Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
RWqHoCWEPI.exe

Overview

General Information

Sample name:RWqHoCWEPI.exe
renamed because original name is a hash value
Original sample name:149069598db31db305dbd822b156e249.exe
Analysis ID:1353705
MD5:149069598db31db305dbd822b156e249
SHA1:853df6ed8db672664f7c4e5911cf73c8330c9c04
SHA256:5869f74791cb84c168e2d6ece00b536880a29db0b59ef963d5a543ab3e2bb89d
Tags:exenjratRAT
Infos:

Detection

Njrat
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Antivirus detection for URL or domain
Antivirus detection for dropped file
Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Snort IDS alert for network traffic
Yara detected Njrat
.NET source code contains potential unpacker
.NET source code references suspicious native API functions
C2 URLs / IPs found in malware configuration
Connects to many ports of the same IP (likely port scanning)
Contains functionality to log keystrokes (.Net Source)
Creates autostart registry keys with suspicious names
Drops PE files to the startup folder
Machine Learning detection for dropped file
Machine Learning detection for sample
Modifies the windows firewall
Protects its processes via BreakOnTermination flag
Uses netsh to modify the Windows network and firewall settings
Abnormal high CPU Usage
Contains functionality to call native functions
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Creates a start menu entry (Start Menu\Programs\Startup)
Detected TCP or UDP traffic on non-standard ports
Drops PE files
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
May infect USB drives
May sleep (evasive loops) to hinder dynamic analysis
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Stores files to the Windows start menu directory
Uses 32bit PE files
Yara signature match

Classification

  • System is w10x64
  • RWqHoCWEPI.exe (PID: 5924 cmdline: C:\Users\user\Desktop\RWqHoCWEPI.exe MD5: 149069598DB31DB305DBD822B156E249)
    • server.exe (PID: 2996 cmdline: "C:\Users\user\AppData\Roaming\server.exe" MD5: 149069598DB31DB305DBD822B156E249)
      • netsh.exe (PID: 6384 cmdline: netsh firewall add allowedprogram "C:\Users\user\AppData\Roaming\server.exe" "server.exe" ENABLE MD5: 4E89A1A088BE715D6C946E55AB07C7DF)
        • conhost.exe (PID: 6652 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
  • server.exe (PID: 3412 cmdline: "C:\Users\user\AppData\Roaming\server.exe" .. MD5: 149069598DB31DB305DBD822B156E249)
  • server.exe (PID: 824 cmdline: "C:\Users\user\AppData\Roaming\server.exe" .. MD5: 149069598DB31DB305DBD822B156E249)
  • server.exe (PID: 2664 cmdline: "C:\Users\user\AppData\Roaming\server.exe" .. MD5: 149069598DB31DB305DBD822B156E249)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
NjRATRedPacket Security describes NJRat as "a remote access trojan (RAT) has capabilities to log keystrokes, access the victim's camera, steal credentials stored in browsers, open a reverse shell, upload/download files, view the victim's desktop, perform process, file, and registry manipulations, and capabilities to let the attacker update, uninstall, restart, close, disconnect the RAT and rename its campaign ID. Through the Command & Control (CnC) server software, the attacker has capabilities to create and configure the malware to spread through USB drives."It is supposedly popular with actors in the Middle East. Similar to other RATs, many leaked builders may be backdoored.
  • AQUATIC PANDA
  • Earth Lusca
  • Operation C-Major
  • The Gorgon Group
https://malpedia.caad.fkie.fraunhofer.de/details/win.njrat
{"Host": "2.tcp.eu.ngrok.io", "Port": "16458", "Version": "im523", "Campaign ID": "HacKed", "Install Name": "server.exe", "Install Dir": "AppData"}
SourceRuleDescriptionAuthorStrings
RWqHoCWEPI.exeJoeSecurity_NjratYara detected NjratJoe Security
    RWqHoCWEPI.exeWindows_Trojan_Njrat_30f3c220unknownunknown
    • 0x64c1:$a1: get_Registry
    • 0x7f02:$a3: Download ERROR
    • 0x81f4:$a5: netsh firewall delete allowedprogram "
    RWqHoCWEPI.exenjrat1Identify njRatBrian Wallace @botnet_hunter
    • 0x80ea:$a1: netsh firewall add allowedprogram
    • 0x82e4:$b1: [TAP]
    • 0x828a:$b2: & exit
    • 0x8256:$c1: md.exe /k ping 0 & del
    RWqHoCWEPI.exeMALWARE_Win_NjRATDetects NjRAT / BladabindiditekSHen
    • 0x81f4:$s1: netsh firewall delete allowedprogram
    • 0x80ea:$s2: netsh firewall add allowedprogram
    • 0x8254:$s3: 63 00 6D 00 64 00 2E 00 65 00 78 00 65 00 20 00 2F 00 6B 00 20 00 70 00 69 00 6E 00 67
    • 0x7ede:$s4: Execute ERROR
    • 0x7f3e:$s4: Execute ERROR
    • 0x7f02:$s5: Download ERROR
    • 0x829a:$s6: [kl]
    SourceRuleDescriptionAuthorStrings
    C:\Users\user\AppData\Roaming\server.exeJoeSecurity_NjratYara detected NjratJoe Security
      C:\Users\user\AppData\Roaming\server.exeWindows_Trojan_Njrat_30f3c220unknownunknown
      • 0x64c1:$a1: get_Registry
      • 0x7f02:$a3: Download ERROR
      • 0x81f4:$a5: netsh firewall delete allowedprogram "
      C:\Users\user\AppData\Roaming\server.exenjrat1Identify njRatBrian Wallace @botnet_hunter
      • 0x80ea:$a1: netsh firewall add allowedprogram
      • 0x82e4:$b1: [TAP]
      • 0x828a:$b2: & exit
      • 0x8256:$c1: md.exe /k ping 0 & del
      C:\Users\user\AppData\Roaming\server.exeMALWARE_Win_NjRATDetects NjRAT / BladabindiditekSHen
      • 0x81f4:$s1: netsh firewall delete allowedprogram
      • 0x80ea:$s2: netsh firewall add allowedprogram
      • 0x8254:$s3: 63 00 6D 00 64 00 2E 00 65 00 78 00 65 00 20 00 2F 00 6B 00 20 00 70 00 69 00 6E 00 67
      • 0x7ede:$s4: Execute ERROR
      • 0x7f3e:$s4: Execute ERROR
      • 0x7f02:$s5: Download ERROR
      • 0x829a:$s6: [kl]
      C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\af78e772b16b220a2184770c875037cc.exeJoeSecurity_NjratYara detected NjratJoe Security
        Click to see the 3 entries
        SourceRuleDescriptionAuthorStrings
        00000000.00000000.1670598790.0000000000C92000.00000002.00000001.01000000.00000003.sdmpJoeSecurity_NjratYara detected NjratJoe Security
          00000000.00000000.1670598790.0000000000C92000.00000002.00000001.01000000.00000003.sdmpWindows_Trojan_Njrat_30f3c220unknownunknown
          • 0x62c1:$a1: get_Registry
          • 0x7d02:$a3: Download ERROR
          • 0x7ff4:$a5: netsh firewall delete allowedprogram "
          00000000.00000000.1670598790.0000000000C92000.00000002.00000001.01000000.00000003.sdmpnjrat1Identify njRatBrian Wallace @botnet_hunter
          • 0x7eea:$a1: netsh firewall add allowedprogram
          • 0x80e4:$b1: [TAP]
          • 0x808a:$b2: & exit
          • 0x8056:$c1: md.exe /k ping 0 & del
          Process Memory Space: RWqHoCWEPI.exe PID: 5924JoeSecurity_NjratYara detected NjratJoe Security
            Process Memory Space: server.exe PID: 2996JoeSecurity_NjratYara detected NjratJoe Security
              SourceRuleDescriptionAuthorStrings
              0.0.RWqHoCWEPI.exe.c90000.0.unpackJoeSecurity_NjratYara detected NjratJoe Security
                0.0.RWqHoCWEPI.exe.c90000.0.unpackWindows_Trojan_Njrat_30f3c220unknownunknown
                • 0x64c1:$a1: get_Registry
                • 0x7f02:$a3: Download ERROR
                • 0x81f4:$a5: netsh firewall delete allowedprogram "
                0.0.RWqHoCWEPI.exe.c90000.0.unpacknjrat1Identify njRatBrian Wallace @botnet_hunter
                • 0x80ea:$a1: netsh firewall add allowedprogram
                • 0x82e4:$b1: [TAP]
                • 0x828a:$b2: & exit
                • 0x8256:$c1: md.exe /k ping 0 & del
                0.0.RWqHoCWEPI.exe.c90000.0.unpackMALWARE_Win_NjRATDetects NjRAT / BladabindiditekSHen
                • 0x81f4:$s1: netsh firewall delete allowedprogram
                • 0x80ea:$s2: netsh firewall add allowedprogram
                • 0x8254:$s3: 63 00 6D 00 64 00 2E 00 65 00 78 00 65 00 20 00 2F 00 6B 00 20 00 70 00 69 00 6E 00 67
                • 0x7ede:$s4: Execute ERROR
                • 0x7f3e:$s4: Execute ERROR
                • 0x7f02:$s5: Download ERROR
                • 0x829a:$s6: [kl]
                No Sigma rule has matched
                Timestamp:192.168.2.418.156.13.20949953164582825564 12/05/23-05:30:54.702443
                SID:2825564
                Source Port:49953
                Destination Port:16458
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.418.156.13.20949954164582033132 12/05/23-05:30:54.887034
                SID:2033132
                Source Port:49954
                Destination Port:16458
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.43.127.138.5749763164582814856 12/05/23-05:28:17.831563
                SID:2814856
                Source Port:49763
                Destination Port:16458
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.43.127.138.5749764164582814856 12/05/23-05:28:19.042466
                SID:2814856
                Source Port:49764
                Destination Port:16458
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.418.156.13.20949951164582825564 12/05/23-05:30:53.874480
                SID:2825564
                Source Port:49951
                Destination Port:16458
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.418.156.13.20949955164582825564 12/05/23-05:30:55.515019
                SID:2825564
                Source Port:49955
                Destination Port:16458
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.43.127.138.5749761164582814856 12/05/23-05:28:15.201898
                SID:2814856
                Source Port:49761
                Destination Port:16458
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.43.127.138.5749762164582814856 12/05/23-05:28:16.554165
                SID:2814856
                Source Port:49762
                Destination Port:16458
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.43.127.138.5749765164582814856 12/05/23-05:28:20.204124
                SID:2814856
                Source Port:49765
                Destination Port:16458
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.43.127.138.5749766164582814856 12/05/23-05:28:21.310665
                SID:2814856
                Source Port:49766
                Destination Port:16458
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.418.156.13.20949950164582825564 12/05/23-05:30:53.468048
                SID:2825564
                Source Port:49950
                Destination Port:16458
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.418.156.13.20949951164582033132 12/05/23-05:30:53.651042
                SID:2033132
                Source Port:49951
                Destination Port:16458
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.418.156.13.20949955164582033132 12/05/23-05:30:55.293994
                SID:2033132
                Source Port:49955
                Destination Port:16458
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.418.156.13.20949928164582814856 12/05/23-05:30:43.621927
                SID:2814856
                Source Port:49928
                Destination Port:16458
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.43.127.138.5749790164582033132 12/05/23-05:28:40.265275
                SID:2033132
                Source Port:49790
                Destination Port:16458
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.418.156.13.20949957164582825564 12/05/23-05:30:56.327667
                SID:2825564
                Source Port:49957
                Destination Port:16458
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.43.127.138.5749791164582033132 12/05/23-05:28:40.794777
                SID:2033132
                Source Port:49791
                Destination Port:16458
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.418.156.13.20949927164582814856 12/05/23-05:30:43.151299
                SID:2814856
                Source Port:49927
                Destination Port:16458
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.418.156.13.20949952164582033132 12/05/23-05:30:54.059521
                SID:2033132
                Source Port:49952
                Destination Port:16458
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.418.156.13.20949953164582033132 12/05/23-05:30:54.470334
                SID:2033132
                Source Port:49953
                Destination Port:16458
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.418.156.13.20949956164582825564 12/05/23-05:30:55.921346
                SID:2825564
                Source Port:49956
                Destination Port:16458
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.418.156.13.20949926164582814856 12/05/23-05:30:42.682748
                SID:2814856
                Source Port:49926
                Destination Port:16458
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.43.127.138.5749794164582033132 12/05/23-05:28:42.327787
                SID:2033132
                Source Port:49794
                Destination Port:16458
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.418.156.13.20949930164582814860 12/05/23-05:30:44.625009
                SID:2814860
                Source Port:49930
                Destination Port:16458
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.43.127.138.5749793164582033132 12/05/23-05:28:41.825597
                SID:2033132
                Source Port:49793
                Destination Port:16458
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.43.127.138.5749795164582033132 12/05/23-05:28:42.827309
                SID:2033132
                Source Port:49795
                Destination Port:16458
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.418.156.13.20949923164582814856 12/05/23-05:30:41.258614
                SID:2814856
                Source Port:49923
                Destination Port:16458
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.418.156.13.20949925164582814856 12/05/23-05:30:42.210120
                SID:2814856
                Source Port:49925
                Destination Port:16458
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.43.127.138.5749792164582033132 12/05/23-05:28:41.313997
                SID:2033132
                Source Port:49792
                Destination Port:16458
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.43.127.138.5749796164582033132 12/05/23-05:28:43.612253
                SID:2033132
                Source Port:49796
                Destination Port:16458
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.43.127.138.5749769164582814856 12/05/23-05:28:24.386936
                SID:2814856
                Source Port:49769
                Destination Port:16458
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.43.127.138.5749796164582825563 12/05/23-05:28:43.794707
                SID:2825563
                Source Port:49796
                Destination Port:16458
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.418.156.13.20949920164582814856 12/05/23-05:30:39.787305
                SID:2814856
                Source Port:49920
                Destination Port:16458
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.418.156.13.20949924164582814856 12/05/23-05:30:41.742428
                SID:2814856
                Source Port:49924
                Destination Port:16458
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.418.156.13.20949950164582033132 12/05/23-05:30:53.248119
                SID:2033132
                Source Port:49950
                Destination Port:16458
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.43.127.138.5749767164582814856 12/05/23-05:28:22.372757
                SID:2814856
                Source Port:49767
                Destination Port:16458
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.43.127.138.5749768164582814856 12/05/23-05:28:23.400281
                SID:2814856
                Source Port:49768
                Destination Port:16458
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.43.127.138.5749797164582825563 12/05/23-05:28:46.037171
                SID:2825563
                Source Port:49797
                Destination Port:16458
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.418.156.13.20949921164582814856 12/05/23-05:30:40.286453
                SID:2814856
                Source Port:49921
                Destination Port:16458
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.43.127.138.5749798164582825563 12/05/23-05:28:46.526164
                SID:2825563
                Source Port:49798
                Destination Port:16458
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.418.156.13.20949922164582814856 12/05/23-05:30:40.772511
                SID:2814856
                Source Port:49922
                Destination Port:16458
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.43.127.138.5749799164582825563 12/05/23-05:28:46.989960
                SID:2825563
                Source Port:49799
                Destination Port:16458
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.43.127.138.5749789164582825563 12/05/23-05:28:39.901043
                SID:2825563
                Source Port:49789
                Destination Port:16458
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.418.156.13.20949930164582814856 12/05/23-05:30:44.540750
                SID:2814856
                Source Port:49930
                Destination Port:16458
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.418.156.13.20949959164582825564 12/05/23-05:30:57.155698
                SID:2825564
                Source Port:49959
                Destination Port:16458
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.43.127.138.5749760164582814856 12/05/23-05:28:13.802701
                SID:2814856
                Source Port:49760
                Destination Port:16458
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.43.127.138.5749770164582814856 12/05/23-05:28:25.324266
                SID:2814856
                Source Port:49770
                Destination Port:16458
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.43.127.138.5749771164582814856 12/05/23-05:28:27.604677
                SID:2814856
                Source Port:49771
                Destination Port:16458
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.43.127.138.5749774164582814856 12/05/23-05:28:30.136952
                SID:2814856
                Source Port:49774
                Destination Port:16458
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.418.156.13.20949943164582825564 12/05/23-05:30:50.484138
                SID:2825564
                Source Port:49943
                Destination Port:16458
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.418.156.13.20949963164582825563 12/05/23-05:30:58.744491
                SID:2825563
                Source Port:49963
                Destination Port:16458
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.418.156.13.20949964164582033132 12/05/23-05:30:58.981178
                SID:2033132
                Source Port:49964
                Destination Port:16458
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.418.156.13.20949964164582825563 12/05/23-05:30:59.161644
                SID:2825563
                Source Port:49964
                Destination Port:16458
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.418.156.13.20949965164582033132 12/05/23-05:30:59.387461
                SID:2033132
                Source Port:49965
                Destination Port:16458
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.43.127.138.5749773164582814856 12/05/23-05:28:29.319798
                SID:2814856
                Source Port:49773
                Destination Port:16458
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.43.127.138.5749775164582814856 12/05/23-05:28:30.932975
                SID:2814856
                Source Port:49775
                Destination Port:16458
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.418.156.13.20949943164582033132 12/05/23-05:30:50.247556
                SID:2033132
                Source Port:49943
                Destination Port:16458
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.418.156.13.20949945164582033132 12/05/23-05:30:51.089533
                SID:2033132
                Source Port:49945
                Destination Port:16458
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.43.127.138.5749772164582814856 12/05/23-05:28:28.477294
                SID:2814856
                Source Port:49772
                Destination Port:16458
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.43.127.138.5749776164582814856 12/05/23-05:28:31.694132
                SID:2814856
                Source Port:49776
                Destination Port:16458
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.418.156.13.20949965164582825563 12/05/23-05:30:59.568414
                SID:2825563
                Source Port:49965
                Destination Port:16458
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.418.156.13.20949940164582825564 12/05/23-05:30:49.218482
                SID:2825564
                Source Port:49940
                Destination Port:16458
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.418.156.13.20949944164582825564 12/05/23-05:30:50.905779
                SID:2825564
                Source Port:49944
                Destination Port:16458
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.418.156.13.20949961164582825563 12/05/23-05:30:57.932002
                SID:2825563
                Source Port:49961
                Destination Port:16458
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.418.156.13.20949962164582033132 12/05/23-05:30:58.158127
                SID:2033132
                Source Port:49962
                Destination Port:16458
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.418.156.13.20949962164582825563 12/05/23-05:30:58.338916
                SID:2825563
                Source Port:49962
                Destination Port:16458
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.418.156.13.20949966164582033132 12/05/23-05:30:59.792452
                SID:2033132
                Source Port:49966
                Destination Port:16458
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.418.156.13.20949939164582814856 12/05/23-05:30:48.740784
                SID:2814856
                Source Port:49939
                Destination Port:16458
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.418.156.13.20949940164582033132 12/05/23-05:30:48.980774
                SID:2033132
                Source Port:49940
                Destination Port:16458
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.418.156.13.20949944164582033132 12/05/23-05:30:50.669939
                SID:2033132
                Source Port:49944
                Destination Port:16458
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.418.156.13.20949917164582814856 12/05/23-05:30:38.255594
                SID:2814856
                Source Port:49917
                Destination Port:16458
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.418.156.13.20949938164582814856 12/05/23-05:30:48.315387
                SID:2814856
                Source Port:49938
                Destination Port:16458
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.418.156.13.20949967164582825563 12/05/23-05:31:00.387111
                SID:2825563
                Source Port:49967
                Destination Port:16458
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.43.127.138.5749780164582033132 12/05/23-05:28:34.335865
                SID:2033132
                Source Port:49780
                Destination Port:16458
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.418.156.13.20949960164582825563 12/05/23-05:30:57.522843
                SID:2825563
                Source Port:49960
                Destination Port:16458
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.418.156.13.20949916164582814856 12/05/23-05:30:37.726849
                SID:2814856
                Source Port:49916
                Destination Port:16458
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.418.156.13.20949966164582825563 12/05/23-05:30:59.973325
                SID:2825563
                Source Port:49966
                Destination Port:16458
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.418.156.13.20949968164582825563 12/05/23-05:31:00.783547
                SID:2825563
                Source Port:49968
                Destination Port:16458
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.418.156.13.20949941164582033132 12/05/23-05:30:49.404746
                SID:2033132
                Source Port:49941
                Destination Port:16458
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.418.156.13.20949949164582033132 12/05/23-05:30:52.809100
                SID:2033132
                Source Port:49949
                Destination Port:16458
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.418.156.13.20949915164582814856 12/05/23-05:30:37.180129
                SID:2814856
                Source Port:49915
                Destination Port:16458
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.418.156.13.20949936164582814856 12/05/23-05:30:47.426018
                SID:2814856
                Source Port:49936
                Destination Port:16458
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.418.156.13.20949945164582825564 12/05/23-05:30:51.327791
                SID:2825564
                Source Port:49945
                Destination Port:16458
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.418.156.13.20949963164582033132 12/05/23-05:30:58.562505
                SID:2033132
                Source Port:49963
                Destination Port:16458
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.418.192.93.8649731164582033132 12/05/23-05:27:17.127747
                SID:2033132
                Source Port:49731
                Destination Port:16458
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.418.156.13.20949937164582814856 12/05/23-05:30:47.880675
                SID:2814856
                Source Port:49937
                Destination Port:16458
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.418.156.13.20949942164582033132 12/05/23-05:30:49.830004
                SID:2033132
                Source Port:49942
                Destination Port:16458
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.418.156.13.20949913164582814856 12/05/23-05:30:36.068568
                SID:2814856
                Source Port:49913
                Destination Port:16458
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.418.156.13.20949934164582814856 12/05/23-05:30:46.446917
                SID:2814856
                Source Port:49934
                Destination Port:16458
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.43.127.138.5749783164582033132 12/05/23-05:28:36.247853
                SID:2033132
                Source Port:49783
                Destination Port:16458
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.43.127.138.5749784164582033132 12/05/23-05:28:36.855308
                SID:2033132
                Source Port:49784
                Destination Port:16458
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.418.156.13.20949912164582814856 12/05/23-05:30:35.503776
                SID:2814856
                Source Port:49912
                Destination Port:16458
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.418.156.13.20949914164582814856 12/05/23-05:30:36.635877
                SID:2814856
                Source Port:49914
                Destination Port:16458
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.43.127.138.5749781164582033132 12/05/23-05:28:34.985112
                SID:2033132
                Source Port:49781
                Destination Port:16458
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.43.127.138.5749782164582033132 12/05/23-05:28:35.624002
                SID:2033132
                Source Port:49782
                Destination Port:16458
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.43.127.138.5749785164582033132 12/05/23-05:28:37.455172
                SID:2033132
                Source Port:49785
                Destination Port:16458
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.43.127.138.5749786164582033132 12/05/23-05:28:38.034826
                SID:2033132
                Source Port:49786
                Destination Port:16458
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.418.156.13.20949931164582814856 12/05/23-05:30:44.997410
                SID:2814856
                Source Port:49931
                Destination Port:16458
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.418.156.13.20949935164582814856 12/05/23-05:30:47.061771
                SID:2814856
                Source Port:49935
                Destination Port:16458
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.43.127.138.5749785164582825564 12/05/23-05:28:37.843889
                SID:2825564
                Source Port:49785
                Destination Port:16458
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.43.127.138.5749778164582814856 12/05/23-05:28:33.152986
                SID:2814856
                Source Port:49778
                Destination Port:16458
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.418.156.13.20949960164582033132 12/05/23-05:30:57.341101
                SID:2033132
                Source Port:49960
                Destination Port:16458
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.418.156.13.20949961164582033132 12/05/23-05:30:57.751368
                SID:2033132
                Source Port:49961
                Destination Port:16458
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.43.127.138.5749777164582814856 12/05/23-05:28:32.429925
                SID:2814856
                Source Port:49777
                Destination Port:16458
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.43.127.138.5749779164582814856 12/05/23-05:28:33.835225
                SID:2814856
                Source Port:49779
                Destination Port:16458
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.418.156.13.20949910164582814856 12/05/23-05:30:34.336695
                SID:2814856
                Source Port:49910
                Destination Port:16458
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.43.127.138.5749788164582825563 12/05/23-05:28:39.348879
                SID:2825563
                Source Port:49788
                Destination Port:16458
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.418.156.13.20949911164582814856 12/05/23-05:30:34.933998
                SID:2814856
                Source Port:49911
                Destination Port:16458
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.418.156.13.20949932164582814856 12/05/23-05:30:45.445445
                SID:2814856
                Source Port:49932
                Destination Port:16458
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.43.127.138.5749787164582825563 12/05/23-05:28:38.793091
                SID:2825563
                Source Port:49787
                Destination Port:16458
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.418.156.13.20949933164582814856 12/05/23-05:30:45.917138
                SID:2814856
                Source Port:49933
                Destination Port:16458
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.418.192.93.8649731164582825563 12/05/23-05:27:17.308269
                SID:2825563
                Source Port:49731
                Destination Port:16458
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.418.156.13.20949939164582814860 12/05/23-05:30:48.796313
                SID:2814860
                Source Port:49939
                Destination Port:16458
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.418.156.13.20949916164582814860 12/05/23-05:30:37.890647
                SID:2814860
                Source Port:49916
                Destination Port:16458
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.418.156.13.20949918164582814860 12/05/23-05:30:38.921490
                SID:2814860
                Source Port:49918
                Destination Port:16458
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.418.192.93.8649738164582033132 12/05/23-05:27:24.345734
                SID:2033132
                Source Port:49738
                Destination Port:16458
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.43.127.138.5749789164582033132 12/05/23-05:28:39.720245
                SID:2033132
                Source Port:49789
                Destination Port:16458
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.418.156.13.20949937164582814860 12/05/23-05:30:47.952432
                SID:2814860
                Source Port:49937
                Destination Port:16458
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.418.192.93.8649737164582033132 12/05/23-05:27:21.937238
                SID:2033132
                Source Port:49737
                Destination Port:16458
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.418.156.13.20949915164582814860 12/05/23-05:30:37.358943
                SID:2814860
                Source Port:49915
                Destination Port:16458
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.418.156.13.20949919164582814860 12/05/23-05:30:39.421594
                SID:2814860
                Source Port:49919
                Destination Port:16458
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.43.127.138.5749787164582033132 12/05/23-05:28:38.610835
                SID:2033132
                Source Port:49787
                Destination Port:16458
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.43.127.138.5749788164582033132 12/05/23-05:28:39.169079
                SID:2033132
                Source Port:49788
                Destination Port:16458
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.418.192.93.8649739164582033132 12/05/23-05:27:26.754614
                SID:2033132
                Source Port:49739
                Destination Port:16458
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.418.156.13.20949917164582814860 12/05/23-05:30:38.405876
                SID:2814860
                Source Port:49917
                Destination Port:16458
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.418.156.13.20949932164582814860 12/05/23-05:30:45.550951
                SID:2814860
                Source Port:49932
                Destination Port:16458
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.418.156.13.20949948164582033132 12/05/23-05:30:52.356572
                SID:2033132
                Source Port:49948
                Destination Port:16458
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.418.192.93.8649736164582033132 12/05/23-05:27:19.532370
                SID:2033132
                Source Port:49736
                Destination Port:16458
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.418.156.13.20949968164582033132 12/05/23-05:31:00.603507
                SID:2033132
                Source Port:49968
                Destination Port:16458
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.418.156.13.20949969164582033132 12/05/23-05:31:01.011281
                SID:2033132
                Source Port:49969
                Destination Port:16458
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.418.156.13.20949918164582814856 12/05/23-05:30:38.774492
                SID:2814856
                Source Port:49918
                Destination Port:16458
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.418.156.13.20949912164582814860 12/05/23-05:30:35.704944
                SID:2814860
                Source Port:49912
                Destination Port:16458
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.418.156.13.20949914164582814860 12/05/23-05:30:36.811958
                SID:2814860
                Source Port:49914
                Destination Port:16458
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.418.156.13.20949947164582033132 12/05/23-05:30:51.933916
                SID:2033132
                Source Port:49947
                Destination Port:16458
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.418.156.13.20949919164582814856 12/05/23-05:30:39.285678
                SID:2814856
                Source Port:49919
                Destination Port:16458
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.418.156.13.20949967164582033132 12/05/23-05:31:00.204452
                SID:2033132
                Source Port:49967
                Destination Port:16458
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.418.156.13.20949913164582814860 12/05/23-05:30:36.265325
                SID:2814860
                Source Port:49913
                Destination Port:16458
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.418.156.13.20949946164582033132 12/05/23-05:30:51.512099
                SID:2033132
                Source Port:49946
                Destination Port:16458
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.418.156.13.20949932164582825564 12/05/23-05:30:45.550951
                SID:2825564
                Source Port:49932
                Destination Port:16458
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.418.156.13.20949933164582033132 12/05/23-05:30:45.736476
                SID:2033132
                Source Port:49933
                Destination Port:16458
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.418.156.13.20949974164582825563 12/05/23-05:31:03.198944
                SID:2825563
                Source Port:49974
                Destination Port:16458
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.418.156.13.20949975164582033132 12/05/23-05:31:03.517120
                SID:2033132
                Source Port:49975
                Destination Port:16458
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.43.127.138.5749784164582814856 12/05/23-05:28:37.034990
                SID:2814856
                Source Port:49784
                Destination Port:16458
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.43.127.138.5749786164582814856 12/05/23-05:28:38.216146
                SID:2814856
                Source Port:49786
                Destination Port:16458
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.418.156.13.20949972164582825563 12/05/23-05:31:02.396051
                SID:2825563
                Source Port:49972
                Destination Port:16458
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.418.156.13.20949973164582033132 12/05/23-05:31:02.622147
                SID:2033132
                Source Port:49973
                Destination Port:16458
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.418.156.13.20949970164582825563 12/05/23-05:31:01.598067
                SID:2825563
                Source Port:49970
                Destination Port:16458
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.418.156.13.20949949164582814856 12/05/23-05:30:52.989913
                SID:2814856
                Source Port:49949
                Destination Port:16458
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.43.127.138.5749770164582033132 12/05/23-05:28:25.143485
                SID:2033132
                Source Port:49770
                Destination Port:16458
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.418.156.13.20949931164582033132 12/05/23-05:30:44.810828
                SID:2033132
                Source Port:49931
                Destination Port:16458
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.418.156.13.20949947164582814856 12/05/23-05:30:52.114677
                SID:2814856
                Source Port:49947
                Destination Port:16458
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.418.156.13.20949905164582814856 12/05/23-05:30:31.132290
                SID:2814856
                Source Port:49905
                Destination Port:16458
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.418.192.93.8649742164582033132 12/05/23-05:27:34.516199
                SID:2033132
                Source Port:49742
                Destination Port:16458
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.418.156.13.20949939164582033132 12/05/23-05:30:48.560194
                SID:2033132
                Source Port:49939
                Destination Port:16458
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.418.192.93.8649741164582825563 12/05/23-05:27:32.319288
                SID:2825563
                Source Port:49741
                Destination Port:16458
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.418.156.13.20949945164582814856 12/05/23-05:30:51.269914
                SID:2814856
                Source Port:49945
                Destination Port:16458
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.418.156.13.20949952164582814860 12/05/23-05:30:54.280837
                SID:2814860
                Source Port:49952
                Destination Port:16458
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.418.156.13.20949903164582814856 12/05/23-05:30:29.473490
                SID:2814856
                Source Port:49903
                Destination Port:16458
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.43.127.138.5749772164582033132 12/05/23-05:28:28.296608
                SID:2033132
                Source Port:49772
                Destination Port:16458
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.43.127.138.5749774164582033132 12/05/23-05:28:29.955112
                SID:2033132
                Source Port:49774
                Destination Port:16458
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.418.156.13.20949950164582814860 12/05/23-05:30:53.468048
                SID:2814860
                Source Port:49950
                Destination Port:16458
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.418.192.93.8649740164582033132 12/05/23-05:27:29.154814
                SID:2033132
                Source Port:49740
                Destination Port:16458
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.418.156.13.20949971164582033132 12/05/23-05:31:01.807809
                SID:2033132
                Source Port:49971
                Destination Port:16458
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.43.127.138.5749788164582814856 12/05/23-05:28:39.348879
                SID:2814856
                Source Port:49788
                Destination Port:16458
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.418.156.13.20949930164582825564 12/05/23-05:30:44.625009
                SID:2825564
                Source Port:49930
                Destination Port:16458
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.418.156.13.20949943164582814856 12/05/23-05:30:50.428670
                SID:2814856
                Source Port:49943
                Destination Port:16458
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.418.156.13.20949901164582814856 12/05/23-05:30:27.975475
                SID:2814856
                Source Port:49901
                Destination Port:16458
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.418.192.93.8649749164582825563 12/05/23-05:27:52.731544
                SID:2825563
                Source Port:49749
                Destination Port:16458
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.418.192.93.8649738164582825563 12/05/23-05:27:24.526596
                SID:2825563
                Source Port:49738
                Destination Port:16458
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.418.192.93.8649747164582825563 12/05/23-05:27:46.734885
                SID:2825563
                Source Port:49747
                Destination Port:16458
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.418.192.93.8649745164582825563 12/05/23-05:27:41.917485
                SID:2825563
                Source Port:49745
                Destination Port:16458
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.418.156.13.20949941164582814856 12/05/23-05:30:49.585914
                SID:2814856
                Source Port:49941
                Destination Port:16458
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.418.156.13.20949952164582814856 12/05/23-05:30:54.240437
                SID:2814856
                Source Port:49952
                Destination Port:16458
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.418.192.93.8649736164582825563 12/05/23-05:27:19.714364
                SID:2825563
                Source Port:49736
                Destination Port:16458
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.418.156.13.20949950164582814856 12/05/23-05:30:53.430533
                SID:2814856
                Source Port:49950
                Destination Port:16458
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.418.156.13.20949929164582825564 12/05/23-05:30:44.171400
                SID:2825564
                Source Port:49929
                Destination Port:16458
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.418.156.13.20949969164582825563 12/05/23-05:31:01.195485
                SID:2825563
                Source Port:49969
                Destination Port:16458
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.43.127.138.5749780164582814856 12/05/23-05:28:34.515761
                SID:2814856
                Source Port:49780
                Destination Port:16458
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.43.127.138.5749782164582814856 12/05/23-05:28:35.805505
                SID:2814856
                Source Port:49782
                Destination Port:16458
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.43.127.138.5749791164582814856 12/05/23-05:28:40.975474
                SID:2814856
                Source Port:49791
                Destination Port:16458
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.43.127.138.5749793164582814856 12/05/23-05:28:42.006662
                SID:2814856
                Source Port:49793
                Destination Port:16458
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.418.156.13.20949927164582825564 12/05/23-05:30:43.249853
                SID:2825564
                Source Port:49927
                Destination Port:16458
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.418.156.13.20949928164582814860 12/05/23-05:30:43.718067
                SID:2814860
                Source Port:49928
                Destination Port:16458
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.418.156.13.20949949164582814860 12/05/23-05:30:53.062377
                SID:2814860
                Source Port:49949
                Destination Port:16458
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.418.192.93.8649729164582033132 12/05/23-05:27:14.926419
                SID:2033132
                Source Port:49729
                Destination Port:16458
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.43.127.138.5749844164582814856 12/05/23-05:29:07.595663
                SID:2814856
                Source Port:49844
                Destination Port:16458
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.43.127.138.5749846164582814856 12/05/23-05:29:08.411103
                SID:2814856
                Source Port:49846
                Destination Port:16458
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.43.127.138.5749778164582033132 12/05/23-05:28:32.971143
                SID:2033132
                Source Port:49778
                Destination Port:16458
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.418.192.93.8649748164582033132 12/05/23-05:27:50.144328
                SID:2033132
                Source Port:49748
                Destination Port:16458
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.43.127.138.5749776164582033132 12/05/23-05:28:31.512762
                SID:2033132
                Source Port:49776
                Destination Port:16458
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.43.127.138.5749797164582033132 12/05/23-05:28:45.855071
                SID:2033132
                Source Port:49797
                Destination Port:16458
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.43.127.138.5749799164582033132 12/05/23-05:28:46.809302
                SID:2033132
                Source Port:49799
                Destination Port:16458
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.43.127.138.5749842164582814856 12/05/23-05:29:06.788955
                SID:2814856
                Source Port:49842
                Destination Port:16458
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.43.127.138.5749794164582825563 12/05/23-05:28:42.507418
                SID:2825563
                Source Port:49794
                Destination Port:16458
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.418.156.13.20949920164582814860 12/05/23-05:30:39.921521
                SID:2814860
                Source Port:49920
                Destination Port:16458
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.418.156.13.20949922164582814860 12/05/23-05:30:40.890140
                SID:2814860
                Source Port:49922
                Destination Port:16458
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.418.156.13.20949943164582814860 12/05/23-05:30:50.484138
                SID:2814860
                Source Port:49943
                Destination Port:16458
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.418.192.93.8649744164582033132 12/05/23-05:27:39.328647
                SID:2033132
                Source Port:49744
                Destination Port:16458
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.43.127.138.5749792164582825563 12/05/23-05:28:41.495057
                SID:2825563
                Source Port:49792
                Destination Port:16458
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.418.156.13.20949937164582033132 12/05/23-05:30:47.699644
                SID:2033132
                Source Port:49937
                Destination Port:16458
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.418.156.13.20949958164582033132 12/05/23-05:30:56.519012
                SID:2033132
                Source Port:49958
                Destination Port:16458
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.418.156.13.20949907164582814856 12/05/23-05:30:32.460493
                SID:2814856
                Source Port:49907
                Destination Port:16458
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.418.156.13.20949945164582814860 12/05/23-05:30:51.327791
                SID:2814860
                Source Port:49945
                Destination Port:16458
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.43.127.138.5749848164582814856 12/05/23-05:29:09.223938
                SID:2814856
                Source Port:49848
                Destination Port:16458
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.418.156.13.20949935164582033132 12/05/23-05:30:47.019125
                SID:2033132
                Source Port:49935
                Destination Port:16458
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.418.156.13.20949956164582033132 12/05/23-05:30:55.698325
                SID:2033132
                Source Port:49956
                Destination Port:16458
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.418.156.13.20949909164582814856 12/05/23-05:30:33.726724
                SID:2814856
                Source Port:49909
                Destination Port:16458
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.418.156.13.20949914164582033132 12/05/23-05:30:36.454498
                SID:2033132
                Source Port:49914
                Destination Port:16458
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.418.192.93.8649746164582033132 12/05/23-05:27:44.144607
                SID:2033132
                Source Port:49746
                Destination Port:16458
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.43.127.138.5749790164582825563 12/05/23-05:28:40.447649
                SID:2825563
                Source Port:49790
                Destination Port:16458
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.418.157.68.7349870164582814856 12/05/23-05:29:38.440888
                SID:2814856
                Source Port:49870
                Destination Port:16458
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.418.157.68.7349871164582814856 12/05/23-05:29:40.850092
                SID:2814856
                Source Port:49871
                Destination Port:16458
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.418.192.93.8649731164582814856 12/05/23-05:27:17.308269
                SID:2814856
                Source Port:49731
                Destination Port:16458
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.418.156.13.20949916164582033132 12/05/23-05:30:37.544762
                SID:2033132
                Source Port:49916
                Destination Port:16458
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.418.157.68.7349875164582814856 12/05/23-05:29:50.461328
                SID:2814856
                Source Port:49875
                Destination Port:16458
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.418.192.93.8649738164582814856 12/05/23-05:27:24.526596
                SID:2814856
                Source Port:49738
                Destination Port:16458
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.418.156.13.20949914164582825564 12/05/23-05:30:36.811958
                SID:2825564
                Source Port:49914
                Destination Port:16458
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.418.156.13.20949910164582033132 12/05/23-05:30:34.155857
                SID:2033132
                Source Port:49910
                Destination Port:16458
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.418.156.13.20949917164582033132 12/05/23-05:30:38.074828
                SID:2033132
                Source Port:49917
                Destination Port:16458
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.418.156.13.20949964164582814856 12/05/23-05:30:59.161644
                SID:2814856
                Source Port:49964
                Destination Port:16458
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.418.156.13.20949968164582814856 12/05/23-05:31:00.783547
                SID:2814856
                Source Port:49968
                Destination Port:16458
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.418.156.13.20949963164582814856 12/05/23-05:30:58.744491
                SID:2814856
                Source Port:49963
                Destination Port:16458
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.418.156.13.20949967164582814856 12/05/23-05:31:00.387111
                SID:2814856
                Source Port:49967
                Destination Port:16458
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.418.157.68.7349874164582814856 12/05/23-05:29:48.052087
                SID:2814856
                Source Port:49874
                Destination Port:16458
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.43.127.138.5749840164582814856 12/05/23-05:29:05.972883
                SID:2814856
                Source Port:49840
                Destination Port:16458
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.418.192.93.8649759164582825563 12/05/23-05:28:12.224798
                SID:2825563
                Source Port:49759
                Destination Port:16458
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.418.156.13.20949960164582814856 12/05/23-05:30:57.522843
                SID:2814856
                Source Port:49960
                Destination Port:16458
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.418.156.13.20949970164582814856 12/05/23-05:31:01.598067
                SID:2814856
                Source Port:49970
                Destination Port:16458
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.418.156.13.20949973164582814856 12/05/23-05:31:02.802170
                SID:2814856
                Source Port:49973
                Destination Port:16458
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.418.157.68.7349878164582814856 12/05/23-05:29:57.584690
                SID:2814856
                Source Port:49878
                Destination Port:16458
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.418.157.68.7349868164582814856 12/05/23-05:29:33.652497
                SID:2814856
                Source Port:49868
                Destination Port:16458
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.418.157.68.7349879164582814856 12/05/23-05:29:59.721935
                SID:2814856
                Source Port:49879
                Destination Port:16458
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.418.156.13.20949918164582825564 12/05/23-05:30:38.921490
                SID:2825564
                Source Port:49918
                Destination Port:16458
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.418.157.68.7349869164582814856 12/05/23-05:29:36.076726
                SID:2814856
                Source Port:49869
                Destination Port:16458
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.418.156.13.20949917164582825564 12/05/23-05:30:38.405876
                SID:2825564
                Source Port:49917
                Destination Port:16458
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.418.192.93.8649744164582814856 12/05/23-05:27:39.510370
                SID:2814856
                Source Port:49744
                Destination Port:16458
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.418.157.68.7349860164582814856 12/05/23-05:29:14.230651
                SID:2814856
                Source Port:49860
                Destination Port:16458
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.418.192.93.8649745164582814856 12/05/23-05:27:41.917485
                SID:2814856
                Source Port:49745
                Destination Port:16458
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.418.156.13.20949902164582033132 12/05/23-05:30:28.619324
                SID:2033132
                Source Port:49902
                Destination Port:16458
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.418.156.13.20949923164582033132 12/05/23-05:30:41.077603
                SID:2033132
                Source Port:49923
                Destination Port:16458
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.43.127.138.5749795164582814856 12/05/23-05:28:43.008877
                SID:2814856
                Source Port:49795
                Destination Port:16458
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.418.157.68.7349882164582814856 12/05/23-05:30:05.492294
                SID:2814856
                Source Port:49882
                Destination Port:16458
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.418.156.13.20949921164582825564 12/05/23-05:30:40.406126
                SID:2825564
                Source Port:49921
                Destination Port:16458
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.418.157.68.7349881164582814856 12/05/23-05:30:03.674869
                SID:2814856
                Source Port:49881
                Destination Port:16458
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.418.192.93.8649740164582814856 12/05/23-05:27:29.334851
                SID:2814856
                Source Port:49740
                Destination Port:16458
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.418.192.93.8649748164582814856 12/05/23-05:27:50.325082
                SID:2814856
                Source Port:49748
                Destination Port:16458
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.418.157.68.7349864164582814856 12/05/23-05:29:24.009108
                SID:2814856
                Source Port:49864
                Destination Port:16458
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.418.192.93.8649741164582814856 12/05/23-05:27:32.319288
                SID:2814856
                Source Port:49741
                Destination Port:16458
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.418.192.93.8649749164582814856 12/05/23-05:27:52.731544
                SID:2814856
                Source Port:49749
                Destination Port:16458
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.418.156.13.20949906164582033132 12/05/23-05:30:31.627151
                SID:2033132
                Source Port:49906
                Destination Port:16458
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.418.156.13.20949927164582033132 12/05/23-05:30:42.970863
                SID:2033132
                Source Port:49927
                Destination Port:16458
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.418.157.68.7349886164582814856 12/05/23-05:30:11.907628
                SID:2814856
                Source Port:49886
                Destination Port:16458
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.418.156.13.20949925164582825564 12/05/23-05:30:42.312316
                SID:2825564
                Source Port:49925
                Destination Port:16458
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.418.156.13.20949907164582033132 12/05/23-05:30:32.280121
                SID:2033132
                Source Port:49907
                Destination Port:16458
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.418.156.13.20949920164582033132 12/05/23-05:30:39.606448
                SID:2033132
                Source Port:49920
                Destination Port:16458
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.418.156.13.20949928164582033132 12/05/23-05:30:43.440981
                SID:2033132
                Source Port:49928
                Destination Port:16458
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.418.157.68.7349865164582814856 12/05/23-05:29:26.417983
                SID:2814856
                Source Port:49865
                Destination Port:16458
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.43.127.138.5749796164582814856 12/05/23-05:28:43.794707
                SID:2814856
                Source Port:49796
                Destination Port:16458
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.43.127.138.5749762164582033132 12/05/23-05:28:16.371122
                SID:2033132
                Source Port:49762
                Destination Port:16458
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.418.156.13.20949956164582814856 12/05/23-05:30:55.878099
                SID:2814856
                Source Port:49956
                Destination Port:16458
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.43.127.138.5749763164582033132 12/05/23-05:28:17.650304
                SID:2033132
                Source Port:49763
                Destination Port:16458
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.418.192.93.8649750164582825563 12/05/23-05:27:55.135430
                SID:2825563
                Source Port:49750
                Destination Port:16458
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.418.192.93.8649754164582825563 12/05/23-05:28:01.612208
                SID:2825563
                Source Port:49754
                Destination Port:16458
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.43.127.138.5749763164582825563 12/05/23-05:28:17.831563
                SID:2825563
                Source Port:49763
                Destination Port:16458
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.418.156.13.20949953164582814856 12/05/23-05:30:54.652576
                SID:2814856
                Source Port:49953
                Destination Port:16458
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.418.156.13.20949957164582814856 12/05/23-05:30:56.288833
                SID:2814856
                Source Port:49957
                Destination Port:16458
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.418.192.93.8649755164582825563 12/05/23-05:28:03.525947
                SID:2825563
                Source Port:49755
                Destination Port:16458
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.418.157.68.7349885164582814856 12/05/23-05:30:10.413799
                SID:2814856
                Source Port:49885
                Destination Port:16458
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.418.156.13.20949974164582814856 12/05/23-05:31:03.198944
                SID:2814856
                Source Port:49974
                Destination Port:16458
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.418.156.13.20949887164582033132 12/05/23-05:30:13.422497
                SID:2033132
                Source Port:49887
                Destination Port:16458
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.418.192.93.8649750164582033132 12/05/23-05:27:54.954060
                SID:2033132
                Source Port:49750
                Destination Port:16458
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.43.127.138.5749799164582814856 12/05/23-05:28:46.989960
                SID:2814856
                Source Port:49799
                Destination Port:16458
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.43.127.138.5749850164582814856 12/05/23-05:29:10.036341
                SID:2814856
                Source Port:49850
                Destination Port:16458
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.418.157.68.7349861164582814856 12/05/23-05:29:16.616752
                SID:2814856
                Source Port:49861
                Destination Port:16458
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.418.156.13.20949920164582825564 12/05/23-05:30:39.921521
                SID:2825564
                Source Port:49920
                Destination Port:16458
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.43.127.138.5749833164582814856 12/05/23-05:29:03.125314
                SID:2814856
                Source Port:49833
                Destination Port:16458
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.418.157.68.7349884164582825563 12/05/23-05:30:08.864321
                SID:2825563
                Source Port:49884
                Destination Port:16458
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.43.127.138.5749766164582033132 12/05/23-05:28:21.128905
                SID:2033132
                Source Port:49766
                Destination Port:16458
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.43.127.138.5749767164582033132 12/05/23-05:28:22.190600
                SID:2033132
                Source Port:49767
                Destination Port:16458
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.43.127.138.5749853164582814856 12/05/23-05:29:11.270246
                SID:2814856
                Source Port:49853
                Destination Port:16458
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.418.156.13.20949887164582825563 12/05/23-05:30:13.602633
                SID:2825563
                Source Port:49887
                Destination Port:16458
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.43.127.138.5749854164582814856 12/05/23-05:29:11.673501
                SID:2814856
                Source Port:49854
                Destination Port:16458
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.418.157.68.7349885164582825563 12/05/23-05:30:10.413799
                SID:2825563
                Source Port:49885
                Destination Port:16458
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.43.127.138.5749832164582814856 12/05/23-05:29:02.733964
                SID:2814856
                Source Port:49832
                Destination Port:16458
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.418.156.13.20949888164582825563 12/05/23-05:30:14.957727
                SID:2825563
                Source Port:49888
                Destination Port:16458
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.418.192.93.8649753164582033132 12/05/23-05:27:59.364102
                SID:2033132
                Source Port:49753
                Destination Port:16458
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.418.192.93.8649754164582033132 12/05/23-05:28:01.430068
                SID:2033132
                Source Port:49754
                Destination Port:16458
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.418.156.13.20949953164582814860 12/05/23-05:30:54.702443
                SID:2814860
                Source Port:49953
                Destination Port:16458
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.43.127.138.5749760164582825563 12/05/23-05:28:13.802701
                SID:2825563
                Source Port:49760
                Destination Port:16458
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.43.127.138.5749800164582033132 12/05/23-05:28:47.277030
                SID:2033132
                Source Port:49800
                Destination Port:16458
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.418.192.93.8649757164582033132 12/05/23-05:28:08.853677
                SID:2033132
                Source Port:49757
                Destination Port:16458
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.418.156.13.20949956164582814860 12/05/23-05:30:55.921346
                SID:2814860
                Source Port:49956
                Destination Port:16458
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.418.192.93.8649758164582033132 12/05/23-05:28:10.487488
                SID:2033132
                Source Port:49758
                Destination Port:16458
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.418.156.13.20949957164582814860 12/05/23-05:30:56.327667
                SID:2814860
                Source Port:49957
                Destination Port:16458
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.43.127.138.5749837164582814856 12/05/23-05:29:04.756571
                SID:2814856
                Source Port:49837
                Destination Port:16458
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.418.156.13.20949903164582033132 12/05/23-05:30:29.293854
                SID:2033132
                Source Port:49903
                Destination Port:16458
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.418.156.13.20949924164582033132 12/05/23-05:30:41.561599
                SID:2033132
                Source Port:49924
                Destination Port:16458
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.43.127.138.5749857164582814856 12/05/23-05:29:12.895684
                SID:2814856
                Source Port:49857
                Destination Port:16458
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.43.127.138.5749858164582814856 12/05/23-05:29:13.301651
                SID:2814856
                Source Port:49858
                Destination Port:16458
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.43.127.138.5749836164582814856 12/05/23-05:29:04.360431
                SID:2814856
                Source Port:49836
                Destination Port:16458
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.43.127.138.5749785164582814856 12/05/23-05:28:37.637658
                SID:2814856
                Source Port:49785
                Destination Port:16458
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.43.127.138.5749808164582825563 12/05/23-05:28:51.078782
                SID:2825563
                Source Port:49808
                Destination Port:16458
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.418.192.93.8649755164582814856 12/05/23-05:28:03.525947
                SID:2814856
                Source Port:49755
                Destination Port:16458
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.418.156.13.20949934164582033132 12/05/23-05:30:46.266394
                SID:2033132
                Source Port:49934
                Destination Port:16458
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.418.156.13.20949973164582825563 12/05/23-05:31:02.802170
                SID:2825563
                Source Port:49973
                Destination Port:16458
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.418.156.13.20949972164582033132 12/05/23-05:31:02.215267
                SID:2033132
                Source Port:49972
                Destination Port:16458
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.43.127.138.5749804164582825563 12/05/23-05:28:49.288914
                SID:2825563
                Source Port:49804
                Destination Port:16458
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.418.192.93.8649759164582814856 12/05/23-05:28:12.224798
                SID:2814856
                Source Port:49759
                Destination Port:16458
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.418.156.13.20949930164582033132 12/05/23-05:30:44.358558
                SID:2033132
                Source Port:49930
                Destination Port:16458
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.418.156.13.20949938164582033132 12/05/23-05:30:48.135570
                SID:2033132
                Source Port:49938
                Destination Port:16458
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.418.156.13.20949904164582814856 12/05/23-05:30:30.441220
                SID:2814856
                Source Port:49904
                Destination Port:16458
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.43.127.138.5749845164582033132 12/05/23-05:29:07.823911
                SID:2033132
                Source Port:49845
                Destination Port:16458
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.418.156.13.20949935164582825563 12/05/23-05:30:47.061771
                SID:2825563
                Source Port:49935
                Destination Port:16458
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.43.127.138.5749773164582033132 12/05/23-05:28:29.139050
                SID:2033132
                Source Port:49773
                Destination Port:16458
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.418.157.68.7349880164582033132 12/05/23-05:30:01.575901
                SID:2033132
                Source Port:49880
                Destination Port:16458
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.43.127.138.5749803164582033132 12/05/23-05:28:48.657059
                SID:2033132
                Source Port:49803
                Destination Port:16458
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.418.192.93.8649744164582825563 12/05/23-05:27:39.510370
                SID:2825563
                Source Port:49744
                Destination Port:16458
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.418.156.13.20949942164582814856 12/05/23-05:30:50.011928
                SID:2814856
                Source Port:49942
                Destination Port:16458
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.418.156.13.20949946164582814856 12/05/23-05:30:51.693923
                SID:2814856
                Source Port:49946
                Destination Port:16458
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.418.192.93.8649740164582825563 12/05/23-05:27:29.334851
                SID:2825563
                Source Port:49740
                Destination Port:16458
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.43.127.138.5749807164582033132 12/05/23-05:28:50.451102
                SID:2033132
                Source Port:49807
                Destination Port:16458
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.418.156.13.20949900164582814856 12/05/23-05:30:27.195061
                SID:2814856
                Source Port:49900
                Destination Port:16458
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.418.157.68.7349881164582825563 12/05/23-05:30:03.674869
                SID:2825563
                Source Port:49881
                Destination Port:16458
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.43.127.138.5749789164582814856 12/05/23-05:28:39.901043
                SID:2814856
                Source Port:49789
                Destination Port:16458
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.43.127.138.5749849164582033132 12/05/23-05:29:09.449021
                SID:2033132
                Source Port:49849
                Destination Port:16458
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.418.157.68.7349877164582033132 12/05/23-05:29:55.113455
                SID:2033132
                Source Port:49877
                Destination Port:16458
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.418.192.93.8649748164582825563 12/05/23-05:27:50.325082
                SID:2825563
                Source Port:49748
                Destination Port:16458
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.418.192.93.8649737164582825563 12/05/23-05:27:22.118276
                SID:2825563
                Source Port:49737
                Destination Port:16458
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.418.156.13.20949893164582033132 12/05/23-05:30:20.623304
                SID:2033132
                Source Port:49893
                Destination Port:16458
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.418.156.13.20949897164582033132 12/05/23-05:30:24.482674
                SID:2033132
                Source Port:49897
                Destination Port:16458
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.43.127.138.5749800164582825563 12/05/23-05:28:47.456811
                SID:2825563
                Source Port:49800
                Destination Port:16458
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.43.127.138.5749853164582825563 12/05/23-05:29:11.270246
                SID:2825563
                Source Port:49853
                Destination Port:16458
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.43.127.138.5749811164582825563 12/05/23-05:28:52.385463
                SID:2825563
                Source Port:49811
                Destination Port:16458
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.43.127.138.5749842164582825563 12/05/23-05:29:06.788955
                SID:2825563
                Source Port:49842
                Destination Port:16458
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.43.127.138.5749781164582814856 12/05/23-05:28:35.166212
                SID:2814856
                Source Port:49781
                Destination Port:16458
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.43.127.138.5749857164582825563 12/05/23-05:29:12.895684
                SID:2825563
                Source Port:49857
                Destination Port:16458
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.418.157.68.7349873164582033132 12/05/23-05:29:45.464085
                SID:2033132
                Source Port:49873
                Destination Port:16458
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.418.157.68.7349884164582033132 12/05/23-05:30:08.683875
                SID:2033132
                Source Port:49884
                Destination Port:16458
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.43.127.138.5749846164582825563 12/05/23-05:29:08.411103
                SID:2825563
                Source Port:49846
                Destination Port:16458
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.418.156.13.20949939164582825564 12/05/23-05:30:48.796313
                SID:2825564
                Source Port:49939
                Destination Port:16458
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.43.127.138.5749792164582814856 12/05/23-05:28:41.495057
                SID:2814856
                Source Port:49792
                Destination Port:16458
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.418.156.13.20949928164582825564 12/05/23-05:30:43.718067
                SID:2825564
                Source Port:49928
                Destination Port:16458
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.43.127.138.5749818164582033132 12/05/23-05:28:55.230885
                SID:2033132
                Source Port:49818
                Destination Port:16458
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.43.127.138.5749835164582033132 12/05/23-05:29:03.776157
                SID:2033132
                Source Port:49835
                Destination Port:16458
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.43.127.138.5749856164582033132 12/05/23-05:29:12.308734
                SID:2033132
                Source Port:49856
                Destination Port:16458
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.43.127.138.5749814164582033132 12/05/23-05:28:53.542337
                SID:2033132
                Source Port:49814
                Destination Port:16458
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.43.127.138.5749809164582814856 12/05/23-05:28:51.505659
                SID:2814856
                Source Port:49809
                Destination Port:16458
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.43.127.138.5749839164582033132 12/05/23-05:29:05.389966
                SID:2033132
                Source Port:49839
                Destination Port:16458
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.418.157.68.7349870164582825563 12/05/23-05:29:38.440888
                SID:2825563
                Source Port:49870
                Destination Port:16458
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.418.156.13.20949929164582814860 12/05/23-05:30:44.171400
                SID:2814860
                Source Port:49929
                Destination Port:16458
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.43.127.138.5749801164582814856 12/05/23-05:28:47.926701
                SID:2814856
                Source Port:49801
                Destination Port:16458
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.43.127.138.5749805164582814856 12/05/23-05:28:49.742715
                SID:2814856
                Source Port:49805
                Destination Port:16458
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.43.127.138.5749785164582814860 12/05/23-05:28:37.843889
                SID:2814860
                Source Port:49785
                Destination Port:16458
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.43.127.138.5749798164582033132 12/05/23-05:28:46.345198
                SID:2033132
                Source Port:49798
                Destination Port:16458
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.43.127.138.5749777164582033132 12/05/23-05:28:32.250015
                SID:2033132
                Source Port:49777
                Destination Port:16458
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.43.127.138.5749795164582825563 12/05/23-05:28:43.008877
                SID:2825563
                Source Port:49795
                Destination Port:16458
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.418.156.13.20949890164582825563 12/05/23-05:30:17.444365
                SID:2825563
                Source Port:49890
                Destination Port:16458
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.43.127.138.5749822164582814856 12/05/23-05:28:57.084253
                SID:2814856
                Source Port:49822
                Destination Port:16458
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.43.127.138.5749843164582814856 12/05/23-05:29:07.197050
                SID:2814856
                Source Port:49843
                Destination Port:16458
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.418.157.68.7349874164582825563 12/05/23-05:29:48.052087
                SID:2825563
                Source Port:49874
                Destination Port:16458
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.418.156.13.20949921164582814860 12/05/23-05:30:40.406126
                SID:2814860
                Source Port:49921
                Destination Port:16458
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.418.192.93.8649743164582033132 12/05/23-05:27:36.923709
                SID:2033132
                Source Port:49743
                Destination Port:16458
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.43.127.138.5749791164582825563 12/05/23-05:28:40.975474
                SID:2825563
                Source Port:49791
                Destination Port:16458
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.43.127.138.5749810164582033132 12/05/23-05:28:51.762284
                SID:2033132
                Source Port:49810
                Destination Port:16458
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.418.156.13.20949959164582033132 12/05/23-05:30:56.934539
                SID:2033132
                Source Port:49959
                Destination Port:16458
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.418.156.13.20949946164582814860 12/05/23-05:30:51.749888
                SID:2814860
                Source Port:49946
                Destination Port:16458
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.418.156.13.20949925164582814860 12/05/23-05:30:42.312316
                SID:2814860
                Source Port:49925
                Destination Port:16458
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.418.192.93.8649747164582033132 12/05/23-05:27:46.553435
                SID:2033132
                Source Port:49747
                Destination Port:16458
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.418.156.13.20949929164582814856 12/05/23-05:30:44.086997
                SID:2814856
                Source Port:49929
                Destination Port:16458
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.43.127.138.5749826164582814856 12/05/23-05:28:58.738962
                SID:2814856
                Source Port:49826
                Destination Port:16458
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.43.127.138.5749831164582033132 12/05/23-05:29:00.622291
                SID:2033132
                Source Port:49831
                Destination Port:16458
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.43.127.138.5749847164582814856 12/05/23-05:29:08.818505
                SID:2814856
                Source Port:49847
                Destination Port:16458
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.418.156.13.20949908164582814856 12/05/23-05:30:33.106811
                SID:2814856
                Source Port:49908
                Destination Port:16458
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.418.156.13.20949913164582033132 12/05/23-05:30:35.889028
                SID:2033132
                Source Port:49913
                Destination Port:16458
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.418.157.68.7349878164582825563 12/05/23-05:29:57.584690
                SID:2825563
                Source Port:49878
                Destination Port:16458
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.43.127.138.5749852164582033132 12/05/23-05:29:10.682965
                SID:2033132
                Source Port:49852
                Destination Port:16458
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.43.127.138.5749829164582825563 12/05/23-05:28:59.989623
                SID:2825563
                Source Port:49829
                Destination Port:16458
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.43.127.138.5749828164582825563 12/05/23-05:28:59.573407
                SID:2825563
                Source Port:49828
                Destination Port:16458
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.43.127.138.5749829164582033132 12/05/23-05:28:59.808064
                SID:2033132
                Source Port:49829
                Destination Port:16458
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.418.156.13.20949891164582814856 12/05/23-05:30:18.619994
                SID:2814856
                Source Port:49891
                Destination Port:16458
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.43.127.138.5749826164582825563 12/05/23-05:28:58.738962
                SID:2825563
                Source Port:49826
                Destination Port:16458
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.418.156.13.20949892164582814856 12/05/23-05:30:19.723319
                SID:2814856
                Source Port:49892
                Destination Port:16458
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.43.127.138.5749827164582825563 12/05/23-05:28:59.158313
                SID:2825563
                Source Port:49827
                Destination Port:16458
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.418.156.13.20949893164582814856 12/05/23-05:30:20.805581
                SID:2814856
                Source Port:49893
                Destination Port:16458
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.43.127.138.5749824164582033132 12/05/23-05:28:57.730393
                SID:2033132
                Source Port:49824
                Destination Port:16458
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.43.127.138.5749825164582033132 12/05/23-05:28:58.152157
                SID:2033132
                Source Port:49825
                Destination Port:16458
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.43.127.138.5749826164582033132 12/05/23-05:28:58.558789
                SID:2033132
                Source Port:49826
                Destination Port:16458
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.43.127.138.5749827164582033132 12/05/23-05:28:58.978981
                SID:2033132
                Source Port:49827
                Destination Port:16458
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.418.157.68.7349860164582825563 12/05/23-05:29:14.230651
                SID:2825563
                Source Port:49860
                Destination Port:16458
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.418.157.68.7349861164582825563 12/05/23-05:29:16.616752
                SID:2825563
                Source Port:49861
                Destination Port:16458
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.418.156.13.20949890164582814856 12/05/23-05:30:17.444365
                SID:2814856
                Source Port:49890
                Destination Port:16458
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.43.127.138.5749828164582033132 12/05/23-05:28:59.391597
                SID:2033132
                Source Port:49828
                Destination Port:16458
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.418.157.68.7349866164582033132 12/05/23-05:29:28.636957
                SID:2033132
                Source Port:49866
                Destination Port:16458
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.418.157.68.7349865164582033132 12/05/23-05:29:26.237214
                SID:2033132
                Source Port:49865
                Destination Port:16458
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.418.157.68.7349867164582033132 12/05/23-05:29:31.048279
                SID:2033132
                Source Port:49867
                Destination Port:16458
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.418.157.68.7349859164582033132 12/05/23-05:29:13.621777
                SID:2033132
                Source Port:49859
                Destination Port:16458
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.418.156.13.20949899164582814856 12/05/23-05:30:26.378798
                SID:2814856
                Source Port:49899
                Destination Port:16458
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.418.157.68.7349861164582033132 12/05/23-05:29:16.435009
                SID:2033132
                Source Port:49861
                Destination Port:16458
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.418.157.68.7349869164582033132 12/05/23-05:29:35.897457
                SID:2033132
                Source Port:49869
                Destination Port:16458
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.418.156.13.20949889164582814856 12/05/23-05:30:16.228002
                SID:2814856
                Source Port:49889
                Destination Port:16458
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.43.127.138.5749830164582825563 12/05/23-05:29:00.397921
                SID:2825563
                Source Port:49830
                Destination Port:16458
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.418.157.68.7349860164582033132 12/05/23-05:29:14.048225
                SID:2033132
                Source Port:49860
                Destination Port:16458
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.418.157.68.7349868164582033132 12/05/23-05:29:33.471781
                SID:2033132
                Source Port:49868
                Destination Port:16458
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.43.127.138.5749820164582825563 12/05/23-05:28:56.240385
                SID:2825563
                Source Port:49820
                Destination Port:16458
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.43.127.138.5749832164582825563 12/05/23-05:29:02.733964
                SID:2825563
                Source Port:49832
                Destination Port:16458
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.418.156.13.20949895164582814856 12/05/23-05:30:22.820058
                SID:2814856
                Source Port:49895
                Destination Port:16458
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.43.127.138.5749821164582825563 12/05/23-05:28:56.664048
                SID:2825563
                Source Port:49821
                Destination Port:16458
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.43.127.138.5749822164582825563 12/05/23-05:28:57.084253
                SID:2825563
                Source Port:49822
                Destination Port:16458
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.43.127.138.5749831164582825563 12/05/23-05:29:00.804324
                SID:2825563
                Source Port:49831
                Destination Port:16458
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.43.127.138.5749833164582825563 12/05/23-05:29:03.125314
                SID:2825563
                Source Port:49833
                Destination Port:16458
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.418.156.13.20949894164582814856 12/05/23-05:30:21.833130
                SID:2814856
                Source Port:49894
                Destination Port:16458
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.418.156.13.20949896164582814856 12/05/23-05:30:23.755760
                SID:2814856
                Source Port:49896
                Destination Port:16458
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.418.156.13.20949888164582814856 12/05/23-05:30:14.957727
                SID:2814856
                Source Port:49888
                Destination Port:16458
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.43.127.138.5749825164582825563 12/05/23-05:28:58.332620
                SID:2825563
                Source Port:49825
                Destination Port:16458
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.43.127.138.5749836164582825563 12/05/23-05:29:04.360431
                SID:2825563
                Source Port:49836
                Destination Port:16458
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.418.157.68.7349862164582033132 12/05/23-05:29:19.027010
                SID:2033132
                Source Port:49862
                Destination Port:16458
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.43.127.138.5749824164582825563 12/05/23-05:28:57.913904
                SID:2825563
                Source Port:49824
                Destination Port:16458
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.418.157.68.7349863164582033132 12/05/23-05:29:21.432690
                SID:2033132
                Source Port:49863
                Destination Port:16458
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.418.156.13.20949898164582814856 12/05/23-05:30:25.539553
                SID:2814856
                Source Port:49898
                Destination Port:16458
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.418.156.13.20949887164582814856 12/05/23-05:30:13.602633
                SID:2814856
                Source Port:49887
                Destination Port:16458
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.43.127.138.5749823164582825563 12/05/23-05:28:57.503766
                SID:2825563
                Source Port:49823
                Destination Port:16458
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.43.127.138.5749834164582825563 12/05/23-05:29:03.520411
                SID:2825563
                Source Port:49834
                Destination Port:16458
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.418.157.68.7349864164582033132 12/05/23-05:29:23.827162
                SID:2033132
                Source Port:49864
                Destination Port:16458
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.418.156.13.20949897164582814856 12/05/23-05:30:24.663749
                SID:2814856
                Source Port:49897
                Destination Port:16458
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.43.127.138.5749818164582825563 12/05/23-05:28:55.412198
                SID:2825563
                Source Port:49818
                Destination Port:16458
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.43.127.138.5749819164582825563 12/05/23-05:28:55.831748
                SID:2825563
                Source Port:49819
                Destination Port:16458
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.43.127.138.5749839164582825563 12/05/23-05:29:05.570625
                SID:2825563
                Source Port:49839
                Destination Port:16458
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.43.127.138.5749815164582825563 12/05/23-05:28:54.144279
                SID:2825563
                Source Port:49815
                Destination Port:16458
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.43.127.138.5749837164582825563 12/05/23-05:29:04.756571
                SID:2825563
                Source Port:49837
                Destination Port:16458
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.43.127.138.5749838164582825563 12/05/23-05:29:05.159344
                SID:2825563
                Source Port:49838
                Destination Port:16458
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.43.127.138.5749816164582825563 12/05/23-05:28:54.566548
                SID:2825563
                Source Port:49816
                Destination Port:16458
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.43.127.138.5749813164582814856 12/05/23-05:28:53.296410
                SID:2814856
                Source Port:49813
                Destination Port:16458
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.43.127.138.5749814164582814856 12/05/23-05:28:53.722786
                SID:2814856
                Source Port:49814
                Destination Port:16458
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.418.157.68.7349864164582825563 12/05/23-05:29:24.009108
                SID:2825563
                Source Port:49864
                Destination Port:16458
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.418.157.68.7349865164582825563 12/05/23-05:29:26.417983
                SID:2825563
                Source Port:49865
                Destination Port:16458
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.43.127.138.5749812164582814856 12/05/23-05:28:52.818361
                SID:2814856
                Source Port:49812
                Destination Port:16458
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.43.127.138.5749816164582814856 12/05/23-05:28:54.566548
                SID:2814856
                Source Port:49816
                Destination Port:16458
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.418.157.68.7349866164582825563 12/05/23-05:29:28.817890
                SID:2825563
                Source Port:49866
                Destination Port:16458
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.43.127.138.5749810164582814856 12/05/23-05:28:51.943839
                SID:2814856
                Source Port:49810
                Destination Port:16458
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.43.127.138.5749817164582814856 12/05/23-05:28:54.987501
                SID:2814856
                Source Port:49817
                Destination Port:16458
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.43.127.138.5749818164582814856 12/05/23-05:28:55.412198
                SID:2814856
                Source Port:49818
                Destination Port:16458
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.43.127.138.5749811164582814856 12/05/23-05:28:52.385463
                SID:2814856
                Source Port:49811
                Destination Port:16458
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.43.127.138.5749819164582814856 12/05/23-05:28:55.831748
                SID:2814856
                Source Port:49819
                Destination Port:16458
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.418.157.68.7349863164582825563 12/05/23-05:29:21.612391
                SID:2825563
                Source Port:49863
                Destination Port:16458
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.43.127.138.5749844164582033132 12/05/23-05:29:07.416317
                SID:2033132
                Source Port:49844
                Destination Port:16458
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.43.127.138.5749822164582033132 12/05/23-05:28:56.903127
                SID:2033132
                Source Port:49822
                Destination Port:16458
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.43.127.138.5749823164582033132 12/05/23-05:28:57.324327
                SID:2033132
                Source Port:49823
                Destination Port:16458
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.43.127.138.5749821164582033132 12/05/23-05:28:56.483117
                SID:2033132
                Source Port:49821
                Destination Port:16458
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.43.127.138.5749843164582033132 12/05/23-05:29:07.015804
                SID:2033132
                Source Port:49843
                Destination Port:16458
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.43.127.138.5749840164582033132 12/05/23-05:29:05.792518
                SID:2033132
                Source Port:49840
                Destination Port:16458
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.418.157.68.7349868164582825563 12/05/23-05:29:33.652497
                SID:2825563
                Source Port:49868
                Destination Port:16458
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.418.157.68.7349869164582825563 12/05/23-05:29:36.076726
                SID:2825563
                Source Port:49869
                Destination Port:16458
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.43.127.138.5749842164582033132 12/05/23-05:29:06.608820
                SID:2033132
                Source Port:49842
                Destination Port:16458
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.43.127.138.5749815164582814856 12/05/23-05:28:54.144279
                SID:2814856
                Source Port:49815
                Destination Port:16458
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.43.127.138.5749820164582033132 12/05/23-05:28:56.060305
                SID:2033132
                Source Port:49820
                Destination Port:16458
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.418.157.68.7349867164582825563 12/05/23-05:29:31.229375
                SID:2825563
                Source Port:49867
                Destination Port:16458
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.43.127.138.5749841164582033132 12/05/23-05:29:06.198722
                SID:2033132
                Source Port:49841
                Destination Port:16458
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.418.192.93.8649754164582814856 12/05/23-05:28:01.612208
                SID:2814856
                Source Port:49754
                Destination Port:16458
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.43.127.138.5749807164582825563 12/05/23-05:28:50.631981
                SID:2825563
                Source Port:49807
                Destination Port:16458
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.43.127.138.5749809164582825563 12/05/23-05:28:51.505659
                SID:2825563
                Source Port:49809
                Destination Port:16458
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.418.192.93.8649752164582814856 12/05/23-05:27:57.404139
                SID:2814856
                Source Port:49752
                Destination Port:16458
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.418.192.93.8649756164582814856 12/05/23-05:28:05.373115
                SID:2814856
                Source Port:49756
                Destination Port:16458
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.43.127.138.5749808164582033132 12/05/23-05:28:50.895520
                SID:2033132
                Source Port:49808
                Destination Port:16458
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.43.127.138.5749847164582825563 12/05/23-05:29:08.818505
                SID:2825563
                Source Port:49847
                Destination Port:16458
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.418.192.93.8649750164582814856 12/05/23-05:27:55.135430
                SID:2814856
                Source Port:49750
                Destination Port:16458
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.418.192.93.8649758164582814856 12/05/23-05:28:10.668371
                SID:2814856
                Source Port:49758
                Destination Port:16458
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.43.127.138.5749805164582825563 12/05/23-05:28:49.742715
                SID:2825563
                Source Port:49805
                Destination Port:16458
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.43.127.138.5749846164582033132 12/05/23-05:29:08.230515
                SID:2033132
                Source Port:49846
                Destination Port:16458
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.43.127.138.5749802164582033132 12/05/23-05:28:48.199323
                SID:2033132
                Source Port:49802
                Destination Port:16458
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.43.127.138.5749849164582825563 12/05/23-05:29:09.629833
                SID:2825563
                Source Port:49849
                Destination Port:16458
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.418.157.68.7349880164582825563 12/05/23-05:30:01.757295
                SID:2825563
                Source Port:49880
                Destination Port:16458
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.43.127.138.5749804164582033132 12/05/23-05:28:49.106770
                SID:2033132
                Source Port:49804
                Destination Port:16458
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.418.157.68.7349882164582825563 12/05/23-05:30:05.492294
                SID:2825563
                Source Port:49882
                Destination Port:16458
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.43.127.138.5749848164582033132 12/05/23-05:29:09.042695
                SID:2033132
                Source Port:49848
                Destination Port:16458
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.418.156.13.20949898164582033132 12/05/23-05:30:25.358299
                SID:2033132
                Source Port:49898
                Destination Port:16458
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.43.127.138.5749806164582033132 12/05/23-05:28:49.997628
                SID:2033132
                Source Port:49806
                Destination Port:16458
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.418.157.68.7349876164582033132 12/05/23-05:29:52.688609
                SID:2033132
                Source Port:49876
                Destination Port:16458
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.418.156.13.20949892164582033132 12/05/23-05:30:19.543186
                SID:2033132
                Source Port:49892
                Destination Port:16458
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.418.156.13.20949894164582033132 12/05/23-05:30:21.652534
                SID:2033132
                Source Port:49894
                Destination Port:16458
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.418.157.68.7349883164582033132 12/05/23-05:30:07.044152
                SID:2033132
                Source Port:49883
                Destination Port:16458
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.418.157.68.7349872164582033132 12/05/23-05:29:43.064039
                SID:2033132
                Source Port:49872
                Destination Port:16458
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.418.156.13.20949896164582033132 12/05/23-05:30:23.575816
                SID:2033132
                Source Port:49896
                Destination Port:16458
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.418.157.68.7349881164582033132 12/05/23-05:30:03.495299
                SID:2033132
                Source Port:49881
                Destination Port:16458
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.418.157.68.7349870164582033132 12/05/23-05:29:38.261259
                SID:2033132
                Source Port:49870
                Destination Port:16458
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.418.157.68.7349878164582033132 12/05/23-05:29:57.403315
                SID:2033132
                Source Port:49878
                Destination Port:16458
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.43.127.138.5749852164582825563 12/05/23-05:29:10.865065
                SID:2825563
                Source Port:49852
                Destination Port:16458
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.43.127.138.5749841164582825563 12/05/23-05:29:06.378763
                SID:2825563
                Source Port:49841
                Destination Port:16458
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.43.127.138.5749810164582825563 12/05/23-05:28:51.943839
                SID:2825563
                Source Port:49810
                Destination Port:16458
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.43.127.138.5749801164582825563 12/05/23-05:28:47.926701
                SID:2825563
                Source Port:49801
                Destination Port:16458
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.43.127.138.5749854164582825563 12/05/23-05:29:11.673501
                SID:2825563
                Source Port:49854
                Destination Port:16458
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.43.127.138.5749843164582825563 12/05/23-05:29:07.197050
                SID:2825563
                Source Port:49843
                Destination Port:16458
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.43.127.138.5749814164582825563 12/05/23-05:28:53.722786
                SID:2825563
                Source Port:49814
                Destination Port:16458
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.43.127.138.5749803164582825563 12/05/23-05:28:48.837764
                SID:2825563
                Source Port:49803
                Destination Port:16458
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.418.156.13.20949890164582033132 12/05/23-05:30:17.263123
                SID:2033132
                Source Port:49890
                Destination Port:16458
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.418.157.68.7349885164582033132 12/05/23-05:30:10.234341
                SID:2033132
                Source Port:49885
                Destination Port:16458
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.43.127.138.5749812164582825563 12/05/23-05:28:52.818361
                SID:2825563
                Source Port:49812
                Destination Port:16458
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.418.157.68.7349859164582814856 12/05/23-05:29:13.802515
                SID:2814856
                Source Port:49859
                Destination Port:16458
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.418.157.68.7349874164582033132 12/05/23-05:29:47.871256
                SID:2033132
                Source Port:49874
                Destination Port:16458
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.43.127.138.5749856164582825563 12/05/23-05:29:12.490359
                SID:2825563
                Source Port:49856
                Destination Port:16458
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.43.127.138.5749845164582825563 12/05/23-05:29:08.004585
                SID:2825563
                Source Port:49845
                Destination Port:16458
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.43.127.138.5749819164582033132 12/05/23-05:28:55.651700
                SID:2033132
                Source Port:49819
                Destination Port:16458
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.43.127.138.5749857164582033132 12/05/23-05:29:12.714597
                SID:2033132
                Source Port:49857
                Destination Port:16458
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.43.127.138.5749813164582033132 12/05/23-05:28:53.114093
                SID:2033132
                Source Port:49813
                Destination Port:16458
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.43.127.138.5749834164582033132 12/05/23-05:29:03.339551
                SID:2033132
                Source Port:49834
                Destination Port:16458
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.43.127.138.5749815164582033132 12/05/23-05:28:53.964635
                SID:2033132
                Source Port:49815
                Destination Port:16458
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.43.127.138.5749836164582033132 12/05/23-05:29:04.178160
                SID:2033132
                Source Port:49836
                Destination Port:16458
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.43.127.138.5749850164582825563 12/05/23-05:29:10.036341
                SID:2825563
                Source Port:49850
                Destination Port:16458
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.418.157.68.7349871164582825563 12/05/23-05:29:40.850092
                SID:2825563
                Source Port:49871
                Destination Port:16458
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.43.127.138.5749817164582033132 12/05/23-05:28:54.807517
                SID:2033132
                Source Port:49817
                Destination Port:16458
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.43.127.138.5749838164582033132 12/05/23-05:29:04.979284
                SID:2033132
                Source Port:49838
                Destination Port:16458
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.418.157.68.7349875164582825563 12/05/23-05:29:50.461328
                SID:2825563
                Source Port:49875
                Destination Port:16458
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.418.157.68.7349873164582825563 12/05/23-05:29:45.643969
                SID:2825563
                Source Port:49873
                Destination Port:16458
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.418.157.68.7349877164582825563 12/05/23-05:29:55.294408
                SID:2825563
                Source Port:49877
                Destination Port:16458
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.43.127.138.5749802164582814856 12/05/23-05:28:48.380094
                SID:2814856
                Source Port:49802
                Destination Port:16458
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.43.127.138.5749823164582814856 12/05/23-05:28:57.503766
                SID:2814856
                Source Port:49823
                Destination Port:16458
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.43.127.138.5749827164582814856 12/05/23-05:28:59.158313
                SID:2814856
                Source Port:49827
                Destination Port:16458
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.43.127.138.5749806164582814856 12/05/23-05:28:50.179249
                SID:2814856
                Source Port:49806
                Destination Port:16458
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.43.127.138.5749808164582814856 12/05/23-05:28:51.078782
                SID:2814856
                Source Port:49808
                Destination Port:16458
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.43.127.138.5749800164582814856 12/05/23-05:28:47.456811
                SID:2814856
                Source Port:49800
                Destination Port:16458
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.43.127.138.5749821164582814856 12/05/23-05:28:56.664048
                SID:2814856
                Source Port:49821
                Destination Port:16458
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.43.127.138.5749829164582814856 12/05/23-05:28:59.989623
                SID:2814856
                Source Port:49829
                Destination Port:16458
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.43.127.138.5749853164582033132 12/05/23-05:29:11.089595
                SID:2033132
                Source Port:49853
                Destination Port:16458
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.43.127.138.5749855164582033132 12/05/23-05:29:11.900739
                SID:2033132
                Source Port:49855
                Destination Port:16458
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.43.127.138.5749811164582033132 12/05/23-05:28:52.204621
                SID:2033132
                Source Port:49811
                Destination Port:16458
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.43.127.138.5749832164582033132 12/05/23-05:29:02.721331
                SID:2033132
                Source Port:49832
                Destination Port:16458
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.418.192.93.8649739164582814856 12/05/23-05:27:26.936670
                SID:2814856
                Source Port:49739
                Destination Port:16458
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.418.157.68.7349879164582825563 12/05/23-05:29:59.721935
                SID:2825563
                Source Port:49879
                Destination Port:16458
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.43.127.138.5749851164582033132 12/05/23-05:29:10.262591
                SID:2033132
                Source Port:49851
                Destination Port:16458
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.43.127.138.5749804164582814856 12/05/23-05:28:49.288914
                SID:2814856
                Source Port:49804
                Destination Port:16458
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.43.127.138.5749825164582814856 12/05/23-05:28:58.332620
                SID:2814856
                Source Port:49825
                Destination Port:16458
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.43.127.138.5749830164582033132 12/05/23-05:29:00.216171
                SID:2033132
                Source Port:49830
                Destination Port:16458
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.418.156.13.20949911164582033132 12/05/23-05:30:34.750260
                SID:2033132
                Source Port:49911
                Destination Port:16458
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.418.156.13.20949912164582033132 12/05/23-05:30:35.324208
                SID:2033132
                Source Port:49912
                Destination Port:16458
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.418.156.13.20949912164582825564 12/05/23-05:30:35.704944
                SID:2825564
                Source Port:49912
                Destination Port:16458
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.418.192.93.8649736164582814856 12/05/23-05:27:19.714364
                SID:2814856
                Source Port:49736
                Destination Port:16458
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.418.157.68.7349876164582814856 12/05/23-05:29:52.869609
                SID:2814856
                Source Port:49876
                Destination Port:16458
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.418.156.13.20949918164582033132 12/05/23-05:30:38.592923
                SID:2033132
                Source Port:49918
                Destination Port:16458
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.418.156.13.20949969164582814856 12/05/23-05:31:01.195485
                SID:2814856
                Source Port:49969
                Destination Port:16458
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.418.192.93.8649737164582814856 12/05/23-05:27:22.118276
                SID:2814856
                Source Port:49737
                Destination Port:16458
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.418.156.13.20949966164582814856 12/05/23-05:30:59.973325
                SID:2814856
                Source Port:49966
                Destination Port:16458
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.418.156.13.20949919164582033132 12/05/23-05:30:39.105483
                SID:2033132
                Source Port:49919
                Destination Port:16458
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.418.157.68.7349873164582814856 12/05/23-05:29:45.643969
                SID:2814856
                Source Port:49873
                Destination Port:16458
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.418.157.68.7349872164582814856 12/05/23-05:29:43.245198
                SID:2814856
                Source Port:49872
                Destination Port:16458
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.418.156.13.20949965164582814856 12/05/23-05:30:59.568414
                SID:2814856
                Source Port:49965
                Destination Port:16458
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.418.192.93.8649756164582825563 12/05/23-05:28:05.373115
                SID:2825563
                Source Port:49756
                Destination Port:16458
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.418.156.13.20949962164582814856 12/05/23-05:30:58.338916
                SID:2814856
                Source Port:49962
                Destination Port:16458
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.418.156.13.20949971164582814856 12/05/23-05:31:01.989272
                SID:2814856
                Source Port:49971
                Destination Port:16458
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.418.192.93.8649757164582825563 12/05/23-05:28:09.038400
                SID:2825563
                Source Port:49757
                Destination Port:16458
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.418.156.13.20949961164582814856 12/05/23-05:30:57.932002
                SID:2814856
                Source Port:49961
                Destination Port:16458
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.418.156.13.20949972164582814856 12/05/23-05:31:02.396051
                SID:2814856
                Source Port:49972
                Destination Port:16458
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.418.157.68.7349867164582814856 12/05/23-05:29:31.229375
                SID:2814856
                Source Port:49867
                Destination Port:16458
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.418.157.68.7349877164582814856 12/05/23-05:29:55.294408
                SID:2814856
                Source Port:49877
                Destination Port:16458
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.418.156.13.20949919164582825564 12/05/23-05:30:39.421594
                SID:2825564
                Source Port:49919
                Destination Port:16458
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.418.156.13.20949916164582825564 12/05/23-05:30:37.890647
                SID:2825564
                Source Port:49916
                Destination Port:16458
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.418.156.13.20949901164582033132 12/05/23-05:30:27.794287
                SID:2033132
                Source Port:49901
                Destination Port:16458
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.418.156.13.20949922164582033132 12/05/23-05:30:40.591479
                SID:2033132
                Source Port:49922
                Destination Port:16458
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.418.192.93.8649743164582814856 12/05/23-05:27:37.103134
                SID:2814856
                Source Port:49743
                Destination Port:16458
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.418.156.13.20949900164582033132 12/05/23-05:30:27.014168
                SID:2033132
                Source Port:49900
                Destination Port:16458
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.418.156.13.20949921164582033132 12/05/23-05:30:40.105865
                SID:2033132
                Source Port:49921
                Destination Port:16458
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.43.127.138.5749797164582814856 12/05/23-05:28:46.037171
                SID:2814856
                Source Port:49797
                Destination Port:16458
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.418.157.68.7349880164582814856 12/05/23-05:30:01.757295
                SID:2814856
                Source Port:49880
                Destination Port:16458
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.418.192.93.8649742164582814856 12/05/23-05:27:34.697940
                SID:2814856
                Source Port:49742
                Destination Port:16458
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.418.192.93.8649746164582814856 12/05/23-05:27:44.324898
                SID:2814856
                Source Port:49746
                Destination Port:16458
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.43.127.138.5749858164582825563 12/05/23-05:29:13.301651
                SID:2825563
                Source Port:49858
                Destination Port:16458
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.43.127.138.5749794164582814856 12/05/23-05:28:42.507418
                SID:2814856
                Source Port:49794
                Destination Port:16458
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.43.127.138.5749798164582814856 12/05/23-05:28:46.526164
                SID:2814856
                Source Port:49798
                Destination Port:16458
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.418.156.13.20949922164582825564 12/05/23-05:30:40.890140
                SID:2825564
                Source Port:49922
                Destination Port:16458
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.418.156.13.20949905164582033132 12/05/23-05:30:30.952686
                SID:2033132
                Source Port:49905
                Destination Port:16458
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.418.156.13.20949959164582814856 12/05/23-05:30:57.115661
                SID:2814856
                Source Port:49959
                Destination Port:16458
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.418.192.93.8649747164582814856 12/05/23-05:27:46.734885
                SID:2814856
                Source Port:49747
                Destination Port:16458
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.418.157.68.7349866164582814856 12/05/23-05:29:28.817890
                SID:2814856
                Source Port:49866
                Destination Port:16458
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.418.156.13.20949958164582814856 12/05/23-05:30:56.699749
                SID:2814856
                Source Port:49958
                Destination Port:16458
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.418.192.93.8649752164582825563 12/05/23-05:27:57.404139
                SID:2825563
                Source Port:49752
                Destination Port:16458
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.418.156.13.20949909164582033132 12/05/23-05:30:33.545653
                SID:2033132
                Source Port:49909
                Destination Port:16458
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.418.156.13.20949955164582814856 12/05/23-05:30:55.475002
                SID:2814856
                Source Port:49955
                Destination Port:16458
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.418.192.93.8649752164582033132 12/05/23-05:27:57.222094
                SID:2033132
                Source Port:49752
                Destination Port:16458
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.43.127.138.5749761164582033132 12/05/23-05:28:15.020275
                SID:2033132
                Source Port:49761
                Destination Port:16458
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.418.156.13.20949908164582033132 12/05/23-05:30:32.925073
                SID:2033132
                Source Port:49908
                Destination Port:16458
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.418.156.13.20949929164582033132 12/05/23-05:30:43.904813
                SID:2033132
                Source Port:49929
                Destination Port:16458
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.418.156.13.20949975164582814856 12/05/23-05:31:03.623892
                SID:2814856
                Source Port:49975
                Destination Port:16458
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.43.127.138.5749760164582033132 12/05/23-05:28:13.622007
                SID:2033132
                Source Port:49760
                Destination Port:16458
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.43.127.138.5749764164582033132 12/05/23-05:28:18.862030
                SID:2033132
                Source Port:49764
                Destination Port:16458
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.43.127.138.5749830164582814856 12/05/23-05:29:00.397921
                SID:2814856
                Source Port:49830
                Destination Port:16458
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.418.157.68.7349863164582814856 12/05/23-05:29:21.612391
                SID:2814856
                Source Port:49863
                Destination Port:16458
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.43.127.138.5749851164582814856 12/05/23-05:29:10.444716
                SID:2814856
                Source Port:49851
                Destination Port:16458
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.418.157.68.7349884164582814856 12/05/23-05:30:08.864321
                SID:2814856
                Source Port:49884
                Destination Port:16458
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.418.156.13.20949889164582033132 12/05/23-05:30:16.047233
                SID:2033132
                Source Port:49889
                Destination Port:16458
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.418.157.68.7349862164582814856 12/05/23-05:29:19.208172
                SID:2814856
                Source Port:49862
                Destination Port:16458
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.418.156.13.20949954164582814856 12/05/23-05:30:55.067188
                SID:2814856
                Source Port:49954
                Destination Port:16458
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.418.192.93.8649753164582825563 12/05/23-05:27:59.557036
                SID:2825563
                Source Port:49753
                Destination Port:16458
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.418.156.13.20949888164582033132 12/05/23-05:30:14.777264
                SID:2033132
                Source Port:49888
                Destination Port:16458
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.418.157.68.7349883164582814856 12/05/23-05:30:07.225303
                SID:2814856
                Source Port:49883
                Destination Port:16458
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.43.127.138.5749856164582814856 12/05/23-05:29:12.490359
                SID:2814856
                Source Port:49856
                Destination Port:16458
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.418.157.68.7349886164582825563 12/05/23-05:30:11.907628
                SID:2825563
                Source Port:49886
                Destination Port:16458
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.43.127.138.5749769164582033132 12/05/23-05:28:24.205480
                SID:2033132
                Source Port:49769
                Destination Port:16458
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.43.127.138.5749855164582814856 12/05/23-05:29:12.080390
                SID:2814856
                Source Port:49855
                Destination Port:16458
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.418.156.13.20949959164582814860 12/05/23-05:30:57.155698
                SID:2814860
                Source Port:49959
                Destination Port:16458
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.43.127.138.5749835164582814856 12/05/23-05:29:03.956503
                SID:2814856
                Source Port:49835
                Destination Port:16458
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.418.192.93.8649759164582033132 12/05/23-05:28:12.041951
                SID:2033132
                Source Port:49759
                Destination Port:16458
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.43.127.138.5749768164582033132 12/05/23-05:28:23.220537
                SID:2033132
                Source Port:49768
                Destination Port:16458
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.418.157.68.7349883164582825563 12/05/23-05:30:07.225303
                SID:2825563
                Source Port:49883
                Destination Port:16458
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.43.127.138.5749834164582814856 12/05/23-05:29:03.520411
                SID:2814856
                Source Port:49834
                Destination Port:16458
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.43.127.138.5749838164582814856 12/05/23-05:29:05.159344
                SID:2814856
                Source Port:49838
                Destination Port:16458
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.43.127.138.5749852164582814856 12/05/23-05:29:10.865065
                SID:2814856
                Source Port:49852
                Destination Port:16458
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.43.127.138.5749765164582033132 12/05/23-05:28:20.020259
                SID:2033132
                Source Port:49765
                Destination Port:16458
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.43.127.138.5749831164582814856 12/05/23-05:29:00.804324
                SID:2814856
                Source Port:49831
                Destination Port:16458
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.43.127.138.5749839164582814856 12/05/23-05:29:05.570625
                SID:2814856
                Source Port:49839
                Destination Port:16458
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.43.127.138.5749761164582825563 12/05/23-05:28:15.201898
                SID:2825563
                Source Port:49761
                Destination Port:16458
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.43.127.138.5749801164582033132 12/05/23-05:28:47.746763
                SID:2033132
                Source Port:49801
                Destination Port:16458
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.418.192.93.8649755164582033132 12/05/23-05:28:03.344910
                SID:2033132
                Source Port:49755
                Destination Port:16458
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.418.156.13.20949954164582814860 12/05/23-05:30:55.109029
                SID:2814860
                Source Port:49954
                Destination Port:16458
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.418.156.13.20949926164582033132 12/05/23-05:30:42.500560
                SID:2033132
                Source Port:49926
                Destination Port:16458
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.418.192.93.8649756164582033132 12/05/23-05:28:05.235367
                SID:2033132
                Source Port:49756
                Destination Port:16458
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.418.156.13.20949904164582033132 12/05/23-05:30:30.260268
                SID:2033132
                Source Port:49904
                Destination Port:16458
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.418.156.13.20949925164582033132 12/05/23-05:30:42.030273
                SID:2033132
                Source Port:49925
                Destination Port:16458
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.418.156.13.20949955164582814860 12/05/23-05:30:55.515019
                SID:2814860
                Source Port:49955
                Destination Port:16458
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.418.156.13.20949932164582033132 12/05/23-05:30:45.262465
                SID:2033132
                Source Port:49932
                Destination Port:16458
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.418.156.13.20949975164582825563 12/05/23-05:31:03.623892
                SID:2825563
                Source Port:49975
                Destination Port:16458
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.43.127.138.5749809164582033132 12/05/23-05:28:51.324622
                SID:2033132
                Source Port:49809
                Destination Port:16458
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.43.127.138.5749783164582814856 12/05/23-05:28:36.429111
                SID:2814856
                Source Port:49783
                Destination Port:16458
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.43.127.138.5749787164582814856 12/05/23-05:28:38.793091
                SID:2814856
                Source Port:49787
                Destination Port:16458
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.418.192.93.8649753164582814856 12/05/23-05:27:59.557036
                SID:2814856
                Source Port:49753
                Destination Port:16458
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.418.192.93.8649757164582814856 12/05/23-05:28:09.038400
                SID:2814856
                Source Port:49757
                Destination Port:16458
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.418.156.13.20949906164582814856 12/05/23-05:30:31.808906
                SID:2814856
                Source Port:49906
                Destination Port:16458
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.418.156.13.20949971164582825563 12/05/23-05:31:01.989272
                SID:2825563
                Source Port:49971
                Destination Port:16458
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.43.127.138.5749848164582825563 12/05/23-05:29:09.223938
                SID:2825563
                Source Port:49848
                Destination Port:16458
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.43.127.138.5749806164582825563 12/05/23-05:28:50.179249
                SID:2825563
                Source Port:49806
                Destination Port:16458
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.418.156.13.20949948164582814856 12/05/23-05:30:52.537768
                SID:2814856
                Source Port:49948
                Destination Port:16458
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.418.156.13.20949974164582033132 12/05/23-05:31:03.014634
                SID:2033132
                Source Port:49974
                Destination Port:16458
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.418.156.13.20949902164582814856 12/05/23-05:30:28.764552
                SID:2814856
                Source Port:49902
                Destination Port:16458
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.418.156.13.20949951164582814860 12/05/23-05:30:53.874480
                SID:2814860
                Source Port:49951
                Destination Port:16458
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.418.192.93.8649741164582033132 12/05/23-05:27:32.146905
                SID:2033132
                Source Port:49741
                Destination Port:16458
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.43.127.138.5749771164582033132 12/05/23-05:28:27.423553
                SID:2033132
                Source Port:49771
                Destination Port:16458
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.43.127.138.5749775164582033132 12/05/23-05:28:30.751692
                SID:2033132
                Source Port:49775
                Destination Port:16458
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.43.127.138.5749847164582033132 12/05/23-05:29:08.637132
                SID:2033132
                Source Port:49847
                Destination Port:16458
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.43.127.138.5749805164582033132 12/05/23-05:28:49.562929
                SID:2033132
                Source Port:49805
                Destination Port:16458
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.418.192.93.8649742164582825563 12/05/23-05:27:34.697940
                SID:2825563
                Source Port:49742
                Destination Port:16458
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.418.156.13.20949944164582814856 12/05/23-05:30:50.851324
                SID:2814856
                Source Port:49944
                Destination Port:16458
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.418.156.13.20949970164582033132 12/05/23-05:31:01.418455
                SID:2033132
                Source Port:49970
                Destination Port:16458
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.418.156.13.20949899164582033132 12/05/23-05:30:26.198574
                SID:2033132
                Source Port:49899
                Destination Port:16458
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.418.157.68.7349886164582033132 12/05/23-05:30:11.725388
                SID:2033132
                Source Port:49886
                Destination Port:16458
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.418.156.13.20949951164582814856 12/05/23-05:30:53.830684
                SID:2814856
                Source Port:49951
                Destination Port:16458
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.418.157.68.7349882164582033132 12/05/23-05:30:05.310312
                SID:2033132
                Source Port:49882
                Destination Port:16458
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.43.127.138.5749840164582825563 12/05/23-05:29:05.972883
                SID:2825563
                Source Port:49840
                Destination Port:16458
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.43.127.138.5749851164582825563 12/05/23-05:29:10.444716
                SID:2825563
                Source Port:49851
                Destination Port:16458
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.418.157.68.7349871164582033132 12/05/23-05:29:40.670023
                SID:2033132
                Source Port:49871
                Destination Port:16458
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.418.157.68.7349879164582033132 12/05/23-05:29:59.542092
                SID:2033132
                Source Port:49879
                Destination Port:16458
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.418.192.93.8649746164582825563 12/05/23-05:27:44.324898
                SID:2825563
                Source Port:49746
                Destination Port:16458
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.418.156.13.20949940164582814856 12/05/23-05:30:49.161327
                SID:2814856
                Source Port:49940
                Destination Port:16458
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.418.156.13.20949895164582033132 12/05/23-05:30:22.638934
                SID:2033132
                Source Port:49895
                Destination Port:16458
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.43.127.138.5749844164582825563 12/05/23-05:29:07.595663
                SID:2825563
                Source Port:49844
                Destination Port:16458
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.43.127.138.5749790164582814856 12/05/23-05:28:40.447649
                SID:2814856
                Source Port:49790
                Destination Port:16458
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.43.127.138.5749802164582825563 12/05/23-05:28:48.380094
                SID:2825563
                Source Port:49802
                Destination Port:16458
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.43.127.138.5749813164582825563 12/05/23-05:28:53.296410
                SID:2825563
                Source Port:49813
                Destination Port:16458
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.418.157.68.7349875164582033132 12/05/23-05:29:50.280325
                SID:2033132
                Source Port:49875
                Destination Port:16458
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.418.192.93.8649739164582825563 12/05/23-05:27:26.936670
                SID:2825563
                Source Port:49739
                Destination Port:16458
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.418.156.13.20949891164582033132 12/05/23-05:30:18.437391
                SID:2033132
                Source Port:49891
                Destination Port:16458
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.418.156.13.20949940164582814860 12/05/23-05:30:49.218482
                SID:2814860
                Source Port:49940
                Destination Port:16458
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.43.127.138.5749858164582033132 12/05/23-05:29:13.120862
                SID:2033132
                Source Port:49858
                Destination Port:16458
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.43.127.138.5749816164582033132 12/05/23-05:28:54.386300
                SID:2033132
                Source Port:49816
                Destination Port:16458
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.43.127.138.5749837164582033132 12/05/23-05:29:04.575624
                SID:2033132
                Source Port:49837
                Destination Port:16458
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.418.157.68.7349872164582825563 12/05/23-05:29:43.245198
                SID:2825563
                Source Port:49872
                Destination Port:16458
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.43.127.138.5749803164582814856 12/05/23-05:28:48.837764
                SID:2814856
                Source Port:49803
                Destination Port:16458
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.43.127.138.5749824164582814856 12/05/23-05:28:57.913904
                SID:2814856
                Source Port:49824
                Destination Port:16458
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.43.127.138.5749845164582814856 12/05/23-05:29:08.004585
                SID:2814856
                Source Port:49845
                Destination Port:16458
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.418.156.13.20949927164582814860 12/05/23-05:30:43.249853
                SID:2814860
                Source Port:49927
                Destination Port:16458
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.418.192.93.8649749164582033132 12/05/23-05:27:52.549904
                SID:2033132
                Source Port:49749
                Destination Port:16458
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.418.156.13.20949892164582825563 12/05/23-05:30:19.723319
                SID:2825563
                Source Port:49892
                Destination Port:16458
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.43.127.138.5749779164582033132 12/05/23-05:28:33.654731
                SID:2033132
                Source Port:49779
                Destination Port:16458
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.418.156.13.20949948164582814860 12/05/23-05:30:52.624503
                SID:2814860
                Source Port:49948
                Destination Port:16458
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.418.157.68.7349876164582825563 12/05/23-05:29:52.869609
                SID:2825563
                Source Port:49876
                Destination Port:16458
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.43.127.138.5749850164582033132 12/05/23-05:29:09.855333
                SID:2033132
                Source Port:49850
                Destination Port:16458
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.43.127.138.5749820164582814856 12/05/23-05:28:56.240385
                SID:2814856
                Source Port:49820
                Destination Port:16458
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.43.127.138.5749828164582814856 12/05/23-05:28:59.573407
                SID:2814856
                Source Port:49828
                Destination Port:16458
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.43.127.138.5749841164582814856 12/05/23-05:29:06.378763
                SID:2814856
                Source Port:49841
                Destination Port:16458
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.43.127.138.5749849164582814856 12/05/23-05:29:09.629833
                SID:2814856
                Source Port:49849
                Destination Port:16458
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.43.127.138.5749807164582814856 12/05/23-05:28:50.631981
                SID:2814856
                Source Port:49807
                Destination Port:16458
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.43.127.138.5749812164582033132 12/05/23-05:28:52.637433
                SID:2033132
                Source Port:49812
                Destination Port:16458
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.43.127.138.5749833164582033132 12/05/23-05:29:03.064031
                SID:2033132
                Source Port:49833
                Destination Port:16458
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.43.127.138.5749793164582825563 12/05/23-05:28:42.006662
                SID:2825563
                Source Port:49793
                Destination Port:16458
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.418.156.13.20949944164582814860 12/05/23-05:30:50.905779
                SID:2814860
                Source Port:49944
                Destination Port:16458
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.418.157.68.7349859164582825563 12/05/23-05:29:13.802515
                SID:2825563
                Source Port:49859
                Destination Port:16458
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.43.127.138.5749854164582033132 12/05/23-05:29:11.494403
                SID:2033132
                Source Port:49854
                Destination Port:16458
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.418.156.13.20949915164582033132 12/05/23-05:30:37.000009
                SID:2033132
                Source Port:49915
                Destination Port:16458
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.418.156.13.20949923164582814860 12/05/23-05:30:41.377097
                SID:2814860
                Source Port:49923
                Destination Port:16458
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.418.192.93.8649745164582033132 12/05/23-05:27:41.736299
                SID:2033132
                Source Port:49745
                Destination Port:16458
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.418.156.13.20949936164582033132 12/05/23-05:30:47.245574
                SID:2033132
                Source Port:49936
                Destination Port:16458
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.418.156.13.20949957164582033132 12/05/23-05:30:56.108139
                SID:2033132
                Source Port:49957
                Destination Port:16458
                Protocol:TCP
                Classtype:A Network Trojan was detected

                Click to jump to signature section

                Show All Signature Results

                AV Detection

                barindex
                Source: RWqHoCWEPI.exeAvira: detected
                Source: 2.tcp.eu.ngrok.ioAvira URL Cloud: Label: malware
                Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\af78e772b16b220a2184770c875037cc.exeAvira: detection malicious, Label: TR/ATRAPS.Gen
                Source: C:\Users\user\AppData\Roaming\server.exeAvira: detection malicious, Label: TR/ATRAPS.Gen
                Source: 00000000.00000000.1670598790.0000000000C92000.00000002.00000001.01000000.00000003.sdmpMalware Configuration Extractor: Njrat {"Host": "2.tcp.eu.ngrok.io", "Port": "16458", "Version": "im523", "Campaign ID": "HacKed", "Install Name": "server.exe", "Install Dir": "AppData"}
                Source: 2.tcp.eu.ngrok.ioVirustotal: Detection: 12%Perma Link
                Source: 2.tcp.eu.ngrok.ioVirustotal: Detection: 12%Perma Link
                Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\af78e772b16b220a2184770c875037cc.exeReversingLabs: Detection: 86%
                Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\af78e772b16b220a2184770c875037cc.exeVirustotal: Detection: 86%Perma Link
                Source: C:\Users\user\AppData\Roaming\server.exeReversingLabs: Detection: 86%
                Source: C:\Users\user\AppData\Roaming\server.exeVirustotal: Detection: 86%Perma Link
                Source: RWqHoCWEPI.exeReversingLabs: Detection: 86%
                Source: RWqHoCWEPI.exeVirustotal: Detection: 86%Perma Link
                Source: Yara matchFile source: RWqHoCWEPI.exe, type: SAMPLE
                Source: Yara matchFile source: 0.0.RWqHoCWEPI.exe.c90000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000000.00000000.1670598790.0000000000C92000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: RWqHoCWEPI.exe PID: 5924, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: server.exe PID: 2996, type: MEMORYSTR
                Source: Yara matchFile source: C:\Users\user\AppData\Roaming\server.exe, type: DROPPED
                Source: Yara matchFile source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\af78e772b16b220a2184770c875037cc.exe, type: DROPPED
                Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\af78e772b16b220a2184770c875037cc.exeJoe Sandbox ML: detected
                Source: C:\Users\user\AppData\Roaming\server.exeJoe Sandbox ML: detected
                Source: RWqHoCWEPI.exeJoe Sandbox ML: detected
                Source: RWqHoCWEPI.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                Source: C:\Users\user\Desktop\RWqHoCWEPI.exeFile opened: C:\Windows\WinSxS\x86_microsoft.vc80.crt_1fc8b3b9a1e18e3b_8.0.50727.9672_none_d08f9da24428a513\MSVCR80.dllJump to behavior
                Source: RWqHoCWEPI.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                Source: RWqHoCWEPI.exe, 00000000.00000000.1670598790.0000000000C92000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: autorun.inf
                Source: RWqHoCWEPI.exe, 00000000.00000000.1670598790.0000000000C92000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: [autorun]
                Source: RWqHoCWEPI.exe, 00000000.00000002.1737651028.0000000003374000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: autorun.inf
                Source: RWqHoCWEPI.exe, 00000000.00000002.1737651028.0000000003374000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: [autorun]
                Source: server.exe, 00000001.00000002.4128186352.0000000002BE1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: autorun.inf
                Source: server.exe, 00000001.00000002.4128186352.0000000002BE1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: [autorun]
                Source: RWqHoCWEPI.exeBinary or memory string: autorun.inf
                Source: RWqHoCWEPI.exeBinary or memory string: [autorun]
                Source: af78e772b16b220a2184770c875037cc.exe.1.drBinary or memory string: autorun.inf
                Source: af78e772b16b220a2184770c875037cc.exe.1.drBinary or memory string: [autorun]
                Source: server.exe.0.drBinary or memory string: autorun.inf
                Source: server.exe.0.drBinary or memory string: [autorun]

                Networking

                barindex
                Source: TrafficSnort IDS: 2033132 ET TROJAN Generic njRAT/Bladabindi CnC Activity (ll) 192.168.2.4:49729 -> 18.192.93.86:16458
                Source: TrafficSnort IDS: 2033132 ET TROJAN Generic njRAT/Bladabindi CnC Activity (ll) 192.168.2.4:49731 -> 18.192.93.86:16458
                Source: TrafficSnort IDS: 2814856 ETPRO TROJAN njrat ver 0.7d Malware CnC Callback (inf) 192.168.2.4:49731 -> 18.192.93.86:16458
                Source: TrafficSnort IDS: 2825563 ETPRO TROJAN Generic njRAT/Bladabindi CnC Activity (inf) 192.168.2.4:49731 -> 18.192.93.86:16458
                Source: TrafficSnort IDS: 2033132 ET TROJAN Generic njRAT/Bladabindi CnC Activity (ll) 192.168.2.4:49736 -> 18.192.93.86:16458
                Source: TrafficSnort IDS: 2814856 ETPRO TROJAN njrat ver 0.7d Malware CnC Callback (inf) 192.168.2.4:49736 -> 18.192.93.86:16458
                Source: TrafficSnort IDS: 2825563 ETPRO TROJAN Generic njRAT/Bladabindi CnC Activity (inf) 192.168.2.4:49736 -> 18.192.93.86:16458
                Source: TrafficSnort IDS: 2033132 ET TROJAN Generic njRAT/Bladabindi CnC Activity (ll) 192.168.2.4:49737 -> 18.192.93.86:16458
                Source: TrafficSnort IDS: 2814856 ETPRO TROJAN njrat ver 0.7d Malware CnC Callback (inf) 192.168.2.4:49737 -> 18.192.93.86:16458
                Source: TrafficSnort IDS: 2825563 ETPRO TROJAN Generic njRAT/Bladabindi CnC Activity (inf) 192.168.2.4:49737 -> 18.192.93.86:16458
                Source: TrafficSnort IDS: 2033132 ET TROJAN Generic njRAT/Bladabindi CnC Activity (ll) 192.168.2.4:49738 -> 18.192.93.86:16458
                Source: TrafficSnort IDS: 2814856 ETPRO TROJAN njrat ver 0.7d Malware CnC Callback (inf) 192.168.2.4:49738 -> 18.192.93.86:16458
                Source: TrafficSnort IDS: 2825563 ETPRO TROJAN Generic njRAT/Bladabindi CnC Activity (inf) 192.168.2.4:49738 -> 18.192.93.86:16458
                Source: TrafficSnort IDS: 2033132 ET TROJAN Generic njRAT/Bladabindi CnC Activity (ll) 192.168.2.4:49739 -> 18.192.93.86:16458
                Source: TrafficSnort IDS: 2814856 ETPRO TROJAN njrat ver 0.7d Malware CnC Callback (inf) 192.168.2.4:49739 -> 18.192.93.86:16458
                Source: TrafficSnort IDS: 2825563 ETPRO TROJAN Generic njRAT/Bladabindi CnC Activity (inf) 192.168.2.4:49739 -> 18.192.93.86:16458
                Source: TrafficSnort IDS: 2033132 ET TROJAN Generic njRAT/Bladabindi CnC Activity (ll) 192.168.2.4:49740 -> 18.192.93.86:16458
                Source: TrafficSnort IDS: 2814856 ETPRO TROJAN njrat ver 0.7d Malware CnC Callback (inf) 192.168.2.4:49740 -> 18.192.93.86:16458
                Source: TrafficSnort IDS: 2825563 ETPRO TROJAN Generic njRAT/Bladabindi CnC Activity (inf) 192.168.2.4:49740 -> 18.192.93.86:16458
                Source: TrafficSnort IDS: 2033132 ET TROJAN Generic njRAT/Bladabindi CnC Activity (ll) 192.168.2.4:49741 -> 18.192.93.86:16458
                Source: TrafficSnort IDS: 2814856 ETPRO TROJAN njrat ver 0.7d Malware CnC Callback (inf) 192.168.2.4:49741 -> 18.192.93.86:16458
                Source: TrafficSnort IDS: 2825563 ETPRO TROJAN Generic njRAT/Bladabindi CnC Activity (inf) 192.168.2.4:49741 -> 18.192.93.86:16458
                Source: TrafficSnort IDS: 2033132 ET TROJAN Generic njRAT/Bladabindi CnC Activity (ll) 192.168.2.4:49742 -> 18.192.93.86:16458
                Source: TrafficSnort IDS: 2814856 ETPRO TROJAN njrat ver 0.7d Malware CnC Callback (inf) 192.168.2.4:49742 -> 18.192.93.86:16458
                Source: TrafficSnort IDS: 2825563 ETPRO TROJAN Generic njRAT/Bladabindi CnC Activity (inf) 192.168.2.4:49742 -> 18.192.93.86:16458
                Source: TrafficSnort IDS: 2033132 ET TROJAN Generic njRAT/Bladabindi CnC Activity (ll) 192.168.2.4:49743 -> 18.192.93.86:16458
                Source: TrafficSnort IDS: 2814856 ETPRO TROJAN njrat ver 0.7d Malware CnC Callback (inf) 192.168.2.4:49743 -> 18.192.93.86:16458
                Source: TrafficSnort IDS: 2033132 ET TROJAN Generic njRAT/Bladabindi CnC Activity (ll) 192.168.2.4:49744 -> 18.192.93.86:16458
                Source: TrafficSnort IDS: 2814856 ETPRO TROJAN njrat ver 0.7d Malware CnC Callback (inf) 192.168.2.4:49744 -> 18.192.93.86:16458
                Source: TrafficSnort IDS: 2825563 ETPRO TROJAN Generic njRAT/Bladabindi CnC Activity (inf) 192.168.2.4:49744 -> 18.192.93.86:16458
                Source: TrafficSnort IDS: 2033132 ET TROJAN Generic njRAT/Bladabindi CnC Activity (ll) 192.168.2.4:49745 -> 18.192.93.86:16458
                Source: TrafficSnort IDS: 2814856 ETPRO TROJAN njrat ver 0.7d Malware CnC Callback (inf) 192.168.2.4:49745 -> 18.192.93.86:16458
                Source: TrafficSnort IDS: 2825563 ETPRO TROJAN Generic njRAT/Bladabindi CnC Activity (inf) 192.168.2.4:49745 -> 18.192.93.86:16458
                Source: TrafficSnort IDS: 2033132 ET TROJAN Generic njRAT/Bladabindi CnC Activity (ll) 192.168.2.4:49746 -> 18.192.93.86:16458
                Source: TrafficSnort IDS: 2814856 ETPRO TROJAN njrat ver 0.7d Malware CnC Callback (inf) 192.168.2.4:49746 -> 18.192.93.86:16458
                Source: TrafficSnort IDS: 2825563 ETPRO TROJAN Generic njRAT/Bladabindi CnC Activity (inf) 192.168.2.4:49746 -> 18.192.93.86:16458
                Source: TrafficSnort IDS: 2033132 ET TROJAN Generic njRAT/Bladabindi CnC Activity (ll) 192.168.2.4:49747 -> 18.192.93.86:16458
                Source: TrafficSnort IDS: 2814856 ETPRO TROJAN njrat ver 0.7d Malware CnC Callback (inf) 192.168.2.4:49747 -> 18.192.93.86:16458
                Source: TrafficSnort IDS: 2825563 ETPRO TROJAN Generic njRAT/Bladabindi CnC Activity (inf) 192.168.2.4:49747 -> 18.192.93.86:16458
                Source: TrafficSnort IDS: 2033132 ET TROJAN Generic njRAT/Bladabindi CnC Activity (ll) 192.168.2.4:49748 -> 18.192.93.86:16458
                Source: TrafficSnort IDS: 2814856 ETPRO TROJAN njrat ver 0.7d Malware CnC Callback (inf) 192.168.2.4:49748 -> 18.192.93.86:16458
                Source: TrafficSnort IDS: 2825563 ETPRO TROJAN Generic njRAT/Bladabindi CnC Activity (inf) 192.168.2.4:49748 -> 18.192.93.86:16458
                Source: TrafficSnort IDS: 2033132 ET TROJAN Generic njRAT/Bladabindi CnC Activity (ll) 192.168.2.4:49749 -> 18.192.93.86:16458
                Source: TrafficSnort IDS: 2814856 ETPRO TROJAN njrat ver 0.7d Malware CnC Callback (inf) 192.168.2.4:49749 -> 18.192.93.86:16458
                Source: TrafficSnort IDS: 2825563 ETPRO TROJAN Generic njRAT/Bladabindi CnC Activity (inf) 192.168.2.4:49749 -> 18.192.93.86:16458
                Source: TrafficSnort IDS: 2033132 ET TROJAN Generic njRAT/Bladabindi CnC Activity (ll) 192.168.2.4:49750 -> 18.192.93.86:16458
                Source: TrafficSnort IDS: 2814856 ETPRO TROJAN njrat ver 0.7d Malware CnC Callback (inf) 192.168.2.4:49750 -> 18.192.93.86:16458
                Source: TrafficSnort IDS: 2825563 ETPRO TROJAN Generic njRAT/Bladabindi CnC Activity (inf) 192.168.2.4:49750 -> 18.192.93.86:16458
                Source: TrafficSnort IDS: 2033132 ET TROJAN Generic njRAT/Bladabindi CnC Activity (ll) 192.168.2.4:49752 -> 18.192.93.86:16458
                Source: TrafficSnort IDS: 2814856 ETPRO TROJAN njrat ver 0.7d Malware CnC Callback (inf) 192.168.2.4:49752 -> 18.192.93.86:16458
                Source: TrafficSnort IDS: 2825563 ETPRO TROJAN Generic njRAT/Bladabindi CnC Activity (inf) 192.168.2.4:49752 -> 18.192.93.86:16458
                Source: TrafficSnort IDS: 2033132 ET TROJAN Generic njRAT/Bladabindi CnC Activity (ll) 192.168.2.4:49753 -> 18.192.93.86:16458
                Source: TrafficSnort IDS: 2814856 ETPRO TROJAN njrat ver 0.7d Malware CnC Callback (inf) 192.168.2.4:49753 -> 18.192.93.86:16458
                Source: TrafficSnort IDS: 2825563 ETPRO TROJAN Generic njRAT/Bladabindi CnC Activity (inf) 192.168.2.4:49753 -> 18.192.93.86:16458
                Source: TrafficSnort IDS: 2033132 ET TROJAN Generic njRAT/Bladabindi CnC Activity (ll) 192.168.2.4:49754 -> 18.192.93.86:16458
                Source: TrafficSnort IDS: 2814856 ETPRO TROJAN njrat ver 0.7d Malware CnC Callback (inf) 192.168.2.4:49754 -> 18.192.93.86:16458
                Source: TrafficSnort IDS: 2825563 ETPRO TROJAN Generic njRAT/Bladabindi CnC Activity (inf) 192.168.2.4:49754 -> 18.192.93.86:16458
                Source: TrafficSnort IDS: 2033132 ET TROJAN Generic njRAT/Bladabindi CnC Activity (ll) 192.168.2.4:49755 -> 18.192.93.86:16458
                Source: TrafficSnort IDS: 2814856 ETPRO TROJAN njrat ver 0.7d Malware CnC Callback (inf) 192.168.2.4:49755 -> 18.192.93.86:16458
                Source: TrafficSnort IDS: 2825563 ETPRO TROJAN Generic njRAT/Bladabindi CnC Activity (inf) 192.168.2.4:49755 -> 18.192.93.86:16458
                Source: TrafficSnort IDS: 2033132 ET TROJAN Generic njRAT/Bladabindi CnC Activity (ll) 192.168.2.4:49756 -> 18.192.93.86:16458
                Source: TrafficSnort IDS: 2814856 ETPRO TROJAN njrat ver 0.7d Malware CnC Callback (inf) 192.168.2.4:49756 -> 18.192.93.86:16458
                Source: TrafficSnort IDS: 2825563 ETPRO TROJAN Generic njRAT/Bladabindi CnC Activity (inf) 192.168.2.4:49756 -> 18.192.93.86:16458
                Source: TrafficSnort IDS: 2033132 ET TROJAN Generic njRAT/Bladabindi CnC Activity (ll) 192.168.2.4:49757 -> 18.192.93.86:16458
                Source: TrafficSnort IDS: 2814856 ETPRO TROJAN njrat ver 0.7d Malware CnC Callback (inf) 192.168.2.4:49757 -> 18.192.93.86:16458
                Source: TrafficSnort IDS: 2825563 ETPRO TROJAN Generic njRAT/Bladabindi CnC Activity (inf) 192.168.2.4:49757 -> 18.192.93.86:16458
                Source: TrafficSnort IDS: 2033132 ET TROJAN Generic njRAT/Bladabindi CnC Activity (ll) 192.168.2.4:49758 -> 18.192.93.86:16458
                Source: TrafficSnort IDS: 2814856 ETPRO TROJAN njrat ver 0.7d Malware CnC Callback (inf) 192.168.2.4:49758 -> 18.192.93.86:16458
                Source: TrafficSnort IDS: 2033132 ET TROJAN Generic njRAT/Bladabindi CnC Activity (ll) 192.168.2.4:49759 -> 18.192.93.86:16458
                Source: TrafficSnort IDS: 2814856 ETPRO TROJAN njrat ver 0.7d Malware CnC Callback (inf) 192.168.2.4:49759 -> 18.192.93.86:16458
                Source: TrafficSnort IDS: 2825563 ETPRO TROJAN Generic njRAT/Bladabindi CnC Activity (inf) 192.168.2.4:49759 -> 18.192.93.86:16458
                Source: TrafficSnort IDS: 2033132 ET TROJAN Generic njRAT/Bladabindi CnC Activity (ll) 192.168.2.4:49760 -> 3.127.138.57:16458
                Source: TrafficSnort IDS: 2814856 ETPRO TROJAN njrat ver 0.7d Malware CnC Callback (inf) 192.168.2.4:49760 -> 3.127.138.57:16458
                Source: TrafficSnort IDS: 2825563 ETPRO TROJAN Generic njRAT/Bladabindi CnC Activity (inf) 192.168.2.4:49760 -> 3.127.138.57:16458
                Source: TrafficSnort IDS: 2033132 ET TROJAN Generic njRAT/Bladabindi CnC Activity (ll) 192.168.2.4:49761 -> 3.127.138.57:16458
                Source: TrafficSnort IDS: 2814856 ETPRO TROJAN njrat ver 0.7d Malware CnC Callback (inf) 192.168.2.4:49761 -> 3.127.138.57:16458
                Source: TrafficSnort IDS: 2825563 ETPRO TROJAN Generic njRAT/Bladabindi CnC Activity (inf) 192.168.2.4:49761 -> 3.127.138.57:16458
                Source: TrafficSnort IDS: 2033132 ET TROJAN Generic njRAT/Bladabindi CnC Activity (ll) 192.168.2.4:49762 -> 3.127.138.57:16458
                Source: TrafficSnort IDS: 2814856 ETPRO TROJAN njrat ver 0.7d Malware CnC Callback (inf) 192.168.2.4:49762 -> 3.127.138.57:16458
                Source: TrafficSnort IDS: 2033132 ET TROJAN Generic njRAT/Bladabindi CnC Activity (ll) 192.168.2.4:49763 -> 3.127.138.57:16458
                Source: TrafficSnort IDS: 2814856 ETPRO TROJAN njrat ver 0.7d Malware CnC Callback (inf) 192.168.2.4:49763 -> 3.127.138.57:16458
                Source: TrafficSnort IDS: 2825563 ETPRO TROJAN Generic njRAT/Bladabindi CnC Activity (inf) 192.168.2.4:49763 -> 3.127.138.57:16458
                Source: TrafficSnort IDS: 2033132 ET TROJAN Generic njRAT/Bladabindi CnC Activity (ll) 192.168.2.4:49764 -> 3.127.138.57:16458
                Source: TrafficSnort IDS: 2814856 ETPRO TROJAN njrat ver 0.7d Malware CnC Callback (inf) 192.168.2.4:49764 -> 3.127.138.57:16458
                Source: TrafficSnort IDS: 2033132 ET TROJAN Generic njRAT/Bladabindi CnC Activity (ll) 192.168.2.4:49765 -> 3.127.138.57:16458
                Source: TrafficSnort IDS: 2814856 ETPRO TROJAN njrat ver 0.7d Malware CnC Callback (inf) 192.168.2.4:49765 -> 3.127.138.57:16458
                Source: TrafficSnort IDS: 2033132 ET TROJAN Generic njRAT/Bladabindi CnC Activity (ll) 192.168.2.4:49766 -> 3.127.138.57:16458
                Source: TrafficSnort IDS: 2814856 ETPRO TROJAN njrat ver 0.7d Malware CnC Callback (inf) 192.168.2.4:49766 -> 3.127.138.57:16458
                Source: TrafficSnort IDS: 2033132 ET TROJAN Generic njRAT/Bladabindi CnC Activity (ll) 192.168.2.4:49767 -> 3.127.138.57:16458
                Source: TrafficSnort IDS: 2814856 ETPRO TROJAN njrat ver 0.7d Malware CnC Callback (inf) 192.168.2.4:49767 -> 3.127.138.57:16458
                Source: TrafficSnort IDS: 2033132 ET TROJAN Generic njRAT/Bladabindi CnC Activity (ll) 192.168.2.4:49768 -> 3.127.138.57:16458
                Source: TrafficSnort IDS: 2814856 ETPRO TROJAN njrat ver 0.7d Malware CnC Callback (inf) 192.168.2.4:49768 -> 3.127.138.57:16458
                Source: TrafficSnort IDS: 2033132 ET TROJAN Generic njRAT/Bladabindi CnC Activity (ll) 192.168.2.4:49769 -> 3.127.138.57:16458
                Source: TrafficSnort IDS: 2814856 ETPRO TROJAN njrat ver 0.7d Malware CnC Callback (inf) 192.168.2.4:49769 -> 3.127.138.57:16458
                Source: TrafficSnort IDS: 2033132 ET TROJAN Generic njRAT/Bladabindi CnC Activity (ll) 192.168.2.4:49770 -> 3.127.138.57:16458
                Source: TrafficSnort IDS: 2814856 ETPRO TROJAN njrat ver 0.7d Malware CnC Callback (inf) 192.168.2.4:49770 -> 3.127.138.57:16458
                Source: TrafficSnort IDS: 2033132 ET TROJAN Generic njRAT/Bladabindi CnC Activity (ll) 192.168.2.4:49771 -> 3.127.138.57:16458
                Source: TrafficSnort IDS: 2814856 ETPRO TROJAN njrat ver 0.7d Malware CnC Callback (inf) 192.168.2.4:49771 -> 3.127.138.57:16458
                Source: TrafficSnort IDS: 2033132 ET TROJAN Generic njRAT/Bladabindi CnC Activity (ll) 192.168.2.4:49772 -> 3.127.138.57:16458
                Source: TrafficSnort IDS: 2814856 ETPRO TROJAN njrat ver 0.7d Malware CnC Callback (inf) 192.168.2.4:49772 -> 3.127.138.57:16458
                Source: TrafficSnort IDS: 2033132 ET TROJAN Generic njRAT/Bladabindi CnC Activity (ll) 192.168.2.4:49773 -> 3.127.138.57:16458
                Source: TrafficSnort IDS: 2814856 ETPRO TROJAN njrat ver 0.7d Malware CnC Callback (inf) 192.168.2.4:49773 -> 3.127.138.57:16458
                Source: TrafficSnort IDS: 2033132 ET TROJAN Generic njRAT/Bladabindi CnC Activity (ll) 192.168.2.4:49774 -> 3.127.138.57:16458
                Source: TrafficSnort IDS: 2814856 ETPRO TROJAN njrat ver 0.7d Malware CnC Callback (inf) 192.168.2.4:49774 -> 3.127.138.57:16458
                Source: TrafficSnort IDS: 2033132 ET TROJAN Generic njRAT/Bladabindi CnC Activity (ll) 192.168.2.4:49775 -> 3.127.138.57:16458
                Source: TrafficSnort IDS: 2814856 ETPRO TROJAN njrat ver 0.7d Malware CnC Callback (inf) 192.168.2.4:49775 -> 3.127.138.57:16458
                Source: TrafficSnort IDS: 2033132 ET TROJAN Generic njRAT/Bladabindi CnC Activity (ll) 192.168.2.4:49776 -> 3.127.138.57:16458
                Source: TrafficSnort IDS: 2814856 ETPRO TROJAN njrat ver 0.7d Malware CnC Callback (inf) 192.168.2.4:49776 -> 3.127.138.57:16458
                Source: TrafficSnort IDS: 2033132 ET TROJAN Generic njRAT/Bladabindi CnC Activity (ll) 192.168.2.4:49777 -> 3.127.138.57:16458
                Source: TrafficSnort IDS: 2814856 ETPRO TROJAN njrat ver 0.7d Malware CnC Callback (inf) 192.168.2.4:49777 -> 3.127.138.57:16458
                Source: TrafficSnort IDS: 2033132 ET TROJAN Generic njRAT/Bladabindi CnC Activity (ll) 192.168.2.4:49778 -> 3.127.138.57:16458
                Source: TrafficSnort IDS: 2814856 ETPRO TROJAN njrat ver 0.7d Malware CnC Callback (inf) 192.168.2.4:49778 -> 3.127.138.57:16458
                Source: TrafficSnort IDS: 2033132 ET TROJAN Generic njRAT/Bladabindi CnC Activity (ll) 192.168.2.4:49779 -> 3.127.138.57:16458
                Source: TrafficSnort IDS: 2814856 ETPRO TROJAN njrat ver 0.7d Malware CnC Callback (inf) 192.168.2.4:49779 -> 3.127.138.57:16458
                Source: TrafficSnort IDS: 2033132 ET TROJAN Generic njRAT/Bladabindi CnC Activity (ll) 192.168.2.4:49780 -> 3.127.138.57:16458
                Source: TrafficSnort IDS: 2814856 ETPRO TROJAN njrat ver 0.7d Malware CnC Callback (inf) 192.168.2.4:49780 -> 3.127.138.57:16458
                Source: TrafficSnort IDS: 2033132 ET TROJAN Generic njRAT/Bladabindi CnC Activity (ll) 192.168.2.4:49781 -> 3.127.138.57:16458
                Source: TrafficSnort IDS: 2814856 ETPRO TROJAN njrat ver 0.7d Malware CnC Callback (inf) 192.168.2.4:49781 -> 3.127.138.57:16458
                Source: TrafficSnort IDS: 2033132 ET TROJAN Generic njRAT/Bladabindi CnC Activity (ll) 192.168.2.4:49782 -> 3.127.138.57:16458
                Source: TrafficSnort IDS: 2814856 ETPRO TROJAN njrat ver 0.7d Malware CnC Callback (inf) 192.168.2.4:49782 -> 3.127.138.57:16458
                Source: TrafficSnort IDS: 2033132 ET TROJAN Generic njRAT/Bladabindi CnC Activity (ll) 192.168.2.4:49783 -> 3.127.138.57:16458
                Source: TrafficSnort IDS: 2814856 ETPRO TROJAN njrat ver 0.7d Malware CnC Callback (inf) 192.168.2.4:49783 -> 3.127.138.57:16458
                Source: TrafficSnort IDS: 2033132 ET TROJAN Generic njRAT/Bladabindi CnC Activity (ll) 192.168.2.4:49784 -> 3.127.138.57:16458
                Source: TrafficSnort IDS: 2814856 ETPRO TROJAN njrat ver 0.7d Malware CnC Callback (inf) 192.168.2.4:49784 -> 3.127.138.57:16458
                Source: TrafficSnort IDS: 2033132 ET TROJAN Generic njRAT/Bladabindi CnC Activity (ll) 192.168.2.4:49785 -> 3.127.138.57:16458
                Source: TrafficSnort IDS: 2814856 ETPRO TROJAN njrat ver 0.7d Malware CnC Callback (inf) 192.168.2.4:49785 -> 3.127.138.57:16458
                Source: TrafficSnort IDS: 2814860 ETPRO TROJAN njRAT/Bladabindi CnC Callback (act) 192.168.2.4:49785 -> 3.127.138.57:16458
                Source: TrafficSnort IDS: 2825564 ETPRO TROJAN Generic njRAT/Bladabindi CnC Activity (act) 192.168.2.4:49785 -> 3.127.138.57:16458
                Source: TrafficSnort IDS: 2033132 ET TROJAN Generic njRAT/Bladabindi CnC Activity (ll) 192.168.2.4:49786 -> 3.127.138.57:16458
                Source: TrafficSnort IDS: 2814856 ETPRO TROJAN njrat ver 0.7d Malware CnC Callback (inf) 192.168.2.4:49786 -> 3.127.138.57:16458
                Source: TrafficSnort IDS: 2033132 ET TROJAN Generic njRAT/Bladabindi CnC Activity (ll) 192.168.2.4:49787 -> 3.127.138.57:16458
                Source: TrafficSnort IDS: 2814856 ETPRO TROJAN njrat ver 0.7d Malware CnC Callback (inf) 192.168.2.4:49787 -> 3.127.138.57:16458
                Source: TrafficSnort IDS: 2825563 ETPRO TROJAN Generic njRAT/Bladabindi CnC Activity (inf) 192.168.2.4:49787 -> 3.127.138.57:16458
                Source: TrafficSnort IDS: 2033132 ET TROJAN Generic njRAT/Bladabindi CnC Activity (ll) 192.168.2.4:49788 -> 3.127.138.57:16458
                Source: TrafficSnort IDS: 2814856 ETPRO TROJAN njrat ver 0.7d Malware CnC Callback (inf) 192.168.2.4:49788 -> 3.127.138.57:16458
                Source: TrafficSnort IDS: 2825563 ETPRO TROJAN Generic njRAT/Bladabindi CnC Activity (inf) 192.168.2.4:49788 -> 3.127.138.57:16458
                Source: TrafficSnort IDS: 2033132 ET TROJAN Generic njRAT/Bladabindi CnC Activity (ll) 192.168.2.4:49789 -> 3.127.138.57:16458
                Source: TrafficSnort IDS: 2814856 ETPRO TROJAN njrat ver 0.7d Malware CnC Callback (inf) 192.168.2.4:49789 -> 3.127.138.57:16458
                Source: TrafficSnort IDS: 2825563 ETPRO TROJAN Generic njRAT/Bladabindi CnC Activity (inf) 192.168.2.4:49789 -> 3.127.138.57:16458
                Source: TrafficSnort IDS: 2033132 ET TROJAN Generic njRAT/Bladabindi CnC Activity (ll) 192.168.2.4:49790 -> 3.127.138.57:16458
                Source: TrafficSnort IDS: 2814856 ETPRO TROJAN njrat ver 0.7d Malware CnC Callback (inf) 192.168.2.4:49790 -> 3.127.138.57:16458
                Source: TrafficSnort IDS: 2825563 ETPRO TROJAN Generic njRAT/Bladabindi CnC Activity (inf) 192.168.2.4:49790 -> 3.127.138.57:16458
                Source: TrafficSnort IDS: 2033132 ET TROJAN Generic njRAT/Bladabindi CnC Activity (ll) 192.168.2.4:49791 -> 3.127.138.57:16458
                Source: TrafficSnort IDS: 2814856 ETPRO TROJAN njrat ver 0.7d Malware CnC Callback (inf) 192.168.2.4:49791 -> 3.127.138.57:16458
                Source: TrafficSnort IDS: 2825563 ETPRO TROJAN Generic njRAT/Bladabindi CnC Activity (inf) 192.168.2.4:49791 -> 3.127.138.57:16458
                Source: TrafficSnort IDS: 2033132 ET TROJAN Generic njRAT/Bladabindi CnC Activity (ll) 192.168.2.4:49792 -> 3.127.138.57:16458
                Source: TrafficSnort IDS: 2814856 ETPRO TROJAN njrat ver 0.7d Malware CnC Callback (inf) 192.168.2.4:49792 -> 3.127.138.57:16458
                Source: TrafficSnort IDS: 2825563 ETPRO TROJAN Generic njRAT/Bladabindi CnC Activity (inf) 192.168.2.4:49792 -> 3.127.138.57:16458
                Source: TrafficSnort IDS: 2033132 ET TROJAN Generic njRAT/Bladabindi CnC Activity (ll) 192.168.2.4:49793 -> 3.127.138.57:16458
                Source: TrafficSnort IDS: 2814856 ETPRO TROJAN njrat ver 0.7d Malware CnC Callback (inf) 192.168.2.4:49793 -> 3.127.138.57:16458
                Source: TrafficSnort IDS: 2825563 ETPRO TROJAN Generic njRAT/Bladabindi CnC Activity (inf) 192.168.2.4:49793 -> 3.127.138.57:16458
                Source: TrafficSnort IDS: 2033132 ET TROJAN Generic njRAT/Bladabindi CnC Activity (ll) 192.168.2.4:49794 -> 3.127.138.57:16458
                Source: TrafficSnort IDS: 2814856 ETPRO TROJAN njrat ver 0.7d Malware CnC Callback (inf) 192.168.2.4:49794 -> 3.127.138.57:16458
                Source: TrafficSnort IDS: 2825563 ETPRO TROJAN Generic njRAT/Bladabindi CnC Activity (inf) 192.168.2.4:49794 -> 3.127.138.57:16458
                Source: TrafficSnort IDS: 2033132 ET TROJAN Generic njRAT/Bladabindi CnC Activity (ll) 192.168.2.4:49795 -> 3.127.138.57:16458
                Source: TrafficSnort IDS: 2814856 ETPRO TROJAN njrat ver 0.7d Malware CnC Callback (inf) 192.168.2.4:49795 -> 3.127.138.57:16458
                Source: TrafficSnort IDS: 2825563 ETPRO TROJAN Generic njRAT/Bladabindi CnC Activity (inf) 192.168.2.4:49795 -> 3.127.138.57:16458
                Source: TrafficSnort IDS: 2033132 ET TROJAN Generic njRAT/Bladabindi CnC Activity (ll) 192.168.2.4:49796 -> 3.127.138.57:16458
                Source: TrafficSnort IDS: 2814856 ETPRO TROJAN njrat ver 0.7d Malware CnC Callback (inf) 192.168.2.4:49796 -> 3.127.138.57:16458
                Source: TrafficSnort IDS: 2825563 ETPRO TROJAN Generic njRAT/Bladabindi CnC Activity (inf) 192.168.2.4:49796 -> 3.127.138.57:16458
                Source: TrafficSnort IDS: 2033132 ET TROJAN Generic njRAT/Bladabindi CnC Activity (ll) 192.168.2.4:49797 -> 3.127.138.57:16458
                Source: TrafficSnort IDS: 2814856 ETPRO TROJAN njrat ver 0.7d Malware CnC Callback (inf) 192.168.2.4:49797 -> 3.127.138.57:16458
                Source: TrafficSnort IDS: 2825563 ETPRO TROJAN Generic njRAT/Bladabindi CnC Activity (inf) 192.168.2.4:49797 -> 3.127.138.57:16458
                Source: TrafficSnort IDS: 2033132 ET TROJAN Generic njRAT/Bladabindi CnC Activity (ll) 192.168.2.4:49798 -> 3.127.138.57:16458
                Source: TrafficSnort IDS: 2814856 ETPRO TROJAN njrat ver 0.7d Malware CnC Callback (inf) 192.168.2.4:49798 -> 3.127.138.57:16458
                Source: TrafficSnort IDS: 2825563 ETPRO TROJAN Generic njRAT/Bladabindi CnC Activity (inf) 192.168.2.4:49798 -> 3.127.138.57:16458
                Source: TrafficSnort IDS: 2033132 ET TROJAN Generic njRAT/Bladabindi CnC Activity (ll) 192.168.2.4:49799 -> 3.127.138.57:16458
                Source: TrafficSnort IDS: 2814856 ETPRO TROJAN njrat ver 0.7d Malware CnC Callback (inf) 192.168.2.4:49799 -> 3.127.138.57:16458
                Source: TrafficSnort IDS: 2825563 ETPRO TROJAN Generic njRAT/Bladabindi CnC Activity (inf) 192.168.2.4:49799 -> 3.127.138.57:16458
                Source: TrafficSnort IDS: 2033132 ET TROJAN Generic njRAT/Bladabindi CnC Activity (ll) 192.168.2.4:49800 -> 3.127.138.57:16458
                Source: TrafficSnort IDS: 2814856 ETPRO TROJAN njrat ver 0.7d Malware CnC Callback (inf) 192.168.2.4:49800 -> 3.127.138.57:16458
                Source: TrafficSnort IDS: 2825563 ETPRO TROJAN Generic njRAT/Bladabindi CnC Activity (inf) 192.168.2.4:49800 -> 3.127.138.57:16458
                Source: TrafficSnort IDS: 2033132 ET TROJAN Generic njRAT/Bladabindi CnC Activity (ll) 192.168.2.4:49801 -> 3.127.138.57:16458
                Source: TrafficSnort IDS: 2814856 ETPRO TROJAN njrat ver 0.7d Malware CnC Callback (inf) 192.168.2.4:49801 -> 3.127.138.57:16458
                Source: TrafficSnort IDS: 2825563 ETPRO TROJAN Generic njRAT/Bladabindi CnC Activity (inf) 192.168.2.4:49801 -> 3.127.138.57:16458
                Source: TrafficSnort IDS: 2033132 ET TROJAN Generic njRAT/Bladabindi CnC Activity (ll) 192.168.2.4:49802 -> 3.127.138.57:16458
                Source: TrafficSnort IDS: 2814856 ETPRO TROJAN njrat ver 0.7d Malware CnC Callback (inf) 192.168.2.4:49802 -> 3.127.138.57:16458
                Source: TrafficSnort IDS: 2825563 ETPRO TROJAN Generic njRAT/Bladabindi CnC Activity (inf) 192.168.2.4:49802 -> 3.127.138.57:16458
                Source: TrafficSnort IDS: 2033132 ET TROJAN Generic njRAT/Bladabindi CnC Activity (ll) 192.168.2.4:49803 -> 3.127.138.57:16458
                Source: TrafficSnort IDS: 2814856 ETPRO TROJAN njrat ver 0.7d Malware CnC Callback (inf) 192.168.2.4:49803 -> 3.127.138.57:16458
                Source: TrafficSnort IDS: 2825563 ETPRO TROJAN Generic njRAT/Bladabindi CnC Activity (inf) 192.168.2.4:49803 -> 3.127.138.57:16458
                Source: TrafficSnort IDS: 2033132 ET TROJAN Generic njRAT/Bladabindi CnC Activity (ll) 192.168.2.4:49804 -> 3.127.138.57:16458
                Source: TrafficSnort IDS: 2814856 ETPRO TROJAN njrat ver 0.7d Malware CnC Callback (inf) 192.168.2.4:49804 -> 3.127.138.57:16458
                Source: TrafficSnort IDS: 2825563 ETPRO TROJAN Generic njRAT/Bladabindi CnC Activity (inf) 192.168.2.4:49804 -> 3.127.138.57:16458
                Source: TrafficSnort IDS: 2033132 ET TROJAN Generic njRAT/Bladabindi CnC Activity (ll) 192.168.2.4:49805 -> 3.127.138.57:16458
                Source: TrafficSnort IDS: 2814856 ETPRO TROJAN njrat ver 0.7d Malware CnC Callback (inf) 192.168.2.4:49805 -> 3.127.138.57:16458
                Source: TrafficSnort IDS: 2825563 ETPRO TROJAN Generic njRAT/Bladabindi CnC Activity (inf) 192.168.2.4:49805 -> 3.127.138.57:16458
                Source: TrafficSnort IDS: 2033132 ET TROJAN Generic njRAT/Bladabindi CnC Activity (ll) 192.168.2.4:49806 -> 3.127.138.57:16458
                Source: TrafficSnort IDS: 2814856 ETPRO TROJAN njrat ver 0.7d Malware CnC Callback (inf) 192.168.2.4:49806 -> 3.127.138.57:16458
                Source: TrafficSnort IDS: 2825563 ETPRO TROJAN Generic njRAT/Bladabindi CnC Activity (inf) 192.168.2.4:49806 -> 3.127.138.57:16458
                Source: TrafficSnort IDS: 2033132 ET TROJAN Generic njRAT/Bladabindi CnC Activity (ll) 192.168.2.4:49807 -> 3.127.138.57:16458
                Source: TrafficSnort IDS: 2814856 ETPRO TROJAN njrat ver 0.7d Malware CnC Callback (inf) 192.168.2.4:49807 -> 3.127.138.57:16458
                Source: TrafficSnort IDS: 2825563 ETPRO TROJAN Generic njRAT/Bladabindi CnC Activity (inf) 192.168.2.4:49807 -> 3.127.138.57:16458
                Source: TrafficSnort IDS: 2033132 ET TROJAN Generic njRAT/Bladabindi CnC Activity (ll) 192.168.2.4:49808 -> 3.127.138.57:16458
                Source: TrafficSnort IDS: 2814856 ETPRO TROJAN njrat ver 0.7d Malware CnC Callback (inf) 192.168.2.4:49808 -> 3.127.138.57:16458
                Source: TrafficSnort IDS: 2825563 ETPRO TROJAN Generic njRAT/Bladabindi CnC Activity (inf) 192.168.2.4:49808 -> 3.127.138.57:16458
                Source: TrafficSnort IDS: 2033132 ET TROJAN Generic njRAT/Bladabindi CnC Activity (ll) 192.168.2.4:49809 -> 3.127.138.57:16458
                Source: TrafficSnort IDS: 2814856 ETPRO TROJAN njrat ver 0.7d Malware CnC Callback (inf) 192.168.2.4:49809 -> 3.127.138.57:16458
                Source: TrafficSnort IDS: 2825563 ETPRO TROJAN Generic njRAT/Bladabindi CnC Activity (inf) 192.168.2.4:49809 -> 3.127.138.57:16458
                Source: TrafficSnort IDS: 2033132 ET TROJAN Generic njRAT/Bladabindi CnC Activity (ll) 192.168.2.4:49810 -> 3.127.138.57:16458
                Source: TrafficSnort IDS: 2814856 ETPRO TROJAN njrat ver 0.7d Malware CnC Callback (inf) 192.168.2.4:49810 -> 3.127.138.57:16458
                Source: TrafficSnort IDS: 2825563 ETPRO TROJAN Generic njRAT/Bladabindi CnC Activity (inf) 192.168.2.4:49810 -> 3.127.138.57:16458
                Source: TrafficSnort IDS: 2033132 ET TROJAN Generic njRAT/Bladabindi CnC Activity (ll) 192.168.2.4:49811 -> 3.127.138.57:16458
                Source: TrafficSnort IDS: 2814856 ETPRO TROJAN njrat ver 0.7d Malware CnC Callback (inf) 192.168.2.4:49811 -> 3.127.138.57:16458
                Source: TrafficSnort IDS: 2825563 ETPRO TROJAN Generic njRAT/Bladabindi CnC Activity (inf) 192.168.2.4:49811 -> 3.127.138.57:16458
                Source: TrafficSnort IDS: 2033132 ET TROJAN Generic njRAT/Bladabindi CnC Activity (ll) 192.168.2.4:49812 -> 3.127.138.57:16458
                Source: TrafficSnort IDS: 2814856 ETPRO TROJAN njrat ver 0.7d Malware CnC Callback (inf) 192.168.2.4:49812 -> 3.127.138.57:16458
                Source: TrafficSnort IDS: 2825563 ETPRO TROJAN Generic njRAT/Bladabindi CnC Activity (inf) 192.168.2.4:49812 -> 3.127.138.57:16458
                Source: TrafficSnort IDS: 2033132 ET TROJAN Generic njRAT/Bladabindi CnC Activity (ll) 192.168.2.4:49813 -> 3.127.138.57:16458
                Source: TrafficSnort IDS: 2814856 ETPRO TROJAN njrat ver 0.7d Malware CnC Callback (inf) 192.168.2.4:49813 -> 3.127.138.57:16458
                Source: TrafficSnort IDS: 2825563 ETPRO TROJAN Generic njRAT/Bladabindi CnC Activity (inf) 192.168.2.4:49813 -> 3.127.138.57:16458
                Source: TrafficSnort IDS: 2033132 ET TROJAN Generic njRAT/Bladabindi CnC Activity (ll) 192.168.2.4:49814 -> 3.127.138.57:16458
                Source: TrafficSnort IDS: 2814856 ETPRO TROJAN njrat ver 0.7d Malware CnC Callback (inf) 192.168.2.4:49814 -> 3.127.138.57:16458
                Source: TrafficSnort IDS: 2825563 ETPRO TROJAN Generic njRAT/Bladabindi CnC Activity (inf) 192.168.2.4:49814 -> 3.127.138.57:16458
                Source: TrafficSnort IDS: 2033132 ET TROJAN Generic njRAT/Bladabindi CnC Activity (ll) 192.168.2.4:49815 -> 3.127.138.57:16458
                Source: TrafficSnort IDS: 2814856 ETPRO TROJAN njrat ver 0.7d Malware CnC Callback (inf) 192.168.2.4:49815 -> 3.127.138.57:16458
                Source: TrafficSnort IDS: 2825563 ETPRO TROJAN Generic njRAT/Bladabindi CnC Activity (inf) 192.168.2.4:49815 -> 3.127.138.57:16458
                Source: TrafficSnort IDS: 2033132 ET TROJAN Generic njRAT/Bladabindi CnC Activity (ll) 192.168.2.4:49816 -> 3.127.138.57:16458
                Source: TrafficSnort IDS: 2814856 ETPRO TROJAN njrat ver 0.7d Malware CnC Callback (inf) 192.168.2.4:49816 -> 3.127.138.57:16458
                Source: TrafficSnort IDS: 2825563 ETPRO TROJAN Generic njRAT/Bladabindi CnC Activity (inf) 192.168.2.4:49816 -> 3.127.138.57:16458
                Source: TrafficSnort IDS: 2033132 ET TROJAN Generic njRAT/Bladabindi CnC Activity (ll) 192.168.2.4:49817 -> 3.127.138.57:16458
                Source: TrafficSnort IDS: 2814856 ETPRO TROJAN njrat ver 0.7d Malware CnC Callback (inf) 192.168.2.4:49817 -> 3.127.138.57:16458
                Source: TrafficSnort IDS: 2033132 ET TROJAN Generic njRAT/Bladabindi CnC Activity (ll) 192.168.2.4:49818 -> 3.127.138.57:16458
                Source: TrafficSnort IDS: 2814856 ETPRO TROJAN njrat ver 0.7d Malware CnC Callback (inf) 192.168.2.4:49818 -> 3.127.138.57:16458
                Source: TrafficSnort IDS: 2825563 ETPRO TROJAN Generic njRAT/Bladabindi CnC Activity (inf) 192.168.2.4:49818 -> 3.127.138.57:16458
                Source: TrafficSnort IDS: 2033132 ET TROJAN Generic njRAT/Bladabindi CnC Activity (ll) 192.168.2.4:49819 -> 3.127.138.57:16458
                Source: TrafficSnort IDS: 2814856 ETPRO TROJAN njrat ver 0.7d Malware CnC Callback (inf) 192.168.2.4:49819 -> 3.127.138.57:16458
                Source: TrafficSnort IDS: 2825563 ETPRO TROJAN Generic njRAT/Bladabindi CnC Activity (inf) 192.168.2.4:49819 -> 3.127.138.57:16458
                Source: TrafficSnort IDS: 2033132 ET TROJAN Generic njRAT/Bladabindi CnC Activity (ll) 192.168.2.4:49820 -> 3.127.138.57:16458
                Source: TrafficSnort IDS: 2814856 ETPRO TROJAN njrat ver 0.7d Malware CnC Callback (inf) 192.168.2.4:49820 -> 3.127.138.57:16458
                Source: TrafficSnort IDS: 2825563 ETPRO TROJAN Generic njRAT/Bladabindi CnC Activity (inf) 192.168.2.4:49820 -> 3.127.138.57:16458
                Source: TrafficSnort IDS: 2033132 ET TROJAN Generic njRAT/Bladabindi CnC Activity (ll) 192.168.2.4:49821 -> 3.127.138.57:16458
                Source: TrafficSnort IDS: 2814856 ETPRO TROJAN njrat ver 0.7d Malware CnC Callback (inf) 192.168.2.4:49821 -> 3.127.138.57:16458
                Source: TrafficSnort IDS: 2825563 ETPRO TROJAN Generic njRAT/Bladabindi CnC Activity (inf) 192.168.2.4:49821 -> 3.127.138.57:16458
                Source: TrafficSnort IDS: 2033132 ET TROJAN Generic njRAT/Bladabindi CnC Activity (ll) 192.168.2.4:49822 -> 3.127.138.57:16458
                Source: TrafficSnort IDS: 2814856 ETPRO TROJAN njrat ver 0.7d Malware CnC Callback (inf) 192.168.2.4:49822 -> 3.127.138.57:16458
                Source: TrafficSnort IDS: 2825563 ETPRO TROJAN Generic njRAT/Bladabindi CnC Activity (inf) 192.168.2.4:49822 -> 3.127.138.57:16458
                Source: TrafficSnort IDS: 2033132 ET TROJAN Generic njRAT/Bladabindi CnC Activity (ll) 192.168.2.4:49823 -> 3.127.138.57:16458
                Source: TrafficSnort IDS: 2814856 ETPRO TROJAN njrat ver 0.7d Malware CnC Callback (inf) 192.168.2.4:49823 -> 3.127.138.57:16458
                Source: TrafficSnort IDS: 2825563 ETPRO TROJAN Generic njRAT/Bladabindi CnC Activity (inf) 192.168.2.4:49823 -> 3.127.138.57:16458
                Source: TrafficSnort IDS: 2033132 ET TROJAN Generic njRAT/Bladabindi CnC Activity (ll) 192.168.2.4:49824 -> 3.127.138.57:16458
                Source: TrafficSnort IDS: 2814856 ETPRO TROJAN njrat ver 0.7d Malware CnC Callback (inf) 192.168.2.4:49824 -> 3.127.138.57:16458
                Source: TrafficSnort IDS: 2825563 ETPRO TROJAN Generic njRAT/Bladabindi CnC Activity (inf) 192.168.2.4:49824 -> 3.127.138.57:16458
                Source: TrafficSnort IDS: 2033132 ET TROJAN Generic njRAT/Bladabindi CnC Activity (ll) 192.168.2.4:49825 -> 3.127.138.57:16458
                Source: TrafficSnort IDS: 2814856 ETPRO TROJAN njrat ver 0.7d Malware CnC Callback (inf) 192.168.2.4:49825 -> 3.127.138.57:16458
                Source: TrafficSnort IDS: 2825563 ETPRO TROJAN Generic njRAT/Bladabindi CnC Activity (inf) 192.168.2.4:49825 -> 3.127.138.57:16458
                Source: TrafficSnort IDS: 2033132 ET TROJAN Generic njRAT/Bladabindi CnC Activity (ll) 192.168.2.4:49826 -> 3.127.138.57:16458
                Source: TrafficSnort IDS: 2814856 ETPRO TROJAN njrat ver 0.7d Malware CnC Callback (inf) 192.168.2.4:49826 -> 3.127.138.57:16458
                Source: TrafficSnort IDS: 2825563 ETPRO TROJAN Generic njRAT/Bladabindi CnC Activity (inf) 192.168.2.4:49826 -> 3.127.138.57:16458
                Source: TrafficSnort IDS: 2033132 ET TROJAN Generic njRAT/Bladabindi CnC Activity (ll) 192.168.2.4:49827 -> 3.127.138.57:16458
                Source: TrafficSnort IDS: 2814856 ETPRO TROJAN njrat ver 0.7d Malware CnC Callback (inf) 192.168.2.4:49827 -> 3.127.138.57:16458
                Source: TrafficSnort IDS: 2825563 ETPRO TROJAN Generic njRAT/Bladabindi CnC Activity (inf) 192.168.2.4:49827 -> 3.127.138.57:16458
                Source: TrafficSnort IDS: 2033132 ET TROJAN Generic njRAT/Bladabindi CnC Activity (ll) 192.168.2.4:49828 -> 3.127.138.57:16458
                Source: TrafficSnort IDS: 2814856 ETPRO TROJAN njrat ver 0.7d Malware CnC Callback (inf) 192.168.2.4:49828 -> 3.127.138.57:16458
                Source: TrafficSnort IDS: 2825563 ETPRO TROJAN Generic njRAT/Bladabindi CnC Activity (inf) 192.168.2.4:49828 -> 3.127.138.57:16458
                Source: TrafficSnort IDS: 2033132 ET TROJAN Generic njRAT/Bladabindi CnC Activity (ll) 192.168.2.4:49829 -> 3.127.138.57:16458
                Source: TrafficSnort IDS: 2814856 ETPRO TROJAN njrat ver 0.7d Malware CnC Callback (inf) 192.168.2.4:49829 -> 3.127.138.57:16458
                Source: TrafficSnort IDS: 2825563 ETPRO TROJAN Generic njRAT/Bladabindi CnC Activity (inf) 192.168.2.4:49829 -> 3.127.138.57:16458
                Source: TrafficSnort IDS: 2033132 ET TROJAN Generic njRAT/Bladabindi CnC Activity (ll) 192.168.2.4:49830 -> 3.127.138.57:16458
                Source: TrafficSnort IDS: 2814856 ETPRO TROJAN njrat ver 0.7d Malware CnC Callback (inf) 192.168.2.4:49830 -> 3.127.138.57:16458
                Source: TrafficSnort IDS: 2825563 ETPRO TROJAN Generic njRAT/Bladabindi CnC Activity (inf) 192.168.2.4:49830 -> 3.127.138.57:16458
                Source: TrafficSnort IDS: 2033132 ET TROJAN Generic njRAT/Bladabindi CnC Activity (ll) 192.168.2.4:49831 -> 3.127.138.57:16458
                Source: TrafficSnort IDS: 2814856 ETPRO TROJAN njrat ver 0.7d Malware CnC Callback (inf) 192.168.2.4:49831 -> 3.127.138.57:16458
                Source: TrafficSnort IDS: 2825563 ETPRO TROJAN Generic njRAT/Bladabindi CnC Activity (inf) 192.168.2.4:49831 -> 3.127.138.57:16458
                Source: TrafficSnort IDS: 2033132 ET TROJAN Generic njRAT/Bladabindi CnC Activity (ll) 192.168.2.4:49832 -> 3.127.138.57:16458
                Source: TrafficSnort IDS: 2814856 ETPRO TROJAN njrat ver 0.7d Malware CnC Callback (inf) 192.168.2.4:49832 -> 3.127.138.57:16458
                Source: TrafficSnort IDS: 2825563 ETPRO TROJAN Generic njRAT/Bladabindi CnC Activity (inf) 192.168.2.4:49832 -> 3.127.138.57:16458
                Source: TrafficSnort IDS: 2033132 ET TROJAN Generic njRAT/Bladabindi CnC Activity (ll) 192.168.2.4:49833 -> 3.127.138.57:16458
                Source: TrafficSnort IDS: 2814856 ETPRO TROJAN njrat ver 0.7d Malware CnC Callback (inf) 192.168.2.4:49833 -> 3.127.138.57:16458
                Source: TrafficSnort IDS: 2825563 ETPRO TROJAN Generic njRAT/Bladabindi CnC Activity (inf) 192.168.2.4:49833 -> 3.127.138.57:16458
                Source: TrafficSnort IDS: 2033132 ET TROJAN Generic njRAT/Bladabindi CnC Activity (ll) 192.168.2.4:49834 -> 3.127.138.57:16458
                Source: TrafficSnort IDS: 2814856 ETPRO TROJAN njrat ver 0.7d Malware CnC Callback (inf) 192.168.2.4:49834 -> 3.127.138.57:16458
                Source: TrafficSnort IDS: 2825563 ETPRO TROJAN Generic njRAT/Bladabindi CnC Activity (inf) 192.168.2.4:49834 -> 3.127.138.57:16458
                Source: TrafficSnort IDS: 2033132 ET TROJAN Generic njRAT/Bladabindi CnC Activity (ll) 192.168.2.4:49835 -> 3.127.138.57:16458
                Source: TrafficSnort IDS: 2814856 ETPRO TROJAN njrat ver 0.7d Malware CnC Callback (inf) 192.168.2.4:49835 -> 3.127.138.57:16458
                Source: TrafficSnort IDS: 2033132 ET TROJAN Generic njRAT/Bladabindi CnC Activity (ll) 192.168.2.4:49836 -> 3.127.138.57:16458
                Source: TrafficSnort IDS: 2814856 ETPRO TROJAN njrat ver 0.7d Malware CnC Callback (inf) 192.168.2.4:49836 -> 3.127.138.57:16458
                Source: TrafficSnort IDS: 2825563 ETPRO TROJAN Generic njRAT/Bladabindi CnC Activity (inf) 192.168.2.4:49836 -> 3.127.138.57:16458
                Source: TrafficSnort IDS: 2033132 ET TROJAN Generic njRAT/Bladabindi CnC Activity (ll) 192.168.2.4:49837 -> 3.127.138.57:16458
                Source: TrafficSnort IDS: 2814856 ETPRO TROJAN njrat ver 0.7d Malware CnC Callback (inf) 192.168.2.4:49837 -> 3.127.138.57:16458
                Source: TrafficSnort IDS: 2825563 ETPRO TROJAN Generic njRAT/Bladabindi CnC Activity (inf) 192.168.2.4:49837 -> 3.127.138.57:16458
                Source: TrafficSnort IDS: 2033132 ET TROJAN Generic njRAT/Bladabindi CnC Activity (ll) 192.168.2.4:49838 -> 3.127.138.57:16458
                Source: TrafficSnort IDS: 2814856 ETPRO TROJAN njrat ver 0.7d Malware CnC Callback (inf) 192.168.2.4:49838 -> 3.127.138.57:16458
                Source: TrafficSnort IDS: 2825563 ETPRO TROJAN Generic njRAT/Bladabindi CnC Activity (inf) 192.168.2.4:49838 -> 3.127.138.57:16458
                Source: TrafficSnort IDS: 2033132 ET TROJAN Generic njRAT/Bladabindi CnC Activity (ll) 192.168.2.4:49839 -> 3.127.138.57:16458
                Source: TrafficSnort IDS: 2814856 ETPRO TROJAN njrat ver 0.7d Malware CnC Callback (inf) 192.168.2.4:49839 -> 3.127.138.57:16458
                Source: TrafficSnort IDS: 2825563 ETPRO TROJAN Generic njRAT/Bladabindi CnC Activity (inf) 192.168.2.4:49839 -> 3.127.138.57:16458
                Source: TrafficSnort IDS: 2033132 ET TROJAN Generic njRAT/Bladabindi CnC Activity (ll) 192.168.2.4:49840 -> 3.127.138.57:16458
                Source: TrafficSnort IDS: 2814856 ETPRO TROJAN njrat ver 0.7d Malware CnC Callback (inf) 192.168.2.4:49840 -> 3.127.138.57:16458
                Source: TrafficSnort IDS: 2825563 ETPRO TROJAN Generic njRAT/Bladabindi CnC Activity (inf) 192.168.2.4:49840 -> 3.127.138.57:16458
                Source: TrafficSnort IDS: 2033132 ET TROJAN Generic njRAT/Bladabindi CnC Activity (ll) 192.168.2.4:49841 -> 3.127.138.57:16458
                Source: TrafficSnort IDS: 2814856 ETPRO TROJAN njrat ver 0.7d Malware CnC Callback (inf) 192.168.2.4:49841 -> 3.127.138.57:16458
                Source: TrafficSnort IDS: 2825563 ETPRO TROJAN Generic njRAT/Bladabindi CnC Activity (inf) 192.168.2.4:49841 -> 3.127.138.57:16458
                Source: TrafficSnort IDS: 2033132 ET TROJAN Generic njRAT/Bladabindi CnC Activity (ll) 192.168.2.4:49842 -> 3.127.138.57:16458
                Source: TrafficSnort IDS: 2814856 ETPRO TROJAN njrat ver 0.7d Malware CnC Callback (inf) 192.168.2.4:49842 -> 3.127.138.57:16458
                Source: TrafficSnort IDS: 2825563 ETPRO TROJAN Generic njRAT/Bladabindi CnC Activity (inf) 192.168.2.4:49842 -> 3.127.138.57:16458
                Source: TrafficSnort IDS: 2033132 ET TROJAN Generic njRAT/Bladabindi CnC Activity (ll) 192.168.2.4:49843 -> 3.127.138.57:16458
                Source: TrafficSnort IDS: 2814856 ETPRO TROJAN njrat ver 0.7d Malware CnC Callback (inf) 192.168.2.4:49843 -> 3.127.138.57:16458
                Source: TrafficSnort IDS: 2825563 ETPRO TROJAN Generic njRAT/Bladabindi CnC Activity (inf) 192.168.2.4:49843 -> 3.127.138.57:16458
                Source: TrafficSnort IDS: 2033132 ET TROJAN Generic njRAT/Bladabindi CnC Activity (ll) 192.168.2.4:49844 -> 3.127.138.57:16458
                Source: TrafficSnort IDS: 2814856 ETPRO TROJAN njrat ver 0.7d Malware CnC Callback (inf) 192.168.2.4:49844 -> 3.127.138.57:16458
                Source: TrafficSnort IDS: 2825563 ETPRO TROJAN Generic njRAT/Bladabindi CnC Activity (inf) 192.168.2.4:49844 -> 3.127.138.57:16458
                Source: TrafficSnort IDS: 2033132 ET TROJAN Generic njRAT/Bladabindi CnC Activity (ll) 192.168.2.4:49845 -> 3.127.138.57:16458
                Source: TrafficSnort IDS: 2814856 ETPRO TROJAN njrat ver 0.7d Malware CnC Callback (inf) 192.168.2.4:49845 -> 3.127.138.57:16458
                Source: TrafficSnort IDS: 2825563 ETPRO TROJAN Generic njRAT/Bladabindi CnC Activity (inf) 192.168.2.4:49845 -> 3.127.138.57:16458
                Source: TrafficSnort IDS: 2033132 ET TROJAN Generic njRAT/Bladabindi CnC Activity (ll) 192.168.2.4:49846 -> 3.127.138.57:16458
                Source: TrafficSnort IDS: 2814856 ETPRO TROJAN njrat ver 0.7d Malware CnC Callback (inf) 192.168.2.4:49846 -> 3.127.138.57:16458
                Source: TrafficSnort IDS: 2825563 ETPRO TROJAN Generic njRAT/Bladabindi CnC Activity (inf) 192.168.2.4:49846 -> 3.127.138.57:16458
                Source: TrafficSnort IDS: 2033132 ET TROJAN Generic njRAT/Bladabindi CnC Activity (ll) 192.168.2.4:49847 -> 3.127.138.57:16458
                Source: TrafficSnort IDS: 2814856 ETPRO TROJAN njrat ver 0.7d Malware CnC Callback (inf) 192.168.2.4:49847 -> 3.127.138.57:16458
                Source: TrafficSnort IDS: 2825563 ETPRO TROJAN Generic njRAT/Bladabindi CnC Activity (inf) 192.168.2.4:49847 -> 3.127.138.57:16458
                Source: TrafficSnort IDS: 2033132 ET TROJAN Generic njRAT/Bladabindi CnC Activity (ll) 192.168.2.4:49848 -> 3.127.138.57:16458
                Source: TrafficSnort IDS: 2814856 ETPRO TROJAN njrat ver 0.7d Malware CnC Callback (inf) 192.168.2.4:49848 -> 3.127.138.57:16458
                Source: TrafficSnort IDS: 2825563 ETPRO TROJAN Generic njRAT/Bladabindi CnC Activity (inf) 192.168.2.4:49848 -> 3.127.138.57:16458
                Source: TrafficSnort IDS: 2033132 ET TROJAN Generic njRAT/Bladabindi CnC Activity (ll) 192.168.2.4:49849 -> 3.127.138.57:16458
                Source: TrafficSnort IDS: 2814856 ETPRO TROJAN njrat ver 0.7d Malware CnC Callback (inf) 192.168.2.4:49849 -> 3.127.138.57:16458
                Source: TrafficSnort IDS: 2825563 ETPRO TROJAN Generic njRAT/Bladabindi CnC Activity (inf) 192.168.2.4:49849 -> 3.127.138.57:16458
                Source: TrafficSnort IDS: 2033132 ET TROJAN Generic njRAT/Bladabindi CnC Activity (ll) 192.168.2.4:49850 -> 3.127.138.57:16458
                Source: TrafficSnort IDS: 2814856 ETPRO TROJAN njrat ver 0.7d Malware CnC Callback (inf) 192.168.2.4:49850 -> 3.127.138.57:16458
                Source: TrafficSnort IDS: 2825563 ETPRO TROJAN Generic njRAT/Bladabindi CnC Activity (inf) 192.168.2.4:49850 -> 3.127.138.57:16458
                Source: TrafficSnort IDS: 2033132 ET TROJAN Generic njRAT/Bladabindi CnC Activity (ll) 192.168.2.4:49851 -> 3.127.138.57:16458
                Source: TrafficSnort IDS: 2814856 ETPRO TROJAN njrat ver 0.7d Malware CnC Callback (inf) 192.168.2.4:49851 -> 3.127.138.57:16458
                Source: TrafficSnort IDS: 2825563 ETPRO TROJAN Generic njRAT/Bladabindi CnC Activity (inf) 192.168.2.4:49851 -> 3.127.138.57:16458
                Source: TrafficSnort IDS: 2033132 ET TROJAN Generic njRAT/Bladabindi CnC Activity (ll) 192.168.2.4:49852 -> 3.127.138.57:16458
                Source: TrafficSnort IDS: 2814856 ETPRO TROJAN njrat ver 0.7d Malware CnC Callback (inf) 192.168.2.4:49852 -> 3.127.138.57:16458
                Source: TrafficSnort IDS: 2825563 ETPRO TROJAN Generic njRAT/Bladabindi CnC Activity (inf) 192.168.2.4:49852 -> 3.127.138.57:16458
                Source: TrafficSnort IDS: 2033132 ET TROJAN Generic njRAT/Bladabindi CnC Activity (ll) 192.168.2.4:49853 -> 3.127.138.57:16458
                Source: TrafficSnort IDS: 2814856 ETPRO TROJAN njrat ver 0.7d Malware CnC Callback (inf) 192.168.2.4:49853 -> 3.127.138.57:16458
                Source: TrafficSnort IDS: 2825563 ETPRO TROJAN Generic njRAT/Bladabindi CnC Activity (inf) 192.168.2.4:49853 -> 3.127.138.57:16458
                Source: TrafficSnort IDS: 2033132 ET TROJAN Generic njRAT/Bladabindi CnC Activity (ll) 192.168.2.4:49854 -> 3.127.138.57:16458
                Source: TrafficSnort IDS: 2814856 ETPRO TROJAN njrat ver 0.7d Malware CnC Callback (inf) 192.168.2.4:49854 -> 3.127.138.57:16458
                Source: TrafficSnort IDS: 2825563 ETPRO TROJAN Generic njRAT/Bladabindi CnC Activity (inf) 192.168.2.4:49854 -> 3.127.138.57:16458
                Source: TrafficSnort IDS: 2033132 ET TROJAN Generic njRAT/Bladabindi CnC Activity (ll) 192.168.2.4:49855 -> 3.127.138.57:16458
                Source: TrafficSnort IDS: 2814856 ETPRO TROJAN njrat ver 0.7d Malware CnC Callback (inf) 192.168.2.4:49855 -> 3.127.138.57:16458
                Source: TrafficSnort IDS: 2033132 ET TROJAN Generic njRAT/Bladabindi CnC Activity (ll) 192.168.2.4:49856 -> 3.127.138.57:16458
                Source: TrafficSnort IDS: 2814856 ETPRO TROJAN njrat ver 0.7d Malware CnC Callback (inf) 192.168.2.4:49856 -> 3.127.138.57:16458
                Source: TrafficSnort IDS: 2825563 ETPRO TROJAN Generic njRAT/Bladabindi CnC Activity (inf) 192.168.2.4:49856 -> 3.127.138.57:16458
                Source: TrafficSnort IDS: 2033132 ET TROJAN Generic njRAT/Bladabindi CnC Activity (ll) 192.168.2.4:49857 -> 3.127.138.57:16458
                Source: TrafficSnort IDS: 2814856 ETPRO TROJAN njrat ver 0.7d Malware CnC Callback (inf) 192.168.2.4:49857 -> 3.127.138.57:16458
                Source: TrafficSnort IDS: 2825563 ETPRO TROJAN Generic njRAT/Bladabindi CnC Activity (inf) 192.168.2.4:49857 -> 3.127.138.57:16458
                Source: TrafficSnort IDS: 2033132 ET TROJAN Generic njRAT/Bladabindi CnC Activity (ll) 192.168.2.4:49858 -> 3.127.138.57:16458
                Source: TrafficSnort IDS: 2814856 ETPRO TROJAN njrat ver 0.7d Malware CnC Callback (inf) 192.168.2.4:49858 -> 3.127.138.57:16458
                Source: TrafficSnort IDS: 2825563 ETPRO TROJAN Generic njRAT/Bladabindi CnC Activity (inf) 192.168.2.4:49858 -> 3.127.138.57:16458
                Source: TrafficSnort IDS: 2033132 ET TROJAN Generic njRAT/Bladabindi CnC Activity (ll) 192.168.2.4:49859 -> 18.157.68.73:16458
                Source: TrafficSnort IDS: 2814856 ETPRO TROJAN njrat ver 0.7d Malware CnC Callback (inf) 192.168.2.4:49859 -> 18.157.68.73:16458
                Source: TrafficSnort IDS: 2825563 ETPRO TROJAN Generic njRAT/Bladabindi CnC Activity (inf) 192.168.2.4:49859 -> 18.157.68.73:16458
                Source: TrafficSnort IDS: 2033132 ET TROJAN Generic njRAT/Bladabindi CnC Activity (ll) 192.168.2.4:49860 -> 18.157.68.73:16458
                Source: TrafficSnort IDS: 2814856 ETPRO TROJAN njrat ver 0.7d Malware CnC Callback (inf) 192.168.2.4:49860 -> 18.157.68.73:16458
                Source: TrafficSnort IDS: 2825563 ETPRO TROJAN Generic njRAT/Bladabindi CnC Activity (inf) 192.168.2.4:49860 -> 18.157.68.73:16458
                Source: TrafficSnort IDS: 2033132 ET TROJAN Generic njRAT/Bladabindi CnC Activity (ll) 192.168.2.4:49861 -> 18.157.68.73:16458
                Source: TrafficSnort IDS: 2814856 ETPRO TROJAN njrat ver 0.7d Malware CnC Callback (inf) 192.168.2.4:49861 -> 18.157.68.73:16458
                Source: TrafficSnort IDS: 2825563 ETPRO TROJAN Generic njRAT/Bladabindi CnC Activity (inf) 192.168.2.4:49861 -> 18.157.68.73:16458
                Source: TrafficSnort IDS: 2033132 ET TROJAN Generic njRAT/Bladabindi CnC Activity (ll) 192.168.2.4:49862 -> 18.157.68.73:16458
                Source: TrafficSnort IDS: 2814856 ETPRO TROJAN njrat ver 0.7d Malware CnC Callback (inf) 192.168.2.4:49862 -> 18.157.68.73:16458
                Source: TrafficSnort IDS: 2033132 ET TROJAN Generic njRAT/Bladabindi CnC Activity (ll) 192.168.2.4:49863 -> 18.157.68.73:16458
                Source: TrafficSnort IDS: 2814856 ETPRO TROJAN njrat ver 0.7d Malware CnC Callback (inf) 192.168.2.4:49863 -> 18.157.68.73:16458
                Source: TrafficSnort IDS: 2825563 ETPRO TROJAN Generic njRAT/Bladabindi CnC Activity (inf) 192.168.2.4:49863 -> 18.157.68.73:16458
                Source: TrafficSnort IDS: 2033132 ET TROJAN Generic njRAT/Bladabindi CnC Activity (ll) 192.168.2.4:49864 -> 18.157.68.73:16458
                Source: TrafficSnort IDS: 2814856 ETPRO TROJAN njrat ver 0.7d Malware CnC Callback (inf) 192.168.2.4:49864 -> 18.157.68.73:16458
                Source: TrafficSnort IDS: 2825563 ETPRO TROJAN Generic njRAT/Bladabindi CnC Activity (inf) 192.168.2.4:49864 -> 18.157.68.73:16458
                Source: TrafficSnort IDS: 2033132 ET TROJAN Generic njRAT/Bladabindi CnC Activity (ll) 192.168.2.4:49865 -> 18.157.68.73:16458
                Source: TrafficSnort IDS: 2814856 ETPRO TROJAN njrat ver 0.7d Malware CnC Callback (inf) 192.168.2.4:49865 -> 18.157.68.73:16458
                Source: TrafficSnort IDS: 2825563 ETPRO TROJAN Generic njRAT/Bladabindi CnC Activity (inf) 192.168.2.4:49865 -> 18.157.68.73:16458
                Source: TrafficSnort IDS: 2033132 ET TROJAN Generic njRAT/Bladabindi CnC Activity (ll) 192.168.2.4:49866 -> 18.157.68.73:16458
                Source: TrafficSnort IDS: 2814856 ETPRO TROJAN njrat ver 0.7d Malware CnC Callback (inf) 192.168.2.4:49866 -> 18.157.68.73:16458
                Source: TrafficSnort IDS: 2825563 ETPRO TROJAN Generic njRAT/Bladabindi CnC Activity (inf) 192.168.2.4:49866 -> 18.157.68.73:16458
                Source: TrafficSnort IDS: 2033132 ET TROJAN Generic njRAT/Bladabindi CnC Activity (ll) 192.168.2.4:49867 -> 18.157.68.73:16458
                Source: TrafficSnort IDS: 2814856 ETPRO TROJAN njrat ver 0.7d Malware CnC Callback (inf) 192.168.2.4:49867 -> 18.157.68.73:16458
                Source: TrafficSnort IDS: 2825563 ETPRO TROJAN Generic njRAT/Bladabindi CnC Activity (inf) 192.168.2.4:49867 -> 18.157.68.73:16458
                Source: TrafficSnort IDS: 2033132 ET TROJAN Generic njRAT/Bladabindi CnC Activity (ll) 192.168.2.4:49868 -> 18.157.68.73:16458
                Source: TrafficSnort IDS: 2814856 ETPRO TROJAN njrat ver 0.7d Malware CnC Callback (inf) 192.168.2.4:49868 -> 18.157.68.73:16458
                Source: TrafficSnort IDS: 2825563 ETPRO TROJAN Generic njRAT/Bladabindi CnC Activity (inf) 192.168.2.4:49868 -> 18.157.68.73:16458
                Source: TrafficSnort IDS: 2033132 ET TROJAN Generic njRAT/Bladabindi CnC Activity (ll) 192.168.2.4:49869 -> 18.157.68.73:16458
                Source: TrafficSnort IDS: 2814856 ETPRO TROJAN njrat ver 0.7d Malware CnC Callback (inf) 192.168.2.4:49869 -> 18.157.68.73:16458
                Source: TrafficSnort IDS: 2825563 ETPRO TROJAN Generic njRAT/Bladabindi CnC Activity (inf) 192.168.2.4:49869 -> 18.157.68.73:16458
                Source: TrafficSnort IDS: 2033132 ET TROJAN Generic njRAT/Bladabindi CnC Activity (ll) 192.168.2.4:49870 -> 18.157.68.73:16458
                Source: TrafficSnort IDS: 2814856 ETPRO TROJAN njrat ver 0.7d Malware CnC Callback (inf) 192.168.2.4:49870 -> 18.157.68.73:16458
                Source: TrafficSnort IDS: 2825563 ETPRO TROJAN Generic njRAT/Bladabindi CnC Activity (inf) 192.168.2.4:49870 -> 18.157.68.73:16458
                Source: TrafficSnort IDS: 2033132 ET TROJAN Generic njRAT/Bladabindi CnC Activity (ll) 192.168.2.4:49871 -> 18.157.68.73:16458
                Source: TrafficSnort IDS: 2814856 ETPRO TROJAN njrat ver 0.7d Malware CnC Callback (inf) 192.168.2.4:49871 -> 18.157.68.73:16458
                Source: TrafficSnort IDS: 2825563 ETPRO TROJAN Generic njRAT/Bladabindi CnC Activity (inf) 192.168.2.4:49871 -> 18.157.68.73:16458
                Source: TrafficSnort IDS: 2033132 ET TROJAN Generic njRAT/Bladabindi CnC Activity (ll) 192.168.2.4:49872 -> 18.157.68.73:16458
                Source: TrafficSnort IDS: 2814856 ETPRO TROJAN njrat ver 0.7d Malware CnC Callback (inf) 192.168.2.4:49872 -> 18.157.68.73:16458
                Source: TrafficSnort IDS: 2825563 ETPRO TROJAN Generic njRAT/Bladabindi CnC Activity (inf) 192.168.2.4:49872 -> 18.157.68.73:16458
                Source: TrafficSnort IDS: 2033132 ET TROJAN Generic njRAT/Bladabindi CnC Activity (ll) 192.168.2.4:49873 -> 18.157.68.73:16458
                Source: TrafficSnort IDS: 2814856 ETPRO TROJAN njrat ver 0.7d Malware CnC Callback (inf) 192.168.2.4:49873 -> 18.157.68.73:16458
                Source: TrafficSnort IDS: 2825563 ETPRO TROJAN Generic njRAT/Bladabindi CnC Activity (inf) 192.168.2.4:49873 -> 18.157.68.73:16458
                Source: TrafficSnort IDS: 2033132 ET TROJAN Generic njRAT/Bladabindi CnC Activity (ll) 192.168.2.4:49874 -> 18.157.68.73:16458
                Source: TrafficSnort IDS: 2814856 ETPRO TROJAN njrat ver 0.7d Malware CnC Callback (inf) 192.168.2.4:49874 -> 18.157.68.73:16458
                Source: TrafficSnort IDS: 2825563 ETPRO TROJAN Generic njRAT/Bladabindi CnC Activity (inf) 192.168.2.4:49874 -> 18.157.68.73:16458
                Source: TrafficSnort IDS: 2033132 ET TROJAN Generic njRAT/Bladabindi CnC Activity (ll) 192.168.2.4:49875 -> 18.157.68.73:16458
                Source: TrafficSnort IDS: 2814856 ETPRO TROJAN njrat ver 0.7d Malware CnC Callback (inf) 192.168.2.4:49875 -> 18.157.68.73:16458
                Source: TrafficSnort IDS: 2825563 ETPRO TROJAN Generic njRAT/Bladabindi CnC Activity (inf) 192.168.2.4:49875 -> 18.157.68.73:16458
                Source: TrafficSnort IDS: 2033132 ET TROJAN Generic njRAT/Bladabindi CnC Activity (ll) 192.168.2.4:49876 -> 18.157.68.73:16458
                Source: TrafficSnort IDS: 2814856 ETPRO TROJAN njrat ver 0.7d Malware CnC Callback (inf) 192.168.2.4:49876 -> 18.157.68.73:16458
                Source: TrafficSnort IDS: 2825563 ETPRO TROJAN Generic njRAT/Bladabindi CnC Activity (inf) 192.168.2.4:49876 -> 18.157.68.73:16458
                Source: TrafficSnort IDS: 2033132 ET TROJAN Generic njRAT/Bladabindi CnC Activity (ll) 192.168.2.4:49877 -> 18.157.68.73:16458
                Source: TrafficSnort IDS: 2814856 ETPRO TROJAN njrat ver 0.7d Malware CnC Callback (inf) 192.168.2.4:49877 -> 18.157.68.73:16458
                Source: TrafficSnort IDS: 2825563 ETPRO TROJAN Generic njRAT/Bladabindi CnC Activity (inf) 192.168.2.4:49877 -> 18.157.68.73:16458
                Source: TrafficSnort IDS: 2033132 ET TROJAN Generic njRAT/Bladabindi CnC Activity (ll) 192.168.2.4:49878 -> 18.157.68.73:16458
                Source: TrafficSnort IDS: 2814856 ETPRO TROJAN njrat ver 0.7d Malware CnC Callback (inf) 192.168.2.4:49878 -> 18.157.68.73:16458
                Source: TrafficSnort IDS: 2825563 ETPRO TROJAN Generic njRAT/Bladabindi CnC Activity (inf) 192.168.2.4:49878 -> 18.157.68.73:16458
                Source: TrafficSnort IDS: 2033132 ET TROJAN Generic njRAT/Bladabindi CnC Activity (ll) 192.168.2.4:49879 -> 18.157.68.73:16458
                Source: TrafficSnort IDS: 2814856 ETPRO TROJAN njrat ver 0.7d Malware CnC Callback (inf) 192.168.2.4:49879 -> 18.157.68.73:16458
                Source: TrafficSnort IDS: 2825563 ETPRO TROJAN Generic njRAT/Bladabindi CnC Activity (inf) 192.168.2.4:49879 -> 18.157.68.73:16458
                Source: TrafficSnort IDS: 2033132 ET TROJAN Generic njRAT/Bladabindi CnC Activity (ll) 192.168.2.4:49880 -> 18.157.68.73:16458
                Source: TrafficSnort IDS: 2814856 ETPRO TROJAN njrat ver 0.7d Malware CnC Callback (inf) 192.168.2.4:49880 -> 18.157.68.73:16458
                Source: TrafficSnort IDS: 2825563 ETPRO TROJAN Generic njRAT/Bladabindi CnC Activity (inf) 192.168.2.4:49880 -> 18.157.68.73:16458
                Source: TrafficSnort IDS: 2033132 ET TROJAN Generic njRAT/Bladabindi CnC Activity (ll) 192.168.2.4:49881 -> 18.157.68.73:16458
                Source: TrafficSnort IDS: 2814856 ETPRO TROJAN njrat ver 0.7d Malware CnC Callback (inf) 192.168.2.4:49881 -> 18.157.68.73:16458
                Source: TrafficSnort IDS: 2825563 ETPRO TROJAN Generic njRAT/Bladabindi CnC Activity (inf) 192.168.2.4:49881 -> 18.157.68.73:16458
                Source: TrafficSnort IDS: 2033132 ET TROJAN Generic njRAT/Bladabindi CnC Activity (ll) 192.168.2.4:49882 -> 18.157.68.73:16458
                Source: TrafficSnort IDS: 2814856 ETPRO TROJAN njrat ver 0.7d Malware CnC Callback (inf) 192.168.2.4:49882 -> 18.157.68.73:16458
                Source: TrafficSnort IDS: 2825563 ETPRO TROJAN Generic njRAT/Bladabindi CnC Activity (inf) 192.168.2.4:49882 -> 18.157.68.73:16458
                Source: TrafficSnort IDS: 2033132 ET TROJAN Generic njRAT/Bladabindi CnC Activity (ll) 192.168.2.4:49883 -> 18.157.68.73:16458
                Source: TrafficSnort IDS: 2814856 ETPRO TROJAN njrat ver 0.7d Malware CnC Callback (inf) 192.168.2.4:49883 -> 18.157.68.73:16458
                Source: TrafficSnort IDS: 2825563 ETPRO TROJAN Generic njRAT/Bladabindi CnC Activity (inf) 192.168.2.4:49883 -> 18.157.68.73:16458
                Source: TrafficSnort IDS: 2033132 ET TROJAN Generic njRAT/Bladabindi CnC Activity (ll) 192.168.2.4:49884 -> 18.157.68.73:16458
                Source: TrafficSnort IDS: 2814856 ETPRO TROJAN njrat ver 0.7d Malware CnC Callback (inf) 192.168.2.4:49884 -> 18.157.68.73:16458
                Source: TrafficSnort IDS: 2825563 ETPRO TROJAN Generic njRAT/Bladabindi CnC Activity (inf) 192.168.2.4:49884 -> 18.157.68.73:16458
                Source: TrafficSnort IDS: 2033132 ET TROJAN Generic njRAT/Bladabindi CnC Activity (ll) 192.168.2.4:49885 -> 18.157.68.73:16458
                Source: TrafficSnort IDS: 2814856 ETPRO TROJAN njrat ver 0.7d Malware CnC Callback (inf) 192.168.2.4:49885 -> 18.157.68.73:16458
                Source: TrafficSnort IDS: 2825563 ETPRO TROJAN Generic njRAT/Bladabindi CnC Activity (inf) 192.168.2.4:49885 -> 18.157.68.73:16458
                Source: TrafficSnort IDS: 2033132 ET TROJAN Generic njRAT/Bladabindi CnC Activity (ll) 192.168.2.4:49886 -> 18.157.68.73:16458
                Source: TrafficSnort IDS: 2814856 ETPRO TROJAN njrat ver 0.7d Malware CnC Callback (inf) 192.168.2.4:49886 -> 18.157.68.73:16458
                Source: TrafficSnort IDS: 2825563 ETPRO TROJAN Generic njRAT/Bladabindi CnC Activity (inf) 192.168.2.4:49886 -> 18.157.68.73:16458
                Source: TrafficSnort IDS: 2033132 ET TROJAN Generic njRAT/Bladabindi CnC Activity (ll) 192.168.2.4:49887 -> 18.156.13.209:16458
                Source: TrafficSnort IDS: 2814856 ETPRO TROJAN njrat ver 0.7d Malware CnC Callback (inf) 192.168.2.4:49887 -> 18.156.13.209:16458
                Source: TrafficSnort IDS: 2825563 ETPRO TROJAN Generic njRAT/Bladabindi CnC Activity (inf) 192.168.2.4:49887 -> 18.156.13.209:16458
                Source: TrafficSnort IDS: 2033132 ET TROJAN Generic njRAT/Bladabindi CnC Activity (ll) 192.168.2.4:49888 -> 18.156.13.209:16458
                Source: TrafficSnort IDS: 2814856 ETPRO TROJAN njrat ver 0.7d Malware CnC Callback (inf) 192.168.2.4:49888 -> 18.156.13.209:16458
                Source: TrafficSnort IDS: 2825563 ETPRO TROJAN Generic njRAT/Bladabindi CnC Activity (inf) 192.168.2.4:49888 -> 18.156.13.209:16458
                Source: TrafficSnort IDS: 2033132 ET TROJAN Generic njRAT/Bladabindi CnC Activity (ll) 192.168.2.4:49889 -> 18.156.13.209:16458
                Source: TrafficSnort IDS: 2814856 ETPRO TROJAN njrat ver 0.7d Malware CnC Callback (inf) 192.168.2.4:49889 -> 18.156.13.209:16458
                Source: TrafficSnort IDS: 2033132 ET TROJAN Generic njRAT/Bladabindi CnC Activity (ll) 192.168.2.4:49890 -> 18.156.13.209:16458
                Source: TrafficSnort IDS: 2814856 ETPRO TROJAN njrat ver 0.7d Malware CnC Callback (inf) 192.168.2.4:49890 -> 18.156.13.209:16458
                Source: TrafficSnort IDS: 2825563 ETPRO TROJAN Generic njRAT/Bladabindi CnC Activity (inf) 192.168.2.4:49890 -> 18.156.13.209:16458
                Source: TrafficSnort IDS: 2033132 ET TROJAN Generic njRAT/Bladabindi CnC Activity (ll) 192.168.2.4:49891 -> 18.156.13.209:16458
                Source: TrafficSnort IDS: 2814856 ETPRO TROJAN njrat ver 0.7d Malware CnC Callback (inf) 192.168.2.4:49891 -> 18.156.13.209:16458
                Source: TrafficSnort IDS: 2033132 ET TROJAN Generic njRAT/Bladabindi CnC Activity (ll) 192.168.2.4:49892 -> 18.156.13.209:16458
                Source: TrafficSnort IDS: 2814856 ETPRO TROJAN njrat ver 0.7d Malware CnC Callback (inf) 192.168.2.4:49892 -> 18.156.13.209:16458
                Source: TrafficSnort IDS: 2825563 ETPRO TROJAN Generic njRAT/Bladabindi CnC Activity (inf) 192.168.2.4:49892 -> 18.156.13.209:16458
                Source: TrafficSnort IDS: 2033132 ET TROJAN Generic njRAT/Bladabindi CnC Activity (ll) 192.168.2.4:49893 -> 18.156.13.209:16458
                Source: TrafficSnort IDS: 2814856 ETPRO TROJAN njrat ver 0.7d Malware CnC Callback (inf) 192.168.2.4:49893 -> 18.156.13.209:16458
                Source: TrafficSnort IDS: 2033132 ET TROJAN Generic njRAT/Bladabindi CnC Activity (ll) 192.168.2.4:49894 -> 18.156.13.209:16458
                Source: TrafficSnort IDS: 2814856 ETPRO TROJAN njrat ver 0.7d Malware CnC Callback (inf) 192.168.2.4:49894 -> 18.156.13.209:16458
                Source: TrafficSnort IDS: 2033132 ET TROJAN Generic njRAT/Bladabindi CnC Activity (ll) 192.168.2.4:49895 -> 18.156.13.209:16458
                Source: TrafficSnort IDS: 2814856 ETPRO TROJAN njrat ver 0.7d Malware CnC Callback (inf) 192.168.2.4:49895 -> 18.156.13.209:16458
                Source: TrafficSnort IDS: 2033132 ET TROJAN Generic njRAT/Bladabindi CnC Activity (ll) 192.168.2.4:49896 -> 18.156.13.209:16458
                Source: TrafficSnort IDS: 2814856 ETPRO TROJAN njrat ver 0.7d Malware CnC Callback (inf) 192.168.2.4:49896 -> 18.156.13.209:16458
                Source: TrafficSnort IDS: 2033132 ET TROJAN Generic njRAT/Bladabindi CnC Activity (ll) 192.168.2.4:49897 -> 18.156.13.209:16458
                Source: TrafficSnort IDS: 2814856 ETPRO TROJAN njrat ver 0.7d Malware CnC Callback (inf) 192.168.2.4:49897 -> 18.156.13.209:16458
                Source: TrafficSnort IDS: 2033132 ET TROJAN Generic njRAT/Bladabindi CnC Activity (ll) 192.168.2.4:49898 -> 18.156.13.209:16458
                Source: TrafficSnort IDS: 2814856 ETPRO TROJAN njrat ver 0.7d Malware CnC Callback (inf) 192.168.2.4:49898 -> 18.156.13.209:16458
                Source: TrafficSnort IDS: 2033132 ET TROJAN Generic njRAT/Bladabindi CnC Activity (ll) 192.168.2.4:49899 -> 18.156.13.209:16458
                Source: TrafficSnort IDS: 2814856 ETPRO TROJAN njrat ver 0.7d Malware CnC Callback (inf) 192.168.2.4:49899 -> 18.156.13.209:16458
                Source: TrafficSnort IDS: 2033132 ET TROJAN Generic njRAT/Bladabindi CnC Activity (ll) 192.168.2.4:49900 -> 18.156.13.209:16458
                Source: TrafficSnort IDS: 2814856 ETPRO TROJAN njrat ver 0.7d Malware CnC Callback (inf) 192.168.2.4:49900 -> 18.156.13.209:16458
                Source: TrafficSnort IDS: 2033132 ET TROJAN Generic njRAT/Bladabindi CnC Activity (ll) 192.168.2.4:49901 -> 18.156.13.209:16458
                Source: TrafficSnort IDS: 2814856 ETPRO TROJAN njrat ver 0.7d Malware CnC Callback (inf) 192.168.2.4:49901 -> 18.156.13.209:16458
                Source: TrafficSnort IDS: 2033132 ET TROJAN Generic njRAT/Bladabindi CnC Activity (ll) 192.168.2.4:49902 -> 18.156.13.209:16458
                Source: TrafficSnort IDS: 2814856 ETPRO TROJAN njrat ver 0.7d Malware CnC Callback (inf) 192.168.2.4:49902 -> 18.156.13.209:16458
                Source: TrafficSnort IDS: 2033132 ET TROJAN Generic njRAT/Bladabindi CnC Activity (ll) 192.168.2.4:49903 -> 18.156.13.209:16458
                Source: TrafficSnort IDS: 2814856 ETPRO TROJAN njrat ver 0.7d Malware CnC Callback (inf) 192.168.2.4:49903 -> 18.156.13.209:16458
                Source: TrafficSnort IDS: 2033132 ET TROJAN Generic njRAT/Bladabindi CnC Activity (ll) 192.168.2.4:49904 -> 18.156.13.209:16458
                Source: TrafficSnort IDS: 2814856 ETPRO TROJAN njrat ver 0.7d Malware CnC Callback (inf) 192.168.2.4:49904 -> 18.156.13.209:16458
                Source: TrafficSnort IDS: 2033132 ET TROJAN Generic njRAT/Bladabindi CnC Activity (ll) 192.168.2.4:49905 -> 18.156.13.209:16458
                Source: TrafficSnort IDS: 2814856 ETPRO TROJAN njrat ver 0.7d Malware CnC Callback (inf) 192.168.2.4:49905 -> 18.156.13.209:16458
                Source: TrafficSnort IDS: 2033132 ET TROJAN Generic njRAT/Bladabindi CnC Activity (ll) 192.168.2.4:49906 -> 18.156.13.209:16458
                Source: TrafficSnort IDS: 2814856 ETPRO TROJAN njrat ver 0.7d Malware CnC Callback (inf) 192.168.2.4:49906 -> 18.156.13.209:16458
                Source: TrafficSnort IDS: 2033132 ET TROJAN Generic njRAT/Bladabindi CnC Activity (ll) 192.168.2.4:49907 -> 18.156.13.209:16458
                Source: TrafficSnort IDS: 2814856 ETPRO TROJAN njrat ver 0.7d Malware CnC Callback (inf) 192.168.2.4:49907 -> 18.156.13.209:16458
                Source: TrafficSnort IDS: 2033132 ET TROJAN Generic njRAT/Bladabindi CnC Activity (ll) 192.168.2.4:49908 -> 18.156.13.209:16458
                Source: TrafficSnort IDS: 2814856 ETPRO TROJAN njrat ver 0.7d Malware CnC Callback (inf) 192.168.2.4:49908 -> 18.156.13.209:16458
                Source: TrafficSnort IDS: 2033132 ET TROJAN Generic njRAT/Bladabindi CnC Activity (ll) 192.168.2.4:49909 -> 18.156.13.209:16458
                Source: TrafficSnort IDS: 2814856 ETPRO TROJAN njrat ver 0.7d Malware CnC Callback (inf) 192.168.2.4:49909 -> 18.156.13.209:16458
                Source: TrafficSnort IDS: 2033132 ET TROJAN Generic njRAT/Bladabindi CnC Activity (ll) 192.168.2.4:49910 -> 18.156.13.209:16458
                Source: TrafficSnort IDS: 2814856 ETPRO TROJAN njrat ver 0.7d Malware CnC Callback (inf) 192.168.2.4:49910 -> 18.156.13.209:16458
                Source: TrafficSnort IDS: 2033132 ET TROJAN Generic njRAT/Bladabindi CnC Activity (ll) 192.168.2.4:49911 -> 18.156.13.209:16458
                Source: TrafficSnort IDS: 2814856 ETPRO TROJAN njrat ver 0.7d Malware CnC Callback (inf) 192.168.2.4:49911 -> 18.156.13.209:16458
                Source: TrafficSnort IDS: 2033132 ET TROJAN Generic njRAT/Bladabindi CnC Activity (ll) 192.168.2.4:49912 -> 18.156.13.209:16458
                Source: TrafficSnort IDS: 2814856 ETPRO TROJAN njrat ver 0.7d Malware CnC Callback (inf) 192.168.2.4:49912 -> 18.156.13.209:16458
                Source: TrafficSnort IDS: 2814860 ETPRO TROJAN njRAT/Bladabindi CnC Callback (act) 192.168.2.4:49912 -> 18.156.13.209:16458
                Source: TrafficSnort IDS: 2825564 ETPRO TROJAN Generic njRAT/Bladabindi CnC Activity (act) 192.168.2.4:49912 -> 18.156.13.209:16458
                Source: TrafficSnort IDS: 2033132 ET TROJAN Generic njRAT/Bladabindi CnC Activity (ll) 192.168.2.4:49913 -> 18.156.13.209:16458
                Source: TrafficSnort IDS: 2814856 ETPRO TROJAN njrat ver 0.7d Malware CnC Callback (inf) 192.168.2.4:49913 -> 18.156.13.209:16458
                Source: TrafficSnort IDS: 2814860 ETPRO TROJAN njRAT/Bladabindi CnC Callback (act) 192.168.2.4:49913 -> 18.156.13.209:16458
                Source: TrafficSnort IDS: 2033132 ET TROJAN Generic njRAT/Bladabindi CnC Activity (ll) 192.168.2.4:49914 -> 18.156.13.209:16458
                Source: TrafficSnort IDS: 2814856 ETPRO TROJAN njrat ver 0.7d Malware CnC Callback (inf) 192.168.2.4:49914 -> 18.156.13.209:16458
                Source: TrafficSnort IDS: 2814860 ETPRO TROJAN njRAT/Bladabindi CnC Callback (act) 192.168.2.4:49914 -> 18.156.13.209:16458
                Source: TrafficSnort IDS: 2825564 ETPRO TROJAN Generic njRAT/Bladabindi CnC Activity (act) 192.168.2.4:49914 -> 18.156.13.209:16458
                Source: TrafficSnort IDS: 2033132 ET TROJAN Generic njRAT/Bladabindi CnC Activity (ll) 192.168.2.4:49915 -> 18.156.13.209:16458
                Source: TrafficSnort IDS: 2814856 ETPRO TROJAN njrat ver 0.7d Malware CnC Callback (inf) 192.168.2.4:49915 -> 18.156.13.209:16458
                Source: TrafficSnort IDS: 2814860 ETPRO TROJAN njRAT/Bladabindi CnC Callback (act) 192.168.2.4:49915 -> 18.156.13.209:16458
                Source: TrafficSnort IDS: 2033132 ET TROJAN Generic njRAT/Bladabindi CnC Activity (ll) 192.168.2.4:49916 -> 18.156.13.209:16458
                Source: TrafficSnort IDS: 2814856 ETPRO TROJAN njrat ver 0.7d Malware CnC Callback (inf) 192.168.2.4:49916 -> 18.156.13.209:16458
                Source: TrafficSnort IDS: 2814860 ETPRO TROJAN njRAT/Bladabindi CnC Callback (act) 192.168.2.4:49916 -> 18.156.13.209:16458
                Source: TrafficSnort IDS: 2825564 ETPRO TROJAN Generic njRAT/Bladabindi CnC Activity (act) 192.168.2.4:49916 -> 18.156.13.209:16458
                Source: TrafficSnort IDS: 2033132 ET TROJAN Generic njRAT/Bladabindi CnC Activity (ll) 192.168.2.4:49917 -> 18.156.13.209:16458
                Source: TrafficSnort IDS: 2814856 ETPRO TROJAN njrat ver 0.7d Malware CnC Callback (inf) 192.168.2.4:49917 -> 18.156.13.209:16458
                Source: Malware configuration extractorURLs: 2.tcp.eu.ngrok.io
                Source: global trafficTCP traffic: 18.192.93.86 ports 1,4,5,6,8,16458
                Source: global trafficTCP traffic: 3.127.138.57 ports 1,4,5,6,8,16458
                Source: global trafficTCP traffic: 18.156.13.209 ports 1,4,5,6,8,16458
                Source: global trafficTCP traffic: 18.157.68.73 ports 1,4,5,6,8,16458
                Source: global trafficTCP traffic: 192.168.2.4:49729 -> 18.192.93.86:16458
                Source: global trafficTCP traffic: 192.168.2.4:49760 -> 3.127.138.57:16458
                Source: global trafficTCP traffic: 192.168.2.4:49859 -> 18.157.68.73:16458
                Source: global trafficTCP traffic: 192.168.2.4:49887 -> 18.156.13.209:16458
                Source: Joe Sandbox ViewIP Address: 18.192.93.86 18.192.93.86
                Source: Joe Sandbox ViewIP Address: 3.127.138.57 3.127.138.57
                Source: Joe Sandbox ViewASN Name: AMAZON-02US AMAZON-02US
                Source: Joe Sandbox ViewASN Name: AMAZON-02US AMAZON-02US
                Source: Joe Sandbox ViewASN Name: AMAZON-02US AMAZON-02US
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: unknownDNS traffic detected: queries for: 2.tcp.eu.ngrok.io
                Source: RWqHoCWEPI.exe, af78e772b16b220a2184770c875037cc.exe.1.dr, server.exe.0.drString found in binary or memory: https://dl.dropbox.com/s/p84aaz28t0hepul/Pass.exe?dl=0

                Key, Mouse, Clipboard, Microphone and Screen Capturing

                barindex
                Source: RWqHoCWEPI.exe, kl.cs.Net Code: VKCodeToUnicode
                Source: server.exe.0.dr, kl.cs.Net Code: VKCodeToUnicode
                Source: af78e772b16b220a2184770c875037cc.exe.1.dr, kl.cs.Net Code: VKCodeToUnicode

                E-Banking Fraud

                barindex
                Source: Yara matchFile source: RWqHoCWEPI.exe, type: SAMPLE
                Source: Yara matchFile source: 0.0.RWqHoCWEPI.exe.c90000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000000.00000000.1670598790.0000000000C92000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: RWqHoCWEPI.exe PID: 5924, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: server.exe PID: 2996, type: MEMORYSTR
                Source: Yara matchFile source: C:\Users\user\AppData\Roaming\server.exe, type: DROPPED
                Source: Yara matchFile source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\af78e772b16b220a2184770c875037cc.exe, type: DROPPED

                Operating System Destruction

                barindex
                Source: C:\Users\user\AppData\Roaming\server.exeProcess information set: 01 00 00 00 Jump to behavior

                System Summary

                barindex
                Source: RWqHoCWEPI.exe, type: SAMPLEMatched rule: Windows_Trojan_Njrat_30f3c220 Author: unknown
                Source: RWqHoCWEPI.exe, type: SAMPLEMatched rule: Identify njRat Author: Brian Wallace @botnet_hunter
                Source: RWqHoCWEPI.exe, type: SAMPLEMatched rule: Detects NjRAT / Bladabindi Author: ditekSHen
                Source: 0.0.RWqHoCWEPI.exe.c90000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Njrat_30f3c220 Author: unknown
                Source: 0.0.RWqHoCWEPI.exe.c90000.0.unpack, type: UNPACKEDPEMatched rule: Identify njRat Author: Brian Wallace @botnet_hunter
                Source: 0.0.RWqHoCWEPI.exe.c90000.0.unpack, type: UNPACKEDPEMatched rule: Detects NjRAT / Bladabindi Author: ditekSHen
                Source: 00000000.00000000.1670598790.0000000000C92000.00000002.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: Windows_Trojan_Njrat_30f3c220 Author: unknown
                Source: 00000000.00000000.1670598790.0000000000C92000.00000002.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: Identify njRat Author: Brian Wallace @botnet_hunter
                Source: C:\Users\user\AppData\Roaming\server.exe, type: DROPPEDMatched rule: Windows_Trojan_Njrat_30f3c220 Author: unknown
                Source: C:\Users\user\AppData\Roaming\server.exe, type: DROPPEDMatched rule: Identify njRat Author: Brian Wallace @botnet_hunter
                Source: C:\Users\user\AppData\Roaming\server.exe, type: DROPPEDMatched rule: Detects NjRAT / Bladabindi Author: ditekSHen
                Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\af78e772b16b220a2184770c875037cc.exe, type: DROPPEDMatched rule: Windows_Trojan_Njrat_30f3c220 Author: unknown
                Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\af78e772b16b220a2184770c875037cc.exe, type: DROPPEDMatched rule: Identify njRat Author: Brian Wallace @botnet_hunter
                Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\af78e772b16b220a2184770c875037cc.exe, type: DROPPEDMatched rule: Detects NjRAT / Bladabindi Author: ditekSHen
                Source: C:\Users\user\AppData\Roaming\server.exeProcess Stats: CPU usage > 49%
                Source: C:\Users\user\AppData\Roaming\server.exeCode function: 1_2_00B0BCB6 NtSetInformationProcess,1_2_00B0BCB6
                Source: C:\Users\user\AppData\Roaming\server.exeCode function: 1_2_00B0BC94 NtSetInformationProcess,1_2_00B0BC94
                Source: C:\Users\user\AppData\Roaming\server.exeCode function: 1_2_0507011A NtQuerySystemInformation,1_2_0507011A
                Source: C:\Users\user\AppData\Roaming\server.exeCode function: 1_2_050700DF NtQuerySystemInformation,1_2_050700DF
                Source: RWqHoCWEPI.exe, 00000000.00000002.1737162866.000000000113E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenamemscorwks.dllT vs RWqHoCWEPI.exe
                Source: RWqHoCWEPI.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                Source: RWqHoCWEPI.exe, type: SAMPLEMatched rule: Windows_Trojan_Njrat_30f3c220 reference_sample = 741a0f3954499c11f9eddc8df7c31e7c59ca41f1a7005646735b8b1d53438c1b, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Njrat, fingerprint = d15e131bca6beddcaecb20fffaff1784ad8a33a25e7ce90f7450d1a362908cc4, id = 30f3c220-b8dc-45a1-bcf0-027c2f76fa63, last_modified = 2021-10-04
                Source: RWqHoCWEPI.exe, type: SAMPLEMatched rule: njrat1 date = 2015-05-27, author = Brian Wallace @botnet_hunter, description = Identify njRat, author_email = bwall@ballastsecurity.net
                Source: RWqHoCWEPI.exe, type: SAMPLEMatched rule: MALWARE_Win_NjRAT author = ditekSHen, description = Detects NjRAT / Bladabindi
                Source: 0.0.RWqHoCWEPI.exe.c90000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Njrat_30f3c220 reference_sample = 741a0f3954499c11f9eddc8df7c31e7c59ca41f1a7005646735b8b1d53438c1b, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Njrat, fingerprint = d15e131bca6beddcaecb20fffaff1784ad8a33a25e7ce90f7450d1a362908cc4, id = 30f3c220-b8dc-45a1-bcf0-027c2f76fa63, last_modified = 2021-10-04
                Source: 0.0.RWqHoCWEPI.exe.c90000.0.unpack, type: UNPACKEDPEMatched rule: njrat1 date = 2015-05-27, author = Brian Wallace @botnet_hunter, description = Identify njRat, author_email = bwall@ballastsecurity.net
                Source: 0.0.RWqHoCWEPI.exe.c90000.0.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NjRAT author = ditekSHen, description = Detects NjRAT / Bladabindi
                Source: 00000000.00000000.1670598790.0000000000C92000.00000002.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: Windows_Trojan_Njrat_30f3c220 reference_sample = 741a0f3954499c11f9eddc8df7c31e7c59ca41f1a7005646735b8b1d53438c1b, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Njrat, fingerprint = d15e131bca6beddcaecb20fffaff1784ad8a33a25e7ce90f7450d1a362908cc4, id = 30f3c220-b8dc-45a1-bcf0-027c2f76fa63, last_modified = 2021-10-04
                Source: 00000000.00000000.1670598790.0000000000C92000.00000002.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: njrat1 date = 2015-05-27, author = Brian Wallace @botnet_hunter, description = Identify njRat, author_email = bwall@ballastsecurity.net
                Source: C:\Users\user\AppData\Roaming\server.exe, type: DROPPEDMatched rule: Windows_Trojan_Njrat_30f3c220 reference_sample = 741a0f3954499c11f9eddc8df7c31e7c59ca41f1a7005646735b8b1d53438c1b, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Njrat, fingerprint = d15e131bca6beddcaecb20fffaff1784ad8a33a25e7ce90f7450d1a362908cc4, id = 30f3c220-b8dc-45a1-bcf0-027c2f76fa63, last_modified = 2021-10-04
                Source: C:\Users\user\AppData\Roaming\server.exe, type: DROPPEDMatched rule: njrat1 date = 2015-05-27, author = Brian Wallace @botnet_hunter, description = Identify njRat, author_email = bwall@ballastsecurity.net
                Source: C:\Users\user\AppData\Roaming\server.exe, type: DROPPEDMatched rule: MALWARE_Win_NjRAT author = ditekSHen, description = Detects NjRAT / Bladabindi
                Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\af78e772b16b220a2184770c875037cc.exe, type: DROPPEDMatched rule: Windows_Trojan_Njrat_30f3c220 reference_sample = 741a0f3954499c11f9eddc8df7c31e7c59ca41f1a7005646735b8b1d53438c1b, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Njrat, fingerprint = d15e131bca6beddcaecb20fffaff1784ad8a33a25e7ce90f7450d1a362908cc4, id = 30f3c220-b8dc-45a1-bcf0-027c2f76fa63, last_modified = 2021-10-04
                Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\af78e772b16b220a2184770c875037cc.exe, type: DROPPEDMatched rule: njrat1 date = 2015-05-27, author = Brian Wallace @botnet_hunter, description = Identify njRat, author_email = bwall@ballastsecurity.net
                Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\af78e772b16b220a2184770c875037cc.exe, type: DROPPEDMatched rule: MALWARE_Win_NjRAT author = ditekSHen, description = Detects NjRAT / Bladabindi
                Source: classification engineClassification label: mal100.troj.adwa.spyw.evad.winEXE@9/7@4/4
                Source: C:\Users\user\AppData\Roaming\server.exeCode function: 1_2_00B0B966 AdjustTokenPrivileges,1_2_00B0B966
                Source: C:\Users\user\AppData\Roaming\server.exeCode function: 1_2_00B0B92F AdjustTokenPrivileges,1_2_00B0B92F
                Source: C:\Users\user\Desktop\RWqHoCWEPI.exeFile created: C:\Users\user\AppData\Roaming\server.exeJump to behavior
                Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6652:120:WilError_03
                Source: C:\Users\user\AppData\Roaming\server.exeMutant created: \Sessions\1\BaseNamedObjects\af78e772b16b220a2184770c875037cc
                Source: C:\Users\user\AppData\Roaming\server.exeMutant created: \Sessions\1\BaseNamedObjects\Global\.net clr networking
                Source: RWqHoCWEPI.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                Source: RWqHoCWEPI.exeStatic file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 49.80%
                Source: C:\Users\user\Desktop\RWqHoCWEPI.exeSection loaded: C:\Windows\assembly\NativeImages_v2.0.50727_32\mscorlib\276d7f4a20a3c21c3bf6fc9bfc1915a2\mscorlib.ni.dllJump to behavior
                Source: C:\Users\user\Desktop\RWqHoCWEPI.exeSection loaded: C:\Windows\assembly\GAC_32\mscorlib\2.0.0.0__b77a5c561934e089\sorttbls.nlpJump to behavior
                Source: C:\Users\user\Desktop\RWqHoCWEPI.exeSection loaded: C:\Windows\assembly\GAC_32\mscorlib\2.0.0.0__b77a5c561934e089\sortkey.nlpJump to behavior
                Source: C:\Users\user\AppData\Roaming\server.exeSection loaded: C:\Windows\assembly\NativeImages_v2.0.50727_32\mscorlib\276d7f4a20a3c21c3bf6fc9bfc1915a2\mscorlib.ni.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\server.exeSection loaded: C:\Windows\assembly\GAC_32\mscorlib\2.0.0.0__b77a5c561934e089\sorttbls.nlpJump to behavior
                Source: C:\Users\user\AppData\Roaming\server.exeSection loaded: C:\Windows\assembly\GAC_32\mscorlib\2.0.0.0__b77a5c561934e089\sortkey.nlpJump to behavior
                Source: C:\Users\user\AppData\Roaming\server.exeSection loaded: C:\Windows\assembly\NativeImages_v2.0.50727_32\mscorlib\276d7f4a20a3c21c3bf6fc9bfc1915a2\mscorlib.ni.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\server.exeSection loaded: C:\Windows\assembly\GAC_32\mscorlib\2.0.0.0__b77a5c561934e089\sorttbls.nlpJump to behavior
                Source: C:\Users\user\AppData\Roaming\server.exeSection loaded: C:\Windows\assembly\GAC_32\mscorlib\2.0.0.0__b77a5c561934e089\sortkey.nlpJump to behavior
                Source: C:\Users\user\AppData\Roaming\server.exeSection loaded: C:\Windows\assembly\NativeImages_v2.0.50727_32\mscorlib\276d7f4a20a3c21c3bf6fc9bfc1915a2\mscorlib.ni.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\server.exeSection loaded: C:\Windows\assembly\GAC_32\mscorlib\2.0.0.0__b77a5c561934e089\sorttbls.nlpJump to behavior
                Source: C:\Users\user\AppData\Roaming\server.exeSection loaded: C:\Windows\assembly\GAC_32\mscorlib\2.0.0.0__b77a5c561934e089\sortkey.nlpJump to behavior
                Source: C:\Users\user\AppData\Roaming\server.exeSection loaded: C:\Windows\assembly\NativeImages_v2.0.50727_32\mscorlib\276d7f4a20a3c21c3bf6fc9bfc1915a2\mscorlib.ni.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\server.exeSection loaded: C:\Windows\assembly\GAC_32\mscorlib\2.0.0.0__b77a5c561934e089\sorttbls.nlpJump to behavior
                Source: C:\Users\user\AppData\Roaming\server.exeSection loaded: C:\Windows\assembly\GAC_32\mscorlib\2.0.0.0__b77a5c561934e089\sortkey.nlpJump to behavior
                Source: C:\Users\user\Desktop\RWqHoCWEPI.exeFile read: C:\Users\user\Desktop\desktop.iniJump to behavior
                Source: C:\Users\user\Desktop\RWqHoCWEPI.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                Source: RWqHoCWEPI.exeReversingLabs: Detection: 86%
                Source: RWqHoCWEPI.exeVirustotal: Detection: 86%
                Source: C:\Users\user\Desktop\RWqHoCWEPI.exeFile read: C:\Users\user\Desktop\RWqHoCWEPI.exeJump to behavior
                Source: unknownProcess created: C:\Users\user\Desktop\RWqHoCWEPI.exe C:\Users\user\Desktop\RWqHoCWEPI.exe
                Source: C:\Users\user\Desktop\RWqHoCWEPI.exeProcess created: C:\Users\user\AppData\Roaming\server.exe "C:\Users\user\AppData\Roaming\server.exe"
                Source: C:\Users\user\AppData\Roaming\server.exeProcess created: C:\Windows\SysWOW64\netsh.exe netsh firewall add allowedprogram "C:\Users\user\AppData\Roaming\server.exe" "server.exe" ENABLE
                Source: C:\Windows\SysWOW64\netsh.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                Source: unknownProcess created: C:\Users\user\AppData\Roaming\server.exe "C:\Users\user\AppData\Roaming\server.exe" ..
                Source: unknownProcess created: C:\Users\user\AppData\Roaming\server.exe "C:\Users\user\AppData\Roaming\server.exe" ..
                Source: unknownProcess created: C:\Users\user\AppData\Roaming\server.exe "C:\Users\user\AppData\Roaming\server.exe" ..
                Source: C:\Users\user\Desktop\RWqHoCWEPI.exeProcess created: C:\Users\user\AppData\Roaming\server.exe "C:\Users\user\AppData\Roaming\server.exe" Jump to behavior
                Source: C:\Users\user\AppData\Roaming\server.exeProcess created: C:\Windows\SysWOW64\netsh.exe netsh firewall add allowedprogram "C:\Users\user\AppData\Roaming\server.exe" "server.exe" ENABLEJump to behavior
                Source: C:\Users\user\AppData\Roaming\server.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{CF4CC405-E2C5-4DDD-B3CE-5E7582D8C9FA}\InprocServer32Jump to behavior
                Source: C:\Users\user\AppData\Roaming\server.exeFile opened: C:\Windows\Microsoft.NET\Framework\v2.0.50727\mscorrc.dllJump to behavior
                Source: RWqHoCWEPI.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
                Source: C:\Users\user\Desktop\RWqHoCWEPI.exeFile opened: C:\Windows\WinSxS\x86_microsoft.vc80.crt_1fc8b3b9a1e18e3b_8.0.50727.9672_none_d08f9da24428a513\MSVCR80.dllJump to behavior
                Source: RWqHoCWEPI.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE

                Data Obfuscation

                barindex
                Source: RWqHoCWEPI.exe, OK.cs.Net Code: Plugin System.Reflection.Assembly.Load(byte[])
                Source: server.exe.0.dr, OK.cs.Net Code: Plugin System.Reflection.Assembly.Load(byte[])
                Source: af78e772b16b220a2184770c875037cc.exe.1.dr, OK.cs.Net Code: Plugin System.Reflection.Assembly.Load(byte[])
                Source: C:\Users\user\Desktop\RWqHoCWEPI.exeFile created: C:\Users\user\AppData\Roaming\server.exeJump to dropped file
                Source: C:\Users\user\AppData\Roaming\server.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\af78e772b16b220a2184770c875037cc.exeJump to dropped file

                Boot Survival

                barindex
                Source: C:\Users\user\AppData\Roaming\server.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run af78e772b16b220a2184770c875037ccJump to behavior
                Source: C:\Users\user\AppData\Roaming\server.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\af78e772b16b220a2184770c875037cc.exeJump to dropped file
                Source: C:\Users\user\AppData\Roaming\server.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\af78e772b16b220a2184770c875037cc.exeJump to behavior
                Source: C:\Users\user\AppData\Roaming\server.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\af78e772b16b220a2184770c875037cc.exeJump to behavior
                Source: C:\Users\user\AppData\Roaming\server.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\af78e772b16b220a2184770c875037cc.exe\:Zone.Identifier:$DATAJump to behavior
                Source: C:\Users\user\AppData\Roaming\server.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run af78e772b16b220a2184770c875037ccJump to behavior
                Source: C:\Users\user\AppData\Roaming\server.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run af78e772b16b220a2184770c875037ccJump to behavior
                Source: C:\Users\user\AppData\Roaming\server.exeRegistry value created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run af78e772b16b220a2184770c875037ccJump to behavior
                Source: C:\Users\user\AppData\Roaming\server.exeRegistry value created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run af78e772b16b220a2184770c875037ccJump to behavior
                Source: C:\Users\user\Desktop\RWqHoCWEPI.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\RWqHoCWEPI.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\RWqHoCWEPI.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\RWqHoCWEPI.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\RWqHoCWEPI.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\RWqHoCWEPI.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\RWqHoCWEPI.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\RWqHoCWEPI.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\RWqHoCWEPI.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\RWqHoCWEPI.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\RWqHoCWEPI.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\RWqHoCWEPI.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\RWqHoCWEPI.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\RWqHoCWEPI.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\RWqHoCWEPI.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\RWqHoCWEPI.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\RWqHoCWEPI.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\RWqHoCWEPI.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\RWqHoCWEPI.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\RWqHoCWEPI.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\RWqHoCWEPI.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\server.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\server.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\server.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\server.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\server.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\server.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\server.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\server.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\server.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\server.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\server.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\server.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\server.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\server.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\server.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\server.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\server.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\server.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\server.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\server.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\server.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\server.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\server.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\server.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\server.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\server.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\server.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\server.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\server.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\server.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\server.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\server.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\server.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\server.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\server.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\server.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\server.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\server.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\server.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\server.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\server.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\server.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\server.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\server.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\netsh.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\netsh.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\server.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\server.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\server.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\server.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\server.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\server.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\server.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\server.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\server.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\server.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\server.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\server.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\server.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\server.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\server.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\server.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\server.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\server.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\server.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\server.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\server.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\server.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\server.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\server.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\server.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\server.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\server.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\server.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\server.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\server.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\server.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\server.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\server.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\server.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\server.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\server.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\server.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\server.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\server.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\server.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\server.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\server.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\server.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\server.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\server.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\server.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\server.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\server.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\server.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\server.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\server.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\server.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\server.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\server.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\RWqHoCWEPI.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: C:\Users\user\AppData\Roaming\server.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: C:\Users\user\AppData\Roaming\server.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: C:\Users\user\AppData\Roaming\server.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: C:\Users\user\AppData\Roaming\server.exeWindow / User API: threadDelayed 3092Jump to behavior
                Source: C:\Users\user\AppData\Roaming\server.exeWindow / User API: threadDelayed 784Jump to behavior
                Source: C:\Users\user\AppData\Roaming\server.exeWindow / User API: threadDelayed 4264Jump to behavior
                Source: C:\Users\user\AppData\Roaming\server.exeWindow / User API: foregroundWindowGot 439Jump to behavior
                Source: C:\Users\user\AppData\Roaming\server.exeWindow / User API: foregroundWindowGot 1221Jump to behavior
                Source: C:\Users\user\Desktop\RWqHoCWEPI.exe TID: 3720Thread sleep time: -922337203685477s >= -30000sJump to behavior
                Source: C:\Users\user\AppData\Roaming\server.exe TID: 396Thread sleep time: -784000s >= -30000sJump to behavior
                Source: C:\Users\user\AppData\Roaming\server.exe TID: 396Thread sleep time: -4264000s >= -30000sJump to behavior
                Source: C:\Users\user\AppData\Roaming\server.exe TID: 6624Thread sleep time: -922337203685477s >= -30000sJump to behavior
                Source: C:\Users\user\AppData\Roaming\server.exe TID: 1060Thread sleep time: -922337203685477s >= -30000sJump to behavior
                Source: C:\Users\user\AppData\Roaming\server.exe TID: 4820Thread sleep time: -922337203685477s >= -30000sJump to behavior
                Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                Source: C:\Users\user\Desktop\RWqHoCWEPI.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: C:\Users\user\AppData\Roaming\server.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: C:\Users\user\AppData\Roaming\server.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: C:\Users\user\AppData\Roaming\server.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: server.exe, 00000001.00000002.4127308319.0000000000B84000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAWqlServer" appl
                Source: server.exe, 00000001.00000002.4127308319.0000000000B84000.00000004.00000020.00020000.00000000.sdmp, netsh.exe, 00000003.00000003.1802942800.0000000003611000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
                Source: C:\Users\user\AppData\Roaming\server.exeProcess information queried: ProcessInformationJump to behavior
                Source: C:\Users\user\AppData\Roaming\server.exeProcess token adjusted: DebugJump to behavior
                Source: C:\Users\user\Desktop\RWqHoCWEPI.exeMemory allocated: page read and write | page guardJump to behavior

                HIPS / PFW / Operating System Protection Evasion

                barindex
                Source: RWqHoCWEPI.exe, kl.csReference to suspicious API methods: MapVirtualKey(a, 0u)
                Source: RWqHoCWEPI.exe, kl.csReference to suspicious API methods: GetAsyncKeyState(num2)
                Source: RWqHoCWEPI.exe, OK.csReference to suspicious API methods: capGetDriverDescriptionA(wDriver, ref lpszName, 100, ref lpszVer, 100)
                Source: C:\Users\user\Desktop\RWqHoCWEPI.exeProcess created: C:\Users\user\AppData\Roaming\server.exe "C:\Users\user\AppData\Roaming\server.exe" Jump to behavior
                Source: server.exe, 00000001.00000002.4128186352.0000000002BE1000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000001.00000002.4128186352.0000000002D9F000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000001.00000002.4128186352.0000000003075000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Program Manager
                Source: server.exe, 00000001.00000002.4128186352.0000000002BE1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: program managerL.lp
                Source: server.exe, 00000001.00000002.4128186352.0000000002D9F000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000001.00000002.4128186352.0000000003075000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000001.00000002.4128186352.0000000002EB8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Program Manager@9l
                Source: server.exe, 00000001.00000002.4128186352.0000000002BE1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: program managerL.lX
                Source: server.exe, 00000001.00000002.4128186352.0000000002EB8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: program managerL.l<g
                Source: server.exe, 00000001.00000002.4128186352.0000000002D9F000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000001.00000002.4128186352.0000000003075000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: program manager
                Source: server.exe, 00000001.00000002.4127308319.0000000000B84000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: 'Program Manager9
                Source: server.exe, 00000001.00000002.4128186352.0000000002F45000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: program managerL.lPh
                Source: server.exe, 00000001.00000002.4128186352.0000000002BE1000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000001.00000002.4128186352.0000000002D9F000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000001.00000002.4128186352.0000000002ED2000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: program managerL.l
                Source: server.exe, 00000001.00000002.4128186352.0000000002D9F000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: program managerL.lPe
                Source: C:\Users\user\AppData\Roaming\server.exeQueries volume information: C:\ VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Roaming\server.exeQueries volume information: C:\ VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Roaming\server.exeQueries volume information: C:\ VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Roaming\server.exeQueries volume information: C:\ VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Roaming\server.exeQueries volume information: C:\ VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Roaming\server.exeQueries volume information: C:\ VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Roaming\server.exeQueries volume information: C:\ VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Roaming\server.exeQueries volume information: C:\ VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Roaming\server.exeQueries volume information: C:\ VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Roaming\server.exeQueries volume information: C:\ VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Roaming\server.exeQueries volume information: C:\ VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Roaming\server.exeQueries volume information: C:\ VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Roaming\server.exeQueries volume information: C:\ VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Roaming\server.exeQueries volume information: C:\ VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Roaming\server.exeQueries volume information: C:\ VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Roaming\server.exeQueries volume information: C:\ VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Roaming\server.exeQueries volume information: C:\ VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Roaming\server.exeQueries volume information: C:\ VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Roaming\server.exeQueries volume information: C:\ VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Roaming\server.exeQueries volume information: C:\ VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Roaming\server.exeQueries volume information: C:\ VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Roaming\server.exeQueries volume information: C:\ VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Roaming\server.exeQueries volume information: C:\ VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Roaming\server.exeQueries volume information: C:\ VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Roaming\server.exeQueries volume information: C:\ VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Roaming\server.exeQueries volume information: C:\ VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Roaming\server.exeQueries volume information: C:\ VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Roaming\server.exeQueries volume information: C:\ VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Roaming\server.exeQueries volume information: C:\ VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\netsh.exeQueries volume information: C:\ VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Roaming\server.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

                Lowering of HIPS / PFW / Operating System Security Settings

                barindex
                Source: C:\Users\user\AppData\Roaming\server.exeProcess created: C:\Windows\SysWOW64\netsh.exe netsh firewall add allowedprogram "C:\Users\user\AppData\Roaming\server.exe" "server.exe" ENABLE
                Source: C:\Users\user\AppData\Roaming\server.exeProcess created: C:\Windows\SysWOW64\netsh.exe netsh firewall add allowedprogram "C:\Users\user\AppData\Roaming\server.exe" "server.exe" ENABLE

                Stealing of Sensitive Information

                barindex
                Source: Yara matchFile source: RWqHoCWEPI.exe, type: SAMPLE
                Source: Yara matchFile source: 0.0.RWqHoCWEPI.exe.c90000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000000.00000000.1670598790.0000000000C92000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: RWqHoCWEPI.exe PID: 5924, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: server.exe PID: 2996, type: MEMORYSTR
                Source: Yara matchFile source: C:\Users\user\AppData\Roaming\server.exe, type: DROPPED
                Source: Yara matchFile source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\af78e772b16b220a2184770c875037cc.exe, type: DROPPED

                Remote Access Functionality

                barindex
                Source: Yara matchFile source: RWqHoCWEPI.exe, type: SAMPLE
                Source: Yara matchFile source: 0.0.RWqHoCWEPI.exe.c90000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000000.00000000.1670598790.0000000000C92000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: RWqHoCWEPI.exe PID: 5924, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: server.exe PID: 2996, type: MEMORYSTR
                Source: Yara matchFile source: C:\Users\user\AppData\Roaming\server.exe, type: DROPPED
                Source: Yara matchFile source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\af78e772b16b220a2184770c875037cc.exe, type: DROPPED
                Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpactResource DevelopmentReconnaissance
                1
                Replication Through Removable Media
                1
                Native API
                221
                Registry Run Keys / Startup Folder
                1
                Access Token Manipulation
                1
                Masquerading
                1
                Input Capture
                11
                Security Software Discovery
                1
                Replication Through Removable Media
                1
                Input Capture
                Exfiltration Over Other Network Medium1
                Non-Standard Port
                Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationAbuse Accessibility FeaturesAcquire InfrastructureGather Victim Identity Information
                Default AccountsScheduled Task/JobBoot or Logon Initialization Scripts12
                Process Injection
                21
                Disable or Modify Tools
                LSASS Memory2
                Process Discovery
                Remote Desktop ProtocolData from Removable MediaExfiltration Over Bluetooth1
                Non-Application Layer Protocol
                SIM Card SwapObtain Device Cloud BackupsNetwork Denial of ServiceDomainsCredentials
                Domain AccountsAtLogon Script (Windows)221
                Registry Run Keys / Startup Folder
                21
                Virtualization/Sandbox Evasion
                Security Account Manager21
                Virtualization/Sandbox Evasion
                SMB/Windows Admin SharesData from Network Shared DriveAutomated Exfiltration11
                Application Layer Protocol
                Data Encrypted for ImpactDNS ServerEmail Addresses
                Local AccountsCronLogin HookLogin Hook1
                Access Token Manipulation
                NTDS1
                Application Window Discovery
                Distributed Component Object ModelInput CaptureTraffic DuplicationProtocol ImpersonationData DestructionVirtual Private ServerEmployee Names
                Cloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script12
                Process Injection
                LSA Secrets1
                Peripheral Device Discovery
                SSHKeyloggingScheduled TransferFallback ChannelsData Encrypted for ImpactServerGather Victim Network Information
                Replication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
                Software Packing
                Cached Domain Credentials1
                File and Directory Discovery
                VNCGUI Input CaptureData Transfer Size LimitsMultiband CommunicationService StopBotnetDomain Properties
                External Remote ServicesSystemd TimersStartup ItemsStartup ItemsCompile After DeliveryDCSync12
                System Information Discovery
                Windows Remote ManagementWeb Portal CaptureExfiltration Over C2 ChannelCommonly Used PortInhibit System RecoveryWeb ServicesDNS
                Hide Legend

                Legend:

                • Process
                • Signature
                • Created File
                • DNS/IP Info
                • Is Dropped
                • Is Windows Process
                • Number of created Registry Values
                • Number of created Files
                • Visual Basic
                • Delphi
                • Java
                • .Net C# or VB.NET
                • C, C++ or other language
                • Is malicious
                • Internet
                behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1353705 Sample: RWqHoCWEPI.exe Startdate: 05/12/2023 Architecture: WINDOWS Score: 100 31 2.tcp.eu.ngrok.io 2->31 39 Snort IDS alert for network traffic 2->39 41 Multi AV Scanner detection for domain / URL 2->41 43 Found malware configuration 2->43 45 14 other signatures 2->45 9 RWqHoCWEPI.exe 1 6 2->9         started        12 server.exe 3 2->12         started        14 server.exe 2 2->14         started        16 server.exe 2 2->16         started        signatures3 process4 file5 29 C:\Users\user\AppData\Roaming\server.exe, PE32 9->29 dropped 18 server.exe 2 6 9->18         started        process6 dnsIp7 33 18.156.13.209, 16458, 49887, 49888 AMAZON-02US United States 18->33 35 18.157.68.73, 16458, 49859, 49860 AMAZON-02US United States 18->35 37 2 other IPs or domains 18->37 27 C:\...\af78e772b16b220a2184770c875037cc.exe, PE32 18->27 dropped 47 Antivirus detection for dropped file 18->47 49 Multi AV Scanner detection for dropped file 18->49 51 Protects its processes via BreakOnTermination flag 18->51 53 5 other signatures 18->53 23 netsh.exe 2 18->23         started        file8 signatures9 process10 process11 25 conhost.exe 23->25         started       

                This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                windows-stand
                SourceDetectionScannerLabelLink
                RWqHoCWEPI.exe86%ReversingLabsByteCode-MSIL.Trojan.NjRAT
                RWqHoCWEPI.exe86%VirustotalBrowse
                RWqHoCWEPI.exe100%AviraTR/ATRAPS.Gen
                RWqHoCWEPI.exe100%Joe Sandbox ML
                SourceDetectionScannerLabelLink
                C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\af78e772b16b220a2184770c875037cc.exe100%AviraTR/ATRAPS.Gen
                C:\Users\user\AppData\Roaming\server.exe100%AviraTR/ATRAPS.Gen
                C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\af78e772b16b220a2184770c875037cc.exe100%Joe Sandbox ML
                C:\Users\user\AppData\Roaming\server.exe100%Joe Sandbox ML
                C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\af78e772b16b220a2184770c875037cc.exe86%ReversingLabsByteCode-MSIL.Trojan.NjRAT
                C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\af78e772b16b220a2184770c875037cc.exe86%VirustotalBrowse
                C:\Users\user\AppData\Roaming\server.exe86%ReversingLabsByteCode-MSIL.Trojan.NjRAT
                C:\Users\user\AppData\Roaming\server.exe86%VirustotalBrowse
                No Antivirus matches
                SourceDetectionScannerLabelLink
                2.tcp.eu.ngrok.io12%VirustotalBrowse
                SourceDetectionScannerLabelLink
                2.tcp.eu.ngrok.io100%Avira URL Cloudmalware
                2.tcp.eu.ngrok.io12%VirustotalBrowse
                NameIPActiveMaliciousAntivirus DetectionReputation
                2.tcp.eu.ngrok.io
                18.192.93.86
                truetrueunknown
                NameMaliciousAntivirus DetectionReputation
                2.tcp.eu.ngrok.iotrue
                • 12%, Virustotal, Browse
                • Avira URL Cloud: malware
                unknown
                NameSourceMaliciousAntivirus DetectionReputation
                https://dl.dropbox.com/s/p84aaz28t0hepul/Pass.exe?dl=0RWqHoCWEPI.exe, af78e772b16b220a2184770c875037cc.exe.1.dr, server.exe.0.drfalse
                  high
                  • No. of IPs < 25%
                  • 25% < No. of IPs < 50%
                  • 50% < No. of IPs < 75%
                  • 75% < No. of IPs
                  IPDomainCountryFlagASNASN NameMalicious
                  18.192.93.86
                  2.tcp.eu.ngrok.ioUnited States
                  16509AMAZON-02UStrue
                  3.127.138.57
                  unknownUnited States
                  16509AMAZON-02UStrue
                  18.156.13.209
                  unknownUnited States
                  16509AMAZON-02UStrue
                  18.157.68.73
                  unknownUnited States
                  16509AMAZON-02UStrue
                  Joe Sandbox version:38.0.0 Ammolite
                  Analysis ID:1353705
                  Start date and time:2023-12-05 05:26:06 +01:00
                  Joe Sandbox product:CloudBasic
                  Overall analysis duration:0h 7m 44s
                  Hypervisor based Inspection enabled:false
                  Report type:full
                  Cookbook file name:default.jbs
                  Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                  Number of analysed new started processes analysed:12
                  Number of new started drivers analysed:0
                  Number of existing processes analysed:0
                  Number of existing drivers analysed:0
                  Number of injected processes analysed:0
                  Technologies:
                  • HCA enabled
                  • EGA enabled
                  • AMSI enabled
                  Analysis Mode:default
                  Analysis stop reason:Timeout
                  Sample name:RWqHoCWEPI.exe
                  renamed because original name is a hash value
                  Original Sample Name:149069598db31db305dbd822b156e249.exe
                  Detection:MAL
                  Classification:mal100.troj.adwa.spyw.evad.winEXE@9/7@4/4
                  EGA Information:
                  • Successful, ratio: 100%
                  HCA Information:
                  • Successful, ratio: 100%
                  • Number of executed functions: 170
                  • Number of non-executed functions: 0
                  Cookbook Comments:
                  • Found application associated with file extension: .exe
                  • Override analysis time to 240000 for current running targets taking high CPU consumption
                  • Behavior information exceeds normal sizes, reducing to normal. Report will have missing behavior information.
                  • Exclude process from analysis (whitelisted): MpCmdRun.exe, dllhost.exe, WMIADAP.exe, SIHClient.exe, conhost.exe
                  • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
                  • Not all processes where analyzed, report is missing behavior information
                  • Report size exceeded maximum capacity and may have missing behavior information.
                  • Report size getting too big, too many NtAllocateVirtualMemory calls found.
                  • Report size getting too big, too many NtDeviceIoControlFile calls found.
                  • Report size getting too big, too many NtOpenKeyEx calls found.
                  • Report size getting too big, too many NtProtectVirtualMemory calls found.
                  • Report size getting too big, too many NtQueryValueKey calls found.
                  TimeTypeDescription
                  04:27:13AutostartRun: HKCU\Software\Microsoft\Windows\CurrentVersion\Run af78e772b16b220a2184770c875037cc "C:\Users\user\AppData\Roaming\server.exe" ..
                  04:27:21AutostartRun: HKLM\Software\Microsoft\Windows\CurrentVersion\Run af78e772b16b220a2184770c875037cc "C:\Users\user\AppData\Roaming\server.exe" ..
                  04:27:31AutostartRun: HKCU64\Software\Microsoft\Windows\CurrentVersion\Run af78e772b16b220a2184770c875037cc "C:\Users\user\AppData\Roaming\server.exe" ..
                  04:27:39AutostartRun: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\af78e772b16b220a2184770c875037cc.exe
                  05:27:44API Interceptor147714x Sleep call for process: server.exe modified
                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                  18.192.93.86P90GT_Invoice_Related_Property_Tax_P800.exeGet hashmaliciousRedLineBrowse
                  • 2.tcp.eu.ngrok.io:17685/
                  http://www.sdrclm.cn/vendor/phpdocumentor/P800/P90GT_Invoice_Related_Property_Tax_P800.exeGet hashmaliciousRedLineBrowse
                  • 2.tcp.eu.ngrok.io:17685/
                  3.127.138.57OUXkIxeP6k.exeGet hashmaliciousNjratBrowse
                    eI43OwXSvq.exeGet hashmaliciousNjratBrowse
                      i9z1c1OtFb.exeGet hashmaliciousNjratBrowse
                        JYGc3o49WE.exeGet hashmaliciousNjratBrowse
                          J6VIiRgq3w.exeGet hashmaliciousNjratBrowse
                            7JdbeSrZ6s.exeGet hashmaliciousNjratBrowse
                              KcWQQO3nZP.exeGet hashmaliciousNjratBrowse
                                zep8vTa4sg.exeGet hashmaliciousNjratBrowse
                                  umyExrpkSF.exeGet hashmaliciousNjratBrowse
                                    QBEgLAO40T.exeGet hashmaliciousNjratBrowse
                                      4KWKhZNy9w.exeGet hashmaliciousNjratBrowse
                                        yPGBUzqVE3.exeGet hashmaliciousNjratBrowse
                                          D02E3399D85D6B14B30F440181EF5B8FE6B55C403B8C7.exeGet hashmaliciousnjRatBrowse
                                            2dZGR4PTLu.exeGet hashmaliciousNjratBrowse
                                              LMva1J8Xkv.exeGet hashmaliciousNjratBrowse
                                                XlNjZS4E8x.exeGet hashmaliciousNjratBrowse
                                                  1F3YBPagot.exeGet hashmaliciousNanocoreBrowse
                                                    H7mLbVb7Tm.exeGet hashmaliciousNjratBrowse
                                                      ojgIfElGah.exeGet hashmaliciousnjRatBrowse
                                                        GpVp3vYsZG.exeGet hashmaliciousNjratBrowse
                                                          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                          2.tcp.eu.ngrok.ioEB4B6878310B1E2843C964E02EC1782AACB518E32777A.exeGet hashmaliciousNjratBrowse
                                                          • 18.192.93.86
                                                          NezbdhNgwG.exeGet hashmaliciousNjratBrowse
                                                          • 18.192.93.86
                                                          xdPdkPMD8u.exeGet hashmaliciousNjratBrowse
                                                          • 18.192.93.86
                                                          VBUXm77rfL.exeGet hashmaliciousNjratBrowse
                                                          • 18.192.93.86
                                                          1UGdjTlX5v.exeGet hashmaliciousNjratBrowse
                                                          • 18.157.68.73
                                                          kXghM8bJcm.exeGet hashmaliciousNjratBrowse
                                                          • 18.192.93.86
                                                          OUXkIxeP6k.exeGet hashmaliciousNjratBrowse
                                                          • 3.126.37.18
                                                          QzzmZiGinp.exeGet hashmaliciousNjratBrowse
                                                          • 18.156.13.209
                                                          eI43OwXSvq.exeGet hashmaliciousNjratBrowse
                                                          • 18.197.239.5
                                                          p0zYXkMETE.exeGet hashmaliciousNjratBrowse
                                                          • 18.157.68.73
                                                          i9z1c1OtFb.exeGet hashmaliciousNjratBrowse
                                                          • 18.157.68.73
                                                          aF73k2XwGj.exeGet hashmaliciousNjratBrowse
                                                          • 18.192.93.86
                                                          7XyFhq6BDj.exeGet hashmaliciousNjratBrowse
                                                          • 3.126.37.18
                                                          JYGc3o49WE.exeGet hashmaliciousNjratBrowse
                                                          • 18.157.68.73
                                                          J6VIiRgq3w.exeGet hashmaliciousNjratBrowse
                                                          • 3.126.37.18
                                                          cTUu5Po5Hy.exeGet hashmaliciousNjratBrowse
                                                          • 3.126.37.18
                                                          7JdbeSrZ6s.exeGet hashmaliciousNjratBrowse
                                                          • 3.127.138.57
                                                          KcWQQO3nZP.exeGet hashmaliciousNjratBrowse
                                                          • 3.126.37.18
                                                          zep8vTa4sg.exeGet hashmaliciousNjratBrowse
                                                          • 18.156.13.209
                                                          umyExrpkSF.exeGet hashmaliciousNjratBrowse
                                                          • 18.192.93.86
                                                          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                          AMAZON-02USFAGgeLHYe5.exeGet hashmaliciousNjratBrowse
                                                          • 3.125.102.39
                                                          FAGgeLHYe5.exeGet hashmaliciousNjratBrowse
                                                          • 3.125.102.39
                                                          VR7k2PGvOs.elfGet hashmaliciousUnknownBrowse
                                                          • 34.249.145.219
                                                          fQOo84bbD6.elfGet hashmaliciousUnknownBrowse
                                                          • 54.127.50.237
                                                          Z6A4MGYLLs.elfGet hashmaliciousMiraiBrowse
                                                          • 54.67.239.15
                                                          uOBk3ireTS.elfGet hashmaliciousMiraiBrowse
                                                          • 18.221.51.58
                                                          nabx86.elfGet hashmaliciousUnknownBrowse
                                                          • 13.224.146.225
                                                          owari.x86.elfGet hashmaliciousMiraiBrowse
                                                          • 18.248.101.49
                                                          nabarm7.elfGet hashmaliciousMiraiBrowse
                                                          • 3.75.78.56
                                                          owari.arm.elfGet hashmaliciousMiraiBrowse
                                                          • 18.228.200.219
                                                          nabarm.elfGet hashmaliciousUnknownBrowse
                                                          • 54.68.255.3
                                                          http://originworld.comGet hashmaliciousUnknownBrowse
                                                          • 13.225.63.120
                                                          x86.elfGet hashmaliciousUnknownBrowse
                                                          • 34.249.145.219
                                                          sora.arm.elfGet hashmaliciousMiraiBrowse
                                                          • 18.237.164.159
                                                          DEHnl7mmZ9.exeGet hashmaliciousNjratBrowse
                                                          • 3.67.112.102
                                                          680471779 Report Gardner Biggs Pason 2023.htmlGet hashmaliciousHTMLPhisherBrowse
                                                          • 99.84.108.83
                                                          https://tracksrh.com/view/GKq0mBsC4lo6VZKqEyA5TLwdkymnilFOyvY97UGw0y0Get hashmaliciousUnknownBrowse
                                                          • 99.84.216.198
                                                          xRLFvVQQUHlv.exeGet hashmaliciousRemcosBrowse
                                                          • 3.16.65.63
                                                          cwilson.emlGet hashmaliciousPhisherBrowse
                                                          • 99.86.227.75
                                                          zVBOjDulsc.exeGet hashmaliciousNjratBrowse
                                                          • 54.94.248.37
                                                          AMAZON-02USFAGgeLHYe5.exeGet hashmaliciousNjratBrowse
                                                          • 3.125.102.39
                                                          FAGgeLHYe5.exeGet hashmaliciousNjratBrowse
                                                          • 3.125.102.39
                                                          VR7k2PGvOs.elfGet hashmaliciousUnknownBrowse
                                                          • 34.249.145.219
                                                          fQOo84bbD6.elfGet hashmaliciousUnknownBrowse
                                                          • 54.127.50.237
                                                          Z6A4MGYLLs.elfGet hashmaliciousMiraiBrowse
                                                          • 54.67.239.15
                                                          uOBk3ireTS.elfGet hashmaliciousMiraiBrowse
                                                          • 18.221.51.58
                                                          nabx86.elfGet hashmaliciousUnknownBrowse
                                                          • 13.224.146.225
                                                          owari.x86.elfGet hashmaliciousMiraiBrowse
                                                          • 18.248.101.49
                                                          nabarm7.elfGet hashmaliciousMiraiBrowse
                                                          • 3.75.78.56
                                                          owari.arm.elfGet hashmaliciousMiraiBrowse
                                                          • 18.228.200.219
                                                          nabarm.elfGet hashmaliciousUnknownBrowse
                                                          • 54.68.255.3
                                                          http://originworld.comGet hashmaliciousUnknownBrowse
                                                          • 13.225.63.120
                                                          x86.elfGet hashmaliciousUnknownBrowse
                                                          • 34.249.145.219
                                                          sora.arm.elfGet hashmaliciousMiraiBrowse
                                                          • 18.237.164.159
                                                          DEHnl7mmZ9.exeGet hashmaliciousNjratBrowse
                                                          • 3.67.112.102
                                                          680471779 Report Gardner Biggs Pason 2023.htmlGet hashmaliciousHTMLPhisherBrowse
                                                          • 99.84.108.83
                                                          https://tracksrh.com/view/GKq0mBsC4lo6VZKqEyA5TLwdkymnilFOyvY97UGw0y0Get hashmaliciousUnknownBrowse
                                                          • 99.84.216.198
                                                          xRLFvVQQUHlv.exeGet hashmaliciousRemcosBrowse
                                                          • 3.16.65.63
                                                          cwilson.emlGet hashmaliciousPhisherBrowse
                                                          • 99.86.227.75
                                                          zVBOjDulsc.exeGet hashmaliciousNjratBrowse
                                                          • 54.94.248.37
                                                          AMAZON-02USFAGgeLHYe5.exeGet hashmaliciousNjratBrowse
                                                          • 3.125.102.39
                                                          FAGgeLHYe5.exeGet hashmaliciousNjratBrowse
                                                          • 3.125.102.39
                                                          VR7k2PGvOs.elfGet hashmaliciousUnknownBrowse
                                                          • 34.249.145.219
                                                          fQOo84bbD6.elfGet hashmaliciousUnknownBrowse
                                                          • 54.127.50.237
                                                          Z6A4MGYLLs.elfGet hashmaliciousMiraiBrowse
                                                          • 54.67.239.15
                                                          uOBk3ireTS.elfGet hashmaliciousMiraiBrowse
                                                          • 18.221.51.58
                                                          nabx86.elfGet hashmaliciousUnknownBrowse
                                                          • 13.224.146.225
                                                          owari.x86.elfGet hashmaliciousMiraiBrowse
                                                          • 18.248.101.49
                                                          nabarm7.elfGet hashmaliciousMiraiBrowse
                                                          • 3.75.78.56
                                                          owari.arm.elfGet hashmaliciousMiraiBrowse
                                                          • 18.228.200.219
                                                          nabarm.elfGet hashmaliciousUnknownBrowse
                                                          • 54.68.255.3
                                                          http://originworld.comGet hashmaliciousUnknownBrowse
                                                          • 13.225.63.120
                                                          x86.elfGet hashmaliciousUnknownBrowse
                                                          • 34.249.145.219
                                                          sora.arm.elfGet hashmaliciousMiraiBrowse
                                                          • 18.237.164.159
                                                          DEHnl7mmZ9.exeGet hashmaliciousNjratBrowse
                                                          • 3.67.112.102
                                                          680471779 Report Gardner Biggs Pason 2023.htmlGet hashmaliciousHTMLPhisherBrowse
                                                          • 99.84.108.83
                                                          https://tracksrh.com/view/GKq0mBsC4lo6VZKqEyA5TLwdkymnilFOyvY97UGw0y0Get hashmaliciousUnknownBrowse
                                                          • 99.84.216.198
                                                          xRLFvVQQUHlv.exeGet hashmaliciousRemcosBrowse
                                                          • 3.16.65.63
                                                          cwilson.emlGet hashmaliciousPhisherBrowse
                                                          • 99.86.227.75
                                                          zVBOjDulsc.exeGet hashmaliciousNjratBrowse
                                                          • 54.94.248.37
                                                          No context
                                                          No context
                                                          Process:C:\Users\user\Desktop\RWqHoCWEPI.exe
                                                          File Type:ASCII text, with CRLF line terminators
                                                          Category:modified
                                                          Size (bytes):525
                                                          Entropy (8bit):5.259753436570609
                                                          Encrypted:false
                                                          SSDEEP:12:Q3LaJU2C9XAn10Ug+9pfu9t0U29xtUz1B0U2uk71K6xhk7v:MLF2CpI3zffup29Iz52Ve
                                                          MD5:260E01CC001F9C4643CA7A62F395D747
                                                          SHA1:492AD0ACE3A9C8736909866EEA168962D418BE5A
                                                          SHA-256:4BC52CCF866F489772A6919A0CC2C55B1432729D6BDF29E17E5853ABDFAB6030
                                                          SHA-512:01AF7D75257E3DBD460E328F5C057D0367B83D3D9397E89CA3AE54AB9B2842D62352D8CCB4BE98ACE0C5667846759D32C199DE39ECCD0CF9CD6A83267D27E7C4
                                                          Malicious:false
                                                          Reputation:moderate, very likely benign file
                                                          Preview:1,"fusion","GAC",0..3,"C:\Windows\assembly\NativeImages_v2.0.50727_32\System\bec14584c93014efbc76285c35d1e891\System.ni.dll",0..3,"C:\Windows\assembly\NativeImages_v2.0.50727_32\Microsoft.VisualBas#\7d443c6c007fe8696f9aa6ff1da53ef7\Microsoft.VisualBasic.ni.dll",0..3,"C:\Windows\assembly\NativeImages_v2.0.50727_32\System.Drawing\2cdaeaf53e3d49038cf7cb0ce9d805d3\System.Drawing.ni.dll",0..3,"C:\Windows\assembly\NativeImages_v2.0.50727_32\System.Windows.Forms\d0e5535854cce87ea7f2d69d0594b7a8\System.Windows.Forms.ni.dll",0..
                                                          Process:C:\Users\user\AppData\Roaming\server.exe
                                                          File Type:ASCII text, with CRLF line terminators
                                                          Category:dropped
                                                          Size (bytes):525
                                                          Entropy (8bit):5.259753436570609
                                                          Encrypted:false
                                                          SSDEEP:12:Q3LaJU2C9XAn10Ug+9pfu9t0U29xtUz1B0U2uk71K6xhk7v:MLF2CpI3zffup29Iz52Ve
                                                          MD5:260E01CC001F9C4643CA7A62F395D747
                                                          SHA1:492AD0ACE3A9C8736909866EEA168962D418BE5A
                                                          SHA-256:4BC52CCF866F489772A6919A0CC2C55B1432729D6BDF29E17E5853ABDFAB6030
                                                          SHA-512:01AF7D75257E3DBD460E328F5C057D0367B83D3D9397E89CA3AE54AB9B2842D62352D8CCB4BE98ACE0C5667846759D32C199DE39ECCD0CF9CD6A83267D27E7C4
                                                          Malicious:false
                                                          Reputation:moderate, very likely benign file
                                                          Preview:1,"fusion","GAC",0..3,"C:\Windows\assembly\NativeImages_v2.0.50727_32\System\bec14584c93014efbc76285c35d1e891\System.ni.dll",0..3,"C:\Windows\assembly\NativeImages_v2.0.50727_32\Microsoft.VisualBas#\7d443c6c007fe8696f9aa6ff1da53ef7\Microsoft.VisualBasic.ni.dll",0..3,"C:\Windows\assembly\NativeImages_v2.0.50727_32\System.Drawing\2cdaeaf53e3d49038cf7cb0ce9d805d3\System.Drawing.ni.dll",0..3,"C:\Windows\assembly\NativeImages_v2.0.50727_32\System.Windows.Forms\d0e5535854cce87ea7f2d69d0594b7a8\System.Windows.Forms.ni.dll",0..
                                                          Process:C:\Users\user\AppData\Roaming\server.exe
                                                          File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                          Category:dropped
                                                          Size (bytes):36864
                                                          Entropy (8bit):5.5246271045360125
                                                          Encrypted:false
                                                          SSDEEP:384:dxqCKMizd3jnBhFbJ8ycPj93tRwympVrAF+rMRTyN/0L+EcoinblneHQM3epzXhr:dECg3lLJfcPj9XNm7rM+rMRa8NuX5t
                                                          MD5:149069598DB31DB305DBD822B156E249
                                                          SHA1:853DF6ED8DB672664F7C4E5911CF73C8330C9C04
                                                          SHA-256:5869F74791CB84C168E2D6ECE00B536880A29DB0B59EF963D5A543AB3E2BB89D
                                                          SHA-512:61C17297406706196297707B55412EDDC3ECDD7C2FDFC424A37262A114A75F4D1FB1BF99E5B03BE0F1BC12DD941B0F97E69846CC0B8A648059B7E05E8987BFBB
                                                          Malicious:true
                                                          Yara Hits:
                                                          • Rule: JoeSecurity_Njrat, Description: Yara detected Njrat, Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\af78e772b16b220a2184770c875037cc.exe, Author: Joe Security
                                                          • Rule: Windows_Trojan_Njrat_30f3c220, Description: unknown, Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\af78e772b16b220a2184770c875037cc.exe, Author: unknown
                                                          • Rule: njrat1, Description: Identify njRat, Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\af78e772b16b220a2184770c875037cc.exe, Author: Brian Wallace @botnet_hunter
                                                          • Rule: MALWARE_Win_NjRAT, Description: Detects NjRAT / Bladabindi, Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\af78e772b16b220a2184770c875037cc.exe, Author: ditekSHen
                                                          Antivirus:
                                                          • Antivirus: Avira, Detection: 100%
                                                          • Antivirus: Joe Sandbox ML, Detection: 100%
                                                          • Antivirus: ReversingLabs, Detection: 86%
                                                          • Antivirus: Virustotal, Detection: 86%, Browse
                                                          Reputation:low
                                                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...xUhe................................ ........@.. ....................................@.................................|...O.................................................................................... ............... ..H............text....... ...................... ..`.reloc..............................@..B................................................................H........e...E..........................................................&.(......**..(......*.s.........s.........s.........s..........*.0...........~....o.....+..*.0...........~....o.....+..*.0...........~....o.....+..*.0...........~....o.....+..*.0.............(....(.....+..*...0............(.....+..*.0................(.....+..*.0............(.....+..*.0.. ...................,.(...+.+.+....+...*.0...........................**..(......*....0..&........~..............,.(...+.
                                                          Process:C:\Users\user\AppData\Roaming\server.exe
                                                          File Type:ASCII text, with CRLF line terminators
                                                          Category:dropped
                                                          Size (bytes):26
                                                          Entropy (8bit):3.95006375643621
                                                          Encrypted:false
                                                          SSDEEP:3:ggPYV:rPYV
                                                          MD5:187F488E27DB4AF347237FE461A079AD
                                                          SHA1:6693BA299EC1881249D59262276A0D2CB21F8E64
                                                          SHA-256:255A65D30841AB4082BD9D0EEA79D49C5EE88F56136157D8D6156AEF11C12309
                                                          SHA-512:89879F237C0C051EBE784D0690657A6827A312A82735DA42DAD5F744D734FC545BEC9642C19D14C05B2F01FF53BC731530C92F7327BB7DC9CDE1B60FB21CD64E
                                                          Malicious:false
                                                          Reputation:high, very likely benign file
                                                          Preview:[ZoneTransfer]....ZoneId=0
                                                          Process:C:\Users\user\Desktop\RWqHoCWEPI.exe
                                                          File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                          Category:dropped
                                                          Size (bytes):36864
                                                          Entropy (8bit):5.5246271045360125
                                                          Encrypted:false
                                                          SSDEEP:384:dxqCKMizd3jnBhFbJ8ycPj93tRwympVrAF+rMRTyN/0L+EcoinblneHQM3epzXhr:dECg3lLJfcPj9XNm7rM+rMRa8NuX5t
                                                          MD5:149069598DB31DB305DBD822B156E249
                                                          SHA1:853DF6ED8DB672664F7C4E5911CF73C8330C9C04
                                                          SHA-256:5869F74791CB84C168E2D6ECE00B536880A29DB0B59EF963D5A543AB3E2BB89D
                                                          SHA-512:61C17297406706196297707B55412EDDC3ECDD7C2FDFC424A37262A114A75F4D1FB1BF99E5B03BE0F1BC12DD941B0F97E69846CC0B8A648059B7E05E8987BFBB
                                                          Malicious:true
                                                          Yara Hits:
                                                          • Rule: JoeSecurity_Njrat, Description: Yara detected Njrat, Source: C:\Users\user\AppData\Roaming\server.exe, Author: Joe Security
                                                          • Rule: Windows_Trojan_Njrat_30f3c220, Description: unknown, Source: C:\Users\user\AppData\Roaming\server.exe, Author: unknown
                                                          • Rule: njrat1, Description: Identify njRat, Source: C:\Users\user\AppData\Roaming\server.exe, Author: Brian Wallace @botnet_hunter
                                                          • Rule: MALWARE_Win_NjRAT, Description: Detects NjRAT / Bladabindi, Source: C:\Users\user\AppData\Roaming\server.exe, Author: ditekSHen
                                                          Antivirus:
                                                          • Antivirus: Avira, Detection: 100%
                                                          • Antivirus: Joe Sandbox ML, Detection: 100%
                                                          • Antivirus: ReversingLabs, Detection: 86%
                                                          • Antivirus: Virustotal, Detection: 86%, Browse
                                                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...xUhe................................ ........@.. ....................................@.................................|...O.................................................................................... ............... ..H............text....... ...................... ..`.reloc..............................@..B................................................................H........e...E..........................................................&.(......**..(......*.s.........s.........s.........s..........*.0...........~....o.....+..*.0...........~....o.....+..*.0...........~....o.....+..*.0...........~....o.....+..*.0.............(....(.....+..*...0............(.....+..*.0................(.....+..*.0............(.....+..*.0.. ...................,.(...+.+.+....+...*.0...........................**..(......*....0..&........~..............,.(...+.
                                                          Process:C:\Users\user\Desktop\RWqHoCWEPI.exe
                                                          File Type:ASCII text, with CRLF line terminators
                                                          Category:dropped
                                                          Size (bytes):26
                                                          Entropy (8bit):3.95006375643621
                                                          Encrypted:false
                                                          SSDEEP:3:ggPYV:rPYV
                                                          MD5:187F488E27DB4AF347237FE461A079AD
                                                          SHA1:6693BA299EC1881249D59262276A0D2CB21F8E64
                                                          SHA-256:255A65D30841AB4082BD9D0EEA79D49C5EE88F56136157D8D6156AEF11C12309
                                                          SHA-512:89879F237C0C051EBE784D0690657A6827A312A82735DA42DAD5F744D734FC545BEC9642C19D14C05B2F01FF53BC731530C92F7327BB7DC9CDE1B60FB21CD64E
                                                          Malicious:false
                                                          Preview:[ZoneTransfer]....ZoneId=0
                                                          Process:C:\Windows\SysWOW64\netsh.exe
                                                          File Type:ASCII text, with CRLF line terminators
                                                          Category:dropped
                                                          Size (bytes):313
                                                          Entropy (8bit):4.971939296804078
                                                          Encrypted:false
                                                          SSDEEP:6:/ojfKsUTGN8Ypox42k9L+DbGMKeQE+vigqAZs2E+AYeDPO+Yswyha:wjPIGNrkHk9iaeIM6ADDPOHyha
                                                          MD5:689E2126A85BF55121488295EE068FA1
                                                          SHA1:09BAAA253A49D80C18326DFBCA106551EBF22DD6
                                                          SHA-256:D968A966EF474068E41256321F77807A042F1965744633D37A203A705662EC25
                                                          SHA-512:C3736A8FC7E6573FA1B26FE6A901C05EE85C55A4A276F8F569D9EADC9A58BEC507D1BB90DBF9EA62AE79A6783178C69304187D6B90441D82E46F5F56172B5C5C
                                                          Malicious:false
                                                          Preview:..IMPORTANT: Command executed successfully...However, "netsh firewall" is deprecated;..use "netsh advfirewall firewall" instead...For more information on using "netsh advfirewall firewall" commands..instead of "netsh firewall", see KB article 947709..at https://go.microsoft.com/fwlink/?linkid=121488 .....Ok.....
                                                          File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                          Entropy (8bit):5.5246271045360125
                                                          TrID:
                                                          • Win32 Executable (generic) Net Framework (10011505/4) 49.80%
                                                          • Win32 Executable (generic) a (10002005/4) 49.75%
                                                          • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
                                                          • Windows Screen Saver (13104/52) 0.07%
                                                          • Generic Win/DOS Executable (2004/3) 0.01%
                                                          File name:RWqHoCWEPI.exe
                                                          File size:36'864 bytes
                                                          MD5:149069598db31db305dbd822b156e249
                                                          SHA1:853df6ed8db672664f7c4e5911cf73c8330c9c04
                                                          SHA256:5869f74791cb84c168e2d6ece00b536880a29db0b59ef963d5a543ab3e2bb89d
                                                          SHA512:61c17297406706196297707b55412eddc3ecdd7c2fdfc424a37262a114a75f4d1fb1bf99e5b03be0f1bc12dd941b0f97e69846cc0b8a648059b7e05e8987bfbb
                                                          SSDEEP:384:dxqCKMizd3jnBhFbJ8ycPj93tRwympVrAF+rMRTyN/0L+EcoinblneHQM3epzXhr:dECg3lLJfcPj9XNm7rM+rMRa8NuX5t
                                                          TLSH:3DF22A4D7FE08168C5FE167B05B2D4120776E14F5E23DD0D8EF264AA36736C18F64AA2
                                                          File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...xUhe................................. ........@.. ....................................@................................
                                                          Icon Hash:90cececece8e8eb0
                                                          Entrypoint:0x40abce
                                                          Entrypoint Section:.text
                                                          Digitally signed:false
                                                          Imagebase:0x400000
                                                          Subsystem:windows gui
                                                          Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
                                                          DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                                                          Time Stamp:0x65685578 [Thu Nov 30 09:27:20 2023 UTC]
                                                          TLS Callbacks:
                                                          CLR (.Net) Version:
                                                          OS Version Major:4
                                                          OS Version Minor:0
                                                          File Version Major:4
                                                          File Version Minor:0
                                                          Subsystem Version Major:4
                                                          Subsystem Version Minor:0
                                                          Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744
                                                          Instruction
                                                          jmp dword ptr [00402000h]
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          NameVirtual AddressVirtual Size Is in Section
                                                          IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                          IMAGE_DIRECTORY_ENTRY_IMPORT0xab7c0x4f.text
                                                          IMAGE_DIRECTORY_ENTRY_RESOURCE0x00x0
                                                          IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                          IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                          IMAGE_DIRECTORY_ENTRY_BASERELOC0xc0000xc.reloc
                                                          IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                                          IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                          IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                          IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                                          IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                                          IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                          IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
                                                          IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                          IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
                                                          IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                          NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                          .text0x20000x8bd40x8c00False0.46397879464285713data5.607705805785399IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                          .reloc0xc0000xc0x200False0.044921875data0.08153941234324169IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                                          DLLImport
                                                          mscoree.dll_CorExeMain
                                                          TimestampProtocolSIDMessageSource PortDest PortSource IPDest IP
                                                          192.168.2.418.156.13.20949953164582825564 12/05/23-05:30:54.702443TCP2825564ETPRO TROJAN Generic njRAT/Bladabindi CnC Activity (act)4995316458192.168.2.418.156.13.209
                                                          192.168.2.418.156.13.20949954164582033132 12/05/23-05:30:54.887034TCP2033132ET TROJAN Generic njRAT/Bladabindi CnC Activity (ll)4995416458192.168.2.418.156.13.209
                                                          192.168.2.43.127.138.5749763164582814856 12/05/23-05:28:17.831563TCP2814856ETPRO TROJAN njrat ver 0.7d Malware CnC Callback (inf)4976316458192.168.2.43.127.138.57
                                                          192.168.2.43.127.138.5749764164582814856 12/05/23-05:28:19.042466TCP2814856ETPRO TROJAN njrat ver 0.7d Malware CnC Callback (inf)4976416458192.168.2.43.127.138.57
                                                          192.168.2.418.156.13.20949951164582825564 12/05/23-05:30:53.874480TCP2825564ETPRO TROJAN Generic njRAT/Bladabindi CnC Activity (act)4995116458192.168.2.418.156.13.209
                                                          192.168.2.418.156.13.20949955164582825564 12/05/23-05:30:55.515019TCP2825564ETPRO TROJAN Generic njRAT/Bladabindi CnC Activity (act)4995516458192.168.2.418.156.13.209
                                                          192.168.2.43.127.138.5749761164582814856 12/05/23-05:28:15.201898TCP2814856ETPRO TROJAN njrat ver 0.7d Malware CnC Callback (inf)4976116458192.168.2.43.127.138.57
                                                          192.168.2.43.127.138.5749762164582814856 12/05/23-05:28:16.554165TCP2814856ETPRO TROJAN njrat ver 0.7d Malware CnC Callback (inf)4976216458192.168.2.43.127.138.57
                                                          192.168.2.43.127.138.5749765164582814856 12/05/23-05:28:20.204124TCP2814856ETPRO TROJAN njrat ver 0.7d Malware CnC Callback (inf)4976516458192.168.2.43.127.138.57
                                                          192.168.2.43.127.138.5749766164582814856 12/05/23-05:28:21.310665TCP2814856ETPRO TROJAN njrat ver 0.7d Malware CnC Callback (inf)4976616458192.168.2.43.127.138.57
                                                          192.168.2.418.156.13.20949950164582825564 12/05/23-05:30:53.468048TCP2825564ETPRO TROJAN Generic njRAT/Bladabindi CnC Activity (act)4995016458192.168.2.418.156.13.209
                                                          192.168.2.418.156.13.20949951164582033132 12/05/23-05:30:53.651042TCP2033132ET TROJAN Generic njRAT/Bladabindi CnC Activity (ll)4995116458192.168.2.418.156.13.209
                                                          192.168.2.418.156.13.20949955164582033132 12/05/23-05:30:55.293994TCP2033132ET TROJAN Generic njRAT/Bladabindi CnC Activity (ll)4995516458192.168.2.418.156.13.209
                                                          192.168.2.418.156.13.20949928164582814856 12/05/23-05:30:43.621927TCP2814856ETPRO TROJAN njrat ver 0.7d Malware CnC Callback (inf)4992816458192.168.2.418.156.13.209
                                                          192.168.2.43.127.138.5749790164582033132 12/05/23-05:28:40.265275TCP2033132ET TROJAN Generic njRAT/Bladabindi CnC Activity (ll)4979016458192.168.2.43.127.138.57
                                                          192.168.2.418.156.13.20949957164582825564 12/05/23-05:30:56.327667TCP2825564ETPRO TROJAN Generic njRAT/Bladabindi CnC Activity (act)4995716458192.168.2.418.156.13.209
                                                          192.168.2.43.127.138.5749791164582033132 12/05/23-05:28:40.794777TCP2033132ET TROJAN Generic njRAT/Bladabindi CnC Activity (ll)4979116458192.168.2.43.127.138.57
                                                          192.168.2.418.156.13.20949927164582814856 12/05/23-05:30:43.151299TCP2814856ETPRO TROJAN njrat ver 0.7d Malware CnC Callback (inf)4992716458192.168.2.418.156.13.209
                                                          192.168.2.418.156.13.20949952164582033132 12/05/23-05:30:54.059521TCP2033132ET TROJAN Generic njRAT/Bladabindi CnC Activity (ll)4995216458192.168.2.418.156.13.209
                                                          192.168.2.418.156.13.20949953164582033132 12/05/23-05:30:54.470334TCP2033132ET TROJAN Generic njRAT/Bladabindi CnC Activity (ll)4995316458192.168.2.418.156.13.209
                                                          192.168.2.418.156.13.20949956164582825564 12/05/23-05:30:55.921346TCP2825564ETPRO TROJAN Generic njRAT/Bladabindi CnC Activity (act)4995616458192.168.2.418.156.13.209
                                                          192.168.2.418.156.13.20949926164582814856 12/05/23-05:30:42.682748TCP2814856ETPRO TROJAN njrat ver 0.7d Malware CnC Callback (inf)4992616458192.168.2.418.156.13.209
                                                          192.168.2.43.127.138.5749794164582033132 12/05/23-05:28:42.327787TCP2033132ET TROJAN Generic njRAT/Bladabindi CnC Activity (ll)4979416458192.168.2.43.127.138.57
                                                          192.168.2.418.156.13.20949930164582814860 12/05/23-05:30:44.625009TCP2814860ETPRO TROJAN njRAT/Bladabindi CnC Callback (act)4993016458192.168.2.418.156.13.209
                                                          192.168.2.43.127.138.5749793164582033132 12/05/23-05:28:41.825597TCP2033132ET TROJAN Generic njRAT/Bladabindi CnC Activity (ll)4979316458192.168.2.43.127.138.57
                                                          192.168.2.43.127.138.5749795164582033132 12/05/23-05:28:42.827309TCP2033132ET TROJAN Generic njRAT/Bladabindi CnC Activity (ll)4979516458192.168.2.43.127.138.57
                                                          192.168.2.418.156.13.20949923164582814856 12/05/23-05:30:41.258614TCP2814856ETPRO TROJAN njrat ver 0.7d Malware CnC Callback (inf)4992316458192.168.2.418.156.13.209
                                                          192.168.2.418.156.13.20949925164582814856 12/05/23-05:30:42.210120TCP2814856ETPRO TROJAN njrat ver 0.7d Malware CnC Callback (inf)4992516458192.168.2.418.156.13.209
                                                          192.168.2.43.127.138.5749792164582033132 12/05/23-05:28:41.313997TCP2033132ET TROJAN Generic njRAT/Bladabindi CnC Activity (ll)4979216458192.168.2.43.127.138.57
                                                          192.168.2.43.127.138.5749796164582033132 12/05/23-05:28:43.612253TCP2033132ET TROJAN Generic njRAT/Bladabindi CnC Activity (ll)4979616458192.168.2.43.127.138.57
                                                          192.168.2.43.127.138.5749769164582814856 12/05/23-05:28:24.386936TCP2814856ETPRO TROJAN njrat ver 0.7d Malware CnC Callback (inf)4976916458192.168.2.43.127.138.57
                                                          192.168.2.43.127.138.5749796164582825563 12/05/23-05:28:43.794707TCP2825563ETPRO TROJAN Generic njRAT/Bladabindi CnC Activity (inf)4979616458192.168.2.43.127.138.57
                                                          192.168.2.418.156.13.20949920164582814856 12/05/23-05:30:39.787305TCP2814856ETPRO TROJAN njrat ver 0.7d Malware CnC Callback (inf)4992016458192.168.2.418.156.13.209
                                                          192.168.2.418.156.13.20949924164582814856 12/05/23-05:30:41.742428TCP2814856ETPRO TROJAN njrat ver 0.7d Malware CnC Callback (inf)4992416458192.168.2.418.156.13.209
                                                          192.168.2.418.156.13.20949950164582033132 12/05/23-05:30:53.248119TCP2033132ET TROJAN Generic njRAT/Bladabindi CnC Activity (ll)4995016458192.168.2.418.156.13.209
                                                          192.168.2.43.127.138.5749767164582814856 12/05/23-05:28:22.372757TCP2814856ETPRO TROJAN njrat ver 0.7d Malware CnC Callback (inf)4976716458192.168.2.43.127.138.57
                                                          192.168.2.43.127.138.5749768164582814856 12/05/23-05:28:23.400281TCP2814856ETPRO TROJAN njrat ver 0.7d Malware CnC Callback (inf)4976816458192.168.2.43.127.138.57
                                                          192.168.2.43.127.138.5749797164582825563 12/05/23-05:28:46.037171TCP2825563ETPRO TROJAN Generic njRAT/Bladabindi CnC Activity (inf)4979716458192.168.2.43.127.138.57
                                                          192.168.2.418.156.13.20949921164582814856 12/05/23-05:30:40.286453TCP2814856ETPRO TROJAN njrat ver 0.7d Malware CnC Callback (inf)4992116458192.168.2.418.156.13.209
                                                          192.168.2.43.127.138.5749798164582825563 12/05/23-05:28:46.526164TCP2825563ETPRO TROJAN Generic njRAT/Bladabindi CnC Activity (inf)4979816458192.168.2.43.127.138.57
                                                          192.168.2.418.156.13.20949922164582814856 12/05/23-05:30:40.772511TCP2814856ETPRO TROJAN njrat ver 0.7d Malware CnC Callback (inf)4992216458192.168.2.418.156.13.209
                                                          192.168.2.43.127.138.5749799164582825563 12/05/23-05:28:46.989960TCP2825563ETPRO TROJAN Generic njRAT/Bladabindi CnC Activity (inf)4979916458192.168.2.43.127.138.57
                                                          192.168.2.43.127.138.5749789164582825563 12/05/23-05:28:39.901043TCP2825563ETPRO TROJAN Generic njRAT/Bladabindi CnC Activity (inf)4978916458192.168.2.43.127.138.57
                                                          192.168.2.418.156.13.20949930164582814856 12/05/23-05:30:44.540750TCP2814856ETPRO TROJAN njrat ver 0.7d Malware CnC Callback (inf)4993016458192.168.2.418.156.13.209
                                                          192.168.2.418.156.13.20949959164582825564 12/05/23-05:30:57.155698TCP2825564ETPRO TROJAN Generic njRAT/Bladabindi CnC Activity (act)4995916458192.168.2.418.156.13.209
                                                          192.168.2.43.127.138.5749760164582814856 12/05/23-05:28:13.802701TCP2814856ETPRO TROJAN njrat ver 0.7d Malware CnC Callback (inf)4976016458192.168.2.43.127.138.57
                                                          192.168.2.43.127.138.5749770164582814856 12/05/23-05:28:25.324266TCP2814856ETPRO TROJAN njrat ver 0.7d Malware CnC Callback (inf)4977016458192.168.2.43.127.138.57
                                                          192.168.2.43.127.138.5749771164582814856 12/05/23-05:28:27.604677TCP2814856ETPRO TROJAN njrat ver 0.7d Malware CnC Callback (inf)4977116458192.168.2.43.127.138.57
                                                          192.168.2.43.127.138.5749774164582814856 12/05/23-05:28:30.136952TCP2814856ETPRO TROJAN njrat ver 0.7d Malware CnC Callback (inf)4977416458192.168.2.43.127.138.57
                                                          192.168.2.418.156.13.20949943164582825564 12/05/23-05:30:50.484138TCP2825564ETPRO TROJAN Generic njRAT/Bladabindi CnC Activity (act)4994316458192.168.2.418.156.13.209
                                                          192.168.2.418.156.13.20949963164582825563 12/05/23-05:30:58.744491TCP2825563ETPRO TROJAN Generic njRAT/Bladabindi CnC Activity (inf)4996316458192.168.2.418.156.13.209
                                                          192.168.2.418.156.13.20949964164582033132 12/05/23-05:30:58.981178TCP2033132ET TROJAN Generic njRAT/Bladabindi CnC Activity (ll)4996416458192.168.2.418.156.13.209
                                                          192.168.2.418.156.13.20949964164582825563 12/05/23-05:30:59.161644TCP2825563ETPRO TROJAN Generic njRAT/Bladabindi CnC Activity (inf)4996416458192.168.2.418.156.13.209
                                                          192.168.2.418.156.13.20949965164582033132 12/05/23-05:30:59.387461TCP2033132ET TROJAN Generic njRAT/Bladabindi CnC Activity (ll)4996516458192.168.2.418.156.13.209
                                                          192.168.2.43.127.138.5749773164582814856 12/05/23-05:28:29.319798TCP2814856ETPRO TROJAN njrat ver 0.7d Malware CnC Callback (inf)4977316458192.168.2.43.127.138.57
                                                          192.168.2.43.127.138.5749775164582814856 12/05/23-05:28:30.932975TCP2814856ETPRO TROJAN njrat ver 0.7d Malware CnC Callback (inf)4977516458192.168.2.43.127.138.57
                                                          192.168.2.418.156.13.20949943164582033132 12/05/23-05:30:50.247556TCP2033132ET TROJAN Generic njRAT/Bladabindi CnC Activity (ll)4994316458192.168.2.418.156.13.209
                                                          192.168.2.418.156.13.20949945164582033132 12/05/23-05:30:51.089533TCP2033132ET TROJAN Generic njRAT/Bladabindi CnC Activity (ll)4994516458192.168.2.418.156.13.209
                                                          192.168.2.43.127.138.5749772164582814856 12/05/23-05:28:28.477294TCP2814856ETPRO TROJAN njrat ver 0.7d Malware CnC Callback (inf)4977216458192.168.2.43.127.138.57
                                                          192.168.2.43.127.138.5749776164582814856 12/05/23-05:28:31.694132TCP2814856ETPRO TROJAN njrat ver 0.7d Malware CnC Callback (inf)4977616458192.168.2.43.127.138.57
                                                          192.168.2.418.156.13.20949965164582825563 12/05/23-05:30:59.568414TCP2825563ETPRO TROJAN Generic njRAT/Bladabindi CnC Activity (inf)4996516458192.168.2.418.156.13.209
                                                          192.168.2.418.156.13.20949940164582825564 12/05/23-05:30:49.218482TCP2825564ETPRO TROJAN Generic njRAT/Bladabindi CnC Activity (act)4994016458192.168.2.418.156.13.209
                                                          192.168.2.418.156.13.20949944164582825564 12/05/23-05:30:50.905779TCP2825564ETPRO TROJAN Generic njRAT/Bladabindi CnC Activity (act)4994416458192.168.2.418.156.13.209
                                                          192.168.2.418.156.13.20949961164582825563 12/05/23-05:30:57.932002TCP2825563ETPRO TROJAN Generic njRAT/Bladabindi CnC Activity (inf)4996116458192.168.2.418.156.13.209
                                                          192.168.2.418.156.13.20949962164582033132 12/05/23-05:30:58.158127TCP2033132ET TROJAN Generic njRAT/Bladabindi CnC Activity (ll)4996216458192.168.2.418.156.13.209
                                                          192.168.2.418.156.13.20949962164582825563 12/05/23-05:30:58.338916TCP2825563ETPRO TROJAN Generic njRAT/Bladabindi CnC Activity (inf)4996216458192.168.2.418.156.13.209
                                                          192.168.2.418.156.13.20949966164582033132 12/05/23-05:30:59.792452TCP2033132ET TROJAN Generic njRAT/Bladabindi CnC Activity (ll)4996616458192.168.2.418.156.13.209
                                                          192.168.2.418.156.13.20949939164582814856 12/05/23-05:30:48.740784TCP2814856ETPRO TROJAN njrat ver 0.7d Malware CnC Callback (inf)4993916458192.168.2.418.156.13.209
                                                          192.168.2.418.156.13.20949940164582033132 12/05/23-05:30:48.980774TCP2033132ET TROJAN Generic njRAT/Bladabindi CnC Activity (ll)4994016458192.168.2.418.156.13.209
                                                          192.168.2.418.156.13.20949944164582033132 12/05/23-05:30:50.669939TCP2033132ET TROJAN Generic njRAT/Bladabindi CnC Activity (ll)4994416458192.168.2.418.156.13.209
                                                          192.168.2.418.156.13.20949917164582814856 12/05/23-05:30:38.255594TCP2814856ETPRO TROJAN njrat ver 0.7d Malware CnC Callback (inf)4991716458192.168.2.418.156.13.209
                                                          192.168.2.418.156.13.20949938164582814856 12/05/23-05:30:48.315387TCP2814856ETPRO TROJAN njrat ver 0.7d Malware CnC Callback (inf)4993816458192.168.2.418.156.13.209
                                                          192.168.2.418.156.13.20949967164582825563 12/05/23-05:31:00.387111TCP2825563ETPRO TROJAN Generic njRAT/Bladabindi CnC Activity (inf)4996716458192.168.2.418.156.13.209
                                                          192.168.2.43.127.138.5749780164582033132 12/05/23-05:28:34.335865TCP2033132ET TROJAN Generic njRAT/Bladabindi CnC Activity (ll)4978016458192.168.2.43.127.138.57
                                                          192.168.2.418.156.13.20949960164582825563 12/05/23-05:30:57.522843TCP2825563ETPRO TROJAN Generic njRAT/Bladabindi CnC Activity (inf)4996016458192.168.2.418.156.13.209
                                                          192.168.2.418.156.13.20949916164582814856 12/05/23-05:30:37.726849TCP2814856ETPRO TROJAN njrat ver 0.7d Malware CnC Callback (inf)4991616458192.168.2.418.156.13.209
                                                          192.168.2.418.156.13.20949966164582825563 12/05/23-05:30:59.973325TCP2825563ETPRO TROJAN Generic njRAT/Bladabindi CnC Activity (inf)4996616458192.168.2.418.156.13.209
                                                          192.168.2.418.156.13.20949968164582825563 12/05/23-05:31:00.783547TCP2825563ETPRO TROJAN Generic njRAT/Bladabindi CnC Activity (inf)4996816458192.168.2.418.156.13.209
                                                          192.168.2.418.156.13.20949941164582033132 12/05/23-05:30:49.404746TCP2033132ET TROJAN Generic njRAT/Bladabindi CnC Activity (ll)4994116458192.168.2.418.156.13.209
                                                          192.168.2.418.156.13.20949949164582033132 12/05/23-05:30:52.809100TCP2033132ET TROJAN Generic njRAT/Bladabindi CnC Activity (ll)4994916458192.168.2.418.156.13.209
                                                          192.168.2.418.156.13.20949915164582814856 12/05/23-05:30:37.180129TCP2814856ETPRO TROJAN njrat ver 0.7d Malware CnC Callback (inf)4991516458192.168.2.418.156.13.209
                                                          192.168.2.418.156.13.20949936164582814856 12/05/23-05:30:47.426018TCP2814856ETPRO TROJAN njrat ver 0.7d Malware CnC Callback (inf)4993616458192.168.2.418.156.13.209
                                                          192.168.2.418.156.13.20949945164582825564 12/05/23-05:30:51.327791TCP2825564ETPRO TROJAN Generic njRAT/Bladabindi CnC Activity (act)4994516458192.168.2.418.156.13.209
                                                          192.168.2.418.156.13.20949963164582033132 12/05/23-05:30:58.562505TCP2033132ET TROJAN Generic njRAT/Bladabindi CnC Activity (ll)4996316458192.168.2.418.156.13.209
                                                          192.168.2.418.192.93.8649731164582033132 12/05/23-05:27:17.127747TCP2033132ET TROJAN Generic njRAT/Bladabindi CnC Activity (ll)4973116458192.168.2.418.192.93.86
                                                          192.168.2.418.156.13.20949937164582814856 12/05/23-05:30:47.880675TCP2814856ETPRO TROJAN njrat ver 0.7d Malware CnC Callback (inf)4993716458192.168.2.418.156.13.209
                                                          192.168.2.418.156.13.20949942164582033132 12/05/23-05:30:49.830004TCP2033132ET TROJAN Generic njRAT/Bladabindi CnC Activity (ll)4994216458192.168.2.418.156.13.209
                                                          192.168.2.418.156.13.20949913164582814856 12/05/23-05:30:36.068568TCP2814856ETPRO TROJAN njrat ver 0.7d Malware CnC Callback (inf)4991316458192.168.2.418.156.13.209
                                                          192.168.2.418.156.13.20949934164582814856 12/05/23-05:30:46.446917TCP2814856ETPRO TROJAN njrat ver 0.7d Malware CnC Callback (inf)4993416458192.168.2.418.156.13.209
                                                          192.168.2.43.127.138.5749783164582033132 12/05/23-05:28:36.247853TCP2033132ET TROJAN Generic njRAT/Bladabindi CnC Activity (ll)4978316458192.168.2.43.127.138.57
                                                          192.168.2.43.127.138.5749784164582033132 12/05/23-05:28:36.855308TCP2033132ET TROJAN Generic njRAT/Bladabindi CnC Activity (ll)4978416458192.168.2.43.127.138.57
                                                          192.168.2.418.156.13.20949912164582814856 12/05/23-05:30:35.503776TCP2814856ETPRO TROJAN njrat ver 0.7d Malware CnC Callback (inf)4991216458192.168.2.418.156.13.209
                                                          192.168.2.418.156.13.20949914164582814856 12/05/23-05:30:36.635877TCP2814856ETPRO TROJAN njrat ver 0.7d Malware CnC Callback (inf)4991416458192.168.2.418.156.13.209
                                                          192.168.2.43.127.138.5749781164582033132 12/05/23-05:28:34.985112TCP2033132ET TROJAN Generic njRAT/Bladabindi CnC Activity (ll)4978116458192.168.2.43.127.138.57
                                                          192.168.2.43.127.138.5749782164582033132 12/05/23-05:28:35.624002TCP2033132ET TROJAN Generic njRAT/Bladabindi CnC Activity (ll)4978216458192.168.2.43.127.138.57
                                                          192.168.2.43.127.138.5749785164582033132 12/05/23-05:28:37.455172TCP2033132ET TROJAN Generic njRAT/Bladabindi CnC Activity (ll)4978516458192.168.2.43.127.138.57
                                                          192.168.2.43.127.138.5749786164582033132 12/05/23-05:28:38.034826TCP2033132ET TROJAN Generic njRAT/Bladabindi CnC Activity (ll)4978616458192.168.2.43.127.138.57
                                                          192.168.2.418.156.13.20949931164582814856 12/05/23-05:30:44.997410TCP2814856ETPRO TROJAN njrat ver 0.7d Malware CnC Callback (inf)4993116458192.168.2.418.156.13.209
                                                          192.168.2.418.156.13.20949935164582814856 12/05/23-05:30:47.061771TCP2814856ETPRO TROJAN njrat ver 0.7d Malware CnC Callback (inf)4993516458192.168.2.418.156.13.209
                                                          192.168.2.43.127.138.5749785164582825564 12/05/23-05:28:37.843889TCP2825564ETPRO TROJAN Generic njRAT/Bladabindi CnC Activity (act)4978516458192.168.2.43.127.138.57
                                                          192.168.2.43.127.138.5749778164582814856 12/05/23-05:28:33.152986TCP2814856ETPRO TROJAN njrat ver 0.7d Malware CnC Callback (inf)4977816458192.168.2.43.127.138.57
                                                          192.168.2.418.156.13.20949960164582033132 12/05/23-05:30:57.341101TCP2033132ET TROJAN Generic njRAT/Bladabindi CnC Activity (ll)4996016458192.168.2.418.156.13.209
                                                          192.168.2.418.156.13.20949961164582033132 12/05/23-05:30:57.751368TCP2033132ET TROJAN Generic njRAT/Bladabindi CnC Activity (ll)4996116458192.168.2.418.156.13.209
                                                          192.168.2.43.127.138.5749777164582814856 12/05/23-05:28:32.429925TCP2814856ETPRO TROJAN njrat ver 0.7d Malware CnC Callback (inf)4977716458192.168.2.43.127.138.57
                                                          192.168.2.43.127.138.5749779164582814856 12/05/23-05:28:33.835225TCP2814856ETPRO TROJAN njrat ver 0.7d Malware CnC Callback (inf)4977916458192.168.2.43.127.138.57
                                                          192.168.2.418.156.13.20949910164582814856 12/05/23-05:30:34.336695TCP2814856ETPRO TROJAN njrat ver 0.7d Malware CnC Callback (inf)4991016458192.168.2.418.156.13.209
                                                          192.168.2.43.127.138.5749788164582825563 12/05/23-05:28:39.348879TCP2825563ETPRO TROJAN Generic njRAT/Bladabindi CnC Activity (inf)4978816458192.168.2.43.127.138.57
                                                          192.168.2.418.156.13.20949911164582814856 12/05/23-05:30:34.933998TCP2814856ETPRO TROJAN njrat ver 0.7d Malware CnC Callback (inf)4991116458192.168.2.418.156.13.209
                                                          192.168.2.418.156.13.20949932164582814856 12/05/23-05:30:45.445445TCP2814856ETPRO TROJAN njrat ver 0.7d Malware CnC Callback (inf)4993216458192.168.2.418.156.13.209
                                                          192.168.2.43.127.138.5749787164582825563 12/05/23-05:28:38.793091TCP2825563ETPRO TROJAN Generic njRAT/Bladabindi CnC Activity (inf)4978716458192.168.2.43.127.138.57
                                                          192.168.2.418.156.13.20949933164582814856 12/05/23-05:30:45.917138TCP2814856ETPRO TROJAN njrat ver 0.7d Malware CnC Callback (inf)4993316458192.168.2.418.156.13.209
                                                          192.168.2.418.192.93.8649731164582825563 12/05/23-05:27:17.308269TCP2825563ETPRO TROJAN Generic njRAT/Bladabindi CnC Activity (inf)4973116458192.168.2.418.192.93.86
                                                          192.168.2.418.156.13.20949939164582814860 12/05/23-05:30:48.796313TCP2814860ETPRO TROJAN njRAT/Bladabindi CnC Callback (act)4993916458192.168.2.418.156.13.209
                                                          192.168.2.418.156.13.20949916164582814860 12/05/23-05:30:37.890647TCP2814860ETPRO TROJAN njRAT/Bladabindi CnC Callback (act)4991616458192.168.2.418.156.13.209
                                                          192.168.2.418.156.13.20949918164582814860 12/05/23-05:30:38.921490TCP2814860ETPRO TROJAN njRAT/Bladabindi CnC Callback (act)4991816458192.168.2.418.156.13.209
                                                          192.168.2.418.192.93.8649738164582033132 12/05/23-05:27:24.345734TCP2033132ET TROJAN Generic njRAT/Bladabindi CnC Activity (ll)4973816458192.168.2.418.192.93.86
                                                          192.168.2.43.127.138.5749789164582033132 12/05/23-05:28:39.720245TCP2033132ET TROJAN Generic njRAT/Bladabindi CnC Activity (ll)4978916458192.168.2.43.127.138.57
                                                          192.168.2.418.156.13.20949937164582814860 12/05/23-05:30:47.952432TCP2814860ETPRO TROJAN njRAT/Bladabindi CnC Callback (act)4993716458192.168.2.418.156.13.209
                                                          192.168.2.418.192.93.8649737164582033132 12/05/23-05:27:21.937238TCP2033132ET TROJAN Generic njRAT/Bladabindi CnC Activity (ll)4973716458192.168.2.418.192.93.86
                                                          192.168.2.418.156.13.20949915164582814860 12/05/23-05:30:37.358943TCP2814860ETPRO TROJAN njRAT/Bladabindi CnC Callback (act)4991516458192.168.2.418.156.13.209
                                                          192.168.2.418.156.13.20949919164582814860 12/05/23-05:30:39.421594TCP2814860ETPRO TROJAN njRAT/Bladabindi CnC Callback (act)4991916458192.168.2.418.156.13.209
                                                          192.168.2.43.127.138.5749787164582033132 12/05/23-05:28:38.610835TCP2033132ET TROJAN Generic njRAT/Bladabindi CnC Activity (ll)4978716458192.168.2.43.127.138.57
                                                          192.168.2.43.127.138.5749788164582033132 12/05/23-05:28:39.169079TCP2033132ET TROJAN Generic njRAT/Bladabindi CnC Activity (ll)4978816458192.168.2.43.127.138.57
                                                          192.168.2.418.192.93.8649739164582033132 12/05/23-05:27:26.754614TCP2033132ET TROJAN Generic njRAT/Bladabindi CnC Activity (ll)4973916458192.168.2.418.192.93.86
                                                          192.168.2.418.156.13.20949917164582814860 12/05/23-05:30:38.405876TCP2814860ETPRO TROJAN njRAT/Bladabindi CnC Callback (act)4991716458192.168.2.418.156.13.209
                                                          192.168.2.418.156.13.20949932164582814860 12/05/23-05:30:45.550951TCP2814860ETPRO TROJAN njRAT/Bladabindi CnC Callback (act)4993216458192.168.2.418.156.13.209
                                                          192.168.2.418.156.13.20949948164582033132 12/05/23-05:30:52.356572TCP2033132ET TROJAN Generic njRAT/Bladabindi CnC Activity (ll)4994816458192.168.2.418.156.13.209
                                                          192.168.2.418.192.93.8649736164582033132 12/05/23-05:27:19.532370TCP2033132ET TROJAN Generic njRAT/Bladabindi CnC Activity (ll)4973616458192.168.2.418.192.93.86
                                                          192.168.2.418.156.13.20949968164582033132 12/05/23-05:31:00.603507TCP2033132ET TROJAN Generic njRAT/Bladabindi CnC Activity (ll)4996816458192.168.2.418.156.13.209
                                                          192.168.2.418.156.13.20949969164582033132 12/05/23-05:31:01.011281TCP2033132ET TROJAN Generic njRAT/Bladabindi CnC Activity (ll)4996916458192.168.2.418.156.13.209
                                                          192.168.2.418.156.13.20949918164582814856 12/05/23-05:30:38.774492TCP2814856ETPRO TROJAN njrat ver 0.7d Malware CnC Callback (inf)4991816458192.168.2.418.156.13.209
                                                          192.168.2.418.156.13.20949912164582814860 12/05/23-05:30:35.704944TCP2814860ETPRO TROJAN njRAT/Bladabindi CnC Callback (act)4991216458192.168.2.418.156.13.209
                                                          192.168.2.418.156.13.20949914164582814860 12/05/23-05:30:36.811958TCP2814860ETPRO TROJAN njRAT/Bladabindi CnC Callback (act)4991416458192.168.2.418.156.13.209
                                                          192.168.2.418.156.13.20949947164582033132 12/05/23-05:30:51.933916TCP2033132ET TROJAN Generic njRAT/Bladabindi CnC Activity (ll)4994716458192.168.2.418.156.13.209
                                                          192.168.2.418.156.13.20949919164582814856 12/05/23-05:30:39.285678TCP2814856ETPRO TROJAN njrat ver 0.7d Malware CnC Callback (inf)4991916458192.168.2.418.156.13.209
                                                          192.168.2.418.156.13.20949967164582033132 12/05/23-05:31:00.204452TCP2033132ET TROJAN Generic njRAT/Bladabindi CnC Activity (ll)4996716458192.168.2.418.156.13.209
                                                          192.168.2.418.156.13.20949913164582814860 12/05/23-05:30:36.265325TCP2814860ETPRO TROJAN njRAT/Bladabindi CnC Callback (act)4991316458192.168.2.418.156.13.209
                                                          192.168.2.418.156.13.20949946164582033132 12/05/23-05:30:51.512099TCP2033132ET TROJAN Generic njRAT/Bladabindi CnC Activity (ll)4994616458192.168.2.418.156.13.209
                                                          192.168.2.418.156.13.20949932164582825564 12/05/23-05:30:45.550951TCP2825564ETPRO TROJAN Generic njRAT/Bladabindi CnC Activity (act)4993216458192.168.2.418.156.13.209
                                                          192.168.2.418.156.13.20949933164582033132 12/05/23-05:30:45.736476TCP2033132ET TROJAN Generic njRAT/Bladabindi CnC Activity (ll)4993316458192.168.2.418.156.13.209
                                                          192.168.2.418.156.13.20949974164582825563 12/05/23-05:31:03.198944TCP2825563ETPRO TROJAN Generic njRAT/Bladabindi CnC Activity (inf)4997416458192.168.2.418.156.13.209
                                                          192.168.2.418.156.13.20949975164582033132 12/05/23-05:31:03.517120TCP2033132ET TROJAN Generic njRAT/Bladabindi CnC Activity (ll)4997516458192.168.2.418.156.13.209
                                                          192.168.2.43.127.138.5749784164582814856 12/05/23-05:28:37.034990TCP2814856ETPRO TROJAN njrat ver 0.7d Malware CnC Callback (inf)4978416458192.168.2.43.127.138.57
                                                          192.168.2.43.127.138.5749786164582814856 12/05/23-05:28:38.216146TCP2814856ETPRO TROJAN njrat ver 0.7d Malware CnC Callback (inf)4978616458192.168.2.43.127.138.57
                                                          192.168.2.418.156.13.20949972164582825563 12/05/23-05:31:02.396051TCP2825563ETPRO TROJAN Generic njRAT/Bladabindi CnC Activity (inf)4997216458192.168.2.418.156.13.209
                                                          192.168.2.418.156.13.20949973164582033132 12/05/23-05:31:02.622147TCP2033132ET TROJAN Generic njRAT/Bladabindi CnC Activity (ll)4997316458192.168.2.418.156.13.209
                                                          192.168.2.418.156.13.20949970164582825563 12/05/23-05:31:01.598067TCP2825563ETPRO TROJAN Generic njRAT/Bladabindi CnC Activity (inf)4997016458192.168.2.418.156.13.209
                                                          192.168.2.418.156.13.20949949164582814856 12/05/23-05:30:52.989913TCP2814856ETPRO TROJAN njrat ver 0.7d Malware CnC Callback (inf)4994916458192.168.2.418.156.13.209
                                                          192.168.2.43.127.138.5749770164582033132 12/05/23-05:28:25.143485TCP2033132ET TROJAN Generic njRAT/Bladabindi CnC Activity (ll)4977016458192.168.2.43.127.138.57
                                                          192.168.2.418.156.13.20949931164582033132 12/05/23-05:30:44.810828TCP2033132ET TROJAN Generic njRAT/Bladabindi CnC Activity (ll)4993116458192.168.2.418.156.13.209
                                                          192.168.2.418.156.13.20949947164582814856 12/05/23-05:30:52.114677TCP2814856ETPRO TROJAN njrat ver 0.7d Malware CnC Callback (inf)4994716458192.168.2.418.156.13.209
                                                          192.168.2.418.156.13.20949905164582814856 12/05/23-05:30:31.132290TCP2814856ETPRO TROJAN njrat ver 0.7d Malware CnC Callback (inf)4990516458192.168.2.418.156.13.209
                                                          192.168.2.418.192.93.8649742164582033132 12/05/23-05:27:34.516199TCP2033132ET TROJAN Generic njRAT/Bladabindi CnC Activity (ll)4974216458192.168.2.418.192.93.86
                                                          192.168.2.418.156.13.20949939164582033132 12/05/23-05:30:48.560194TCP2033132ET TROJAN Generic njRAT/Bladabindi CnC Activity (ll)4993916458192.168.2.418.156.13.209
                                                          192.168.2.418.192.93.8649741164582825563 12/05/23-05:27:32.319288TCP2825563ETPRO TROJAN Generic njRAT/Bladabindi CnC Activity (inf)4974116458192.168.2.418.192.93.86
                                                          192.168.2.418.156.13.20949945164582814856 12/05/23-05:30:51.269914TCP2814856ETPRO TROJAN njrat ver 0.7d Malware CnC Callback (inf)4994516458192.168.2.418.156.13.209
                                                          192.168.2.418.156.13.20949952164582814860 12/05/23-05:30:54.280837TCP2814860ETPRO TROJAN njRAT/Bladabindi CnC Callback (act)4995216458192.168.2.418.156.13.209
                                                          192.168.2.418.156.13.20949903164582814856 12/05/23-05:30:29.473490TCP2814856ETPRO TROJAN njrat ver 0.7d Malware CnC Callback (inf)4990316458192.168.2.418.156.13.209
                                                          192.168.2.43.127.138.5749772164582033132 12/05/23-05:28:28.296608TCP2033132ET TROJAN Generic njRAT/Bladabindi CnC Activity (ll)4977216458192.168.2.43.127.138.57
                                                          192.168.2.43.127.138.5749774164582033132 12/05/23-05:28:29.955112TCP2033132ET TROJAN Generic njRAT/Bladabindi CnC Activity (ll)4977416458192.168.2.43.127.138.57
                                                          192.168.2.418.156.13.20949950164582814860 12/05/23-05:30:53.468048TCP2814860ETPRO TROJAN njRAT/Bladabindi CnC Callback (act)4995016458192.168.2.418.156.13.209
                                                          192.168.2.418.192.93.8649740164582033132 12/05/23-05:27:29.154814TCP2033132ET TROJAN Generic njRAT/Bladabindi CnC Activity (ll)4974016458192.168.2.418.192.93.86
                                                          192.168.2.418.156.13.20949971164582033132 12/05/23-05:31:01.807809TCP2033132ET TROJAN Generic njRAT/Bladabindi CnC Activity (ll)4997116458192.168.2.418.156.13.209
                                                          192.168.2.43.127.138.5749788164582814856 12/05/23-05:28:39.348879TCP2814856ETPRO TROJAN njrat ver 0.7d Malware CnC Callback (inf)4978816458192.168.2.43.127.138.57
                                                          192.168.2.418.156.13.20949930164582825564 12/05/23-05:30:44.625009TCP2825564ETPRO TROJAN Generic njRAT/Bladabindi CnC Activity (act)4993016458192.168.2.418.156.13.209
                                                          192.168.2.418.156.13.20949943164582814856 12/05/23-05:30:50.428670TCP2814856ETPRO TROJAN njrat ver 0.7d Malware CnC Callback (inf)4994316458192.168.2.418.156.13.209
                                                          192.168.2.418.156.13.20949901164582814856 12/05/23-05:30:27.975475TCP2814856ETPRO TROJAN njrat ver 0.7d Malware CnC Callback (inf)4990116458192.168.2.418.156.13.209
                                                          192.168.2.418.192.93.8649749164582825563 12/05/23-05:27:52.731544TCP2825563ETPRO TROJAN Generic njRAT/Bladabindi CnC Activity (inf)4974916458192.168.2.418.192.93.86
                                                          192.168.2.418.192.93.8649738164582825563 12/05/23-05:27:24.526596TCP2825563ETPRO TROJAN Generic njRAT/Bladabindi CnC Activity (inf)4973816458192.168.2.418.192.93.86
                                                          192.168.2.418.192.93.8649747164582825563 12/05/23-05:27:46.734885TCP2825563ETPRO TROJAN Generic njRAT/Bladabindi CnC Activity (inf)4974716458192.168.2.418.192.93.86
                                                          192.168.2.418.192.93.8649745164582825563 12/05/23-05:27:41.917485TCP2825563ETPRO TROJAN Generic njRAT/Bladabindi CnC Activity (inf)4974516458192.168.2.418.192.93.86
                                                          192.168.2.418.156.13.20949941164582814856 12/05/23-05:30:49.585914TCP2814856ETPRO TROJAN njrat ver 0.7d Malware CnC Callback (inf)4994116458192.168.2.418.156.13.209
                                                          192.168.2.418.156.13.20949952164582814856 12/05/23-05:30:54.240437TCP2814856ETPRO TROJAN njrat ver 0.7d Malware CnC Callback (inf)4995216458192.168.2.418.156.13.209
                                                          192.168.2.418.192.93.8649736164582825563 12/05/23-05:27:19.714364TCP2825563ETPRO TROJAN Generic njRAT/Bladabindi CnC Activity (inf)4973616458192.168.2.418.192.93.86
                                                          192.168.2.418.156.13.20949950164582814856 12/05/23-05:30:53.430533TCP2814856ETPRO TROJAN njrat ver 0.7d Malware CnC Callback (inf)4995016458192.168.2.418.156.13.209
                                                          192.168.2.418.156.13.20949929164582825564 12/05/23-05:30:44.171400TCP2825564ETPRO TROJAN Generic njRAT/Bladabindi CnC Activity (act)4992916458192.168.2.418.156.13.209
                                                          192.168.2.418.156.13.20949969164582825563 12/05/23-05:31:01.195485TCP2825563ETPRO TROJAN Generic njRAT/Bladabindi CnC Activity (inf)4996916458192.168.2.418.156.13.209
                                                          192.168.2.43.127.138.5749780164582814856 12/05/23-05:28:34.515761TCP2814856ETPRO TROJAN njrat ver 0.7d Malware CnC Callback (inf)4978016458192.168.2.43.127.138.57
                                                          192.168.2.43.127.138.5749782164582814856 12/05/23-05:28:35.805505TCP2814856ETPRO TROJAN njrat ver 0.7d Malware CnC Callback (inf)4978216458192.168.2.43.127.138.57
                                                          192.168.2.43.127.138.5749791164582814856 12/05/23-05:28:40.975474TCP2814856ETPRO TROJAN njrat ver 0.7d Malware CnC Callback (inf)4979116458192.168.2.43.127.138.57
                                                          192.168.2.43.127.138.5749793164582814856 12/05/23-05:28:42.006662TCP2814856ETPRO TROJAN njrat ver 0.7d Malware CnC Callback (inf)4979316458192.168.2.43.127.138.57
                                                          192.168.2.418.156.13.20949927164582825564 12/05/23-05:30:43.249853TCP2825564ETPRO TROJAN Generic njRAT/Bladabindi CnC Activity (act)4992716458192.168.2.418.156.13.209
                                                          192.168.2.418.156.13.20949928164582814860 12/05/23-05:30:43.718067TCP2814860ETPRO TROJAN njRAT/Bladabindi CnC Callback (act)4992816458192.168.2.418.156.13.209
                                                          192.168.2.418.156.13.20949949164582814860 12/05/23-05:30:53.062377TCP2814860ETPRO TROJAN njRAT/Bladabindi CnC Callback (act)4994916458192.168.2.418.156.13.209
                                                          192.168.2.418.192.93.8649729164582033132 12/05/23-05:27:14.926419TCP2033132ET TROJAN Generic njRAT/Bladabindi CnC Activity (ll)4972916458192.168.2.418.192.93.86
                                                          192.168.2.43.127.138.5749844164582814856 12/05/23-05:29:07.595663TCP2814856ETPRO TROJAN njrat ver 0.7d Malware CnC Callback (inf)4984416458192.168.2.43.127.138.57
                                                          192.168.2.43.127.138.5749846164582814856 12/05/23-05:29:08.411103TCP2814856ETPRO TROJAN njrat ver 0.7d Malware CnC Callback (inf)4984616458192.168.2.43.127.138.57
                                                          192.168.2.43.127.138.5749778164582033132 12/05/23-05:28:32.971143TCP2033132ET TROJAN Generic njRAT/Bladabindi CnC Activity (ll)4977816458192.168.2.43.127.138.57
                                                          192.168.2.418.192.93.8649748164582033132 12/05/23-05:27:50.144328TCP2033132ET TROJAN Generic njRAT/Bladabindi CnC Activity (ll)4974816458192.168.2.418.192.93.86
                                                          192.168.2.43.127.138.5749776164582033132 12/05/23-05:28:31.512762TCP2033132ET TROJAN Generic njRAT/Bladabindi CnC Activity (ll)4977616458192.168.2.43.127.138.57
                                                          192.168.2.43.127.138.5749797164582033132 12/05/23-05:28:45.855071TCP2033132ET TROJAN Generic njRAT/Bladabindi CnC Activity (ll)4979716458192.168.2.43.127.138.57
                                                          192.168.2.43.127.138.5749799164582033132 12/05/23-05:28:46.809302TCP2033132ET TROJAN Generic njRAT/Bladabindi CnC Activity (ll)4979916458192.168.2.43.127.138.57
                                                          192.168.2.43.127.138.5749842164582814856 12/05/23-05:29:06.788955TCP2814856ETPRO TROJAN njrat ver 0.7d Malware CnC Callback (inf)4984216458192.168.2.43.127.138.57
                                                          192.168.2.43.127.138.5749794164582825563 12/05/23-05:28:42.507418TCP2825563ETPRO TROJAN Generic njRAT/Bladabindi CnC Activity (inf)4979416458192.168.2.43.127.138.57
                                                          192.168.2.418.156.13.20949920164582814860 12/05/23-05:30:39.921521TCP2814860ETPRO TROJAN njRAT/Bladabindi CnC Callback (act)4992016458192.168.2.418.156.13.209
                                                          192.168.2.418.156.13.20949922164582814860 12/05/23-05:30:40.890140TCP2814860ETPRO TROJAN njRAT/Bladabindi CnC Callback (act)4992216458192.168.2.418.156.13.209
                                                          192.168.2.418.156.13.20949943164582814860 12/05/23-05:30:50.484138TCP2814860ETPRO TROJAN njRAT/Bladabindi CnC Callback (act)4994316458192.168.2.418.156.13.209
                                                          192.168.2.418.192.93.8649744164582033132 12/05/23-05:27:39.328647TCP2033132ET TROJAN Generic njRAT/Bladabindi CnC Activity (ll)4974416458192.168.2.418.192.93.86
                                                          192.168.2.43.127.138.5749792164582825563 12/05/23-05:28:41.495057TCP2825563ETPRO TROJAN Generic njRAT/Bladabindi CnC Activity (inf)4979216458192.168.2.43.127.138.57
                                                          192.168.2.418.156.13.20949937164582033132 12/05/23-05:30:47.699644TCP2033132ET TROJAN Generic njRAT/Bladabindi CnC Activity (ll)4993716458192.168.2.418.156.13.209
                                                          192.168.2.418.156.13.20949958164582033132 12/05/23-05:30:56.519012TCP2033132ET TROJAN Generic njRAT/Bladabindi CnC Activity (ll)4995816458192.168.2.418.156.13.209
                                                          192.168.2.418.156.13.20949907164582814856 12/05/23-05:30:32.460493TCP2814856ETPRO TROJAN njrat ver 0.7d Malware CnC Callback (inf)4990716458192.168.2.418.156.13.209
                                                          192.168.2.418.156.13.20949945164582814860 12/05/23-05:30:51.327791TCP2814860ETPRO TROJAN njRAT/Bladabindi CnC Callback (act)4994516458192.168.2.418.156.13.209
                                                          192.168.2.43.127.138.5749848164582814856 12/05/23-05:29:09.223938TCP2814856ETPRO TROJAN njrat ver 0.7d Malware CnC Callback (inf)4984816458192.168.2.43.127.138.57
                                                          192.168.2.418.156.13.20949935164582033132 12/05/23-05:30:47.019125TCP2033132ET TROJAN Generic njRAT/Bladabindi CnC Activity (ll)4993516458192.168.2.418.156.13.209
                                                          192.168.2.418.156.13.20949956164582033132 12/05/23-05:30:55.698325TCP2033132ET TROJAN Generic njRAT/Bladabindi CnC Activity (ll)4995616458192.168.2.418.156.13.209
                                                          192.168.2.418.156.13.20949909164582814856 12/05/23-05:30:33.726724TCP2814856ETPRO TROJAN njrat ver 0.7d Malware CnC Callback (inf)4990916458192.168.2.418.156.13.209
                                                          192.168.2.418.156.13.20949914164582033132 12/05/23-05:30:36.454498TCP2033132ET TROJAN Generic njRAT/Bladabindi CnC Activity (ll)4991416458192.168.2.418.156.13.209
                                                          192.168.2.418.192.93.8649746164582033132 12/05/23-05:27:44.144607TCP2033132ET TROJAN Generic njRAT/Bladabindi CnC Activity (ll)4974616458192.168.2.418.192.93.86
                                                          192.168.2.43.127.138.5749790164582825563 12/05/23-05:28:40.447649TCP2825563ETPRO TROJAN Generic njRAT/Bladabindi CnC Activity (inf)4979016458192.168.2.43.127.138.57
                                                          192.168.2.418.157.68.7349870164582814856 12/05/23-05:29:38.440888TCP2814856ETPRO TROJAN njrat ver 0.7d Malware CnC Callback (inf)4987016458192.168.2.418.157.68.73
                                                          192.168.2.418.157.68.7349871164582814856 12/05/23-05:29:40.850092TCP2814856ETPRO TROJAN njrat ver 0.7d Malware CnC Callback (inf)4987116458192.168.2.418.157.68.73
                                                          192.168.2.418.192.93.8649731164582814856 12/05/23-05:27:17.308269TCP2814856ETPRO TROJAN njrat ver 0.7d Malware CnC Callback (inf)4973116458192.168.2.418.192.93.86
                                                          192.168.2.418.156.13.20949916164582033132 12/05/23-05:30:37.544762TCP2033132ET TROJAN Generic njRAT/Bladabindi CnC Activity (ll)4991616458192.168.2.418.156.13.209
                                                          192.168.2.418.157.68.7349875164582814856 12/05/23-05:29:50.461328TCP2814856ETPRO TROJAN njrat ver 0.7d Malware CnC Callback (inf)4987516458192.168.2.418.157.68.73
                                                          192.168.2.418.192.93.8649738164582814856 12/05/23-05:27:24.526596TCP2814856ETPRO TROJAN njrat ver 0.7d Malware CnC Callback (inf)4973816458192.168.2.418.192.93.86
                                                          192.168.2.418.156.13.20949914164582825564 12/05/23-05:30:36.811958TCP2825564ETPRO TROJAN Generic njRAT/Bladabindi CnC Activity (act)4991416458192.168.2.418.156.13.209
                                                          192.168.2.418.156.13.20949910164582033132 12/05/23-05:30:34.155857TCP2033132ET TROJAN Generic njRAT/Bladabindi CnC Activity (ll)4991016458192.168.2.418.156.13.209
                                                          192.168.2.418.156.13.20949917164582033132 12/05/23-05:30:38.074828TCP2033132ET TROJAN Generic njRAT/Bladabindi CnC Activity (ll)4991716458192.168.2.418.156.13.209
                                                          192.168.2.418.156.13.20949964164582814856 12/05/23-05:30:59.161644TCP2814856ETPRO TROJAN njrat ver 0.7d Malware CnC Callback (inf)4996416458192.168.2.418.156.13.209
                                                          192.168.2.418.156.13.20949968164582814856 12/05/23-05:31:00.783547TCP2814856ETPRO TROJAN njrat ver 0.7d Malware CnC Callback (inf)4996816458192.168.2.418.156.13.209
                                                          192.168.2.418.156.13.20949963164582814856 12/05/23-05:30:58.744491TCP2814856ETPRO TROJAN njrat ver 0.7d Malware CnC Callback (inf)4996316458192.168.2.418.156.13.209
                                                          192.168.2.418.156.13.20949967164582814856 12/05/23-05:31:00.387111TCP2814856ETPRO TROJAN njrat ver 0.7d Malware CnC Callback (inf)4996716458192.168.2.418.156.13.209
                                                          192.168.2.418.157.68.7349874164582814856 12/05/23-05:29:48.052087TCP2814856ETPRO TROJAN njrat ver 0.7d Malware CnC Callback (inf)4987416458192.168.2.418.157.68.73
                                                          192.168.2.43.127.138.5749840164582814856 12/05/23-05:29:05.972883TCP2814856ETPRO TROJAN njrat ver 0.7d Malware CnC Callback (inf)4984016458192.168.2.43.127.138.57
                                                          192.168.2.418.192.93.8649759164582825563 12/05/23-05:28:12.224798TCP2825563ETPRO TROJAN Generic njRAT/Bladabindi CnC Activity (inf)4975916458192.168.2.418.192.93.86
                                                          192.168.2.418.156.13.20949960164582814856 12/05/23-05:30:57.522843TCP2814856ETPRO TROJAN njrat ver 0.7d Malware CnC Callback (inf)4996016458192.168.2.418.156.13.209
                                                          192.168.2.418.156.13.20949970164582814856 12/05/23-05:31:01.598067TCP2814856ETPRO TROJAN njrat ver 0.7d Malware CnC Callback (inf)4997016458192.168.2.418.156.13.209
                                                          192.168.2.418.156.13.20949973164582814856 12/05/23-05:31:02.802170TCP2814856ETPRO TROJAN njrat ver 0.7d Malware CnC Callback (inf)4997316458192.168.2.418.156.13.209
                                                          192.168.2.418.157.68.7349878164582814856 12/05/23-05:29:57.584690TCP2814856ETPRO TROJAN njrat ver 0.7d Malware CnC Callback (inf)4987816458192.168.2.418.157.68.73
                                                          192.168.2.418.157.68.7349868164582814856 12/05/23-05:29:33.652497TCP2814856ETPRO TROJAN njrat ver 0.7d Malware CnC Callback (inf)4986816458192.168.2.418.157.68.73
                                                          192.168.2.418.157.68.7349879164582814856 12/05/23-05:29:59.721935TCP2814856ETPRO TROJAN njrat ver 0.7d Malware CnC Callback (inf)4987916458192.168.2.418.157.68.73
                                                          192.168.2.418.156.13.20949918164582825564 12/05/23-05:30:38.921490TCP2825564ETPRO TROJAN Generic njRAT/Bladabindi CnC Activity (act)4991816458192.168.2.418.156.13.209
                                                          192.168.2.418.157.68.7349869164582814856 12/05/23-05:29:36.076726TCP2814856ETPRO TROJAN njrat ver 0.7d Malware CnC Callback (inf)4986916458192.168.2.418.157.68.73
                                                          192.168.2.418.156.13.20949917164582825564 12/05/23-05:30:38.405876TCP2825564ETPRO TROJAN Generic njRAT/Bladabindi CnC Activity (act)4991716458192.168.2.418.156.13.209
                                                          192.168.2.418.192.93.8649744164582814856 12/05/23-05:27:39.510370TCP2814856ETPRO TROJAN njrat ver 0.7d Malware CnC Callback (inf)4974416458192.168.2.418.192.93.86
                                                          192.168.2.418.157.68.7349860164582814856 12/05/23-05:29:14.230651TCP2814856ETPRO TROJAN njrat ver 0.7d Malware CnC Callback (inf)4986016458192.168.2.418.157.68.73
                                                          192.168.2.418.192.93.8649745164582814856 12/05/23-05:27:41.917485TCP2814856ETPRO TROJAN njrat ver 0.7d Malware CnC Callback (inf)4974516458192.168.2.418.192.93.86
                                                          192.168.2.418.156.13.20949902164582033132 12/05/23-05:30:28.619324TCP2033132ET TROJAN Generic njRAT/Bladabindi CnC Activity (ll)4990216458192.168.2.418.156.13.209
                                                          192.168.2.418.156.13.20949923164582033132 12/05/23-05:30:41.077603TCP2033132ET TROJAN Generic njRAT/Bladabindi CnC Activity (ll)4992316458192.168.2.418.156.13.209
                                                          192.168.2.43.127.138.5749795164582814856 12/05/23-05:28:43.008877TCP2814856ETPRO TROJAN njrat ver 0.7d Malware CnC Callback (inf)4979516458192.168.2.43.127.138.57
                                                          192.168.2.418.157.68.7349882164582814856 12/05/23-05:30:05.492294TCP2814856ETPRO TROJAN njrat ver 0.7d Malware CnC Callback (inf)4988216458192.168.2.418.157.68.73
                                                          192.168.2.418.156.13.20949921164582825564 12/05/23-05:30:40.406126TCP2825564ETPRO TROJAN Generic njRAT/Bladabindi CnC Activity (act)4992116458192.168.2.418.156.13.209
                                                          192.168.2.418.157.68.7349881164582814856 12/05/23-05:30:03.674869TCP2814856ETPRO TROJAN njrat ver 0.7d Malware CnC Callback (inf)4988116458192.168.2.418.157.68.73
                                                          192.168.2.418.192.93.8649740164582814856 12/05/23-05:27:29.334851TCP2814856ETPRO TROJAN njrat ver 0.7d Malware CnC Callback (inf)4974016458192.168.2.418.192.93.86
                                                          192.168.2.418.192.93.8649748164582814856 12/05/23-05:27:50.325082TCP2814856ETPRO TROJAN njrat ver 0.7d Malware CnC Callback (inf)4974816458192.168.2.418.192.93.86
                                                          192.168.2.418.157.68.7349864164582814856 12/05/23-05:29:24.009108TCP2814856ETPRO TROJAN njrat ver 0.7d Malware CnC Callback (inf)4986416458192.168.2.418.157.68.73
                                                          192.168.2.418.192.93.8649741164582814856 12/05/23-05:27:32.319288TCP2814856ETPRO TROJAN njrat ver 0.7d Malware CnC Callback (inf)4974116458192.168.2.418.192.93.86
                                                          192.168.2.418.192.93.8649749164582814856 12/05/23-05:27:52.731544TCP2814856ETPRO TROJAN njrat ver 0.7d Malware CnC Callback (inf)4974916458192.168.2.418.192.93.86
                                                          192.168.2.418.156.13.20949906164582033132 12/05/23-05:30:31.627151TCP2033132ET TROJAN Generic njRAT/Bladabindi CnC Activity (ll)4990616458192.168.2.418.156.13.209
                                                          192.168.2.418.156.13.20949927164582033132 12/05/23-05:30:42.970863TCP2033132ET TROJAN Generic njRAT/Bladabindi CnC Activity (ll)4992716458192.168.2.418.156.13.209
                                                          192.168.2.418.157.68.7349886164582814856 12/05/23-05:30:11.907628TCP2814856ETPRO TROJAN njrat ver 0.7d Malware CnC Callback (inf)4988616458192.168.2.418.157.68.73
                                                          192.168.2.418.156.13.20949925164582825564 12/05/23-05:30:42.312316TCP2825564ETPRO TROJAN Generic njRAT/Bladabindi CnC Activity (act)4992516458192.168.2.418.156.13.209
                                                          192.168.2.418.156.13.20949907164582033132 12/05/23-05:30:32.280121TCP2033132ET TROJAN Generic njRAT/Bladabindi CnC Activity (ll)4990716458192.168.2.418.156.13.209
                                                          192.168.2.418.156.13.20949920164582033132 12/05/23-05:30:39.606448TCP2033132ET TROJAN Generic njRAT/Bladabindi CnC Activity (ll)4992016458192.168.2.418.156.13.209
                                                          192.168.2.418.156.13.20949928164582033132 12/05/23-05:30:43.440981TCP2033132ET TROJAN Generic njRAT/Bladabindi CnC Activity (ll)4992816458192.168.2.418.156.13.209
                                                          192.168.2.418.157.68.7349865164582814856 12/05/23-05:29:26.417983TCP2814856ETPRO TROJAN njrat ver 0.7d Malware CnC Callback (inf)4986516458192.168.2.418.157.68.73
                                                          192.168.2.43.127.138.5749796164582814856 12/05/23-05:28:43.794707TCP2814856ETPRO TROJAN njrat ver 0.7d Malware CnC Callback (inf)4979616458192.168.2.43.127.138.57
                                                          192.168.2.43.127.138.5749762164582033132 12/05/23-05:28:16.371122TCP2033132ET TROJAN Generic njRAT/Bladabindi CnC Activity (ll)4976216458192.168.2.43.127.138.57
                                                          192.168.2.418.156.13.20949956164582814856 12/05/23-05:30:55.878099TCP2814856ETPRO TROJAN njrat ver 0.7d Malware CnC Callback (inf)4995616458192.168.2.418.156.13.209
                                                          192.168.2.43.127.138.5749763164582033132 12/05/23-05:28:17.650304TCP2033132ET TROJAN Generic njRAT/Bladabindi CnC Activity (ll)4976316458192.168.2.43.127.138.57
                                                          192.168.2.418.192.93.8649750164582825563 12/05/23-05:27:55.135430TCP2825563ETPRO TROJAN Generic njRAT/Bladabindi CnC Activity (inf)4975016458192.168.2.418.192.93.86
                                                          192.168.2.418.192.93.8649754164582825563 12/05/23-05:28:01.612208TCP2825563ETPRO TROJAN Generic njRAT/Bladabindi CnC Activity (inf)4975416458192.168.2.418.192.93.86
                                                          192.168.2.43.127.138.5749763164582825563 12/05/23-05:28:17.831563TCP2825563ETPRO TROJAN Generic njRAT/Bladabindi CnC Activity (inf)4976316458192.168.2.43.127.138.57
                                                          192.168.2.418.156.13.20949953164582814856 12/05/23-05:30:54.652576TCP2814856ETPRO TROJAN njrat ver 0.7d Malware CnC Callback (inf)4995316458192.168.2.418.156.13.209
                                                          192.168.2.418.156.13.20949957164582814856 12/05/23-05:30:56.288833TCP2814856ETPRO TROJAN njrat ver 0.7d Malware CnC Callback (inf)4995716458192.168.2.418.156.13.209
                                                          192.168.2.418.192.93.8649755164582825563 12/05/23-05:28:03.525947TCP2825563ETPRO TROJAN Generic njRAT/Bladabindi CnC Activity (inf)4975516458192.168.2.418.192.93.86
                                                          192.168.2.418.157.68.7349885164582814856 12/05/23-05:30:10.413799TCP2814856ETPRO TROJAN njrat ver 0.7d Malware CnC Callback (inf)4988516458192.168.2.418.157.68.73
                                                          192.168.2.418.156.13.20949974164582814856 12/05/23-05:31:03.198944TCP2814856ETPRO TROJAN njrat ver 0.7d Malware CnC Callback (inf)4997416458192.168.2.418.156.13.209
                                                          192.168.2.418.156.13.20949887164582033132 12/05/23-05:30:13.422497TCP2033132ET TROJAN Generic njRAT/Bladabindi CnC Activity (ll)4988716458192.168.2.418.156.13.209
                                                          192.168.2.418.192.93.8649750164582033132 12/05/23-05:27:54.954060TCP2033132ET TROJAN Generic njRAT/Bladabindi CnC Activity (ll)4975016458192.168.2.418.192.93.86
                                                          192.168.2.43.127.138.5749799164582814856 12/05/23-05:28:46.989960TCP2814856ETPRO TROJAN njrat ver 0.7d Malware CnC Callback (inf)4979916458192.168.2.43.127.138.57
                                                          192.168.2.43.127.138.5749850164582814856 12/05/23-05:29:10.036341TCP2814856ETPRO TROJAN njrat ver 0.7d Malware CnC Callback (inf)4985016458192.168.2.43.127.138.57
                                                          192.168.2.418.157.68.7349861164582814856 12/05/23-05:29:16.616752TCP2814856ETPRO TROJAN njrat ver 0.7d Malware CnC Callback (inf)4986116458192.168.2.418.157.68.73
                                                          192.168.2.418.156.13.20949920164582825564 12/05/23-05:30:39.921521TCP2825564ETPRO TROJAN Generic njRAT/Bladabindi CnC Activity (act)4992016458192.168.2.418.156.13.209
                                                          192.168.2.43.127.138.5749833164582814856 12/05/23-05:29:03.125314TCP2814856ETPRO TROJAN njrat ver 0.7d Malware CnC Callback (inf)4983316458192.168.2.43.127.138.57
                                                          192.168.2.418.157.68.7349884164582825563 12/05/23-05:30:08.864321TCP2825563ETPRO TROJAN Generic njRAT/Bladabindi CnC Activity (inf)4988416458192.168.2.418.157.68.73
                                                          192.168.2.43.127.138.5749766164582033132 12/05/23-05:28:21.128905TCP2033132ET TROJAN Generic njRAT/Bladabindi CnC Activity (ll)4976616458192.168.2.43.127.138.57
                                                          192.168.2.43.127.138.5749767164582033132 12/05/23-05:28:22.190600TCP2033132ET TROJAN Generic njRAT/Bladabindi CnC Activity (ll)4976716458192.168.2.43.127.138.57
                                                          192.168.2.43.127.138.5749853164582814856 12/05/23-05:29:11.270246TCP2814856ETPRO TROJAN njrat ver 0.7d Malware CnC Callback (inf)4985316458192.168.2.43.127.138.57
                                                          192.168.2.418.156.13.20949887164582825563 12/05/23-05:30:13.602633TCP2825563ETPRO TROJAN Generic njRAT/Bladabindi CnC Activity (inf)4988716458192.168.2.418.156.13.209
                                                          192.168.2.43.127.138.5749854164582814856 12/05/23-05:29:11.673501TCP2814856ETPRO TROJAN njrat ver 0.7d Malware CnC Callback (inf)4985416458192.168.2.43.127.138.57
                                                          192.168.2.418.157.68.7349885164582825563 12/05/23-05:30:10.413799TCP2825563ETPRO TROJAN Generic njRAT/Bladabindi CnC Activity (inf)4988516458192.168.2.418.157.68.73
                                                          192.168.2.43.127.138.5749832164582814856 12/05/23-05:29:02.733964TCP2814856ETPRO TROJAN njrat ver 0.7d Malware CnC Callback (inf)4983216458192.168.2.43.127.138.57
                                                          192.168.2.418.156.13.20949888164582825563 12/05/23-05:30:14.957727TCP2825563ETPRO TROJAN Generic njRAT/Bladabindi CnC Activity (inf)4988816458192.168.2.418.156.13.209
                                                          192.168.2.418.192.93.8649753164582033132 12/05/23-05:27:59.364102TCP2033132ET TROJAN Generic njRAT/Bladabindi CnC Activity (ll)4975316458192.168.2.418.192.93.86
                                                          192.168.2.418.192.93.8649754164582033132 12/05/23-05:28:01.430068TCP2033132ET TROJAN Generic njRAT/Bladabindi CnC Activity (ll)4975416458192.168.2.418.192.93.86
                                                          192.168.2.418.156.13.20949953164582814860 12/05/23-05:30:54.702443TCP2814860ETPRO TROJAN njRAT/Bladabindi CnC Callback (act)4995316458192.168.2.418.156.13.209
                                                          192.168.2.43.127.138.5749760164582825563 12/05/23-05:28:13.802701TCP2825563ETPRO TROJAN Generic njRAT/Bladabindi CnC Activity (inf)4976016458192.168.2.43.127.138.57
                                                          192.168.2.43.127.138.5749800164582033132 12/05/23-05:28:47.277030TCP2033132ET TROJAN Generic njRAT/Bladabindi CnC Activity (ll)4980016458192.168.2.43.127.138.57
                                                          192.168.2.418.192.93.8649757164582033132 12/05/23-05:28:08.853677TCP2033132ET TROJAN Generic njRAT/Bladabindi CnC Activity (ll)4975716458192.168.2.418.192.93.86
                                                          192.168.2.418.156.13.20949956164582814860 12/05/23-05:30:55.921346TCP2814860ETPRO TROJAN njRAT/Bladabindi CnC Callback (act)4995616458192.168.2.418.156.13.209
                                                          192.168.2.418.192.93.8649758164582033132 12/05/23-05:28:10.487488TCP2033132ET TROJAN Generic njRAT/Bladabindi CnC Activity (ll)4975816458192.168.2.418.192.93.86
                                                          192.168.2.418.156.13.20949957164582814860 12/05/23-05:30:56.327667TCP2814860ETPRO TROJAN njRAT/Bladabindi CnC Callback (act)4995716458192.168.2.418.156.13.209
                                                          192.168.2.43.127.138.5749837164582814856 12/05/23-05:29:04.756571TCP2814856ETPRO TROJAN njrat ver 0.7d Malware CnC Callback (inf)4983716458192.168.2.43.127.138.57
                                                          192.168.2.418.156.13.20949903164582033132 12/05/23-05:30:29.293854TCP2033132ET TROJAN Generic njRAT/Bladabindi CnC Activity (ll)4990316458192.168.2.418.156.13.209
                                                          192.168.2.418.156.13.20949924164582033132 12/05/23-05:30:41.561599TCP2033132ET TROJAN Generic njRAT/Bladabindi CnC Activity (ll)4992416458192.168.2.418.156.13.209
                                                          192.168.2.43.127.138.5749857164582814856 12/05/23-05:29:12.895684TCP2814856ETPRO TROJAN njrat ver 0.7d Malware CnC Callback (inf)4985716458192.168.2.43.127.138.57
                                                          192.168.2.43.127.138.5749858164582814856 12/05/23-05:29:13.301651TCP2814856ETPRO TROJAN njrat ver 0.7d Malware CnC Callback (inf)4985816458192.168.2.43.127.138.57
                                                          192.168.2.43.127.138.5749836164582814856 12/05/23-05:29:04.360431TCP2814856ETPRO TROJAN njrat ver 0.7d Malware CnC Callback (inf)4983616458192.168.2.43.127.138.57
                                                          192.168.2.43.127.138.5749785164582814856 12/05/23-05:28:37.637658TCP2814856ETPRO TROJAN njrat ver 0.7d Malware CnC Callback (inf)4978516458192.168.2.43.127.138.57
                                                          192.168.2.43.127.138.5749808164582825563 12/05/23-05:28:51.078782TCP2825563ETPRO TROJAN Generic njRAT/Bladabindi CnC Activity (inf)4980816458192.168.2.43.127.138.57
                                                          192.168.2.418.192.93.8649755164582814856 12/05/23-05:28:03.525947TCP2814856ETPRO TROJAN njrat ver 0.7d Malware CnC Callback (inf)4975516458192.168.2.418.192.93.86
                                                          192.168.2.418.156.13.20949934164582033132 12/05/23-05:30:46.266394TCP2033132ET TROJAN Generic njRAT/Bladabindi CnC Activity (ll)4993416458192.168.2.418.156.13.209
                                                          192.168.2.418.156.13.20949973164582825563 12/05/23-05:31:02.802170TCP2825563ETPRO TROJAN Generic njRAT/Bladabindi CnC Activity (inf)4997316458192.168.2.418.156.13.209
                                                          192.168.2.418.156.13.20949972164582033132 12/05/23-05:31:02.215267TCP2033132ET TROJAN Generic njRAT/Bladabindi CnC Activity (ll)4997216458192.168.2.418.156.13.209
                                                          192.168.2.43.127.138.5749804164582825563 12/05/23-05:28:49.288914TCP2825563ETPRO TROJAN Generic njRAT/Bladabindi CnC Activity (inf)4980416458192.168.2.43.127.138.57
                                                          192.168.2.418.192.93.8649759164582814856 12/05/23-05:28:12.224798TCP2814856ETPRO TROJAN njrat ver 0.7d Malware CnC Callback (inf)4975916458192.168.2.418.192.93.86
                                                          192.168.2.418.156.13.20949930164582033132 12/05/23-05:30:44.358558TCP2033132ET TROJAN Generic njRAT/Bladabindi CnC Activity (ll)4993016458192.168.2.418.156.13.209
                                                          192.168.2.418.156.13.20949938164582033132 12/05/23-05:30:48.135570TCP2033132ET TROJAN Generic njRAT/Bladabindi CnC Activity (ll)4993816458192.168.2.418.156.13.209
                                                          192.168.2.418.156.13.20949904164582814856 12/05/23-05:30:30.441220TCP2814856ETPRO TROJAN njrat ver 0.7d Malware CnC Callback (inf)4990416458192.168.2.418.156.13.209
                                                          192.168.2.43.127.138.5749845164582033132 12/05/23-05:29:07.823911TCP2033132ET TROJAN Generic njRAT/Bladabindi CnC Activity (ll)4984516458192.168.2.43.127.138.57
                                                          192.168.2.418.156.13.20949935164582825563 12/05/23-05:30:47.061771TCP2825563ETPRO TROJAN Generic njRAT/Bladabindi CnC Activity (inf)4993516458192.168.2.418.156.13.209
                                                          192.168.2.43.127.138.5749773164582033132 12/05/23-05:28:29.139050TCP2033132ET TROJAN Generic njRAT/Bladabindi CnC Activity (ll)4977316458192.168.2.43.127.138.57
                                                          192.168.2.418.157.68.7349880164582033132 12/05/23-05:30:01.575901TCP2033132ET TROJAN Generic njRAT/Bladabindi CnC Activity (ll)4988016458192.168.2.418.157.68.73
                                                          192.168.2.43.127.138.5749803164582033132 12/05/23-05:28:48.657059TCP2033132ET TROJAN Generic njRAT/Bladabindi CnC Activity (ll)4980316458192.168.2.43.127.138.57
                                                          192.168.2.418.192.93.8649744164582825563 12/05/23-05:27:39.510370TCP2825563ETPRO TROJAN Generic njRAT/Bladabindi CnC Activity (inf)4974416458192.168.2.418.192.93.86
                                                          192.168.2.418.156.13.20949942164582814856 12/05/23-05:30:50.011928TCP2814856ETPRO TROJAN njrat ver 0.7d Malware CnC Callback (inf)4994216458192.168.2.418.156.13.209
                                                          192.168.2.418.156.13.20949946164582814856 12/05/23-05:30:51.693923TCP2814856ETPRO TROJAN njrat ver 0.7d Malware CnC Callback (inf)4994616458192.168.2.418.156.13.209
                                                          192.168.2.418.192.93.8649740164582825563 12/05/23-05:27:29.334851TCP2825563ETPRO TROJAN Generic njRAT/Bladabindi CnC Activity (inf)4974016458192.168.2.418.192.93.86
                                                          192.168.2.43.127.138.5749807164582033132 12/05/23-05:28:50.451102TCP2033132ET TROJAN Generic njRAT/Bladabindi CnC Activity (ll)4980716458192.168.2.43.127.138.57
                                                          192.168.2.418.156.13.20949900164582814856 12/05/23-05:30:27.195061TCP2814856ETPRO TROJAN njrat ver 0.7d Malware CnC Callback (inf)4990016458192.168.2.418.156.13.209
                                                          192.168.2.418.157.68.7349881164582825563 12/05/23-05:30:03.674869TCP2825563ETPRO TROJAN Generic njRAT/Bladabindi CnC Activity (inf)4988116458192.168.2.418.157.68.73
                                                          192.168.2.43.127.138.5749789164582814856 12/05/23-05:28:39.901043TCP2814856ETPRO TROJAN njrat ver 0.7d Malware CnC Callback (inf)4978916458192.168.2.43.127.138.57
                                                          192.168.2.43.127.138.5749849164582033132 12/05/23-05:29:09.449021TCP2033132ET TROJAN Generic njRAT/Bladabindi CnC Activity (ll)4984916458192.168.2.43.127.138.57
                                                          192.168.2.418.157.68.7349877164582033132 12/05/23-05:29:55.113455TCP2033132ET TROJAN Generic njRAT/Bladabindi CnC Activity (ll)4987716458192.168.2.418.157.68.73
                                                          192.168.2.418.192.93.8649748164582825563 12/05/23-05:27:50.325082TCP2825563ETPRO TROJAN Generic njRAT/Bladabindi CnC Activity (inf)4974816458192.168.2.418.192.93.86
                                                          192.168.2.418.192.93.8649737164582825563 12/05/23-05:27:22.118276TCP2825563ETPRO TROJAN Generic njRAT/Bladabindi CnC Activity (inf)4973716458192.168.2.418.192.93.86
                                                          192.168.2.418.156.13.20949893164582033132 12/05/23-05:30:20.623304TCP2033132ET TROJAN Generic njRAT/Bladabindi CnC Activity (ll)4989316458192.168.2.418.156.13.209
                                                          192.168.2.418.156.13.20949897164582033132 12/05/23-05:30:24.482674TCP2033132ET TROJAN Generic njRAT/Bladabindi CnC Activity (ll)4989716458192.168.2.418.156.13.209
                                                          192.168.2.43.127.138.5749800164582825563 12/05/23-05:28:47.456811TCP2825563ETPRO TROJAN Generic njRAT/Bladabindi CnC Activity (inf)4980016458192.168.2.43.127.138.57
                                                          192.168.2.43.127.138.5749853164582825563 12/05/23-05:29:11.270246TCP2825563ETPRO TROJAN Generic njRAT/Bladabindi CnC Activity (inf)4985316458192.168.2.43.127.138.57
                                                          192.168.2.43.127.138.5749811164582825563 12/05/23-05:28:52.385463TCP2825563ETPRO TROJAN Generic njRAT/Bladabindi CnC Activity (inf)4981116458192.168.2.43.127.138.57
                                                          192.168.2.43.127.138.5749842164582825563 12/05/23-05:29:06.788955TCP2825563ETPRO TROJAN Generic njRAT/Bladabindi CnC Activity (inf)4984216458192.168.2.43.127.138.57
                                                          192.168.2.43.127.138.5749781164582814856 12/05/23-05:28:35.166212TCP2814856ETPRO TROJAN njrat ver 0.7d Malware CnC Callback (inf)4978116458192.168.2.43.127.138.57
                                                          192.168.2.43.127.138.5749857164582825563 12/05/23-05:29:12.895684TCP2825563ETPRO TROJAN Generic njRAT/Bladabindi CnC Activity (inf)4985716458192.168.2.43.127.138.57
                                                          192.168.2.418.157.68.7349873164582033132 12/05/23-05:29:45.464085TCP2033132ET TROJAN Generic njRAT/Bladabindi CnC Activity (ll)4987316458192.168.2.418.157.68.73
                                                          192.168.2.418.157.68.7349884164582033132 12/05/23-05:30:08.683875TCP2033132ET TROJAN Generic njRAT/Bladabindi CnC Activity (ll)4988416458192.168.2.418.157.68.73
                                                          192.168.2.43.127.138.5749846164582825563 12/05/23-05:29:08.411103TCP2825563ETPRO TROJAN Generic njRAT/Bladabindi CnC Activity (inf)4984616458192.168.2.43.127.138.57
                                                          192.168.2.418.156.13.20949939164582825564 12/05/23-05:30:48.796313TCP2825564ETPRO TROJAN Generic njRAT/Bladabindi CnC Activity (act)4993916458192.168.2.418.156.13.209
                                                          192.168.2.43.127.138.5749792164582814856 12/05/23-05:28:41.495057TCP2814856ETPRO TROJAN njrat ver 0.7d Malware CnC Callback (inf)4979216458192.168.2.43.127.138.57
                                                          192.168.2.418.156.13.20949928164582825564 12/05/23-05:30:43.718067TCP2825564ETPRO TROJAN Generic njRAT/Bladabindi CnC Activity (act)4992816458192.168.2.418.156.13.209
                                                          192.168.2.43.127.138.5749818164582033132 12/05/23-05:28:55.230885TCP2033132ET TROJAN Generic njRAT/Bladabindi CnC Activity (ll)4981816458192.168.2.43.127.138.57
                                                          192.168.2.43.127.138.5749835164582033132 12/05/23-05:29:03.776157TCP2033132ET TROJAN Generic njRAT/Bladabindi CnC Activity (ll)4983516458192.168.2.43.127.138.57
                                                          192.168.2.43.127.138.5749856164582033132 12/05/23-05:29:12.308734TCP2033132ET TROJAN Generic njRAT/Bladabindi CnC Activity (ll)4985616458192.168.2.43.127.138.57
                                                          192.168.2.43.127.138.5749814164582033132 12/05/23-05:28:53.542337TCP2033132ET TROJAN Generic njRAT/Bladabindi CnC Activity (ll)4981416458192.168.2.43.127.138.57
                                                          192.168.2.43.127.138.5749809164582814856 12/05/23-05:28:51.505659TCP2814856ETPRO TROJAN njrat ver 0.7d Malware CnC Callback (inf)4980916458192.168.2.43.127.138.57
                                                          192.168.2.43.127.138.5749839164582033132 12/05/23-05:29:05.389966TCP2033132ET TROJAN Generic njRAT/Bladabindi CnC Activity (ll)4983916458192.168.2.43.127.138.57
                                                          192.168.2.418.157.68.7349870164582825563 12/05/23-05:29:38.440888TCP2825563ETPRO TROJAN Generic njRAT/Bladabindi CnC Activity (inf)4987016458192.168.2.418.157.68.73
                                                          192.168.2.418.156.13.20949929164582814860 12/05/23-05:30:44.171400TCP2814860ETPRO TROJAN njRAT/Bladabindi CnC Callback (act)4992916458192.168.2.418.156.13.209
                                                          192.168.2.43.127.138.5749801164582814856 12/05/23-05:28:47.926701TCP2814856ETPRO TROJAN njrat ver 0.7d Malware CnC Callback (inf)4980116458192.168.2.43.127.138.57
                                                          192.168.2.43.127.138.5749805164582814856 12/05/23-05:28:49.742715TCP2814856ETPRO TROJAN njrat ver 0.7d Malware CnC Callback (inf)4980516458192.168.2.43.127.138.57
                                                          192.168.2.43.127.138.5749785164582814860 12/05/23-05:28:37.843889TCP2814860ETPRO TROJAN njRAT/Bladabindi CnC Callback (act)4978516458192.168.2.43.127.138.57
                                                          192.168.2.43.127.138.5749798164582033132 12/05/23-05:28:46.345198TCP2033132ET TROJAN Generic njRAT/Bladabindi CnC Activity (ll)4979816458192.168.2.43.127.138.57
                                                          192.168.2.43.127.138.5749777164582033132 12/05/23-05:28:32.250015TCP2033132ET TROJAN Generic njRAT/Bladabindi CnC Activity (ll)4977716458192.168.2.43.127.138.57
                                                          192.168.2.43.127.138.5749795164582825563 12/05/23-05:28:43.008877TCP2825563ETPRO TROJAN Generic njRAT/Bladabindi CnC Activity (inf)4979516458192.168.2.43.127.138.57
                                                          192.168.2.418.156.13.20949890164582825563 12/05/23-05:30:17.444365TCP2825563ETPRO TROJAN Generic njRAT/Bladabindi CnC Activity (inf)4989016458192.168.2.418.156.13.209
                                                          192.168.2.43.127.138.5749822164582814856 12/05/23-05:28:57.084253TCP2814856ETPRO TROJAN njrat ver 0.7d Malware CnC Callback (inf)4982216458192.168.2.43.127.138.57
                                                          192.168.2.43.127.138.5749843164582814856 12/05/23-05:29:07.197050TCP2814856ETPRO TROJAN njrat ver 0.7d Malware CnC Callback (inf)4984316458192.168.2.43.127.138.57
                                                          192.168.2.418.157.68.7349874164582825563 12/05/23-05:29:48.052087TCP2825563ETPRO TROJAN Generic njRAT/Bladabindi CnC Activity (inf)4987416458192.168.2.418.157.68.73
                                                          192.168.2.418.156.13.20949921164582814860 12/05/23-05:30:40.406126TCP2814860ETPRO TROJAN njRAT/Bladabindi CnC Callback (act)4992116458192.168.2.418.156.13.209
                                                          192.168.2.418.192.93.8649743164582033132 12/05/23-05:27:36.923709TCP2033132ET TROJAN Generic njRAT/Bladabindi CnC Activity (ll)4974316458192.168.2.418.192.93.86
                                                          192.168.2.43.127.138.5749791164582825563 12/05/23-05:28:40.975474TCP2825563ETPRO TROJAN Generic njRAT/Bladabindi CnC Activity (inf)4979116458192.168.2.43.127.138.57
                                                          192.168.2.43.127.138.5749810164582033132 12/05/23-05:28:51.762284TCP2033132ET TROJAN Generic njRAT/Bladabindi CnC Activity (ll)4981016458192.168.2.43.127.138.57
                                                          192.168.2.418.156.13.20949959164582033132 12/05/23-05:30:56.934539TCP2033132ET TROJAN Generic njRAT/Bladabindi CnC Activity (ll)4995916458192.168.2.418.156.13.209
                                                          192.168.2.418.156.13.20949946164582814860 12/05/23-05:30:51.749888TCP2814860ETPRO TROJAN njRAT/Bladabindi CnC Callback (act)4994616458192.168.2.418.156.13.209
                                                          192.168.2.418.156.13.20949925164582814860 12/05/23-05:30:42.312316TCP2814860ETPRO TROJAN njRAT/Bladabindi CnC Callback (act)4992516458192.168.2.418.156.13.209
                                                          192.168.2.418.192.93.8649747164582033132 12/05/23-05:27:46.553435TCP2033132ET TROJAN Generic njRAT/Bladabindi CnC Activity (ll)4974716458192.168.2.418.192.93.86
                                                          192.168.2.418.156.13.20949929164582814856 12/05/23-05:30:44.086997TCP2814856ETPRO TROJAN njrat ver 0.7d Malware CnC Callback (inf)4992916458192.168.2.418.156.13.209
                                                          192.168.2.43.127.138.5749826164582814856 12/05/23-05:28:58.738962TCP2814856ETPRO TROJAN njrat ver 0.7d Malware CnC Callback (inf)4982616458192.168.2.43.127.138.57
                                                          192.168.2.43.127.138.5749831164582033132 12/05/23-05:29:00.622291TCP2033132ET TROJAN Generic njRAT/Bladabindi CnC Activity (ll)4983116458192.168.2.43.127.138.57
                                                          192.168.2.43.127.138.5749847164582814856 12/05/23-05:29:08.818505TCP2814856ETPRO TROJAN njrat ver 0.7d Malware CnC Callback (inf)4984716458192.168.2.43.127.138.57
                                                          192.168.2.418.156.13.20949908164582814856 12/05/23-05:30:33.106811TCP2814856ETPRO TROJAN njrat ver 0.7d Malware CnC Callback (inf)4990816458192.168.2.418.156.13.209
                                                          192.168.2.418.156.13.20949913164582033132 12/05/23-05:30:35.889028TCP2033132ET TROJAN Generic njRAT/Bladabindi CnC Activity (ll)4991316458192.168.2.418.156.13.209
                                                          192.168.2.418.157.68.7349878164582825563 12/05/23-05:29:57.584690TCP2825563ETPRO TROJAN Generic njRAT/Bladabindi CnC Activity (inf)4987816458192.168.2.418.157.68.73
                                                          192.168.2.43.127.138.5749852164582033132 12/05/23-05:29:10.682965TCP2033132ET TROJAN Generic njRAT/Bladabindi CnC Activity (ll)4985216458192.168.2.43.127.138.57
                                                          192.168.2.43.127.138.5749829164582825563 12/05/23-05:28:59.989623TCP2825563ETPRO TROJAN Generic njRAT/Bladabindi CnC Activity (inf)4982916458192.168.2.43.127.138.57
                                                          192.168.2.43.127.138.5749828164582825563 12/05/23-05:28:59.573407TCP2825563ETPRO TROJAN Generic njRAT/Bladabindi CnC Activity (inf)4982816458192.168.2.43.127.138.57
                                                          192.168.2.43.127.138.5749829164582033132 12/05/23-05:28:59.808064TCP2033132ET TROJAN Generic njRAT/Bladabindi CnC Activity (ll)4982916458192.168.2.43.127.138.57
                                                          192.168.2.418.156.13.20949891164582814856 12/05/23-05:30:18.619994TCP2814856ETPRO TROJAN njrat ver 0.7d Malware CnC Callback (inf)4989116458192.168.2.418.156.13.209
                                                          192.168.2.43.127.138.5749826164582825563 12/05/23-05:28:58.738962TCP2825563ETPRO TROJAN Generic njRAT/Bladabindi CnC Activity (inf)4982616458192.168.2.43.127.138.57
                                                          192.168.2.418.156.13.20949892164582814856 12/05/23-05:30:19.723319TCP2814856ETPRO TROJAN njrat ver 0.7d Malware CnC Callback (inf)4989216458192.168.2.418.156.13.209
                                                          192.168.2.43.127.138.5749827164582825563 12/05/23-05:28:59.158313TCP2825563ETPRO TROJAN Generic njRAT/Bladabindi CnC Activity (inf)4982716458192.168.2.43.127.138.57
                                                          192.168.2.418.156.13.20949893164582814856 12/05/23-05:30:20.805581TCP2814856ETPRO TROJAN njrat ver 0.7d Malware CnC Callback (inf)4989316458192.168.2.418.156.13.209
                                                          192.168.2.43.127.138.5749824164582033132 12/05/23-05:28:57.730393TCP2033132ET TROJAN Generic njRAT/Bladabindi CnC Activity (ll)4982416458192.168.2.43.127.138.57
                                                          192.168.2.43.127.138.5749825164582033132 12/05/23-05:28:58.152157TCP2033132ET TROJAN Generic njRAT/Bladabindi CnC Activity (ll)4982516458192.168.2.43.127.138.57
                                                          192.168.2.43.127.138.5749826164582033132 12/05/23-05:28:58.558789TCP2033132ET TROJAN Generic njRAT/Bladabindi CnC Activity (ll)4982616458192.168.2.43.127.138.57
                                                          192.168.2.43.127.138.5749827164582033132 12/05/23-05:28:58.978981TCP2033132ET TROJAN Generic njRAT/Bladabindi CnC Activity (ll)4982716458192.168.2.43.127.138.57
                                                          192.168.2.418.157.68.7349860164582825563 12/05/23-05:29:14.230651TCP2825563ETPRO TROJAN Generic njRAT/Bladabindi CnC Activity (inf)4986016458192.168.2.418.157.68.73
                                                          192.168.2.418.157.68.7349861164582825563 12/05/23-05:29:16.616752TCP2825563ETPRO TROJAN Generic njRAT/Bladabindi CnC Activity (inf)4986116458192.168.2.418.157.68.73
                                                          192.168.2.418.156.13.20949890164582814856 12/05/23-05:30:17.444365TCP2814856ETPRO TROJAN njrat ver 0.7d Malware CnC Callback (inf)4989016458192.168.2.418.156.13.209
                                                          192.168.2.43.127.138.5749828164582033132 12/05/23-05:28:59.391597TCP2033132ET TROJAN Generic njRAT/Bladabindi CnC Activity (ll)4982816458192.168.2.43.127.138.57
                                                          192.168.2.418.157.68.7349866164582033132 12/05/23-05:29:28.636957TCP2033132ET TROJAN Generic njRAT/Bladabindi CnC Activity (ll)4986616458192.168.2.418.157.68.73
                                                          192.168.2.418.157.68.7349865164582033132 12/05/23-05:29:26.237214TCP2033132ET TROJAN Generic njRAT/Bladabindi CnC Activity (ll)4986516458192.168.2.418.157.68.73
                                                          192.168.2.418.157.68.7349867164582033132 12/05/23-05:29:31.048279TCP2033132ET TROJAN Generic njRAT/Bladabindi CnC Activity (ll)4986716458192.168.2.418.157.68.73
                                                          192.168.2.418.157.68.7349859164582033132 12/05/23-05:29:13.621777TCP2033132ET TROJAN Generic njRAT/Bladabindi CnC Activity (ll)4985916458192.168.2.418.157.68.73
                                                          192.168.2.418.156.13.20949899164582814856 12/05/23-05:30:26.378798TCP2814856ETPRO TROJAN njrat ver 0.7d Malware CnC Callback (inf)4989916458192.168.2.418.156.13.209
                                                          192.168.2.418.157.68.7349861164582033132 12/05/23-05:29:16.435009TCP2033132ET TROJAN Generic njRAT/Bladabindi CnC Activity (ll)4986116458192.168.2.418.157.68.73
                                                          192.168.2.418.157.68.7349869164582033132 12/05/23-05:29:35.897457TCP2033132ET TROJAN Generic njRAT/Bladabindi CnC Activity (ll)4986916458192.168.2.418.157.68.73
                                                          192.168.2.418.156.13.20949889164582814856 12/05/23-05:30:16.228002TCP2814856ETPRO TROJAN njrat ver 0.7d Malware CnC Callback (inf)4988916458192.168.2.418.156.13.209
                                                          192.168.2.43.127.138.5749830164582825563 12/05/23-05:29:00.397921TCP2825563ETPRO TROJAN Generic njRAT/Bladabindi CnC Activity (inf)4983016458192.168.2.43.127.138.57
                                                          192.168.2.418.157.68.7349860164582033132 12/05/23-05:29:14.048225TCP2033132ET TROJAN Generic njRAT/Bladabindi CnC Activity (ll)4986016458192.168.2.418.157.68.73
                                                          192.168.2.418.157.68.7349868164582033132 12/05/23-05:29:33.471781TCP2033132ET TROJAN Generic njRAT/Bladabindi CnC Activity (ll)4986816458192.168.2.418.157.68.73
                                                          192.168.2.43.127.138.5749820164582825563 12/05/23-05:28:56.240385TCP2825563ETPRO TROJAN Generic njRAT/Bladabindi CnC Activity (inf)4982016458192.168.2.43.127.138.57
                                                          192.168.2.43.127.138.5749832164582825563 12/05/23-05:29:02.733964TCP2825563ETPRO TROJAN Generic njRAT/Bladabindi CnC Activity (inf)4983216458192.168.2.43.127.138.57
                                                          192.168.2.418.156.13.20949895164582814856 12/05/23-05:30:22.820058TCP2814856ETPRO TROJAN njrat ver 0.7d Malware CnC Callback (inf)4989516458192.168.2.418.156.13.209
                                                          192.168.2.43.127.138.5749821164582825563 12/05/23-05:28:56.664048TCP2825563ETPRO TROJAN Generic njRAT/Bladabindi CnC Activity (inf)4982116458192.168.2.43.127.138.57
                                                          192.168.2.43.127.138.5749822164582825563 12/05/23-05:28:57.084253TCP2825563ETPRO TROJAN Generic njRAT/Bladabindi CnC Activity (inf)4982216458192.168.2.43.127.138.57
                                                          192.168.2.43.127.138.5749831164582825563 12/05/23-05:29:00.804324TCP2825563ETPRO TROJAN Generic njRAT/Bladabindi CnC Activity (inf)4983116458192.168.2.43.127.138.57
                                                          192.168.2.43.127.138.5749833164582825563 12/05/23-05:29:03.125314TCP2825563ETPRO TROJAN Generic njRAT/Bladabindi CnC Activity (inf)4983316458192.168.2.43.127.138.57
                                                          192.168.2.418.156.13.20949894164582814856 12/05/23-05:30:21.833130TCP2814856ETPRO TROJAN njrat ver 0.7d Malware CnC Callback (inf)4989416458192.168.2.418.156.13.209
                                                          192.168.2.418.156.13.20949896164582814856 12/05/23-05:30:23.755760TCP2814856ETPRO TROJAN njrat ver 0.7d Malware CnC Callback (inf)4989616458192.168.2.418.156.13.209
                                                          192.168.2.418.156.13.20949888164582814856 12/05/23-05:30:14.957727TCP2814856ETPRO TROJAN njrat ver 0.7d Malware CnC Callback (inf)4988816458192.168.2.418.156.13.209
                                                          192.168.2.43.127.138.5749825164582825563 12/05/23-05:28:58.332620TCP2825563ETPRO TROJAN Generic njRAT/Bladabindi CnC Activity (inf)4982516458192.168.2.43.127.138.57
                                                          192.168.2.43.127.138.5749836164582825563 12/05/23-05:29:04.360431TCP2825563ETPRO TROJAN Generic njRAT/Bladabindi CnC Activity (inf)4983616458192.168.2.43.127.138.57
                                                          192.168.2.418.157.68.7349862164582033132 12/05/23-05:29:19.027010TCP2033132ET TROJAN Generic njRAT/Bladabindi CnC Activity (ll)4986216458192.168.2.418.157.68.73
                                                          192.168.2.43.127.138.5749824164582825563 12/05/23-05:28:57.913904TCP2825563ETPRO TROJAN Generic njRAT/Bladabindi CnC Activity (inf)4982416458192.168.2.43.127.138.57
                                                          192.168.2.418.157.68.7349863164582033132 12/05/23-05:29:21.432690TCP2033132ET TROJAN Generic njRAT/Bladabindi CnC Activity (ll)4986316458192.168.2.418.157.68.73
                                                          192.168.2.418.156.13.20949898164582814856 12/05/23-05:30:25.539553TCP2814856ETPRO TROJAN njrat ver 0.7d Malware CnC Callback (inf)4989816458192.168.2.418.156.13.209
                                                          192.168.2.418.156.13.20949887164582814856 12/05/23-05:30:13.602633TCP2814856ETPRO TROJAN njrat ver 0.7d Malware CnC Callback (inf)4988716458192.168.2.418.156.13.209
                                                          192.168.2.43.127.138.5749823164582825563 12/05/23-05:28:57.503766TCP2825563ETPRO TROJAN Generic njRAT/Bladabindi CnC Activity (inf)4982316458192.168.2.43.127.138.57
                                                          192.168.2.43.127.138.5749834164582825563 12/05/23-05:29:03.520411TCP2825563ETPRO TROJAN Generic njRAT/Bladabindi CnC Activity (inf)4983416458192.168.2.43.127.138.57
                                                          192.168.2.418.157.68.7349864164582033132 12/05/23-05:29:23.827162TCP2033132ET TROJAN Generic njRAT/Bladabindi CnC Activity (ll)4986416458192.168.2.418.157.68.73
                                                          192.168.2.418.156.13.20949897164582814856 12/05/23-05:30:24.663749TCP2814856ETPRO TROJAN njrat ver 0.7d Malware CnC Callback (inf)4989716458192.168.2.418.156.13.209
                                                          192.168.2.43.127.138.5749818164582825563 12/05/23-05:28:55.412198TCP2825563ETPRO TROJAN Generic njRAT/Bladabindi CnC Activity (inf)4981816458192.168.2.43.127.138.57
                                                          192.168.2.43.127.138.5749819164582825563 12/05/23-05:28:55.831748TCP2825563ETPRO TROJAN Generic njRAT/Bladabindi CnC Activity (inf)4981916458192.168.2.43.127.138.57
                                                          192.168.2.43.127.138.5749839164582825563 12/05/23-05:29:05.570625TCP2825563ETPRO TROJAN Generic njRAT/Bladabindi CnC Activity (inf)4983916458192.168.2.43.127.138.57
                                                          192.168.2.43.127.138.5749815164582825563 12/05/23-05:28:54.144279TCP2825563ETPRO TROJAN Generic njRAT/Bladabindi CnC Activity (inf)4981516458192.168.2.43.127.138.57
                                                          192.168.2.43.127.138.5749837164582825563 12/05/23-05:29:04.756571TCP2825563ETPRO TROJAN Generic njRAT/Bladabindi CnC Activity (inf)4983716458192.168.2.43.127.138.57
                                                          192.168.2.43.127.138.5749838164582825563 12/05/23-05:29:05.159344TCP2825563ETPRO TROJAN Generic njRAT/Bladabindi CnC Activity (inf)4983816458192.168.2.43.127.138.57
                                                          192.168.2.43.127.138.5749816164582825563 12/05/23-05:28:54.566548TCP2825563ETPRO TROJAN Generic njRAT/Bladabindi CnC Activity (inf)4981616458192.168.2.43.127.138.57
                                                          192.168.2.43.127.138.5749813164582814856 12/05/23-05:28:53.296410TCP2814856ETPRO TROJAN njrat ver 0.7d Malware CnC Callback (inf)4981316458192.168.2.43.127.138.57
                                                          192.168.2.43.127.138.5749814164582814856 12/05/23-05:28:53.722786TCP2814856ETPRO TROJAN njrat ver 0.7d Malware CnC Callback (inf)4981416458192.168.2.43.127.138.57
                                                          192.168.2.418.157.68.7349864164582825563 12/05/23-05:29:24.009108TCP2825563ETPRO TROJAN Generic njRAT/Bladabindi CnC Activity (inf)4986416458192.168.2.418.157.68.73
                                                          192.168.2.418.157.68.7349865164582825563 12/05/23-05:29:26.417983TCP2825563ETPRO TROJAN Generic njRAT/Bladabindi CnC Activity (inf)4986516458192.168.2.418.157.68.73
                                                          192.168.2.43.127.138.5749812164582814856 12/05/23-05:28:52.818361TCP2814856ETPRO TROJAN njrat ver 0.7d Malware CnC Callback (inf)4981216458192.168.2.43.127.138.57
                                                          192.168.2.43.127.138.5749816164582814856 12/05/23-05:28:54.566548TCP2814856ETPRO TROJAN njrat ver 0.7d Malware CnC Callback (inf)4981616458192.168.2.43.127.138.57
                                                          192.168.2.418.157.68.7349866164582825563 12/05/23-05:29:28.817890TCP2825563ETPRO TROJAN Generic njRAT/Bladabindi CnC Activity (inf)4986616458192.168.2.418.157.68.73
                                                          192.168.2.43.127.138.5749810164582814856 12/05/23-05:28:51.943839TCP2814856ETPRO TROJAN njrat ver 0.7d Malware CnC Callback (inf)4981016458192.168.2.43.127.138.57
                                                          192.168.2.43.127.138.5749817164582814856 12/05/23-05:28:54.987501TCP2814856ETPRO TROJAN njrat ver 0.7d Malware CnC Callback (inf)4981716458192.168.2.43.127.138.57
                                                          192.168.2.43.127.138.5749818164582814856 12/05/23-05:28:55.412198TCP2814856ETPRO TROJAN njrat ver 0.7d Malware CnC Callback (inf)4981816458192.168.2.43.127.138.57
                                                          192.168.2.43.127.138.5749811164582814856 12/05/23-05:28:52.385463TCP2814856ETPRO TROJAN njrat ver 0.7d Malware CnC Callback (inf)4981116458192.168.2.43.127.138.57
                                                          192.168.2.43.127.138.5749819164582814856 12/05/23-05:28:55.831748TCP2814856ETPRO TROJAN njrat ver 0.7d Malware CnC Callback (inf)4981916458192.168.2.43.127.138.57
                                                          192.168.2.418.157.68.7349863164582825563 12/05/23-05:29:21.612391TCP2825563ETPRO TROJAN Generic njRAT/Bladabindi CnC Activity (inf)4986316458192.168.2.418.157.68.73
                                                          192.168.2.43.127.138.5749844164582033132 12/05/23-05:29:07.416317TCP2033132ET TROJAN Generic njRAT/Bladabindi CnC Activity (ll)4984416458192.168.2.43.127.138.57
                                                          192.168.2.43.127.138.5749822164582033132 12/05/23-05:28:56.903127TCP2033132ET TROJAN Generic njRAT/Bladabindi CnC Activity (ll)4982216458192.168.2.43.127.138.57
                                                          192.168.2.43.127.138.5749823164582033132 12/05/23-05:28:57.324327TCP2033132ET TROJAN Generic njRAT/Bladabindi CnC Activity (ll)4982316458192.168.2.43.127.138.57
                                                          192.168.2.43.127.138.5749821164582033132 12/05/23-05:28:56.483117TCP2033132ET TROJAN Generic njRAT/Bladabindi CnC Activity (ll)4982116458192.168.2.43.127.138.57
                                                          192.168.2.43.127.138.5749843164582033132 12/05/23-05:29:07.015804TCP2033132ET TROJAN Generic njRAT/Bladabindi CnC Activity (ll)4984316458192.168.2.43.127.138.57
                                                          192.168.2.43.127.138.5749840164582033132 12/05/23-05:29:05.792518TCP2033132ET TROJAN Generic njRAT/Bladabindi CnC Activity (ll)4984016458192.168.2.43.127.138.57
                                                          192.168.2.418.157.68.7349868164582825563 12/05/23-05:29:33.652497TCP2825563ETPRO TROJAN Generic njRAT/Bladabindi CnC Activity (inf)4986816458192.168.2.418.157.68.73
                                                          192.168.2.418.157.68.7349869164582825563 12/05/23-05:29:36.076726TCP2825563ETPRO TROJAN Generic njRAT/Bladabindi CnC Activity (inf)4986916458192.168.2.418.157.68.73
                                                          192.168.2.43.127.138.5749842164582033132 12/05/23-05:29:06.608820TCP2033132ET TROJAN Generic njRAT/Bladabindi CnC Activity (ll)4984216458192.168.2.43.127.138.57
                                                          192.168.2.43.127.138.5749815164582814856 12/05/23-05:28:54.144279TCP2814856ETPRO TROJAN njrat ver 0.7d Malware CnC Callback (inf)4981516458192.168.2.43.127.138.57
                                                          192.168.2.43.127.138.5749820164582033132 12/05/23-05:28:56.060305TCP2033132ET TROJAN Generic njRAT/Bladabindi CnC Activity (ll)4982016458192.168.2.43.127.138.57
                                                          192.168.2.418.157.68.7349867164582825563 12/05/23-05:29:31.229375TCP2825563ETPRO TROJAN Generic njRAT/Bladabindi CnC Activity (inf)4986716458192.168.2.418.157.68.73
                                                          192.168.2.43.127.138.5749841164582033132 12/05/23-05:29:06.198722TCP2033132ET TROJAN Generic njRAT/Bladabindi CnC Activity (ll)4984116458192.168.2.43.127.138.57
                                                          192.168.2.418.192.93.8649754164582814856 12/05/23-05:28:01.612208TCP2814856ETPRO TROJAN njrat ver 0.7d Malware CnC Callback (inf)4975416458192.168.2.418.192.93.86
                                                          192.168.2.43.127.138.5749807164582825563 12/05/23-05:28:50.631981TCP2825563ETPRO TROJAN Generic njRAT/Bladabindi CnC Activity (inf)4980716458192.168.2.43.127.138.57
                                                          192.168.2.43.127.138.5749809164582825563 12/05/23-05:28:51.505659TCP2825563ETPRO TROJAN Generic njRAT/Bladabindi CnC Activity (inf)4980916458192.168.2.43.127.138.57
                                                          192.168.2.418.192.93.8649752164582814856 12/05/23-05:27:57.404139TCP2814856ETPRO TROJAN njrat ver 0.7d Malware CnC Callback (inf)4975216458192.168.2.418.192.93.86
                                                          192.168.2.418.192.93.8649756164582814856 12/05/23-05:28:05.373115TCP2814856ETPRO TROJAN njrat ver 0.7d Malware CnC Callback (inf)4975616458192.168.2.418.192.93.86
                                                          192.168.2.43.127.138.5749808164582033132 12/05/23-05:28:50.895520TCP2033132ET TROJAN Generic njRAT/Bladabindi CnC Activity (ll)4980816458192.168.2.43.127.138.57
                                                          192.168.2.43.127.138.5749847164582825563 12/05/23-05:29:08.818505TCP2825563ETPRO TROJAN Generic njRAT/Bladabindi CnC Activity (inf)4984716458192.168.2.43.127.138.57
                                                          192.168.2.418.192.93.8649750164582814856 12/05/23-05:27:55.135430TCP2814856ETPRO TROJAN njrat ver 0.7d Malware CnC Callback (inf)4975016458192.168.2.418.192.93.86
                                                          192.168.2.418.192.93.8649758164582814856 12/05/23-05:28:10.668371TCP2814856ETPRO TROJAN njrat ver 0.7d Malware CnC Callback (inf)4975816458192.168.2.418.192.93.86
                                                          192.168.2.43.127.138.5749805164582825563 12/05/23-05:28:49.742715TCP2825563ETPRO TROJAN Generic njRAT/Bladabindi CnC Activity (inf)4980516458192.168.2.43.127.138.57
                                                          192.168.2.43.127.138.5749846164582033132 12/05/23-05:29:08.230515TCP2033132ET TROJAN Generic njRAT/Bladabindi CnC Activity (ll)4984616458192.168.2.43.127.138.57
                                                          192.168.2.43.127.138.5749802164582033132 12/05/23-05:28:48.199323TCP2033132ET TROJAN Generic njRAT/Bladabindi CnC Activity (ll)4980216458192.168.2.43.127.138.57
                                                          192.168.2.43.127.138.5749849164582825563 12/05/23-05:29:09.629833TCP2825563ETPRO TROJAN Generic njRAT/Bladabindi CnC Activity (inf)4984916458192.168.2.43.127.138.57
                                                          192.168.2.418.157.68.7349880164582825563 12/05/23-05:30:01.757295TCP2825563ETPRO TROJAN Generic njRAT/Bladabindi CnC Activity (inf)4988016458192.168.2.418.157.68.73
                                                          192.168.2.43.127.138.5749804164582033132 12/05/23-05:28:49.106770TCP2033132ET TROJAN Generic njRAT/Bladabindi CnC Activity (ll)4980416458192.168.2.43.127.138.57
                                                          192.168.2.418.157.68.7349882164582825563 12/05/23-05:30:05.492294TCP2825563ETPRO TROJAN Generic njRAT/Bladabindi CnC Activity (inf)4988216458192.168.2.418.157.68.73
                                                          192.168.2.43.127.138.5749848164582033132 12/05/23-05:29:09.042695TCP2033132ET TROJAN Generic njRAT/Bladabindi CnC Activity (ll)4984816458192.168.2.43.127.138.57
                                                          192.168.2.418.156.13.20949898164582033132 12/05/23-05:30:25.358299TCP2033132ET TROJAN Generic njRAT/Bladabindi CnC Activity (ll)4989816458192.168.2.418.156.13.209
                                                          192.168.2.43.127.138.5749806164582033132 12/05/23-05:28:49.997628TCP2033132ET TROJAN Generic njRAT/Bladabindi CnC Activity (ll)4980616458192.168.2.43.127.138.57
                                                          192.168.2.418.157.68.7349876164582033132 12/05/23-05:29:52.688609TCP2033132ET TROJAN Generic njRAT/Bladabindi CnC Activity (ll)4987616458192.168.2.418.157.68.73
                                                          192.168.2.418.156.13.20949892164582033132 12/05/23-05:30:19.543186TCP2033132ET TROJAN Generic njRAT/Bladabindi CnC Activity (ll)4989216458192.168.2.418.156.13.209
                                                          192.168.2.418.156.13.20949894164582033132 12/05/23-05:30:21.652534TCP2033132ET TROJAN Generic njRAT/Bladabindi CnC Activity (ll)4989416458192.168.2.418.156.13.209
                                                          192.168.2.418.157.68.7349883164582033132 12/05/23-05:30:07.044152TCP2033132ET TROJAN Generic njRAT/Bladabindi CnC Activity (ll)4988316458192.168.2.418.157.68.73
                                                          192.168.2.418.157.68.7349872164582033132 12/05/23-05:29:43.064039TCP2033132ET TROJAN Generic njRAT/Bladabindi CnC Activity (ll)4987216458192.168.2.418.157.68.73
                                                          192.168.2.418.156.13.20949896164582033132 12/05/23-05:30:23.575816TCP2033132ET TROJAN Generic njRAT/Bladabindi CnC Activity (ll)4989616458192.168.2.418.156.13.209
                                                          192.168.2.418.157.68.7349881164582033132 12/05/23-05:30:03.495299TCP2033132ET TROJAN Generic njRAT/Bladabindi CnC Activity (ll)4988116458192.168.2.418.157.68.73
                                                          192.168.2.418.157.68.7349870164582033132 12/05/23-05:29:38.261259TCP2033132ET TROJAN Generic njRAT/Bladabindi CnC Activity (ll)4987016458192.168.2.418.157.68.73
                                                          192.168.2.418.157.68.7349878164582033132 12/05/23-05:29:57.403315TCP2033132ET TROJAN Generic njRAT/Bladabindi CnC Activity (ll)4987816458192.168.2.418.157.68.73
                                                          192.168.2.43.127.138.5749852164582825563 12/05/23-05:29:10.865065TCP2825563ETPRO TROJAN Generic njRAT/Bladabindi CnC Activity (inf)4985216458192.168.2.43.127.138.57
                                                          192.168.2.43.127.138.5749841164582825563 12/05/23-05:29:06.378763TCP2825563ETPRO TROJAN Generic njRAT/Bladabindi CnC Activity (inf)4984116458192.168.2.43.127.138.57
                                                          192.168.2.43.127.138.5749810164582825563 12/05/23-05:28:51.943839TCP2825563ETPRO TROJAN Generic njRAT/Bladabindi CnC Activity (inf)4981016458192.168.2.43.127.138.57
                                                          192.168.2.43.127.138.5749801164582825563 12/05/23-05:28:47.926701TCP2825563ETPRO TROJAN Generic njRAT/Bladabindi CnC Activity (inf)4980116458192.168.2.43.127.138.57
                                                          192.168.2.43.127.138.5749854164582825563 12/05/23-05:29:11.673501TCP2825563ETPRO TROJAN Generic njRAT/Bladabindi CnC Activity (inf)4985416458192.168.2.43.127.138.57
                                                          192.168.2.43.127.138.5749843164582825563 12/05/23-05:29:07.197050TCP2825563ETPRO TROJAN Generic njRAT/Bladabindi CnC Activity (inf)4984316458192.168.2.43.127.138.57
                                                          192.168.2.43.127.138.5749814164582825563 12/05/23-05:28:53.722786TCP2825563ETPRO TROJAN Generic njRAT/Bladabindi CnC Activity (inf)4981416458192.168.2.43.127.138.57
                                                          192.168.2.43.127.138.5749803164582825563 12/05/23-05:28:48.837764TCP2825563ETPRO TROJAN Generic njRAT/Bladabindi CnC Activity (inf)4980316458192.168.2.43.127.138.57
                                                          192.168.2.418.156.13.20949890164582033132 12/05/23-05:30:17.263123TCP2033132ET TROJAN Generic njRAT/Bladabindi CnC Activity (ll)4989016458192.168.2.418.156.13.209
                                                          192.168.2.418.157.68.7349885164582033132 12/05/23-05:30:10.234341TCP2033132ET TROJAN Generic njRAT/Bladabindi CnC Activity (ll)4988516458192.168.2.418.157.68.73
                                                          192.168.2.43.127.138.5749812164582825563 12/05/23-05:28:52.818361TCP2825563ETPRO TROJAN Generic njRAT/Bladabindi CnC Activity (inf)4981216458192.168.2.43.127.138.57
                                                          192.168.2.418.157.68.7349859164582814856 12/05/23-05:29:13.802515TCP2814856ETPRO TROJAN njrat ver 0.7d Malware CnC Callback (inf)4985916458192.168.2.418.157.68.73
                                                          192.168.2.418.157.68.7349874164582033132 12/05/23-05:29:47.871256TCP2033132ET TROJAN Generic njRAT/Bladabindi CnC Activity (ll)4987416458192.168.2.418.157.68.73
                                                          192.168.2.43.127.138.5749856164582825563 12/05/23-05:29:12.490359TCP2825563ETPRO TROJAN Generic njRAT/Bladabindi CnC Activity (inf)4985616458192.168.2.43.127.138.57
                                                          192.168.2.43.127.138.5749845164582825563 12/05/23-05:29:08.004585TCP2825563ETPRO TROJAN Generic njRAT/Bladabindi CnC Activity (inf)4984516458192.168.2.43.127.138.57
                                                          192.168.2.43.127.138.5749819164582033132 12/05/23-05:28:55.651700TCP2033132ET TROJAN Generic njRAT/Bladabindi CnC Activity (ll)4981916458192.168.2.43.127.138.57
                                                          192.168.2.43.127.138.5749857164582033132 12/05/23-05:29:12.714597TCP2033132ET TROJAN Generic njRAT/Bladabindi CnC Activity (ll)4985716458192.168.2.43.127.138.57
                                                          192.168.2.43.127.138.5749813164582033132 12/05/23-05:28:53.114093TCP2033132ET TROJAN Generic njRAT/Bladabindi CnC Activity (ll)4981316458192.168.2.43.127.138.57
                                                          192.168.2.43.127.138.5749834164582033132 12/05/23-05:29:03.339551TCP2033132ET TROJAN Generic njRAT/Bladabindi CnC Activity (ll)4983416458192.168.2.43.127.138.57
                                                          192.168.2.43.127.138.5749815164582033132 12/05/23-05:28:53.964635TCP2033132ET TROJAN Generic njRAT/Bladabindi CnC Activity (ll)4981516458192.168.2.43.127.138.57
                                                          192.168.2.43.127.138.5749836164582033132 12/05/23-05:29:04.178160TCP2033132ET TROJAN Generic njRAT/Bladabindi CnC Activity (ll)4983616458192.168.2.43.127.138.57
                                                          192.168.2.43.127.138.5749850164582825563 12/05/23-05:29:10.036341TCP2825563ETPRO TROJAN Generic njRAT/Bladabindi CnC Activity (inf)4985016458192.168.2.43.127.138.57
                                                          192.168.2.418.157.68.7349871164582825563 12/05/23-05:29:40.850092TCP2825563ETPRO TROJAN Generic njRAT/Bladabindi CnC Activity (inf)4987116458192.168.2.418.157.68.73
                                                          192.168.2.43.127.138.5749817164582033132 12/05/23-05:28:54.807517TCP2033132ET TROJAN Generic njRAT/Bladabindi CnC Activity (ll)4981716458192.168.2.43.127.138.57
                                                          192.168.2.43.127.138.5749838164582033132 12/05/23-05:29:04.979284TCP2033132ET TROJAN Generic njRAT/Bladabindi CnC Activity (ll)4983816458192.168.2.43.127.138.57
                                                          192.168.2.418.157.68.7349875164582825563 12/05/23-05:29:50.461328TCP2825563ETPRO TROJAN Generic njRAT/Bladabindi CnC Activity (inf)4987516458192.168.2.418.157.68.73
                                                          192.168.2.418.157.68.7349873164582825563 12/05/23-05:29:45.643969TCP2825563ETPRO TROJAN Generic njRAT/Bladabindi CnC Activity (inf)4987316458192.168.2.418.157.68.73
                                                          192.168.2.418.157.68.7349877164582825563 12/05/23-05:29:55.294408TCP2825563ETPRO TROJAN Generic njRAT/Bladabindi CnC Activity (inf)4987716458192.168.2.418.157.68.73
                                                          192.168.2.43.127.138.5749802164582814856 12/05/23-05:28:48.380094TCP2814856ETPRO TROJAN njrat ver 0.7d Malware CnC Callback (inf)4980216458192.168.2.43.127.138.57
                                                          192.168.2.43.127.138.5749823164582814856 12/05/23-05:28:57.503766TCP2814856ETPRO TROJAN njrat ver 0.7d Malware CnC Callback (inf)4982316458192.168.2.43.127.138.57
                                                          192.168.2.43.127.138.5749827164582814856 12/05/23-05:28:59.158313TCP2814856ETPRO TROJAN njrat ver 0.7d Malware CnC Callback (inf)4982716458192.168.2.43.127.138.57
                                                          192.168.2.43.127.138.5749806164582814856 12/05/23-05:28:50.179249TCP2814856ETPRO TROJAN njrat ver 0.7d Malware CnC Callback (inf)4980616458192.168.2.43.127.138.57
                                                          192.168.2.43.127.138.5749808164582814856 12/05/23-05:28:51.078782TCP2814856ETPRO TROJAN njrat ver 0.7d Malware CnC Callback (inf)4980816458192.168.2.43.127.138.57
                                                          192.168.2.43.127.138.5749800164582814856 12/05/23-05:28:47.456811TCP2814856ETPRO TROJAN njrat ver 0.7d Malware CnC Callback (inf)4980016458192.168.2.43.127.138.57
                                                          192.168.2.43.127.138.5749821164582814856 12/05/23-05:28:56.664048TCP2814856ETPRO TROJAN njrat ver 0.7d Malware CnC Callback (inf)4982116458192.168.2.43.127.138.57
                                                          192.168.2.43.127.138.5749829164582814856 12/05/23-05:28:59.989623TCP2814856ETPRO TROJAN njrat ver 0.7d Malware CnC Callback (inf)4982916458192.168.2.43.127.138.57
                                                          192.168.2.43.127.138.5749853164582033132 12/05/23-05:29:11.089595TCP2033132ET TROJAN Generic njRAT/Bladabindi CnC Activity (ll)4985316458192.168.2.43.127.138.57
                                                          192.168.2.43.127.138.5749855164582033132 12/05/23-05:29:11.900739TCP2033132ET TROJAN Generic njRAT/Bladabindi CnC Activity (ll)4985516458192.168.2.43.127.138.57
                                                          192.168.2.43.127.138.5749811164582033132 12/05/23-05:28:52.204621TCP2033132ET TROJAN Generic njRAT/Bladabindi CnC Activity (ll)4981116458192.168.2.43.127.138.57
                                                          192.168.2.43.127.138.5749832164582033132 12/05/23-05:29:02.721331TCP2033132ET TROJAN Generic njRAT/Bladabindi CnC Activity (ll)4983216458192.168.2.43.127.138.57
                                                          192.168.2.418.192.93.8649739164582814856 12/05/23-05:27:26.936670TCP2814856ETPRO TROJAN njrat ver 0.7d Malware CnC Callback (inf)4973916458192.168.2.418.192.93.86
                                                          192.168.2.418.157.68.7349879164582825563 12/05/23-05:29:59.721935TCP2825563ETPRO TROJAN Generic njRAT/Bladabindi CnC Activity (inf)4987916458192.168.2.418.157.68.73
                                                          192.168.2.43.127.138.5749851164582033132 12/05/23-05:29:10.262591TCP2033132ET TROJAN Generic njRAT/Bladabindi CnC Activity (ll)4985116458192.168.2.43.127.138.57
                                                          192.168.2.43.127.138.5749804164582814856 12/05/23-05:28:49.288914TCP2814856ETPRO TROJAN njrat ver 0.7d Malware CnC Callback (inf)4980416458192.168.2.43.127.138.57
                                                          192.168.2.43.127.138.5749825164582814856 12/05/23-05:28:58.332620TCP2814856ETPRO TROJAN njrat ver 0.7d Malware CnC Callback (inf)4982516458192.168.2.43.127.138.57
                                                          192.168.2.43.127.138.5749830164582033132 12/05/23-05:29:00.216171TCP2033132ET TROJAN Generic njRAT/Bladabindi CnC Activity (ll)4983016458192.168.2.43.127.138.57
                                                          192.168.2.418.156.13.20949911164582033132 12/05/23-05:30:34.750260TCP2033132ET TROJAN Generic njRAT/Bladabindi CnC Activity (ll)4991116458192.168.2.418.156.13.209
                                                          192.168.2.418.156.13.20949912164582033132 12/05/23-05:30:35.324208TCP2033132ET TROJAN Generic njRAT/Bladabindi CnC Activity (ll)4991216458192.168.2.418.156.13.209
                                                          192.168.2.418.156.13.20949912164582825564 12/05/23-05:30:35.704944TCP2825564ETPRO TROJAN Generic njRAT/Bladabindi CnC Activity (act)4991216458192.168.2.418.156.13.209
                                                          192.168.2.418.192.93.8649736164582814856 12/05/23-05:27:19.714364TCP2814856ETPRO TROJAN njrat ver 0.7d Malware CnC Callback (inf)4973616458192.168.2.418.192.93.86
                                                          192.168.2.418.157.68.7349876164582814856 12/05/23-05:29:52.869609TCP2814856ETPRO TROJAN njrat ver 0.7d Malware CnC Callback (inf)4987616458192.168.2.418.157.68.73
                                                          192.168.2.418.156.13.20949918164582033132 12/05/23-05:30:38.592923TCP2033132ET TROJAN Generic njRAT/Bladabindi CnC Activity (ll)4991816458192.168.2.418.156.13.209
                                                          192.168.2.418.156.13.20949969164582814856 12/05/23-05:31:01.195485TCP2814856ETPRO TROJAN njrat ver 0.7d Malware CnC Callback (inf)4996916458192.168.2.418.156.13.209
                                                          192.168.2.418.192.93.8649737164582814856 12/05/23-05:27:22.118276TCP2814856ETPRO TROJAN njrat ver 0.7d Malware CnC Callback (inf)4973716458192.168.2.418.192.93.86
                                                          192.168.2.418.156.13.20949966164582814856 12/05/23-05:30:59.973325TCP2814856ETPRO TROJAN njrat ver 0.7d Malware CnC Callback (inf)4996616458192.168.2.418.156.13.209
                                                          192.168.2.418.156.13.20949919164582033132 12/05/23-05:30:39.105483TCP2033132ET TROJAN Generic njRAT/Bladabindi CnC Activity (ll)4991916458192.168.2.418.156.13.209
                                                          192.168.2.418.157.68.7349873164582814856 12/05/23-05:29:45.643969TCP2814856ETPRO TROJAN njrat ver 0.7d Malware CnC Callback (inf)4987316458192.168.2.418.157.68.73
                                                          192.168.2.418.157.68.7349872164582814856 12/05/23-05:29:43.245198TCP2814856ETPRO TROJAN njrat ver 0.7d Malware CnC Callback (inf)4987216458192.168.2.418.157.68.73
                                                          192.168.2.418.156.13.20949965164582814856 12/05/23-05:30:59.568414TCP2814856ETPRO TROJAN njrat ver 0.7d Malware CnC Callback (inf)4996516458192.168.2.418.156.13.209
                                                          192.168.2.418.192.93.8649756164582825563 12/05/23-05:28:05.373115TCP2825563ETPRO TROJAN Generic njRAT/Bladabindi CnC Activity (inf)4975616458192.168.2.418.192.93.86
                                                          192.168.2.418.156.13.20949962164582814856 12/05/23-05:30:58.338916TCP2814856ETPRO TROJAN njrat ver 0.7d Malware CnC Callback (inf)4996216458192.168.2.418.156.13.209
                                                          192.168.2.418.156.13.20949971164582814856 12/05/23-05:31:01.989272TCP2814856ETPRO TROJAN njrat ver 0.7d Malware CnC Callback (inf)4997116458192.168.2.418.156.13.209
                                                          192.168.2.418.192.93.8649757164582825563 12/05/23-05:28:09.038400TCP2825563ETPRO TROJAN Generic njRAT/Bladabindi CnC Activity (inf)4975716458192.168.2.418.192.93.86
                                                          192.168.2.418.156.13.20949961164582814856 12/05/23-05:30:57.932002TCP2814856ETPRO TROJAN njrat ver 0.7d Malware CnC Callback (inf)4996116458192.168.2.418.156.13.209
                                                          192.168.2.418.156.13.20949972164582814856 12/05/23-05:31:02.396051TCP2814856ETPRO TROJAN njrat ver 0.7d Malware CnC Callback (inf)4997216458192.168.2.418.156.13.209
                                                          192.168.2.418.157.68.7349867164582814856 12/05/23-05:29:31.229375TCP2814856ETPRO TROJAN njrat ver 0.7d Malware CnC Callback (inf)4986716458192.168.2.418.157.68.73
                                                          192.168.2.418.157.68.7349877164582814856 12/05/23-05:29:55.294408TCP2814856ETPRO TROJAN njrat ver 0.7d Malware CnC Callback (inf)4987716458192.168.2.418.157.68.73
                                                          192.168.2.418.156.13.20949919164582825564 12/05/23-05:30:39.421594TCP2825564ETPRO TROJAN Generic njRAT/Bladabindi CnC Activity (act)4991916458192.168.2.418.156.13.209
                                                          192.168.2.418.156.13.20949916164582825564 12/05/23-05:30:37.890647TCP2825564ETPRO TROJAN Generic njRAT/Bladabindi CnC Activity (act)4991616458192.168.2.418.156.13.209
                                                          192.168.2.418.156.13.20949901164582033132 12/05/23-05:30:27.794287TCP2033132ET TROJAN Generic njRAT/Bladabindi CnC Activity (ll)4990116458192.168.2.418.156.13.209
                                                          192.168.2.418.156.13.20949922164582033132 12/05/23-05:30:40.591479TCP2033132ET TROJAN Generic njRAT/Bladabindi CnC Activity (ll)4992216458192.168.2.418.156.13.209
                                                          192.168.2.418.192.93.8649743164582814856 12/05/23-05:27:37.103134TCP2814856ETPRO TROJAN njrat ver 0.7d Malware CnC Callback (inf)4974316458192.168.2.418.192.93.86
                                                          192.168.2.418.156.13.20949900164582033132 12/05/23-05:30:27.014168TCP2033132ET TROJAN Generic njRAT/Bladabindi CnC Activity (ll)4990016458192.168.2.418.156.13.209
                                                          192.168.2.418.156.13.20949921164582033132 12/05/23-05:30:40.105865TCP2033132ET TROJAN Generic njRAT/Bladabindi CnC Activity (ll)4992116458192.168.2.418.156.13.209
                                                          192.168.2.43.127.138.5749797164582814856 12/05/23-05:28:46.037171TCP2814856ETPRO TROJAN njrat ver 0.7d Malware CnC Callback (inf)4979716458192.168.2.43.127.138.57
                                                          192.168.2.418.157.68.7349880164582814856 12/05/23-05:30:01.757295TCP2814856ETPRO TROJAN njrat ver 0.7d Malware CnC Callback (inf)4988016458192.168.2.418.157.68.73
                                                          192.168.2.418.192.93.8649742164582814856 12/05/23-05:27:34.697940TCP2814856ETPRO TROJAN njrat ver 0.7d Malware CnC Callback (inf)4974216458192.168.2.418.192.93.86
                                                          192.168.2.418.192.93.8649746164582814856 12/05/23-05:27:44.324898TCP2814856ETPRO TROJAN njrat ver 0.7d Malware CnC Callback (inf)4974616458192.168.2.418.192.93.86
                                                          192.168.2.43.127.138.5749858164582825563 12/05/23-05:29:13.301651TCP2825563ETPRO TROJAN Generic njRAT/Bladabindi CnC Activity (inf)4985816458192.168.2.43.127.138.57
                                                          192.168.2.43.127.138.5749794164582814856 12/05/23-05:28:42.507418TCP2814856ETPRO TROJAN njrat ver 0.7d Malware CnC Callback (inf)4979416458192.168.2.43.127.138.57
                                                          192.168.2.43.127.138.5749798164582814856 12/05/23-05:28:46.526164TCP2814856ETPRO TROJAN njrat ver 0.7d Malware CnC Callback (inf)4979816458192.168.2.43.127.138.57
                                                          192.168.2.418.156.13.20949922164582825564 12/05/23-05:30:40.890140TCP2825564ETPRO TROJAN Generic njRAT/Bladabindi CnC Activity (act)4992216458192.168.2.418.156.13.209
                                                          192.168.2.418.156.13.20949905164582033132 12/05/23-05:30:30.952686TCP2033132ET TROJAN Generic njRAT/Bladabindi CnC Activity (ll)4990516458192.168.2.418.156.13.209
                                                          192.168.2.418.156.13.20949959164582814856 12/05/23-05:30:57.115661TCP2814856ETPRO TROJAN njrat ver 0.7d Malware CnC Callback (inf)4995916458192.168.2.418.156.13.209
                                                          192.168.2.418.192.93.8649747164582814856 12/05/23-05:27:46.734885TCP2814856ETPRO TROJAN njrat ver 0.7d Malware CnC Callback (inf)4974716458192.168.2.418.192.93.86
                                                          192.168.2.418.157.68.7349866164582814856 12/05/23-05:29:28.817890TCP2814856ETPRO TROJAN njrat ver 0.7d Malware CnC Callback (inf)4986616458192.168.2.418.157.68.73
                                                          192.168.2.418.156.13.20949958164582814856 12/05/23-05:30:56.699749TCP2814856ETPRO TROJAN njrat ver 0.7d Malware CnC Callback (inf)4995816458192.168.2.418.156.13.209
                                                          192.168.2.418.192.93.8649752164582825563 12/05/23-05:27:57.404139TCP2825563ETPRO TROJAN Generic njRAT/Bladabindi CnC Activity (inf)4975216458192.168.2.418.192.93.86
                                                          192.168.2.418.156.13.20949909164582033132 12/05/23-05:30:33.545653TCP2033132ET TROJAN Generic njRAT/Bladabindi CnC Activity (ll)4990916458192.168.2.418.156.13.209
                                                          192.168.2.418.156.13.20949955164582814856 12/05/23-05:30:55.475002TCP2814856ETPRO TROJAN njrat ver 0.7d Malware CnC Callback (inf)4995516458192.168.2.418.156.13.209
                                                          192.168.2.418.192.93.8649752164582033132 12/05/23-05:27:57.222094TCP2033132ET TROJAN Generic njRAT/Bladabindi CnC Activity (ll)4975216458192.168.2.418.192.93.86
                                                          192.168.2.43.127.138.5749761164582033132 12/05/23-05:28:15.020275TCP2033132ET TROJAN Generic njRAT/Bladabindi CnC Activity (ll)4976116458192.168.2.43.127.138.57
                                                          192.168.2.418.156.13.20949908164582033132 12/05/23-05:30:32.925073TCP2033132ET TROJAN Generic njRAT/Bladabindi CnC Activity (ll)4990816458192.168.2.418.156.13.209
                                                          192.168.2.418.156.13.20949929164582033132 12/05/23-05:30:43.904813TCP2033132ET TROJAN Generic njRAT/Bladabindi CnC Activity (ll)4992916458192.168.2.418.156.13.209
                                                          192.168.2.418.156.13.20949975164582814856 12/05/23-05:31:03.623892TCP2814856ETPRO TROJAN njrat ver 0.7d Malware CnC Callback (inf)4997516458192.168.2.418.156.13.209
                                                          192.168.2.43.127.138.5749760164582033132 12/05/23-05:28:13.622007TCP2033132ET TROJAN Generic njRAT/Bladabindi CnC Activity (ll)4976016458192.168.2.43.127.138.57
                                                          192.168.2.43.127.138.5749764164582033132 12/05/23-05:28:18.862030TCP2033132ET TROJAN Generic njRAT/Bladabindi CnC Activity (ll)4976416458192.168.2.43.127.138.57
                                                          192.168.2.43.127.138.5749830164582814856 12/05/23-05:29:00.397921TCP2814856ETPRO TROJAN njrat ver 0.7d Malware CnC Callback (inf)4983016458192.168.2.43.127.138.57
                                                          192.168.2.418.157.68.7349863164582814856 12/05/23-05:29:21.612391TCP2814856ETPRO TROJAN njrat ver 0.7d Malware CnC Callback (inf)4986316458192.168.2.418.157.68.73
                                                          192.168.2.43.127.138.5749851164582814856 12/05/23-05:29:10.444716TCP2814856ETPRO TROJAN njrat ver 0.7d Malware CnC Callback (inf)4985116458192.168.2.43.127.138.57
                                                          192.168.2.418.157.68.7349884164582814856 12/05/23-05:30:08.864321TCP2814856ETPRO TROJAN njrat ver 0.7d Malware CnC Callback (inf)4988416458192.168.2.418.157.68.73
                                                          192.168.2.418.156.13.20949889164582033132 12/05/23-05:30:16.047233TCP2033132ET TROJAN Generic njRAT/Bladabindi CnC Activity (ll)4988916458192.168.2.418.156.13.209
                                                          192.168.2.418.157.68.7349862164582814856 12/05/23-05:29:19.208172TCP2814856ETPRO TROJAN njrat ver 0.7d Malware CnC Callback (inf)4986216458192.168.2.418.157.68.73
                                                          192.168.2.418.156.13.20949954164582814856 12/05/23-05:30:55.067188TCP2814856ETPRO TROJAN njrat ver 0.7d Malware CnC Callback (inf)4995416458192.168.2.418.156.13.209
                                                          192.168.2.418.192.93.8649753164582825563 12/05/23-05:27:59.557036TCP2825563ETPRO TROJAN Generic njRAT/Bladabindi CnC Activity (inf)4975316458192.168.2.418.192.93.86
                                                          192.168.2.418.156.13.20949888164582033132 12/05/23-05:30:14.777264TCP2033132ET TROJAN Generic njRAT/Bladabindi CnC Activity (ll)4988816458192.168.2.418.156.13.209
                                                          192.168.2.418.157.68.7349883164582814856 12/05/23-05:30:07.225303TCP2814856ETPRO TROJAN njrat ver 0.7d Malware CnC Callback (inf)4988316458192.168.2.418.157.68.73
                                                          192.168.2.43.127.138.5749856164582814856 12/05/23-05:29:12.490359TCP2814856ETPRO TROJAN njrat ver 0.7d Malware CnC Callback (inf)4985616458192.168.2.43.127.138.57
                                                          192.168.2.418.157.68.7349886164582825563 12/05/23-05:30:11.907628TCP2825563ETPRO TROJAN Generic njRAT/Bladabindi CnC Activity (inf)4988616458192.168.2.418.157.68.73
                                                          192.168.2.43.127.138.5749769164582033132 12/05/23-05:28:24.205480TCP2033132ET TROJAN Generic njRAT/Bladabindi CnC Activity (ll)4976916458192.168.2.43.127.138.57
                                                          192.168.2.43.127.138.5749855164582814856 12/05/23-05:29:12.080390TCP2814856ETPRO TROJAN njrat ver 0.7d Malware CnC Callback (inf)4985516458192.168.2.43.127.138.57
                                                          192.168.2.418.156.13.20949959164582814860 12/05/23-05:30:57.155698TCP2814860ETPRO TROJAN njRAT/Bladabindi CnC Callback (act)4995916458192.168.2.418.156.13.209
                                                          192.168.2.43.127.138.5749835164582814856 12/05/23-05:29:03.956503TCP2814856ETPRO TROJAN njrat ver 0.7d Malware CnC Callback (inf)4983516458192.168.2.43.127.138.57
                                                          192.168.2.418.192.93.8649759164582033132 12/05/23-05:28:12.041951TCP2033132ET TROJAN Generic njRAT/Bladabindi CnC Activity (ll)4975916458192.168.2.418.192.93.86
                                                          192.168.2.43.127.138.5749768164582033132 12/05/23-05:28:23.220537TCP2033132ET TROJAN Generic njRAT/Bladabindi CnC Activity (ll)4976816458192.168.2.43.127.138.57
                                                          192.168.2.418.157.68.7349883164582825563 12/05/23-05:30:07.225303TCP2825563ETPRO TROJAN Generic njRAT/Bladabindi CnC Activity (inf)4988316458192.168.2.418.157.68.73
                                                          192.168.2.43.127.138.5749834164582814856 12/05/23-05:29:03.520411TCP2814856ETPRO TROJAN njrat ver 0.7d Malware CnC Callback (inf)4983416458192.168.2.43.127.138.57
                                                          192.168.2.43.127.138.5749838164582814856 12/05/23-05:29:05.159344TCP2814856ETPRO TROJAN njrat ver 0.7d Malware CnC Callback (inf)4983816458192.168.2.43.127.138.57
                                                          192.168.2.43.127.138.5749852164582814856 12/05/23-05:29:10.865065TCP2814856ETPRO TROJAN njrat ver 0.7d Malware CnC Callback (inf)4985216458192.168.2.43.127.138.57
                                                          192.168.2.43.127.138.5749765164582033132 12/05/23-05:28:20.020259TCP2033132ET TROJAN Generic njRAT/Bladabindi CnC Activity (ll)4976516458192.168.2.43.127.138.57
                                                          192.168.2.43.127.138.5749831164582814856 12/05/23-05:29:00.804324TCP2814856ETPRO TROJAN njrat ver 0.7d Malware CnC Callback (inf)4983116458192.168.2.43.127.138.57
                                                          192.168.2.43.127.138.5749839164582814856 12/05/23-05:29:05.570625TCP2814856ETPRO TROJAN njrat ver 0.7d Malware CnC Callback (inf)4983916458192.168.2.43.127.138.57
                                                          192.168.2.43.127.138.5749761164582825563 12/05/23-05:28:15.201898TCP2825563ETPRO TROJAN Generic njRAT/Bladabindi CnC Activity (inf)4976116458192.168.2.43.127.138.57
                                                          192.168.2.43.127.138.5749801164582033132 12/05/23-05:28:47.746763TCP2033132ET TROJAN Generic njRAT/Bladabindi CnC Activity (ll)4980116458192.168.2.43.127.138.57
                                                          192.168.2.418.192.93.8649755164582033132 12/05/23-05:28:03.344910TCP2033132ET TROJAN Generic njRAT/Bladabindi CnC Activity (ll)4975516458192.168.2.418.192.93.86
                                                          192.168.2.418.156.13.20949954164582814860 12/05/23-05:30:55.109029TCP2814860ETPRO TROJAN njRAT/Bladabindi CnC Callback (act)4995416458192.168.2.418.156.13.209
                                                          192.168.2.418.156.13.20949926164582033132 12/05/23-05:30:42.500560TCP2033132ET TROJAN Generic njRAT/Bladabindi CnC Activity (ll)4992616458192.168.2.418.156.13.209
                                                          192.168.2.418.192.93.8649756164582033132 12/05/23-05:28:05.235367TCP2033132ET TROJAN Generic njRAT/Bladabindi CnC Activity (ll)4975616458192.168.2.418.192.93.86
                                                          192.168.2.418.156.13.20949904164582033132 12/05/23-05:30:30.260268TCP2033132ET TROJAN Generic njRAT/Bladabindi CnC Activity (ll)4990416458192.168.2.418.156.13.209
                                                          192.168.2.418.156.13.20949925164582033132 12/05/23-05:30:42.030273TCP2033132ET TROJAN Generic njRAT/Bladabindi CnC Activity (ll)4992516458192.168.2.418.156.13.209
                                                          192.168.2.418.156.13.20949955164582814860 12/05/23-05:30:55.515019TCP2814860ETPRO TROJAN njRAT/Bladabindi CnC Callback (act)4995516458192.168.2.418.156.13.209
                                                          192.168.2.418.156.13.20949932164582033132 12/05/23-05:30:45.262465TCP2033132ET TROJAN Generic njRAT/Bladabindi CnC Activity (ll)4993216458192.168.2.418.156.13.209
                                                          192.168.2.418.156.13.20949975164582825563 12/05/23-05:31:03.623892TCP2825563ETPRO TROJAN Generic njRAT/Bladabindi CnC Activity (inf)4997516458192.168.2.418.156.13.209
                                                          192.168.2.43.127.138.5749809164582033132 12/05/23-05:28:51.324622TCP2033132ET TROJAN Generic njRAT/Bladabindi CnC Activity (ll)4980916458192.168.2.43.127.138.57
                                                          192.168.2.43.127.138.5749783164582814856 12/05/23-05:28:36.429111TCP2814856ETPRO TROJAN njrat ver 0.7d Malware CnC Callback (inf)4978316458192.168.2.43.127.138.57
                                                          192.168.2.43.127.138.5749787164582814856 12/05/23-05:28:38.793091TCP2814856ETPRO TROJAN njrat ver 0.7d Malware CnC Callback (inf)4978716458192.168.2.43.127.138.57
                                                          192.168.2.418.192.93.8649753164582814856 12/05/23-05:27:59.557036TCP2814856ETPRO TROJAN njrat ver 0.7d Malware CnC Callback (inf)4975316458192.168.2.418.192.93.86
                                                          192.168.2.418.192.93.8649757164582814856 12/05/23-05:28:09.038400TCP2814856ETPRO TROJAN njrat ver 0.7d Malware CnC Callback (inf)4975716458192.168.2.418.192.93.86
                                                          192.168.2.418.156.13.20949906164582814856 12/05/23-05:30:31.808906TCP2814856ETPRO TROJAN njrat ver 0.7d Malware CnC Callback (inf)4990616458192.168.2.418.156.13.209
                                                          192.168.2.418.156.13.20949971164582825563 12/05/23-05:31:01.989272TCP2825563ETPRO TROJAN Generic njRAT/Bladabindi CnC Activity (inf)4997116458192.168.2.418.156.13.209
                                                          192.168.2.43.127.138.5749848164582825563 12/05/23-05:29:09.223938TCP2825563ETPRO TROJAN Generic njRAT/Bladabindi CnC Activity (inf)4984816458192.168.2.43.127.138.57
                                                          192.168.2.43.127.138.5749806164582825563 12/05/23-05:28:50.179249TCP2825563ETPRO TROJAN Generic njRAT/Bladabindi CnC Activity (inf)4980616458192.168.2.43.127.138.57
                                                          192.168.2.418.156.13.20949948164582814856 12/05/23-05:30:52.537768TCP2814856ETPRO TROJAN njrat ver 0.7d Malware CnC Callback (inf)4994816458192.168.2.418.156.13.209
                                                          192.168.2.418.156.13.20949974164582033132 12/05/23-05:31:03.014634TCP2033132ET TROJAN Generic njRAT/Bladabindi CnC Activity (ll)4997416458192.168.2.418.156.13.209
                                                          192.168.2.418.156.13.20949902164582814856 12/05/23-05:30:28.764552TCP2814856ETPRO TROJAN njrat ver 0.7d Malware CnC Callback (inf)4990216458192.168.2.418.156.13.209
                                                          192.168.2.418.156.13.20949951164582814860 12/05/23-05:30:53.874480TCP2814860ETPRO TROJAN njRAT/Bladabindi CnC Callback (act)4995116458192.168.2.418.156.13.209
                                                          192.168.2.418.192.93.8649741164582033132 12/05/23-05:27:32.146905TCP2033132ET TROJAN Generic njRAT/Bladabindi CnC Activity (ll)4974116458192.168.2.418.192.93.86
                                                          192.168.2.43.127.138.5749771164582033132 12/05/23-05:28:27.423553TCP2033132ET TROJAN Generic njRAT/Bladabindi CnC Activity (ll)4977116458192.168.2.43.127.138.57
                                                          192.168.2.43.127.138.5749775164582033132 12/05/23-05:28:30.751692TCP2033132ET TROJAN Generic njRAT/Bladabindi CnC Activity (ll)4977516458192.168.2.43.127.138.57
                                                          192.168.2.43.127.138.5749847164582033132 12/05/23-05:29:08.637132TCP2033132ET TROJAN Generic njRAT/Bladabindi CnC Activity (ll)4984716458192.168.2.43.127.138.57
                                                          192.168.2.43.127.138.5749805164582033132 12/05/23-05:28:49.562929TCP2033132ET TROJAN Generic njRAT/Bladabindi CnC Activity (ll)4980516458192.168.2.43.127.138.57
                                                          192.168.2.418.192.93.8649742164582825563 12/05/23-05:27:34.697940TCP2825563ETPRO TROJAN Generic njRAT/Bladabindi CnC Activity (inf)4974216458192.168.2.418.192.93.86
                                                          192.168.2.418.156.13.20949944164582814856 12/05/23-05:30:50.851324TCP2814856ETPRO TROJAN njrat ver 0.7d Malware CnC Callback (inf)4994416458192.168.2.418.156.13.209
                                                          192.168.2.418.156.13.20949970164582033132 12/05/23-05:31:01.418455TCP2033132ET TROJAN Generic njRAT/Bladabindi CnC Activity (ll)4997016458192.168.2.418.156.13.209
                                                          192.168.2.418.156.13.20949899164582033132 12/05/23-05:30:26.198574TCP2033132ET TROJAN Generic njRAT/Bladabindi CnC Activity (ll)4989916458192.168.2.418.156.13.209
                                                          192.168.2.418.157.68.7349886164582033132 12/05/23-05:30:11.725388TCP2033132ET TROJAN Generic njRAT/Bladabindi CnC Activity (ll)4988616458192.168.2.418.157.68.73
                                                          192.168.2.418.156.13.20949951164582814856 12/05/23-05:30:53.830684TCP2814856ETPRO TROJAN njrat ver 0.7d Malware CnC Callback (inf)4995116458192.168.2.418.156.13.209
                                                          192.168.2.418.157.68.7349882164582033132 12/05/23-05:30:05.310312TCP2033132ET TROJAN Generic njRAT/Bladabindi CnC Activity (ll)4988216458192.168.2.418.157.68.73
                                                          192.168.2.43.127.138.5749840164582825563 12/05/23-05:29:05.972883TCP2825563ETPRO TROJAN Generic njRAT/Bladabindi CnC Activity (inf)4984016458192.168.2.43.127.138.57
                                                          192.168.2.43.127.138.5749851164582825563 12/05/23-05:29:10.444716TCP2825563ETPRO TROJAN Generic njRAT/Bladabindi CnC Activity (inf)4985116458192.168.2.43.127.138.57
                                                          192.168.2.418.157.68.7349871164582033132 12/05/23-05:29:40.670023TCP2033132ET TROJAN Generic njRAT/Bladabindi CnC Activity (ll)4987116458192.168.2.418.157.68.73
                                                          192.168.2.418.157.68.7349879164582033132 12/05/23-05:29:59.542092TCP2033132ET TROJAN Generic njRAT/Bladabindi CnC Activity (ll)4987916458192.168.2.418.157.68.73
                                                          192.168.2.418.192.93.8649746164582825563 12/05/23-05:27:44.324898TCP2825563ETPRO TROJAN Generic njRAT/Bladabindi CnC Activity (inf)4974616458192.168.2.418.192.93.86
                                                          192.168.2.418.156.13.20949940164582814856 12/05/23-05:30:49.161327TCP2814856ETPRO TROJAN njrat ver 0.7d Malware CnC Callback (inf)4994016458192.168.2.418.156.13.209
                                                          192.168.2.418.156.13.20949895164582033132 12/05/23-05:30:22.638934TCP2033132ET TROJAN Generic njRAT/Bladabindi CnC Activity (ll)4989516458192.168.2.418.156.13.209
                                                          192.168.2.43.127.138.5749844164582825563 12/05/23-05:29:07.595663TCP2825563ETPRO TROJAN Generic njRAT/Bladabindi CnC Activity (inf)4984416458192.168.2.43.127.138.57
                                                          192.168.2.43.127.138.5749790164582814856 12/05/23-05:28:40.447649TCP2814856ETPRO TROJAN njrat ver 0.7d Malware CnC Callback (inf)4979016458192.168.2.43.127.138.57
                                                          192.168.2.43.127.138.5749802164582825563 12/05/23-05:28:48.380094TCP2825563ETPRO TROJAN Generic njRAT/Bladabindi CnC Activity (inf)4980216458192.168.2.43.127.138.57
                                                          192.168.2.43.127.138.5749813164582825563 12/05/23-05:28:53.296410TCP2825563ETPRO TROJAN Generic njRAT/Bladabindi CnC Activity (inf)4981316458192.168.2.43.127.138.57
                                                          192.168.2.418.157.68.7349875164582033132 12/05/23-05:29:50.280325TCP2033132ET TROJAN Generic njRAT/Bladabindi CnC Activity (ll)4987516458192.168.2.418.157.68.73
                                                          192.168.2.418.192.93.8649739164582825563 12/05/23-05:27:26.936670TCP2825563ETPRO TROJAN Generic njRAT/Bladabindi CnC Activity (inf)4973916458192.168.2.418.192.93.86
                                                          192.168.2.418.156.13.20949891164582033132 12/05/23-05:30:18.437391TCP2033132ET TROJAN Generic njRAT/Bladabindi CnC Activity (ll)4989116458192.168.2.418.156.13.209
                                                          192.168.2.418.156.13.20949940164582814860 12/05/23-05:30:49.218482TCP2814860ETPRO TROJAN njRAT/Bladabindi CnC Callback (act)4994016458192.168.2.418.156.13.209
                                                          192.168.2.43.127.138.5749858164582033132 12/05/23-05:29:13.120862TCP2033132ET TROJAN Generic njRAT/Bladabindi CnC Activity (ll)4985816458192.168.2.43.127.138.57
                                                          192.168.2.43.127.138.5749816164582033132 12/05/23-05:28:54.386300TCP2033132ET TROJAN Generic njRAT/Bladabindi CnC Activity (ll)4981616458192.168.2.43.127.138.57
                                                          192.168.2.43.127.138.5749837164582033132 12/05/23-05:29:04.575624TCP2033132ET TROJAN Generic njRAT/Bladabindi CnC Activity (ll)4983716458192.168.2.43.127.138.57
                                                          192.168.2.418.157.68.7349872164582825563 12/05/23-05:29:43.245198TCP2825563ETPRO TROJAN Generic njRAT/Bladabindi CnC Activity (inf)4987216458192.168.2.418.157.68.73
                                                          192.168.2.43.127.138.5749803164582814856 12/05/23-05:28:48.837764TCP2814856ETPRO TROJAN njrat ver 0.7d Malware CnC Callback (inf)4980316458192.168.2.43.127.138.57
                                                          192.168.2.43.127.138.5749824164582814856 12/05/23-05:28:57.913904TCP2814856ETPRO TROJAN njrat ver 0.7d Malware CnC Callback (inf)4982416458192.168.2.43.127.138.57
                                                          192.168.2.43.127.138.5749845164582814856 12/05/23-05:29:08.004585TCP2814856ETPRO TROJAN njrat ver 0.7d Malware CnC Callback (inf)4984516458192.168.2.43.127.138.57
                                                          192.168.2.418.156.13.20949927164582814860 12/05/23-05:30:43.249853TCP2814860ETPRO TROJAN njRAT/Bladabindi CnC Callback (act)4992716458192.168.2.418.156.13.209
                                                          192.168.2.418.192.93.8649749164582033132 12/05/23-05:27:52.549904TCP2033132ET TROJAN Generic njRAT/Bladabindi CnC Activity (ll)4974916458192.168.2.418.192.93.86
                                                          192.168.2.418.156.13.20949892164582825563 12/05/23-05:30:19.723319TCP2825563ETPRO TROJAN Generic njRAT/Bladabindi CnC Activity (inf)4989216458192.168.2.418.156.13.209
                                                          192.168.2.43.127.138.5749779164582033132 12/05/23-05:28:33.654731TCP2033132ET TROJAN Generic njRAT/Bladabindi CnC Activity (ll)4977916458192.168.2.43.127.138.57
                                                          192.168.2.418.156.13.20949948164582814860 12/05/23-05:30:52.624503TCP2814860ETPRO TROJAN njRAT/Bladabindi CnC Callback (act)4994816458192.168.2.418.156.13.209
                                                          192.168.2.418.157.68.7349876164582825563 12/05/23-05:29:52.869609TCP2825563ETPRO TROJAN Generic njRAT/Bladabindi CnC Activity (inf)4987616458192.168.2.418.157.68.73
                                                          192.168.2.43.127.138.5749850164582033132 12/05/23-05:29:09.855333TCP2033132ET TROJAN Generic njRAT/Bladabindi CnC Activity (ll)4985016458192.168.2.43.127.138.57
                                                          192.168.2.43.127.138.5749820164582814856 12/05/23-05:28:56.240385TCP2814856ETPRO TROJAN njrat ver 0.7d Malware CnC Callback (inf)4982016458192.168.2.43.127.138.57
                                                          192.168.2.43.127.138.5749828164582814856 12/05/23-05:28:59.573407TCP2814856ETPRO TROJAN njrat ver 0.7d Malware CnC Callback (inf)4982816458192.168.2.43.127.138.57
                                                          192.168.2.43.127.138.5749841164582814856 12/05/23-05:29:06.378763TCP2814856ETPRO TROJAN njrat ver 0.7d Malware CnC Callback (inf)4984116458192.168.2.43.127.138.57
                                                          192.168.2.43.127.138.5749849164582814856 12/05/23-05:29:09.629833TCP2814856ETPRO TROJAN njrat ver 0.7d Malware CnC Callback (inf)4984916458192.168.2.43.127.138.57
                                                          192.168.2.43.127.138.5749807164582814856 12/05/23-05:28:50.631981TCP2814856ETPRO TROJAN njrat ver 0.7d Malware CnC Callback (inf)4980716458192.168.2.43.127.138.57
                                                          192.168.2.43.127.138.5749812164582033132 12/05/23-05:28:52.637433TCP2033132ET TROJAN Generic njRAT/Bladabindi CnC Activity (ll)4981216458192.168.2.43.127.138.57
                                                          192.168.2.43.127.138.5749833164582033132 12/05/23-05:29:03.064031TCP2033132ET TROJAN Generic njRAT/Bladabindi CnC Activity (ll)4983316458192.168.2.43.127.138.57
                                                          192.168.2.43.127.138.5749793164582825563 12/05/23-05:28:42.006662TCP2825563ETPRO TROJAN Generic njRAT/Bladabindi CnC Activity (inf)4979316458192.168.2.43.127.138.57
                                                          192.168.2.418.156.13.20949944164582814860 12/05/23-05:30:50.905779TCP2814860ETPRO TROJAN njRAT/Bladabindi CnC Callback (act)4994416458192.168.2.418.156.13.209
                                                          192.168.2.418.157.68.7349859164582825563 12/05/23-05:29:13.802515TCP2825563ETPRO TROJAN Generic njRAT/Bladabindi CnC Activity (inf)4985916458192.168.2.418.157.68.73
                                                          192.168.2.43.127.138.5749854164582033132 12/05/23-05:29:11.494403TCP2033132ET TROJAN Generic njRAT/Bladabindi CnC Activity (ll)4985416458192.168.2.43.127.138.57
                                                          192.168.2.418.156.13.20949915164582033132 12/05/23-05:30:37.000009TCP2033132ET TROJAN Generic njRAT/Bladabindi CnC Activity (ll)4991516458192.168.2.418.156.13.209
                                                          192.168.2.418.156.13.20949923164582814860 12/05/23-05:30:41.377097TCP2814860ETPRO TROJAN njRAT/Bladabindi CnC Callback (act)4992316458192.168.2.418.156.13.209
                                                          192.168.2.418.192.93.8649745164582033132 12/05/23-05:27:41.736299TCP2033132ET TROJAN Generic njRAT/Bladabindi CnC Activity (ll)4974516458192.168.2.418.192.93.86
                                                          192.168.2.418.156.13.20949936164582033132 12/05/23-05:30:47.245574TCP2033132ET TROJAN Generic njRAT/Bladabindi CnC Activity (ll)4993616458192.168.2.418.156.13.209
                                                          192.168.2.418.156.13.20949957164582033132 12/05/23-05:30:56.108139TCP2033132ET TROJAN Generic njRAT/Bladabindi CnC Activity (ll)4995716458192.168.2.418.156.13.209
                                                          TimestampSource PortDest PortSource IPDest IP
                                                          Dec 5, 2023 05:27:13.072690964 CET4972916458192.168.2.418.192.93.86
                                                          Dec 5, 2023 05:27:13.253001928 CET164584972918.192.93.86192.168.2.4
                                                          Dec 5, 2023 05:27:13.253416061 CET4972916458192.168.2.418.192.93.86
                                                          Dec 5, 2023 05:27:13.462372065 CET164584972918.192.93.86192.168.2.4
                                                          Dec 5, 2023 05:27:13.462660074 CET4972916458192.168.2.418.192.93.86
                                                          Dec 5, 2023 05:27:14.926419020 CET4972916458192.168.2.418.192.93.86
                                                          Dec 5, 2023 05:27:15.107040882 CET164584972918.192.93.86192.168.2.4
                                                          Dec 5, 2023 05:27:16.940136909 CET4973116458192.168.2.418.192.93.86
                                                          Dec 5, 2023 05:27:17.120657921 CET164584973118.192.93.86192.168.2.4
                                                          Dec 5, 2023 05:27:17.120836973 CET4973116458192.168.2.418.192.93.86
                                                          Dec 5, 2023 05:27:17.127747059 CET4973116458192.168.2.418.192.93.86
                                                          Dec 5, 2023 05:27:17.308130026 CET164584973118.192.93.86192.168.2.4
                                                          Dec 5, 2023 05:27:17.308269024 CET4973116458192.168.2.418.192.93.86
                                                          Dec 5, 2023 05:27:17.332191944 CET164584973118.192.93.86192.168.2.4
                                                          Dec 5, 2023 05:27:17.332267046 CET4973116458192.168.2.418.192.93.86
                                                          Dec 5, 2023 05:27:17.488851070 CET164584973118.192.93.86192.168.2.4
                                                          Dec 5, 2023 05:27:17.512654066 CET164584973118.192.93.86192.168.2.4
                                                          Dec 5, 2023 05:27:19.345498085 CET4973616458192.168.2.418.192.93.86
                                                          Dec 5, 2023 05:27:19.527265072 CET164584973618.192.93.86192.168.2.4
                                                          Dec 5, 2023 05:27:19.527610064 CET4973616458192.168.2.418.192.93.86
                                                          Dec 5, 2023 05:27:19.532370090 CET4973616458192.168.2.418.192.93.86
                                                          Dec 5, 2023 05:27:19.714139938 CET164584973618.192.93.86192.168.2.4
                                                          Dec 5, 2023 05:27:19.714364052 CET4973616458192.168.2.418.192.93.86
                                                          Dec 5, 2023 05:27:19.741972923 CET164584973618.192.93.86192.168.2.4
                                                          Dec 5, 2023 05:27:19.742279053 CET4973616458192.168.2.418.192.93.86
                                                          Dec 5, 2023 05:27:19.896682024 CET164584973618.192.93.86192.168.2.4
                                                          Dec 5, 2023 05:27:19.924235106 CET164584973618.192.93.86192.168.2.4
                                                          Dec 5, 2023 05:27:21.751518011 CET4973716458192.168.2.418.192.93.86
                                                          Dec 5, 2023 05:27:21.932498932 CET164584973718.192.93.86192.168.2.4
                                                          Dec 5, 2023 05:27:21.932627916 CET4973716458192.168.2.418.192.93.86
                                                          Dec 5, 2023 05:27:21.937237978 CET4973716458192.168.2.418.192.93.86
                                                          Dec 5, 2023 05:27:22.117961884 CET164584973718.192.93.86192.168.2.4
                                                          Dec 5, 2023 05:27:22.118275881 CET4973716458192.168.2.418.192.93.86
                                                          Dec 5, 2023 05:27:22.145628929 CET164584973718.192.93.86192.168.2.4
                                                          Dec 5, 2023 05:27:22.146004915 CET4973716458192.168.2.418.192.93.86
                                                          Dec 5, 2023 05:27:22.299118996 CET164584973718.192.93.86192.168.2.4
                                                          Dec 5, 2023 05:27:22.326875925 CET164584973718.192.93.86192.168.2.4
                                                          Dec 5, 2023 05:27:24.159884930 CET4973816458192.168.2.418.192.93.86
                                                          Dec 5, 2023 05:27:24.340642929 CET164584973818.192.93.86192.168.2.4
                                                          Dec 5, 2023 05:27:24.340837002 CET4973816458192.168.2.418.192.93.86
                                                          Dec 5, 2023 05:27:24.345733881 CET4973816458192.168.2.418.192.93.86
                                                          Dec 5, 2023 05:27:24.526483059 CET164584973818.192.93.86192.168.2.4
                                                          Dec 5, 2023 05:27:24.526596069 CET4973816458192.168.2.418.192.93.86
                                                          Dec 5, 2023 05:27:24.550115108 CET164584973818.192.93.86192.168.2.4
                                                          Dec 5, 2023 05:27:24.550276995 CET4973816458192.168.2.418.192.93.86
                                                          Dec 5, 2023 05:27:24.707359076 CET164584973818.192.93.86192.168.2.4
                                                          Dec 5, 2023 05:27:24.731172085 CET164584973818.192.93.86192.168.2.4
                                                          Dec 5, 2023 05:27:26.569341898 CET4973916458192.168.2.418.192.93.86
                                                          Dec 5, 2023 05:27:26.750431061 CET164584973918.192.93.86192.168.2.4
                                                          Dec 5, 2023 05:27:26.750749111 CET4973916458192.168.2.418.192.93.86
                                                          Dec 5, 2023 05:27:26.754614115 CET4973916458192.168.2.418.192.93.86
                                                          Dec 5, 2023 05:27:26.936450005 CET164584973918.192.93.86192.168.2.4
                                                          Dec 5, 2023 05:27:26.936670065 CET4973916458192.168.2.418.192.93.86
                                                          Dec 5, 2023 05:27:26.957365990 CET164584973918.192.93.86192.168.2.4
                                                          Dec 5, 2023 05:27:26.957849026 CET4973916458192.168.2.418.192.93.86
                                                          Dec 5, 2023 05:27:27.120939970 CET164584973918.192.93.86192.168.2.4
                                                          Dec 5, 2023 05:27:27.140332937 CET164584973918.192.93.86192.168.2.4
                                                          Dec 5, 2023 05:27:28.970326900 CET4974016458192.168.2.418.192.93.86
                                                          Dec 5, 2023 05:27:29.150283098 CET164584974018.192.93.86192.168.2.4
                                                          Dec 5, 2023 05:27:29.150389910 CET4974016458192.168.2.418.192.93.86
                                                          Dec 5, 2023 05:27:29.154814005 CET4974016458192.168.2.418.192.93.86
                                                          Dec 5, 2023 05:27:29.334686995 CET164584974018.192.93.86192.168.2.4
                                                          Dec 5, 2023 05:27:29.334851027 CET4974016458192.168.2.418.192.93.86
                                                          Dec 5, 2023 05:27:29.361664057 CET164584974018.192.93.86192.168.2.4
                                                          Dec 5, 2023 05:27:29.361824989 CET4974016458192.168.2.418.192.93.86
                                                          Dec 5, 2023 05:27:29.514919043 CET164584974018.192.93.86192.168.2.4
                                                          Dec 5, 2023 05:27:29.545165062 CET164584974018.192.93.86192.168.2.4
                                                          Dec 5, 2023 05:27:31.927886963 CET4974116458192.168.2.418.192.93.86
                                                          Dec 5, 2023 05:27:32.109241962 CET164584974118.192.93.86192.168.2.4
                                                          Dec 5, 2023 05:27:32.109399080 CET4974116458192.168.2.418.192.93.86
                                                          Dec 5, 2023 05:27:32.146904945 CET4974116458192.168.2.418.192.93.86
                                                          Dec 5, 2023 05:27:32.318975925 CET164584974118.192.93.86192.168.2.4
                                                          Dec 5, 2023 05:27:32.319288015 CET4974116458192.168.2.418.192.93.86
                                                          Dec 5, 2023 05:27:32.327635050 CET164584974118.192.93.86192.168.2.4
                                                          Dec 5, 2023 05:27:32.499941111 CET164584974118.192.93.86192.168.2.4
                                                          Dec 5, 2023 05:27:34.330167055 CET4974216458192.168.2.418.192.93.86
                                                          Dec 5, 2023 05:27:34.511917114 CET164584974218.192.93.86192.168.2.4
                                                          Dec 5, 2023 05:27:34.512017965 CET4974216458192.168.2.418.192.93.86
                                                          Dec 5, 2023 05:27:34.516199112 CET4974216458192.168.2.418.192.93.86
                                                          Dec 5, 2023 05:27:34.697648048 CET164584974218.192.93.86192.168.2.4
                                                          Dec 5, 2023 05:27:34.697940111 CET4974216458192.168.2.418.192.93.86
                                                          Dec 5, 2023 05:27:34.719753027 CET164584974218.192.93.86192.168.2.4
                                                          Dec 5, 2023 05:27:34.719974041 CET4974216458192.168.2.418.192.93.86
                                                          Dec 5, 2023 05:27:34.879638910 CET164584974218.192.93.86192.168.2.4
                                                          Dec 5, 2023 05:27:34.901581049 CET164584974218.192.93.86192.168.2.4
                                                          Dec 5, 2023 05:27:36.736717939 CET4974316458192.168.2.418.192.93.86
                                                          Dec 5, 2023 05:27:36.916143894 CET164584974318.192.93.86192.168.2.4
                                                          Dec 5, 2023 05:27:36.916238070 CET4974316458192.168.2.418.192.93.86
                                                          Dec 5, 2023 05:27:36.923708916 CET4974316458192.168.2.418.192.93.86
                                                          Dec 5, 2023 05:27:37.103015900 CET164584974318.192.93.86192.168.2.4
                                                          Dec 5, 2023 05:27:37.103133917 CET4974316458192.168.2.418.192.93.86
                                                          Dec 5, 2023 05:27:37.124674082 CET164584974318.192.93.86192.168.2.4
                                                          Dec 5, 2023 05:27:37.125006914 CET4974316458192.168.2.418.192.93.86
                                                          Dec 5, 2023 05:27:37.282288074 CET164584974318.192.93.86192.168.2.4
                                                          Dec 5, 2023 05:27:37.304326057 CET164584974318.192.93.86192.168.2.4
                                                          Dec 5, 2023 05:27:39.142297983 CET4974416458192.168.2.418.192.93.86
                                                          Dec 5, 2023 05:27:39.324057102 CET164584974418.192.93.86192.168.2.4
                                                          Dec 5, 2023 05:27:39.324219942 CET4974416458192.168.2.418.192.93.86
                                                          Dec 5, 2023 05:27:39.328646898 CET4974416458192.168.2.418.192.93.86
                                                          Dec 5, 2023 05:27:39.510148048 CET164584974418.192.93.86192.168.2.4
                                                          Dec 5, 2023 05:27:39.510370016 CET4974416458192.168.2.418.192.93.86
                                                          Dec 5, 2023 05:27:39.534426928 CET164584974418.192.93.86192.168.2.4
                                                          Dec 5, 2023 05:27:39.534616947 CET4974416458192.168.2.418.192.93.86
                                                          Dec 5, 2023 05:27:39.692107916 CET164584974418.192.93.86192.168.2.4
                                                          Dec 5, 2023 05:27:39.716304064 CET164584974418.192.93.86192.168.2.4
                                                          Dec 5, 2023 05:27:41.548855066 CET4974516458192.168.2.418.192.93.86
                                                          Dec 5, 2023 05:27:41.731054068 CET164584974518.192.93.86192.168.2.4
                                                          Dec 5, 2023 05:27:41.731234074 CET4974516458192.168.2.418.192.93.86
                                                          Dec 5, 2023 05:27:41.736299038 CET4974516458192.168.2.418.192.93.86
                                                          Dec 5, 2023 05:27:41.917385101 CET164584974518.192.93.86192.168.2.4
                                                          Dec 5, 2023 05:27:41.917484999 CET4974516458192.168.2.418.192.93.86
                                                          Dec 5, 2023 05:27:41.938051939 CET164584974518.192.93.86192.168.2.4
                                                          Dec 5, 2023 05:27:41.938209057 CET4974516458192.168.2.418.192.93.86
                                                          Dec 5, 2023 05:27:42.098556042 CET164584974518.192.93.86192.168.2.4
                                                          Dec 5, 2023 05:27:42.119472027 CET164584974518.192.93.86192.168.2.4
                                                          Dec 5, 2023 05:27:43.957629919 CET4974616458192.168.2.418.192.93.86
                                                          Dec 5, 2023 05:27:44.138308048 CET164584974618.192.93.86192.168.2.4
                                                          Dec 5, 2023 05:27:44.138454914 CET4974616458192.168.2.418.192.93.86
                                                          Dec 5, 2023 05:27:44.144607067 CET4974616458192.168.2.418.192.93.86
                                                          Dec 5, 2023 05:27:44.324827909 CET164584974618.192.93.86192.168.2.4
                                                          Dec 5, 2023 05:27:44.324898005 CET4974616458192.168.2.418.192.93.86
                                                          Dec 5, 2023 05:27:44.347814083 CET164584974618.192.93.86192.168.2.4
                                                          Dec 5, 2023 05:27:44.348001957 CET4974616458192.168.2.418.192.93.86
                                                          Dec 5, 2023 05:27:44.505533934 CET164584974618.192.93.86192.168.2.4
                                                          Dec 5, 2023 05:27:44.528431892 CET164584974618.192.93.86192.168.2.4
                                                          Dec 5, 2023 05:27:46.361248016 CET4974716458192.168.2.418.192.93.86
                                                          Dec 5, 2023 05:27:46.542675972 CET164584974718.192.93.86192.168.2.4
                                                          Dec 5, 2023 05:27:46.543041945 CET4974716458192.168.2.418.192.93.86
                                                          Dec 5, 2023 05:27:46.553435087 CET4974716458192.168.2.418.192.93.86
                                                          Dec 5, 2023 05:27:46.734807014 CET164584974718.192.93.86192.168.2.4
                                                          Dec 5, 2023 05:27:46.734884977 CET4974716458192.168.2.418.192.93.86
                                                          Dec 5, 2023 05:27:46.753317118 CET164584974718.192.93.86192.168.2.4
                                                          Dec 5, 2023 05:27:46.753423929 CET4974716458192.168.2.418.192.93.86
                                                          Dec 5, 2023 05:27:46.916421890 CET164584974718.192.93.86192.168.2.4
                                                          Dec 5, 2023 05:27:46.934462070 CET164584974718.192.93.86192.168.2.4
                                                          Dec 5, 2023 05:27:49.958756924 CET4974816458192.168.2.418.192.93.86
                                                          Dec 5, 2023 05:27:50.139600039 CET164584974818.192.93.86192.168.2.4
                                                          Dec 5, 2023 05:27:50.139869928 CET4974816458192.168.2.418.192.93.86
                                                          Dec 5, 2023 05:27:50.144328117 CET4974816458192.168.2.418.192.93.86
                                                          Dec 5, 2023 05:27:50.324974060 CET164584974818.192.93.86192.168.2.4
                                                          Dec 5, 2023 05:27:50.325082064 CET4974816458192.168.2.418.192.93.86
                                                          Dec 5, 2023 05:27:50.349661112 CET164584974818.192.93.86192.168.2.4
                                                          Dec 5, 2023 05:27:50.349749088 CET4974816458192.168.2.418.192.93.86
                                                          Dec 5, 2023 05:27:50.505656958 CET164584974818.192.93.86192.168.2.4
                                                          Dec 5, 2023 05:27:50.530061007 CET164584974818.192.93.86192.168.2.4
                                                          Dec 5, 2023 05:27:52.364568949 CET4974916458192.168.2.418.192.93.86
                                                          Dec 5, 2023 05:27:52.546359062 CET164584974918.192.93.86192.168.2.4
                                                          Dec 5, 2023 05:27:52.546463013 CET4974916458192.168.2.418.192.93.86
                                                          Dec 5, 2023 05:27:52.549904108 CET4974916458192.168.2.418.192.93.86
                                                          Dec 5, 2023 05:27:52.731344938 CET164584974918.192.93.86192.168.2.4
                                                          Dec 5, 2023 05:27:52.731544018 CET4974916458192.168.2.418.192.93.86
                                                          Dec 5, 2023 05:27:52.754446030 CET164584974918.192.93.86192.168.2.4
                                                          Dec 5, 2023 05:27:52.754703999 CET4974916458192.168.2.418.192.93.86
                                                          Dec 5, 2023 05:27:52.913340092 CET164584974918.192.93.86192.168.2.4
                                                          Dec 5, 2023 05:27:52.936355114 CET164584974918.192.93.86192.168.2.4
                                                          Dec 5, 2023 05:27:54.766952991 CET4975016458192.168.2.418.192.93.86
                                                          Dec 5, 2023 05:27:54.948190928 CET164584975018.192.93.86192.168.2.4
                                                          Dec 5, 2023 05:27:54.948280096 CET4975016458192.168.2.418.192.93.86
                                                          Dec 5, 2023 05:27:54.954060078 CET4975016458192.168.2.418.192.93.86
                                                          Dec 5, 2023 05:27:55.135355949 CET164584975018.192.93.86192.168.2.4
                                                          Dec 5, 2023 05:27:55.135430098 CET4975016458192.168.2.418.192.93.86
                                                          Dec 5, 2023 05:27:55.155316114 CET164584975018.192.93.86192.168.2.4
                                                          Dec 5, 2023 05:27:55.155468941 CET4975016458192.168.2.418.192.93.86
                                                          Dec 5, 2023 05:27:55.316608906 CET164584975018.192.93.86192.168.2.4
                                                          Dec 5, 2023 05:27:55.336519957 CET164584975018.192.93.86192.168.2.4
                                                          Dec 5, 2023 05:27:57.034962893 CET4975216458192.168.2.418.192.93.86
                                                          Dec 5, 2023 05:27:57.216675043 CET164584975218.192.93.86192.168.2.4
                                                          Dec 5, 2023 05:27:57.216809034 CET4975216458192.168.2.418.192.93.86
                                                          Dec 5, 2023 05:27:57.222094059 CET4975216458192.168.2.418.192.93.86
                                                          Dec 5, 2023 05:27:57.403769016 CET164584975218.192.93.86192.168.2.4
                                                          Dec 5, 2023 05:27:57.404139042 CET4975216458192.168.2.418.192.93.86
                                                          Dec 5, 2023 05:27:57.425157070 CET164584975218.192.93.86192.168.2.4
                                                          Dec 5, 2023 05:27:57.425509930 CET4975216458192.168.2.418.192.93.86
                                                          Dec 5, 2023 05:27:57.585966110 CET164584975218.192.93.86192.168.2.4
                                                          Dec 5, 2023 05:27:57.607347012 CET164584975218.192.93.86192.168.2.4
                                                          Dec 5, 2023 05:27:59.175225973 CET4975316458192.168.2.418.192.93.86
                                                          Dec 5, 2023 05:27:59.357191086 CET164584975318.192.93.86192.168.2.4
                                                          Dec 5, 2023 05:27:59.357357979 CET4975316458192.168.2.418.192.93.86
                                                          Dec 5, 2023 05:27:59.364101887 CET4975316458192.168.2.418.192.93.86
                                                          Dec 5, 2023 05:27:59.556874037 CET164584975318.192.93.86192.168.2.4
                                                          Dec 5, 2023 05:27:59.557035923 CET4975316458192.168.2.418.192.93.86
                                                          Dec 5, 2023 05:27:59.592807055 CET164584975318.192.93.86192.168.2.4
                                                          Dec 5, 2023 05:27:59.593035936 CET4975316458192.168.2.418.192.93.86
                                                          Dec 5, 2023 05:27:59.738961935 CET164584975318.192.93.86192.168.2.4
                                                          Dec 5, 2023 05:27:59.776794910 CET164584975318.192.93.86192.168.2.4
                                                          Dec 5, 2023 05:28:01.237221956 CET4975416458192.168.2.418.192.93.86
                                                          Dec 5, 2023 05:28:01.418463945 CET164584975418.192.93.86192.168.2.4
                                                          Dec 5, 2023 05:28:01.418749094 CET4975416458192.168.2.418.192.93.86
                                                          Dec 5, 2023 05:28:01.430068016 CET4975416458192.168.2.418.192.93.86
                                                          Dec 5, 2023 05:28:01.611960888 CET164584975418.192.93.86192.168.2.4
                                                          Dec 5, 2023 05:28:01.612207890 CET4975416458192.168.2.418.192.93.86
                                                          Dec 5, 2023 05:28:01.626612902 CET164584975418.192.93.86192.168.2.4
                                                          Dec 5, 2023 05:28:01.627007008 CET4975416458192.168.2.418.192.93.86
                                                          Dec 5, 2023 05:28:01.793443918 CET164584975418.192.93.86192.168.2.4
                                                          Dec 5, 2023 05:28:01.808331966 CET164584975418.192.93.86192.168.2.4
                                                          Dec 5, 2023 05:28:03.158860922 CET4975516458192.168.2.418.192.93.86
                                                          Dec 5, 2023 05:28:03.339740992 CET164584975518.192.93.86192.168.2.4
                                                          Dec 5, 2023 05:28:03.339956999 CET4975516458192.168.2.418.192.93.86
                                                          Dec 5, 2023 05:28:03.344909906 CET4975516458192.168.2.418.192.93.86
                                                          Dec 5, 2023 05:28:03.525619984 CET164584975518.192.93.86192.168.2.4
                                                          Dec 5, 2023 05:28:03.525947094 CET4975516458192.168.2.418.192.93.86
                                                          Dec 5, 2023 05:28:03.549583912 CET164584975518.192.93.86192.168.2.4
                                                          Dec 5, 2023 05:28:03.549674034 CET4975516458192.168.2.418.192.93.86
                                                          Dec 5, 2023 05:28:03.707056046 CET164584975518.192.93.86192.168.2.4
                                                          Dec 5, 2023 05:28:03.730364084 CET164584975518.192.93.86192.168.2.4
                                                          Dec 5, 2023 05:28:04.978863001 CET4975616458192.168.2.418.192.93.86
                                                          Dec 5, 2023 05:28:05.161423922 CET164584975618.192.93.86192.168.2.4
                                                          Dec 5, 2023 05:28:05.161756039 CET4975616458192.168.2.418.192.93.86
                                                          Dec 5, 2023 05:28:05.235367060 CET4975616458192.168.2.418.192.93.86
                                                          Dec 5, 2023 05:28:05.372781038 CET164584975618.192.93.86192.168.2.4
                                                          Dec 5, 2023 05:28:05.373115063 CET4975616458192.168.2.418.192.93.86
                                                          Dec 5, 2023 05:28:05.417557955 CET164584975618.192.93.86192.168.2.4
                                                          Dec 5, 2023 05:28:05.555358887 CET164584975618.192.93.86192.168.2.4
                                                          Dec 5, 2023 05:28:08.668066978 CET4975716458192.168.2.418.192.93.86
                                                          Dec 5, 2023 05:28:08.848764896 CET164584975718.192.93.86192.168.2.4
                                                          Dec 5, 2023 05:28:08.848881960 CET4975716458192.168.2.418.192.93.86
                                                          Dec 5, 2023 05:28:08.853677034 CET4975716458192.168.2.418.192.93.86
                                                          Dec 5, 2023 05:28:09.038162947 CET164584975718.192.93.86192.168.2.4
                                                          Dec 5, 2023 05:28:09.038399935 CET4975716458192.168.2.418.192.93.86
                                                          Dec 5, 2023 05:28:09.060671091 CET164584975718.192.93.86192.168.2.4
                                                          Dec 5, 2023 05:28:09.060924053 CET4975716458192.168.2.418.192.93.86
                                                          Dec 5, 2023 05:28:09.219188929 CET164584975718.192.93.86192.168.2.4
                                                          Dec 5, 2023 05:28:09.241512060 CET164584975718.192.93.86192.168.2.4
                                                          Dec 5, 2023 05:28:10.299913883 CET4975816458192.168.2.418.192.93.86
                                                          Dec 5, 2023 05:28:10.480824947 CET164584975818.192.93.86192.168.2.4
                                                          Dec 5, 2023 05:28:10.481075048 CET4975816458192.168.2.418.192.93.86
                                                          Dec 5, 2023 05:28:10.487488031 CET4975816458192.168.2.418.192.93.86
                                                          Dec 5, 2023 05:28:10.668288946 CET164584975818.192.93.86192.168.2.4
                                                          Dec 5, 2023 05:28:10.668370962 CET4975816458192.168.2.418.192.93.86
                                                          Dec 5, 2023 05:28:10.691364050 CET164584975818.192.93.86192.168.2.4
                                                          Dec 5, 2023 05:28:10.691437006 CET4975816458192.168.2.418.192.93.86
                                                          Dec 5, 2023 05:28:10.849215984 CET164584975818.192.93.86192.168.2.4
                                                          Dec 5, 2023 05:28:10.872423887 CET164584975818.192.93.86192.168.2.4
                                                          Dec 5, 2023 05:28:11.849832058 CET4975916458192.168.2.418.192.93.86
                                                          Dec 5, 2023 05:28:12.033368111 CET164584975918.192.93.86192.168.2.4
                                                          Dec 5, 2023 05:28:12.033638954 CET4975916458192.168.2.418.192.93.86
                                                          Dec 5, 2023 05:28:12.041950941 CET4975916458192.168.2.418.192.93.86
                                                          Dec 5, 2023 05:28:12.224512100 CET164584975918.192.93.86192.168.2.4
                                                          Dec 5, 2023 05:28:12.224797964 CET4975916458192.168.2.418.192.93.86
                                                          Dec 5, 2023 05:28:12.244060040 CET164584975918.192.93.86192.168.2.4
                                                          Dec 5, 2023 05:28:12.244648933 CET4975916458192.168.2.418.192.93.86
                                                          Dec 5, 2023 05:28:12.407784939 CET164584975918.192.93.86192.168.2.4
                                                          Dec 5, 2023 05:28:12.427309990 CET164584975918.192.93.86192.168.2.4
                                                          Dec 5, 2023 05:28:13.430679083 CET4976016458192.168.2.43.127.138.57
                                                          Dec 5, 2023 05:28:13.611274004 CET16458497603.127.138.57192.168.2.4
                                                          Dec 5, 2023 05:28:13.611989021 CET4976016458192.168.2.43.127.138.57
                                                          Dec 5, 2023 05:28:13.622006893 CET4976016458192.168.2.43.127.138.57
                                                          Dec 5, 2023 05:28:13.802617073 CET16458497603.127.138.57192.168.2.4
                                                          Dec 5, 2023 05:28:13.802700996 CET4976016458192.168.2.43.127.138.57
                                                          Dec 5, 2023 05:28:13.819195986 CET16458497603.127.138.57192.168.2.4
                                                          Dec 5, 2023 05:28:13.819299936 CET4976016458192.168.2.43.127.138.57
                                                          Dec 5, 2023 05:28:13.982839108 CET16458497603.127.138.57192.168.2.4
                                                          Dec 5, 2023 05:28:14.000186920 CET16458497603.127.138.57192.168.2.4
                                                          Dec 5, 2023 05:28:14.832257986 CET4976116458192.168.2.43.127.138.57
                                                          Dec 5, 2023 05:28:15.014214039 CET16458497613.127.138.57192.168.2.4
                                                          Dec 5, 2023 05:28:15.014848948 CET4976116458192.168.2.43.127.138.57
                                                          Dec 5, 2023 05:28:15.020275116 CET4976116458192.168.2.43.127.138.57
                                                          Dec 5, 2023 05:28:15.201412916 CET16458497613.127.138.57192.168.2.4
                                                          Dec 5, 2023 05:28:15.201898098 CET4976116458192.168.2.43.127.138.57
                                                          Dec 5, 2023 05:28:15.222107887 CET16458497613.127.138.57192.168.2.4
                                                          Dec 5, 2023 05:28:15.222623110 CET4976116458192.168.2.43.127.138.57
                                                          Dec 5, 2023 05:28:15.382967949 CET16458497613.127.138.57192.168.2.4
                                                          Dec 5, 2023 05:28:15.403848886 CET16458497613.127.138.57192.168.2.4
                                                          Dec 5, 2023 05:28:16.177051067 CET4976216458192.168.2.43.127.138.57
                                                          Dec 5, 2023 05:28:16.359142065 CET16458497623.127.138.57192.168.2.4
                                                          Dec 5, 2023 05:28:16.359534979 CET4976216458192.168.2.43.127.138.57
                                                          Dec 5, 2023 05:28:16.371121883 CET4976216458192.168.2.43.127.138.57
                                                          Dec 5, 2023 05:28:16.553730965 CET16458497623.127.138.57192.168.2.4
                                                          Dec 5, 2023 05:28:16.554164886 CET4976216458192.168.2.43.127.138.57
                                                          Dec 5, 2023 05:28:16.573640108 CET16458497623.127.138.57192.168.2.4
                                                          Dec 5, 2023 05:28:16.574120998 CET4976216458192.168.2.43.127.138.57
                                                          Dec 5, 2023 05:28:16.736469984 CET16458497623.127.138.57192.168.2.4
                                                          Dec 5, 2023 05:28:16.756390095 CET16458497623.127.138.57192.168.2.4
                                                          Dec 5, 2023 05:28:17.459703922 CET4976316458192.168.2.43.127.138.57
                                                          Dec 5, 2023 05:28:17.644896030 CET16458497633.127.138.57192.168.2.4
                                                          Dec 5, 2023 05:28:17.645133972 CET4976316458192.168.2.43.127.138.57
                                                          Dec 5, 2023 05:28:17.650304079 CET4976316458192.168.2.43.127.138.57
                                                          Dec 5, 2023 05:28:17.831263065 CET16458497633.127.138.57192.168.2.4
                                                          Dec 5, 2023 05:28:17.831562996 CET4976316458192.168.2.43.127.138.57
                                                          Dec 5, 2023 05:28:17.852756023 CET16458497633.127.138.57192.168.2.4
                                                          Dec 5, 2023 05:28:17.853055954 CET4976316458192.168.2.43.127.138.57
                                                          Dec 5, 2023 05:28:18.012672901 CET16458497633.127.138.57192.168.2.4
                                                          Dec 5, 2023 05:28:18.033772945 CET16458497633.127.138.57192.168.2.4
                                                          Dec 5, 2023 05:28:18.675345898 CET4976416458192.168.2.43.127.138.57
                                                          Dec 5, 2023 05:28:18.855998993 CET16458497643.127.138.57192.168.2.4
                                                          Dec 5, 2023 05:28:18.856092930 CET4976416458192.168.2.43.127.138.57
                                                          Dec 5, 2023 05:28:18.862030029 CET4976416458192.168.2.43.127.138.57
                                                          Dec 5, 2023 05:28:19.042253971 CET16458497643.127.138.57192.168.2.4
                                                          Dec 5, 2023 05:28:19.042465925 CET4976416458192.168.2.43.127.138.57
                                                          Dec 5, 2023 05:28:19.062050104 CET16458497643.127.138.57192.168.2.4
                                                          Dec 5, 2023 05:28:19.062299013 CET4976416458192.168.2.43.127.138.57
                                                          Dec 5, 2023 05:28:19.223001957 CET16458497643.127.138.57192.168.2.4
                                                          Dec 5, 2023 05:28:19.242440939 CET16458497643.127.138.57192.168.2.4
                                                          Dec 5, 2023 05:28:19.832783937 CET4976516458192.168.2.43.127.138.57
                                                          Dec 5, 2023 05:28:20.014259100 CET16458497653.127.138.57192.168.2.4
                                                          Dec 5, 2023 05:28:20.014448881 CET4976516458192.168.2.43.127.138.57
                                                          Dec 5, 2023 05:28:20.020258904 CET4976516458192.168.2.43.127.138.57
                                                          Dec 5, 2023 05:28:20.204004049 CET16458497653.127.138.57192.168.2.4
                                                          Dec 5, 2023 05:28:20.204123974 CET4976516458192.168.2.43.127.138.57
                                                          Dec 5, 2023 05:28:20.224060059 CET16458497653.127.138.57192.168.2.4
                                                          Dec 5, 2023 05:28:20.224147081 CET4976516458192.168.2.43.127.138.57
                                                          Dec 5, 2023 05:28:20.385435104 CET16458497653.127.138.57192.168.2.4
                                                          Dec 5, 2023 05:28:20.405136108 CET16458497653.127.138.57192.168.2.4
                                                          Dec 5, 2023 05:28:20.940346003 CET4976616458192.168.2.43.127.138.57
                                                          Dec 5, 2023 05:28:21.122375965 CET16458497663.127.138.57192.168.2.4
                                                          Dec 5, 2023 05:28:21.122546911 CET4976616458192.168.2.43.127.138.57
                                                          Dec 5, 2023 05:28:21.128905058 CET4976616458192.168.2.43.127.138.57
                                                          Dec 5, 2023 05:28:21.310457945 CET16458497663.127.138.57192.168.2.4
                                                          Dec 5, 2023 05:28:21.310664892 CET4976616458192.168.2.43.127.138.57
                                                          Dec 5, 2023 05:28:21.332799911 CET16458497663.127.138.57192.168.2.4
                                                          Dec 5, 2023 05:28:21.332895994 CET4976616458192.168.2.43.127.138.57
                                                          Dec 5, 2023 05:28:21.492465973 CET16458497663.127.138.57192.168.2.4
                                                          Dec 5, 2023 05:28:21.514655113 CET16458497663.127.138.57192.168.2.4
                                                          Dec 5, 2023 05:28:22.003150940 CET4976716458192.168.2.43.127.138.57
                                                          Dec 5, 2023 05:28:22.185956955 CET16458497673.127.138.57192.168.2.4
                                                          Dec 5, 2023 05:28:22.186500072 CET4976716458192.168.2.43.127.138.57
                                                          Dec 5, 2023 05:28:22.190599918 CET4976716458192.168.2.43.127.138.57
                                                          Dec 5, 2023 05:28:22.372564077 CET16458497673.127.138.57192.168.2.4
                                                          Dec 5, 2023 05:28:22.372756958 CET4976716458192.168.2.43.127.138.57
                                                          Dec 5, 2023 05:28:22.396533012 CET16458497673.127.138.57192.168.2.4
                                                          Dec 5, 2023 05:28:22.396646023 CET4976716458192.168.2.43.127.138.57
                                                          Dec 5, 2023 05:28:22.554672003 CET16458497673.127.138.57192.168.2.4
                                                          Dec 5, 2023 05:28:22.578524113 CET16458497673.127.138.57192.168.2.4
                                                          Dec 5, 2023 05:28:23.036773920 CET4976816458192.168.2.43.127.138.57
                                                          Dec 5, 2023 05:28:23.216742039 CET16458497683.127.138.57192.168.2.4
                                                          Dec 5, 2023 05:28:23.216830015 CET4976816458192.168.2.43.127.138.57
                                                          Dec 5, 2023 05:28:23.220536947 CET4976816458192.168.2.43.127.138.57
                                                          Dec 5, 2023 05:28:23.399945974 CET16458497683.127.138.57192.168.2.4
                                                          Dec 5, 2023 05:28:23.400280952 CET4976816458192.168.2.43.127.138.57
                                                          Dec 5, 2023 05:28:23.423377037 CET16458497683.127.138.57192.168.2.4
                                                          Dec 5, 2023 05:28:23.423814058 CET4976816458192.168.2.43.127.138.57
                                                          Dec 5, 2023 05:28:23.583431959 CET16458497683.127.138.57192.168.2.4
                                                          Dec 5, 2023 05:28:23.605496883 CET16458497683.127.138.57192.168.2.4
                                                          Dec 5, 2023 05:28:24.018290043 CET4976916458192.168.2.43.127.138.57
                                                          Dec 5, 2023 05:28:24.199675083 CET16458497693.127.138.57192.168.2.4
                                                          Dec 5, 2023 05:28:24.200238943 CET4976916458192.168.2.43.127.138.57
                                                          Dec 5, 2023 05:28:24.205480099 CET4976916458192.168.2.43.127.138.57
                                                          Dec 5, 2023 05:28:24.386456966 CET16458497693.127.138.57192.168.2.4
                                                          Dec 5, 2023 05:28:24.386935949 CET4976916458192.168.2.43.127.138.57
                                                          Dec 5, 2023 05:28:24.413384914 CET16458497693.127.138.57192.168.2.4
                                                          Dec 5, 2023 05:28:24.413795948 CET4976916458192.168.2.43.127.138.57
                                                          Dec 5, 2023 05:28:24.568296909 CET16458497693.127.138.57192.168.2.4
                                                          Dec 5, 2023 05:28:24.594763041 CET16458497693.127.138.57192.168.2.4
                                                          Dec 5, 2023 05:28:24.957974911 CET4977016458192.168.2.43.127.138.57
                                                          Dec 5, 2023 05:28:25.139723063 CET16458497703.127.138.57192.168.2.4
                                                          Dec 5, 2023 05:28:25.140073061 CET4977016458192.168.2.43.127.138.57
                                                          Dec 5, 2023 05:28:25.143485069 CET4977016458192.168.2.43.127.138.57
                                                          Dec 5, 2023 05:28:25.323821068 CET16458497703.127.138.57192.168.2.4
                                                          Dec 5, 2023 05:28:25.324265957 CET4977016458192.168.2.43.127.138.57
                                                          Dec 5, 2023 05:28:25.351476908 CET16458497703.127.138.57192.168.2.4
                                                          Dec 5, 2023 05:28:25.351891994 CET4977016458192.168.2.43.127.138.57
                                                          Dec 5, 2023 05:28:25.504853010 CET16458497703.127.138.57192.168.2.4
                                                          Dec 5, 2023 05:28:25.534689903 CET16458497703.127.138.57192.168.2.4
                                                          Dec 5, 2023 05:28:27.239979982 CET4977116458192.168.2.43.127.138.57
                                                          Dec 5, 2023 05:28:27.421088934 CET16458497713.127.138.57192.168.2.4
                                                          Dec 5, 2023 05:28:27.421211004 CET4977116458192.168.2.43.127.138.57
                                                          Dec 5, 2023 05:28:27.423552990 CET4977116458192.168.2.43.127.138.57
                                                          Dec 5, 2023 05:28:27.604425907 CET16458497713.127.138.57192.168.2.4
                                                          Dec 5, 2023 05:28:27.604676962 CET4977116458192.168.2.43.127.138.57
                                                          Dec 5, 2023 05:28:27.629154921 CET16458497713.127.138.57192.168.2.4
                                                          Dec 5, 2023 05:28:27.629668951 CET4977116458192.168.2.43.127.138.57
                                                          Dec 5, 2023 05:28:27.785600901 CET16458497713.127.138.57192.168.2.4
                                                          Dec 5, 2023 05:28:27.810756922 CET16458497713.127.138.57192.168.2.4
                                                          Dec 5, 2023 05:28:28.112834930 CET4977216458192.168.2.43.127.138.57
                                                          Dec 5, 2023 05:28:28.294145107 CET16458497723.127.138.57192.168.2.4
                                                          Dec 5, 2023 05:28:28.294387102 CET4977216458192.168.2.43.127.138.57
                                                          Dec 5, 2023 05:28:28.296607971 CET4977216458192.168.2.43.127.138.57
                                                          Dec 5, 2023 05:28:28.476826906 CET16458497723.127.138.57192.168.2.4
                                                          Dec 5, 2023 05:28:28.477293968 CET4977216458192.168.2.43.127.138.57
                                                          Dec 5, 2023 05:28:28.502850056 CET16458497723.127.138.57192.168.2.4
                                                          Dec 5, 2023 05:28:28.503232002 CET4977216458192.168.2.43.127.138.57
                                                          Dec 5, 2023 05:28:28.657448053 CET16458497723.127.138.57192.168.2.4
                                                          Dec 5, 2023 05:28:28.683335066 CET16458497723.127.138.57192.168.2.4
                                                          Dec 5, 2023 05:28:28.955874920 CET4977316458192.168.2.43.127.138.57
                                                          Dec 5, 2023 05:28:29.136789083 CET16458497733.127.138.57192.168.2.4
                                                          Dec 5, 2023 05:28:29.136908054 CET4977316458192.168.2.43.127.138.57
                                                          Dec 5, 2023 05:28:29.139050007 CET4977316458192.168.2.43.127.138.57
                                                          Dec 5, 2023 05:28:29.319603920 CET16458497733.127.138.57192.168.2.4
                                                          Dec 5, 2023 05:28:29.319797993 CET4977316458192.168.2.43.127.138.57
                                                          Dec 5, 2023 05:28:29.346061945 CET16458497733.127.138.57192.168.2.4
                                                          Dec 5, 2023 05:28:29.346283913 CET4977316458192.168.2.43.127.138.57
                                                          Dec 5, 2023 05:28:29.500535011 CET16458497733.127.138.57192.168.2.4
                                                          Dec 5, 2023 05:28:29.527188063 CET16458497733.127.138.57192.168.2.4
                                                          Dec 5, 2023 05:28:29.767997026 CET4977416458192.168.2.43.127.138.57
                                                          Dec 5, 2023 05:28:29.950818062 CET16458497743.127.138.57192.168.2.4
                                                          Dec 5, 2023 05:28:29.950922012 CET4977416458192.168.2.43.127.138.57
                                                          Dec 5, 2023 05:28:29.955111980 CET4977416458192.168.2.43.127.138.57
                                                          Dec 5, 2023 05:28:30.136852980 CET16458497743.127.138.57192.168.2.4
                                                          Dec 5, 2023 05:28:30.136951923 CET4977416458192.168.2.43.127.138.57
                                                          Dec 5, 2023 05:28:30.161207914 CET16458497743.127.138.57192.168.2.4
                                                          Dec 5, 2023 05:28:30.161426067 CET4977416458192.168.2.43.127.138.57
                                                          Dec 5, 2023 05:28:30.317996025 CET16458497743.127.138.57192.168.2.4
                                                          Dec 5, 2023 05:28:30.342216015 CET16458497743.127.138.57192.168.2.4
                                                          Dec 5, 2023 05:28:30.566833973 CET4977516458192.168.2.43.127.138.57
                                                          Dec 5, 2023 05:28:30.747849941 CET16458497753.127.138.57192.168.2.4
                                                          Dec 5, 2023 05:28:30.748478889 CET4977516458192.168.2.43.127.138.57
                                                          Dec 5, 2023 05:28:30.751692057 CET4977516458192.168.2.43.127.138.57
                                                          Dec 5, 2023 05:28:30.932626009 CET16458497753.127.138.57192.168.2.4
                                                          Dec 5, 2023 05:28:30.932975054 CET4977516458192.168.2.43.127.138.57
                                                          Dec 5, 2023 05:28:30.957017899 CET16458497753.127.138.57192.168.2.4
                                                          Dec 5, 2023 05:28:30.957288980 CET4977516458192.168.2.43.127.138.57
                                                          Dec 5, 2023 05:28:31.113367081 CET16458497753.127.138.57192.168.2.4
                                                          Dec 5, 2023 05:28:31.137576103 CET16458497753.127.138.57192.168.2.4
                                                          Dec 5, 2023 05:28:31.330581903 CET4977616458192.168.2.43.127.138.57
                                                          Dec 5, 2023 05:28:31.510442019 CET16458497763.127.138.57192.168.2.4
                                                          Dec 5, 2023 05:28:31.510577917 CET4977616458192.168.2.43.127.138.57
                                                          Dec 5, 2023 05:28:31.512762070 CET4977616458192.168.2.43.127.138.57
                                                          Dec 5, 2023 05:28:31.693936110 CET16458497763.127.138.57192.168.2.4
                                                          Dec 5, 2023 05:28:31.694132090 CET4977616458192.168.2.43.127.138.57
                                                          Dec 5, 2023 05:28:31.724443913 CET16458497763.127.138.57192.168.2.4
                                                          Dec 5, 2023 05:28:31.724530935 CET4977616458192.168.2.43.127.138.57
                                                          Dec 5, 2023 05:28:31.874433041 CET16458497763.127.138.57192.168.2.4
                                                          Dec 5, 2023 05:28:31.904369116 CET16458497763.127.138.57192.168.2.4
                                                          Dec 5, 2023 05:28:32.066109896 CET4977716458192.168.2.43.127.138.57
                                                          Dec 5, 2023 05:28:32.245996952 CET16458497773.127.138.57192.168.2.4
                                                          Dec 5, 2023 05:28:32.246220112 CET4977716458192.168.2.43.127.138.57
                                                          Dec 5, 2023 05:28:32.250015020 CET4977716458192.168.2.43.127.138.57
                                                          Dec 5, 2023 05:28:32.429610968 CET16458497773.127.138.57192.168.2.4
                                                          Dec 5, 2023 05:28:32.429924965 CET4977716458192.168.2.43.127.138.57
                                                          Dec 5, 2023 05:28:32.460365057 CET16458497773.127.138.57192.168.2.4
                                                          Dec 5, 2023 05:28:32.460470915 CET4977716458192.168.2.43.127.138.57
                                                          Dec 5, 2023 05:28:32.609860897 CET16458497773.127.138.57192.168.2.4
                                                          Dec 5, 2023 05:28:32.640189886 CET16458497773.127.138.57192.168.2.4
                                                          Dec 5, 2023 05:28:32.783577919 CET4977816458192.168.2.43.127.138.57
                                                          Dec 5, 2023 05:28:32.965835094 CET16458497783.127.138.57192.168.2.4
                                                          Dec 5, 2023 05:28:32.965924025 CET4977816458192.168.2.43.127.138.57
                                                          Dec 5, 2023 05:28:32.971143007 CET4977816458192.168.2.43.127.138.57
                                                          Dec 5, 2023 05:28:33.152704000 CET16458497783.127.138.57192.168.2.4
                                                          Dec 5, 2023 05:28:33.152986050 CET4977816458192.168.2.43.127.138.57
                                                          Dec 5, 2023 05:28:33.176383018 CET16458497783.127.138.57192.168.2.4
                                                          Dec 5, 2023 05:28:33.176475048 CET4977816458192.168.2.43.127.138.57
                                                          Dec 5, 2023 05:28:33.334526062 CET16458497783.127.138.57192.168.2.4
                                                          Dec 5, 2023 05:28:33.358489990 CET16458497783.127.138.57192.168.2.4
                                                          Dec 5, 2023 05:28:33.470933914 CET4977916458192.168.2.43.127.138.57
                                                          Dec 5, 2023 05:28:33.651483059 CET16458497793.127.138.57192.168.2.4
                                                          Dec 5, 2023 05:28:33.651681900 CET4977916458192.168.2.43.127.138.57
                                                          Dec 5, 2023 05:28:33.654731035 CET4977916458192.168.2.43.127.138.57
                                                          Dec 5, 2023 05:28:33.835086107 CET16458497793.127.138.57192.168.2.4
                                                          Dec 5, 2023 05:28:33.835225105 CET4977916458192.168.2.43.127.138.57
                                                          Dec 5, 2023 05:28:33.857811928 CET16458497793.127.138.57192.168.2.4
                                                          Dec 5, 2023 05:28:33.858026028 CET4977916458192.168.2.43.127.138.57
                                                          Dec 5, 2023 05:28:34.018946886 CET16458497793.127.138.57192.168.2.4
                                                          Dec 5, 2023 05:28:34.041568995 CET16458497793.127.138.57192.168.2.4
                                                          Dec 5, 2023 05:28:34.150885105 CET4978016458192.168.2.43.127.138.57
                                                          Dec 5, 2023 05:28:34.331434965 CET16458497803.127.138.57192.168.2.4
                                                          Dec 5, 2023 05:28:34.331558943 CET4978016458192.168.2.43.127.138.57
                                                          Dec 5, 2023 05:28:34.335865021 CET4978016458192.168.2.43.127.138.57
                                                          Dec 5, 2023 05:28:34.515496016 CET16458497803.127.138.57192.168.2.4
                                                          Dec 5, 2023 05:28:34.515760899 CET4978016458192.168.2.43.127.138.57
                                                          Dec 5, 2023 05:28:34.538876057 CET16458497803.127.138.57192.168.2.4
                                                          Dec 5, 2023 05:28:34.539195061 CET4978016458192.168.2.43.127.138.57
                                                          Dec 5, 2023 05:28:34.695352077 CET16458497803.127.138.57192.168.2.4
                                                          Dec 5, 2023 05:28:34.718879938 CET16458497803.127.138.57192.168.2.4
                                                          Dec 5, 2023 05:28:34.800570965 CET4978116458192.168.2.43.127.138.57
                                                          Dec 5, 2023 05:28:34.981544971 CET16458497813.127.138.57192.168.2.4
                                                          Dec 5, 2023 05:28:34.981673002 CET4978116458192.168.2.43.127.138.57
                                                          Dec 5, 2023 05:28:34.985111952 CET4978116458192.168.2.43.127.138.57
                                                          Dec 5, 2023 05:28:35.166100025 CET16458497813.127.138.57192.168.2.4
                                                          Dec 5, 2023 05:28:35.166212082 CET4978116458192.168.2.43.127.138.57
                                                          Dec 5, 2023 05:28:35.188905954 CET16458497813.127.138.57192.168.2.4
                                                          Dec 5, 2023 05:28:35.188992977 CET4978116458192.168.2.43.127.138.57
                                                          Dec 5, 2023 05:28:35.347196102 CET16458497813.127.138.57192.168.2.4
                                                          Dec 5, 2023 05:28:35.369610071 CET16458497813.127.138.57192.168.2.4
                                                          Dec 5, 2023 05:28:35.439078093 CET4978216458192.168.2.43.127.138.57
                                                          Dec 5, 2023 05:28:35.620204926 CET16458497823.127.138.57192.168.2.4
                                                          Dec 5, 2023 05:28:35.620474100 CET4978216458192.168.2.43.127.138.57
                                                          Dec 5, 2023 05:28:35.624001980 CET4978216458192.168.2.43.127.138.57
                                                          Dec 5, 2023 05:28:35.805296898 CET16458497823.127.138.57192.168.2.4
                                                          Dec 5, 2023 05:28:35.805505037 CET4978216458192.168.2.43.127.138.57
                                                          Dec 5, 2023 05:28:35.837419033 CET16458497823.127.138.57192.168.2.4
                                                          Dec 5, 2023 05:28:35.837630987 CET4978216458192.168.2.43.127.138.57
                                                          Dec 5, 2023 05:28:35.986700058 CET16458497823.127.138.57192.168.2.4
                                                          Dec 5, 2023 05:28:36.018660069 CET16458497823.127.138.57192.168.2.4
                                                          Dec 5, 2023 05:28:36.064234972 CET4978316458192.168.2.43.127.138.57
                                                          Dec 5, 2023 05:28:36.245362043 CET16458497833.127.138.57192.168.2.4
                                                          Dec 5, 2023 05:28:36.245632887 CET4978316458192.168.2.43.127.138.57
                                                          Dec 5, 2023 05:28:36.247853041 CET4978316458192.168.2.43.127.138.57
                                                          Dec 5, 2023 05:28:36.428905010 CET16458497833.127.138.57192.168.2.4
                                                          Dec 5, 2023 05:28:36.429111004 CET4978316458192.168.2.43.127.138.57
                                                          Dec 5, 2023 05:28:36.452836037 CET16458497833.127.138.57192.168.2.4
                                                          Dec 5, 2023 05:28:36.453022957 CET4978316458192.168.2.43.127.138.57
                                                          Dec 5, 2023 05:28:36.610081911 CET16458497833.127.138.57192.168.2.4
                                                          Dec 5, 2023 05:28:36.634282112 CET16458497833.127.138.57192.168.2.4
                                                          Dec 5, 2023 05:28:36.673229933 CET4978416458192.168.2.43.127.138.57
                                                          Dec 5, 2023 05:28:36.852771044 CET16458497843.127.138.57192.168.2.4
                                                          Dec 5, 2023 05:28:36.853121996 CET4978416458192.168.2.43.127.138.57
                                                          Dec 5, 2023 05:28:36.855308056 CET4978416458192.168.2.43.127.138.57
                                                          Dec 5, 2023 05:28:37.034768105 CET16458497843.127.138.57192.168.2.4
                                                          Dec 5, 2023 05:28:37.034990072 CET4978416458192.168.2.43.127.138.57
                                                          Dec 5, 2023 05:28:37.059216976 CET16458497843.127.138.57192.168.2.4
                                                          Dec 5, 2023 05:28:37.059438944 CET4978416458192.168.2.43.127.138.57
                                                          Dec 5, 2023 05:28:37.214447975 CET16458497843.127.138.57192.168.2.4
                                                          Dec 5, 2023 05:28:37.239029884 CET16458497843.127.138.57192.168.2.4
                                                          Dec 5, 2023 05:28:37.267535925 CET4978516458192.168.2.43.127.138.57
                                                          Dec 5, 2023 05:28:37.450804949 CET16458497853.127.138.57192.168.2.4
                                                          Dec 5, 2023 05:28:37.451200008 CET4978516458192.168.2.43.127.138.57
                                                          Dec 5, 2023 05:28:37.455172062 CET4978516458192.168.2.43.127.138.57
                                                          Dec 5, 2023 05:28:37.637557030 CET16458497853.127.138.57192.168.2.4
                                                          Dec 5, 2023 05:28:37.637658119 CET4978516458192.168.2.43.127.138.57
                                                          Dec 5, 2023 05:28:37.662879944 CET16458497853.127.138.57192.168.2.4
                                                          Dec 5, 2023 05:28:37.662947893 CET4978516458192.168.2.43.127.138.57
                                                          Dec 5, 2023 05:28:37.820302963 CET16458497853.127.138.57192.168.2.4
                                                          Dec 5, 2023 05:28:37.843888998 CET4978516458192.168.2.43.127.138.57
                                                          Dec 5, 2023 05:28:37.845067978 CET4978616458192.168.2.43.127.138.57
                                                          Dec 5, 2023 05:28:37.845082998 CET16458497853.127.138.57192.168.2.4
                                                          Dec 5, 2023 05:28:38.024517059 CET16458497863.127.138.57192.168.2.4
                                                          Dec 5, 2023 05:28:38.024665117 CET4978616458192.168.2.43.127.138.57
                                                          Dec 5, 2023 05:28:38.026262999 CET16458497853.127.138.57192.168.2.4
                                                          Dec 5, 2023 05:28:38.034826040 CET4978616458192.168.2.43.127.138.57
                                                          Dec 5, 2023 05:28:38.216082096 CET16458497863.127.138.57192.168.2.4
                                                          Dec 5, 2023 05:28:38.216145992 CET4978616458192.168.2.43.127.138.57
                                                          Dec 5, 2023 05:28:38.238679886 CET16458497863.127.138.57192.168.2.4
                                                          Dec 5, 2023 05:28:38.238763094 CET4978616458192.168.2.43.127.138.57
                                                          Dec 5, 2023 05:28:38.395812988 CET16458497863.127.138.57192.168.2.4
                                                          Dec 5, 2023 05:28:38.418281078 CET16458497863.127.138.57192.168.2.4
                                                          Dec 5, 2023 05:28:38.425878048 CET4978716458192.168.2.43.127.138.57
                                                          Dec 5, 2023 05:28:38.608221054 CET16458497873.127.138.57192.168.2.4
                                                          Dec 5, 2023 05:28:38.608443022 CET4978716458192.168.2.43.127.138.57
                                                          Dec 5, 2023 05:28:38.610835075 CET4978716458192.168.2.43.127.138.57
                                                          Dec 5, 2023 05:28:38.793019056 CET16458497873.127.138.57192.168.2.4
                                                          Dec 5, 2023 05:28:38.793091059 CET4978716458192.168.2.43.127.138.57
                                                          Dec 5, 2023 05:28:38.816998959 CET16458497873.127.138.57192.168.2.4
                                                          Dec 5, 2023 05:28:38.817066908 CET4978716458192.168.2.43.127.138.57
                                                          Dec 5, 2023 05:28:38.975378990 CET16458497873.127.138.57192.168.2.4
                                                          Dec 5, 2023 05:28:38.984127998 CET4978716458192.168.2.43.127.138.57
                                                          Dec 5, 2023 05:28:38.986244917 CET4978816458192.168.2.43.127.138.57
                                                          Dec 5, 2023 05:28:38.999239922 CET16458497873.127.138.57192.168.2.4
                                                          Dec 5, 2023 05:28:39.165934086 CET16458497883.127.138.57192.168.2.4
                                                          Dec 5, 2023 05:28:39.166311979 CET4978816458192.168.2.43.127.138.57
                                                          Dec 5, 2023 05:28:39.166734934 CET16458497873.127.138.57192.168.2.4
                                                          Dec 5, 2023 05:28:39.169079065 CET4978816458192.168.2.43.127.138.57
                                                          Dec 5, 2023 05:28:39.348793983 CET16458497883.127.138.57192.168.2.4
                                                          Dec 5, 2023 05:28:39.348879099 CET4978816458192.168.2.43.127.138.57
                                                          Dec 5, 2023 05:28:39.372564077 CET16458497883.127.138.57192.168.2.4
                                                          Dec 5, 2023 05:28:39.372648954 CET4978816458192.168.2.43.127.138.57
                                                          Dec 5, 2023 05:28:39.528573990 CET16458497883.127.138.57192.168.2.4
                                                          Dec 5, 2023 05:28:39.531642914 CET4978816458192.168.2.43.127.138.57
                                                          Dec 5, 2023 05:28:39.535516977 CET4978916458192.168.2.43.127.138.57
                                                          Dec 5, 2023 05:28:39.552277088 CET16458497883.127.138.57192.168.2.4
                                                          Dec 5, 2023 05:28:39.710757971 CET16458497883.127.138.57192.168.2.4
                                                          Dec 5, 2023 05:28:39.715727091 CET16458497893.127.138.57192.168.2.4
                                                          Dec 5, 2023 05:28:39.715856075 CET4978916458192.168.2.43.127.138.57
                                                          Dec 5, 2023 05:28:39.720244884 CET4978916458192.168.2.43.127.138.57
                                                          Dec 5, 2023 05:28:39.900664091 CET16458497893.127.138.57192.168.2.4
                                                          Dec 5, 2023 05:28:39.901042938 CET4978916458192.168.2.43.127.138.57
                                                          Dec 5, 2023 05:28:39.925329924 CET16458497893.127.138.57192.168.2.4
                                                          Dec 5, 2023 05:28:39.925600052 CET4978916458192.168.2.43.127.138.57
                                                          Dec 5, 2023 05:28:40.078145981 CET4978916458192.168.2.43.127.138.57
                                                          Dec 5, 2023 05:28:40.079849958 CET4979016458192.168.2.43.127.138.57
                                                          Dec 5, 2023 05:28:40.081685066 CET16458497893.127.138.57192.168.2.4
                                                          Dec 5, 2023 05:28:40.106054068 CET16458497893.127.138.57192.168.2.4
                                                          Dec 5, 2023 05:28:40.258512974 CET16458497893.127.138.57192.168.2.4
                                                          Dec 5, 2023 05:28:40.262083054 CET16458497903.127.138.57192.168.2.4
                                                          Dec 5, 2023 05:28:40.262319088 CET4979016458192.168.2.43.127.138.57
                                                          Dec 5, 2023 05:28:40.265275002 CET4979016458192.168.2.43.127.138.57
                                                          Dec 5, 2023 05:28:40.447294950 CET16458497903.127.138.57192.168.2.4
                                                          Dec 5, 2023 05:28:40.447649002 CET4979016458192.168.2.43.127.138.57
                                                          Dec 5, 2023 05:28:40.478400946 CET16458497903.127.138.57192.168.2.4
                                                          Dec 5, 2023 05:28:40.478640079 CET4979016458192.168.2.43.127.138.57
                                                          Dec 5, 2023 05:28:40.609530926 CET4979016458192.168.2.43.127.138.57
                                                          Dec 5, 2023 05:28:40.611320019 CET4979116458192.168.2.43.127.138.57
                                                          Dec 5, 2023 05:28:40.629657984 CET16458497903.127.138.57192.168.2.4
                                                          Dec 5, 2023 05:28:40.661338091 CET16458497903.127.138.57192.168.2.4
                                                          Dec 5, 2023 05:28:40.791485071 CET16458497913.127.138.57192.168.2.4
                                                          Dec 5, 2023 05:28:40.791544914 CET16458497903.127.138.57192.168.2.4
                                                          Dec 5, 2023 05:28:40.792013884 CET4979116458192.168.2.43.127.138.57
                                                          Dec 5, 2023 05:28:40.794776917 CET4979116458192.168.2.43.127.138.57
                                                          Dec 5, 2023 05:28:40.975066900 CET16458497913.127.138.57192.168.2.4
                                                          Dec 5, 2023 05:28:40.975474119 CET4979116458192.168.2.43.127.138.57
                                                          Dec 5, 2023 05:28:40.999635935 CET16458497913.127.138.57192.168.2.4
                                                          Dec 5, 2023 05:28:41.000121117 CET4979116458192.168.2.43.127.138.57
                                                          Dec 5, 2023 05:28:41.125080109 CET4979116458192.168.2.43.127.138.57
                                                          Dec 5, 2023 05:28:41.128765106 CET4979216458192.168.2.43.127.138.57
                                                          Dec 5, 2023 05:28:41.155754089 CET16458497913.127.138.57192.168.2.4
                                                          Dec 5, 2023 05:28:41.180187941 CET16458497913.127.138.57192.168.2.4
                                                          Dec 5, 2023 05:28:41.305164099 CET16458497913.127.138.57192.168.2.4
                                                          Dec 5, 2023 05:28:41.310233116 CET16458497923.127.138.57192.168.2.4
                                                          Dec 5, 2023 05:28:41.310480118 CET4979216458192.168.2.43.127.138.57
                                                          Dec 5, 2023 05:28:41.313997030 CET4979216458192.168.2.43.127.138.57
                                                          Dec 5, 2023 05:28:41.494798899 CET16458497923.127.138.57192.168.2.4
                                                          Dec 5, 2023 05:28:41.495057106 CET4979216458192.168.2.43.127.138.57
                                                          Dec 5, 2023 05:28:41.518117905 CET16458497923.127.138.57192.168.2.4
                                                          Dec 5, 2023 05:28:41.518491030 CET4979216458192.168.2.43.127.138.57
                                                          Dec 5, 2023 05:28:41.640609980 CET4979216458192.168.2.43.127.138.57
                                                          Dec 5, 2023 05:28:41.642119884 CET4979316458192.168.2.43.127.138.57
                                                          Dec 5, 2023 05:28:41.676511049 CET16458497923.127.138.57192.168.2.4
                                                          Dec 5, 2023 05:28:41.699565887 CET16458497923.127.138.57192.168.2.4
                                                          Dec 5, 2023 05:28:41.822057009 CET16458497923.127.138.57192.168.2.4
                                                          Dec 5, 2023 05:28:41.822556973 CET16458497933.127.138.57192.168.2.4
                                                          Dec 5, 2023 05:28:41.822854042 CET4979316458192.168.2.43.127.138.57
                                                          Dec 5, 2023 05:28:41.825597048 CET4979316458192.168.2.43.127.138.57
                                                          Dec 5, 2023 05:28:42.006215096 CET16458497933.127.138.57192.168.2.4
                                                          Dec 5, 2023 05:28:42.006661892 CET4979316458192.168.2.43.127.138.57
                                                          Dec 5, 2023 05:28:42.030977011 CET16458497933.127.138.57192.168.2.4
                                                          Dec 5, 2023 05:28:42.031229973 CET4979316458192.168.2.43.127.138.57
                                                          Dec 5, 2023 05:28:42.140383005 CET4979316458192.168.2.43.127.138.57
                                                          Dec 5, 2023 05:28:42.141931057 CET4979416458192.168.2.43.127.138.57
                                                          Dec 5, 2023 05:28:42.187484026 CET16458497933.127.138.57192.168.2.4
                                                          Dec 5, 2023 05:28:42.211827040 CET16458497933.127.138.57192.168.2.4
                                                          Dec 5, 2023 05:28:42.320904970 CET16458497933.127.138.57192.168.2.4
                                                          Dec 5, 2023 05:28:42.321511984 CET16458497943.127.138.57192.168.2.4
                                                          Dec 5, 2023 05:28:42.321615934 CET4979416458192.168.2.43.127.138.57
                                                          Dec 5, 2023 05:28:42.327786922 CET4979416458192.168.2.43.127.138.57
                                                          Dec 5, 2023 05:28:42.507132053 CET16458497943.127.138.57192.168.2.4
                                                          Dec 5, 2023 05:28:42.507417917 CET4979416458192.168.2.43.127.138.57
                                                          Dec 5, 2023 05:28:42.529763937 CET16458497943.127.138.57192.168.2.4
                                                          Dec 5, 2023 05:28:42.529953957 CET4979416458192.168.2.43.127.138.57
                                                          Dec 5, 2023 05:28:42.640554905 CET4979416458192.168.2.43.127.138.57
                                                          Dec 5, 2023 05:28:42.642134905 CET4979516458192.168.2.43.127.138.57
                                                          Dec 5, 2023 05:28:42.688271999 CET16458497943.127.138.57192.168.2.4
                                                          Dec 5, 2023 05:28:42.709965944 CET16458497943.127.138.57192.168.2.4
                                                          Dec 5, 2023 05:28:42.820354939 CET16458497943.127.138.57192.168.2.4
                                                          Dec 5, 2023 05:28:42.824050903 CET16458497953.127.138.57192.168.2.4
                                                          Dec 5, 2023 05:28:42.824172974 CET4979516458192.168.2.43.127.138.57
                                                          Dec 5, 2023 05:28:42.827308893 CET4979516458192.168.2.43.127.138.57
                                                          Dec 5, 2023 05:28:43.008667946 CET16458497953.127.138.57192.168.2.4
                                                          Dec 5, 2023 05:28:43.008877039 CET4979516458192.168.2.43.127.138.57
                                                          Dec 5, 2023 05:28:43.033958912 CET16458497953.127.138.57192.168.2.4
                                                          Dec 5, 2023 05:28:43.034063101 CET4979516458192.168.2.43.127.138.57
                                                          Dec 5, 2023 05:28:43.190481901 CET16458497953.127.138.57192.168.2.4
                                                          Dec 5, 2023 05:28:43.216381073 CET16458497953.127.138.57192.168.2.4
                                                          Dec 5, 2023 05:28:43.423567057 CET4979616458192.168.2.43.127.138.57
                                                          Dec 5, 2023 05:28:43.605700016 CET16458497963.127.138.57192.168.2.4
                                                          Dec 5, 2023 05:28:43.605894089 CET4979616458192.168.2.43.127.138.57
                                                          Dec 5, 2023 05:28:43.612252951 CET4979616458192.168.2.43.127.138.57
                                                          Dec 5, 2023 05:28:43.794610023 CET16458497963.127.138.57192.168.2.4
                                                          Dec 5, 2023 05:28:43.794707060 CET4979616458192.168.2.43.127.138.57
                                                          Dec 5, 2023 05:28:43.814318895 CET16458497963.127.138.57192.168.2.4
                                                          Dec 5, 2023 05:28:43.814423084 CET4979616458192.168.2.43.127.138.57
                                                          Dec 5, 2023 05:28:43.942797899 CET4979616458192.168.2.43.127.138.57
                                                          Dec 5, 2023 05:28:43.977634907 CET16458497963.127.138.57192.168.2.4
                                                          Dec 5, 2023 05:28:43.996308088 CET16458497963.127.138.57192.168.2.4
                                                          Dec 5, 2023 05:28:44.125078917 CET16458497963.127.138.57192.168.2.4
                                                          Dec 5, 2023 05:28:45.670762062 CET4979716458192.168.2.43.127.138.57
                                                          Dec 5, 2023 05:28:45.853091002 CET16458497973.127.138.57192.168.2.4
                                                          Dec 5, 2023 05:28:45.853204012 CET4979716458192.168.2.43.127.138.57
                                                          Dec 5, 2023 05:28:45.855071068 CET4979716458192.168.2.43.127.138.57
                                                          Dec 5, 2023 05:28:46.036983967 CET16458497973.127.138.57192.168.2.4
                                                          Dec 5, 2023 05:28:46.037170887 CET4979716458192.168.2.43.127.138.57
                                                          Dec 5, 2023 05:28:46.070938110 CET16458497973.127.138.57192.168.2.4
                                                          Dec 5, 2023 05:28:46.071110010 CET4979716458192.168.2.43.127.138.57
                                                          Dec 5, 2023 05:28:46.155960083 CET4979716458192.168.2.43.127.138.57
                                                          Dec 5, 2023 05:28:46.157028913 CET4979816458192.168.2.43.127.138.57
                                                          Dec 5, 2023 05:28:46.219613075 CET16458497973.127.138.57192.168.2.4
                                                          Dec 5, 2023 05:28:46.253448963 CET16458497973.127.138.57192.168.2.4
                                                          Dec 5, 2023 05:28:46.338016033 CET16458497973.127.138.57192.168.2.4
                                                          Dec 5, 2023 05:28:46.338074923 CET16458497983.127.138.57192.168.2.4
                                                          Dec 5, 2023 05:28:46.338288069 CET4979816458192.168.2.43.127.138.57
                                                          Dec 5, 2023 05:28:46.345197916 CET4979816458192.168.2.43.127.138.57
                                                          Dec 5, 2023 05:28:46.525887012 CET16458497983.127.138.57192.168.2.4
                                                          Dec 5, 2023 05:28:46.526164055 CET4979816458192.168.2.43.127.138.57
                                                          Dec 5, 2023 05:28:46.547374964 CET16458497983.127.138.57192.168.2.4
                                                          Dec 5, 2023 05:28:46.547512054 CET4979816458192.168.2.43.127.138.57
                                                          Dec 5, 2023 05:28:46.624773026 CET4979816458192.168.2.43.127.138.57
                                                          Dec 5, 2023 05:28:46.626878023 CET4979916458192.168.2.43.127.138.57
                                                          Dec 5, 2023 05:28:46.707072973 CET16458497983.127.138.57192.168.2.4
                                                          Dec 5, 2023 05:28:46.728390932 CET16458497983.127.138.57192.168.2.4
                                                          Dec 5, 2023 05:28:46.805418015 CET16458497983.127.138.57192.168.2.4
                                                          Dec 5, 2023 05:28:46.807225943 CET16458497993.127.138.57192.168.2.4
                                                          Dec 5, 2023 05:28:46.807342052 CET4979916458192.168.2.43.127.138.57
                                                          Dec 5, 2023 05:28:46.809302092 CET4979916458192.168.2.43.127.138.57
                                                          Dec 5, 2023 05:28:46.989752054 CET16458497993.127.138.57192.168.2.4
                                                          Dec 5, 2023 05:28:46.989959955 CET4979916458192.168.2.43.127.138.57
                                                          Dec 5, 2023 05:28:47.020519018 CET16458497993.127.138.57192.168.2.4
                                                          Dec 5, 2023 05:28:47.020613909 CET4979916458192.168.2.43.127.138.57
                                                          Dec 5, 2023 05:28:47.093970060 CET4979916458192.168.2.43.127.138.57
                                                          Dec 5, 2023 05:28:47.095325947 CET4980016458192.168.2.43.127.138.57
                                                          Dec 5, 2023 05:28:47.170842886 CET16458497993.127.138.57192.168.2.4
                                                          Dec 5, 2023 05:28:47.201376915 CET16458497993.127.138.57192.168.2.4
                                                          Dec 5, 2023 05:28:47.274651051 CET16458497993.127.138.57192.168.2.4
                                                          Dec 5, 2023 05:28:47.275299072 CET16458498003.127.138.57192.168.2.4
                                                          Dec 5, 2023 05:28:47.275571108 CET4980016458192.168.2.43.127.138.57
                                                          Dec 5, 2023 05:28:47.277029991 CET4980016458192.168.2.43.127.138.57
                                                          Dec 5, 2023 05:28:47.456618071 CET16458498003.127.138.57192.168.2.4
                                                          Dec 5, 2023 05:28:47.456810951 CET4980016458192.168.2.43.127.138.57
                                                          Dec 5, 2023 05:28:47.484389067 CET16458498003.127.138.57192.168.2.4
                                                          Dec 5, 2023 05:28:47.484519005 CET4980016458192.168.2.43.127.138.57
                                                          Dec 5, 2023 05:28:47.562432051 CET4980016458192.168.2.43.127.138.57
                                                          Dec 5, 2023 05:28:47.564815998 CET4980116458192.168.2.43.127.138.57
                                                          Dec 5, 2023 05:28:47.636703014 CET16458498003.127.138.57192.168.2.4
                                                          Dec 5, 2023 05:28:47.663896084 CET16458498003.127.138.57192.168.2.4
                                                          Dec 5, 2023 05:28:47.742090940 CET16458498003.127.138.57192.168.2.4
                                                          Dec 5, 2023 05:28:47.744590044 CET16458498013.127.138.57192.168.2.4
                                                          Dec 5, 2023 05:28:47.744884968 CET4980116458192.168.2.43.127.138.57
                                                          Dec 5, 2023 05:28:47.746762991 CET4980116458192.168.2.43.127.138.57
                                                          Dec 5, 2023 05:28:47.926497936 CET16458498013.127.138.57192.168.2.4
                                                          Dec 5, 2023 05:28:47.926701069 CET4980116458192.168.2.43.127.138.57
                                                          Dec 5, 2023 05:28:47.953769922 CET16458498013.127.138.57192.168.2.4
                                                          Dec 5, 2023 05:28:47.953885078 CET4980116458192.168.2.43.127.138.57
                                                          Dec 5, 2023 05:28:48.015276909 CET4980116458192.168.2.43.127.138.57
                                                          Dec 5, 2023 05:28:48.016199112 CET4980216458192.168.2.43.127.138.57
                                                          Dec 5, 2023 05:28:48.107031107 CET16458498013.127.138.57192.168.2.4
                                                          Dec 5, 2023 05:28:48.133919954 CET16458498013.127.138.57192.168.2.4
                                                          Dec 5, 2023 05:28:48.195225954 CET16458498013.127.138.57192.168.2.4
                                                          Dec 5, 2023 05:28:48.197370052 CET16458498023.127.138.57192.168.2.4
                                                          Dec 5, 2023 05:28:48.197465897 CET4980216458192.168.2.43.127.138.57
                                                          Dec 5, 2023 05:28:48.199322939 CET4980216458192.168.2.43.127.138.57
                                                          Dec 5, 2023 05:28:48.379970074 CET16458498023.127.138.57192.168.2.4
                                                          Dec 5, 2023 05:28:48.380094051 CET4980216458192.168.2.43.127.138.57
                                                          Dec 5, 2023 05:28:48.404504061 CET16458498023.127.138.57192.168.2.4
                                                          Dec 5, 2023 05:28:48.404683113 CET4980216458192.168.2.43.127.138.57
                                                          Dec 5, 2023 05:28:48.468889952 CET4980216458192.168.2.43.127.138.57
                                                          Dec 5, 2023 05:28:48.474459887 CET4980316458192.168.2.43.127.138.57
                                                          Dec 5, 2023 05:28:48.560863018 CET16458498023.127.138.57192.168.2.4
                                                          Dec 5, 2023 05:28:48.585513115 CET16458498023.127.138.57192.168.2.4
                                                          Dec 5, 2023 05:28:48.649904966 CET16458498023.127.138.57192.168.2.4
                                                          Dec 5, 2023 05:28:48.655195951 CET16458498033.127.138.57192.168.2.4
                                                          Dec 5, 2023 05:28:48.655373096 CET4980316458192.168.2.43.127.138.57
                                                          Dec 5, 2023 05:28:48.657058954 CET4980316458192.168.2.43.127.138.57
                                                          Dec 5, 2023 05:28:48.837519884 CET16458498033.127.138.57192.168.2.4
                                                          Dec 5, 2023 05:28:48.837764025 CET4980316458192.168.2.43.127.138.57
                                                          Dec 5, 2023 05:28:48.862207890 CET16458498033.127.138.57192.168.2.4
                                                          Dec 5, 2023 05:28:48.862373114 CET4980316458192.168.2.43.127.138.57
                                                          Dec 5, 2023 05:28:48.921649933 CET4980316458192.168.2.43.127.138.57
                                                          Dec 5, 2023 05:28:48.922604084 CET4980416458192.168.2.43.127.138.57
                                                          Dec 5, 2023 05:28:49.019129038 CET16458498033.127.138.57192.168.2.4
                                                          Dec 5, 2023 05:28:49.043489933 CET16458498033.127.138.57192.168.2.4
                                                          Dec 5, 2023 05:28:49.102552891 CET16458498033.127.138.57192.168.2.4
                                                          Dec 5, 2023 05:28:49.104819059 CET16458498043.127.138.57192.168.2.4
                                                          Dec 5, 2023 05:28:49.104943991 CET4980416458192.168.2.43.127.138.57
                                                          Dec 5, 2023 05:28:49.106770039 CET4980416458192.168.2.43.127.138.57
                                                          Dec 5, 2023 05:28:49.288804054 CET16458498043.127.138.57192.168.2.4
                                                          Dec 5, 2023 05:28:49.288913965 CET4980416458192.168.2.43.127.138.57
                                                          Dec 5, 2023 05:28:49.315648079 CET16458498043.127.138.57192.168.2.4
                                                          Dec 5, 2023 05:28:49.315747023 CET4980416458192.168.2.43.127.138.57
                                                          Dec 5, 2023 05:28:49.374928951 CET4980416458192.168.2.43.127.138.57
                                                          Dec 5, 2023 05:28:49.377159119 CET4980516458192.168.2.43.127.138.57
                                                          Dec 5, 2023 05:28:49.470887899 CET16458498043.127.138.57192.168.2.4
                                                          Dec 5, 2023 05:28:49.497505903 CET16458498043.127.138.57192.168.2.4
                                                          Dec 5, 2023 05:28:49.556870937 CET16458498053.127.138.57192.168.2.4
                                                          Dec 5, 2023 05:28:49.556934118 CET16458498043.127.138.57192.168.2.4
                                                          Dec 5, 2023 05:28:49.557070017 CET4980516458192.168.2.43.127.138.57
                                                          Dec 5, 2023 05:28:49.562928915 CET4980516458192.168.2.43.127.138.57
                                                          Dec 5, 2023 05:28:49.742551088 CET16458498053.127.138.57192.168.2.4
                                                          Dec 5, 2023 05:28:49.742714882 CET4980516458192.168.2.43.127.138.57
                                                          Dec 5, 2023 05:28:49.764688969 CET16458498053.127.138.57192.168.2.4
                                                          Dec 5, 2023 05:28:49.764791965 CET4980516458192.168.2.43.127.138.57
                                                          Dec 5, 2023 05:28:49.812211037 CET4980516458192.168.2.43.127.138.57
                                                          Dec 5, 2023 05:28:49.813189030 CET4980616458192.168.2.43.127.138.57
                                                          Dec 5, 2023 05:28:49.922600031 CET16458498053.127.138.57192.168.2.4
                                                          Dec 5, 2023 05:28:49.944255114 CET16458498053.127.138.57192.168.2.4
                                                          Dec 5, 2023 05:28:49.991591930 CET16458498053.127.138.57192.168.2.4
                                                          Dec 5, 2023 05:28:49.995088100 CET16458498063.127.138.57192.168.2.4
                                                          Dec 5, 2023 05:28:49.995323896 CET4980616458192.168.2.43.127.138.57
                                                          Dec 5, 2023 05:28:49.997627974 CET4980616458192.168.2.43.127.138.57
                                                          Dec 5, 2023 05:28:50.179162979 CET16458498063.127.138.57192.168.2.4
                                                          Dec 5, 2023 05:28:50.179249048 CET4980616458192.168.2.43.127.138.57
                                                          Dec 5, 2023 05:28:50.213690996 CET16458498063.127.138.57192.168.2.4
                                                          Dec 5, 2023 05:28:50.213911057 CET4980616458192.168.2.43.127.138.57
                                                          Dec 5, 2023 05:28:50.265561104 CET4980616458192.168.2.43.127.138.57
                                                          Dec 5, 2023 05:28:50.266725063 CET4980716458192.168.2.43.127.138.57
                                                          Dec 5, 2023 05:28:50.361099958 CET16458498063.127.138.57192.168.2.4
                                                          Dec 5, 2023 05:28:50.395246029 CET16458498063.127.138.57192.168.2.4
                                                          Dec 5, 2023 05:28:50.449381113 CET16458498063.127.138.57192.168.2.4
                                                          Dec 5, 2023 05:28:50.449495077 CET16458498073.127.138.57192.168.2.4
                                                          Dec 5, 2023 05:28:50.449561119 CET4980716458192.168.2.43.127.138.57
                                                          Dec 5, 2023 05:28:50.451102018 CET4980716458192.168.2.43.127.138.57
                                                          Dec 5, 2023 05:28:50.631752014 CET16458498073.127.138.57192.168.2.4
                                                          Dec 5, 2023 05:28:50.631980896 CET4980716458192.168.2.43.127.138.57
                                                          Dec 5, 2023 05:28:50.659636021 CET16458498073.127.138.57192.168.2.4
                                                          Dec 5, 2023 05:28:50.659826994 CET4980716458192.168.2.43.127.138.57
                                                          Dec 5, 2023 05:28:50.703836918 CET4980716458192.168.2.43.127.138.57
                                                          Dec 5, 2023 05:28:50.704843998 CET4980816458192.168.2.43.127.138.57
                                                          Dec 5, 2023 05:28:50.812257051 CET16458498073.127.138.57192.168.2.4
                                                          Dec 5, 2023 05:28:50.840186119 CET16458498073.127.138.57192.168.2.4
                                                          Dec 5, 2023 05:28:50.888856888 CET16458498083.127.138.57192.168.2.4
                                                          Dec 5, 2023 05:28:50.888885975 CET16458498073.127.138.57192.168.2.4
                                                          Dec 5, 2023 05:28:50.889102936 CET4980816458192.168.2.43.127.138.57
                                                          Dec 5, 2023 05:28:50.895519972 CET4980816458192.168.2.43.127.138.57
                                                          Dec 5, 2023 05:28:51.078641891 CET16458498083.127.138.57192.168.2.4
                                                          Dec 5, 2023 05:28:51.078782082 CET4980816458192.168.2.43.127.138.57
                                                          Dec 5, 2023 05:28:51.098274946 CET16458498083.127.138.57192.168.2.4
                                                          Dec 5, 2023 05:28:51.098372936 CET4980816458192.168.2.43.127.138.57
                                                          Dec 5, 2023 05:28:51.140522003 CET4980816458192.168.2.43.127.138.57
                                                          Dec 5, 2023 05:28:51.141443968 CET4980916458192.168.2.43.127.138.57
                                                          Dec 5, 2023 05:28:51.258198977 CET16458498083.127.138.57192.168.2.4
                                                          Dec 5, 2023 05:28:51.277657032 CET16458498083.127.138.57192.168.2.4
                                                          Dec 5, 2023 05:28:51.320008993 CET16458498083.127.138.57192.168.2.4
                                                          Dec 5, 2023 05:28:51.322582006 CET16458498093.127.138.57192.168.2.4
                                                          Dec 5, 2023 05:28:51.322813988 CET4980916458192.168.2.43.127.138.57
                                                          Dec 5, 2023 05:28:51.324621916 CET4980916458192.168.2.43.127.138.57
                                                          Dec 5, 2023 05:28:51.505481005 CET16458498093.127.138.57192.168.2.4
                                                          Dec 5, 2023 05:28:51.505659103 CET4980916458192.168.2.43.127.138.57
                                                          Dec 5, 2023 05:28:51.530051947 CET16458498093.127.138.57192.168.2.4
                                                          Dec 5, 2023 05:28:51.530230999 CET4980916458192.168.2.43.127.138.57
                                                          Dec 5, 2023 05:28:51.577743053 CET4980916458192.168.2.43.127.138.57
                                                          Dec 5, 2023 05:28:51.579063892 CET4981016458192.168.2.43.127.138.57
                                                          Dec 5, 2023 05:28:51.686508894 CET16458498093.127.138.57192.168.2.4
                                                          Dec 5, 2023 05:28:51.711065054 CET16458498093.127.138.57192.168.2.4
                                                          Dec 5, 2023 05:28:51.758495092 CET16458498093.127.138.57192.168.2.4
                                                          Dec 5, 2023 05:28:51.760195971 CET16458498103.127.138.57192.168.2.4
                                                          Dec 5, 2023 05:28:51.760596991 CET4981016458192.168.2.43.127.138.57
                                                          Dec 5, 2023 05:28:51.762284040 CET4981016458192.168.2.43.127.138.57
                                                          Dec 5, 2023 05:28:51.943593025 CET16458498103.127.138.57192.168.2.4
                                                          Dec 5, 2023 05:28:51.943839073 CET4981016458192.168.2.43.127.138.57
                                                          Dec 5, 2023 05:28:51.969716072 CET16458498103.127.138.57192.168.2.4
                                                          Dec 5, 2023 05:28:51.969963074 CET4981016458192.168.2.43.127.138.57
                                                          Dec 5, 2023 05:28:52.015578985 CET4981016458192.168.2.43.127.138.57
                                                          Dec 5, 2023 05:28:52.020421028 CET4981116458192.168.2.43.127.138.57
                                                          Dec 5, 2023 05:28:52.125224113 CET16458498103.127.138.57192.168.2.4
                                                          Dec 5, 2023 05:28:52.151139021 CET16458498103.127.138.57192.168.2.4
                                                          Dec 5, 2023 05:28:52.196816921 CET16458498103.127.138.57192.168.2.4
                                                          Dec 5, 2023 05:28:52.200968981 CET16458498113.127.138.57192.168.2.4
                                                          Dec 5, 2023 05:28:52.201111078 CET4981116458192.168.2.43.127.138.57
                                                          Dec 5, 2023 05:28:52.204621077 CET4981116458192.168.2.43.127.138.57
                                                          Dec 5, 2023 05:28:52.385138035 CET16458498113.127.138.57192.168.2.4
                                                          Dec 5, 2023 05:28:52.385462999 CET4981116458192.168.2.43.127.138.57
                                                          Dec 5, 2023 05:28:52.413110018 CET16458498113.127.138.57192.168.2.4
                                                          Dec 5, 2023 05:28:52.413441896 CET4981116458192.168.2.43.127.138.57
                                                          Dec 5, 2023 05:28:52.452874899 CET4981116458192.168.2.43.127.138.57
                                                          Dec 5, 2023 05:28:52.453984976 CET4981216458192.168.2.43.127.138.57
                                                          Dec 5, 2023 05:28:52.566098928 CET16458498113.127.138.57192.168.2.4
                                                          Dec 5, 2023 05:28:52.594177008 CET16458498113.127.138.57192.168.2.4
                                                          Dec 5, 2023 05:28:52.633678913 CET16458498113.127.138.57192.168.2.4
                                                          Dec 5, 2023 05:28:52.635418892 CET16458498123.127.138.57192.168.2.4
                                                          Dec 5, 2023 05:28:52.635585070 CET4981216458192.168.2.43.127.138.57
                                                          Dec 5, 2023 05:28:52.637433052 CET4981216458192.168.2.43.127.138.57
                                                          Dec 5, 2023 05:28:52.818188906 CET16458498123.127.138.57192.168.2.4
                                                          Dec 5, 2023 05:28:52.818361044 CET4981216458192.168.2.43.127.138.57
                                                          Dec 5, 2023 05:28:52.847582102 CET16458498123.127.138.57192.168.2.4
                                                          Dec 5, 2023 05:28:52.847713947 CET4981216458192.168.2.43.127.138.57
                                                          Dec 5, 2023 05:28:52.898447990 CET4981216458192.168.2.43.127.138.57
                                                          Dec 5, 2023 05:28:52.930088043 CET4981316458192.168.2.43.127.138.57
                                                          Dec 5, 2023 05:28:52.999294996 CET16458498123.127.138.57192.168.2.4
                                                          Dec 5, 2023 05:28:53.028525114 CET16458498123.127.138.57192.168.2.4
                                                          Dec 5, 2023 05:28:53.079204082 CET16458498123.127.138.57192.168.2.4
                                                          Dec 5, 2023 05:28:53.111984015 CET16458498133.127.138.57192.168.2.4
                                                          Dec 5, 2023 05:28:53.112330914 CET4981316458192.168.2.43.127.138.57
                                                          Dec 5, 2023 05:28:53.114093065 CET4981316458192.168.2.43.127.138.57
                                                          Dec 5, 2023 05:28:53.296139956 CET16458498133.127.138.57192.168.2.4
                                                          Dec 5, 2023 05:28:53.296410084 CET4981316458192.168.2.43.127.138.57
                                                          Dec 5, 2023 05:28:53.320122957 CET16458498133.127.138.57192.168.2.4
                                                          Dec 5, 2023 05:28:53.320382118 CET4981316458192.168.2.43.127.138.57
                                                          Dec 5, 2023 05:28:53.359139919 CET4981316458192.168.2.43.127.138.57
                                                          Dec 5, 2023 05:28:53.360215902 CET4981416458192.168.2.43.127.138.57
                                                          Dec 5, 2023 05:28:53.478451014 CET16458498133.127.138.57192.168.2.4
                                                          Dec 5, 2023 05:28:53.502793074 CET16458498133.127.138.57192.168.2.4
                                                          Dec 5, 2023 05:28:53.540383101 CET16458498143.127.138.57192.168.2.4
                                                          Dec 5, 2023 05:28:53.540658951 CET4981416458192.168.2.43.127.138.57
                                                          Dec 5, 2023 05:28:53.541165113 CET16458498133.127.138.57192.168.2.4
                                                          Dec 5, 2023 05:28:53.542336941 CET4981416458192.168.2.43.127.138.57
                                                          Dec 5, 2023 05:28:53.722657919 CET16458498143.127.138.57192.168.2.4
                                                          Dec 5, 2023 05:28:53.722785950 CET4981416458192.168.2.43.127.138.57
                                                          Dec 5, 2023 05:28:53.750503063 CET16458498143.127.138.57192.168.2.4
                                                          Dec 5, 2023 05:28:53.750626087 CET4981416458192.168.2.43.127.138.57
                                                          Dec 5, 2023 05:28:53.780925989 CET4981416458192.168.2.43.127.138.57
                                                          Dec 5, 2023 05:28:53.782155037 CET4981516458192.168.2.43.127.138.57
                                                          Dec 5, 2023 05:28:53.903348923 CET16458498143.127.138.57192.168.2.4
                                                          Dec 5, 2023 05:28:53.931324959 CET16458498143.127.138.57192.168.2.4
                                                          Dec 5, 2023 05:28:53.961352110 CET16458498143.127.138.57192.168.2.4
                                                          Dec 5, 2023 05:28:53.962676048 CET16458498153.127.138.57192.168.2.4
                                                          Dec 5, 2023 05:28:53.962743998 CET4981516458192.168.2.43.127.138.57
                                                          Dec 5, 2023 05:28:53.964634895 CET4981516458192.168.2.43.127.138.57
                                                          Dec 5, 2023 05:28:54.144082069 CET16458498153.127.138.57192.168.2.4
                                                          Dec 5, 2023 05:28:54.144279003 CET4981516458192.168.2.43.127.138.57
                                                          Dec 5, 2023 05:28:54.170172930 CET16458498153.127.138.57192.168.2.4
                                                          Dec 5, 2023 05:28:54.170454025 CET4981516458192.168.2.43.127.138.57
                                                          Dec 5, 2023 05:28:54.202702045 CET4981516458192.168.2.43.127.138.57
                                                          Dec 5, 2023 05:28:54.203691959 CET4981616458192.168.2.43.127.138.57
                                                          Dec 5, 2023 05:28:54.323592901 CET16458498153.127.138.57192.168.2.4
                                                          Dec 5, 2023 05:28:54.349987984 CET16458498153.127.138.57192.168.2.4
                                                          Dec 5, 2023 05:28:54.383047104 CET16458498153.127.138.57192.168.2.4
                                                          Dec 5, 2023 05:28:54.384118080 CET16458498163.127.138.57192.168.2.4
                                                          Dec 5, 2023 05:28:54.384222031 CET4981616458192.168.2.43.127.138.57
                                                          Dec 5, 2023 05:28:54.386300087 CET4981616458192.168.2.43.127.138.57
                                                          Dec 5, 2023 05:28:54.566484928 CET16458498163.127.138.57192.168.2.4
                                                          Dec 5, 2023 05:28:54.566548109 CET4981616458192.168.2.43.127.138.57
                                                          Dec 5, 2023 05:28:54.593308926 CET16458498163.127.138.57192.168.2.4
                                                          Dec 5, 2023 05:28:54.593532085 CET4981616458192.168.2.43.127.138.57
                                                          Dec 5, 2023 05:28:54.624845982 CET4981616458192.168.2.43.127.138.57
                                                          Dec 5, 2023 05:28:54.625751019 CET4981716458192.168.2.43.127.138.57
                                                          Dec 5, 2023 05:28:54.746957064 CET16458498163.127.138.57192.168.2.4
                                                          Dec 5, 2023 05:28:54.774035931 CET16458498163.127.138.57192.168.2.4
                                                          Dec 5, 2023 05:28:54.805308104 CET16458498163.127.138.57192.168.2.4
                                                          Dec 5, 2023 05:28:54.805594921 CET16458498173.127.138.57192.168.2.4
                                                          Dec 5, 2023 05:28:54.805726051 CET4981716458192.168.2.43.127.138.57
                                                          Dec 5, 2023 05:28:54.807517052 CET4981716458192.168.2.43.127.138.57
                                                          Dec 5, 2023 05:28:54.987406969 CET16458498173.127.138.57192.168.2.4
                                                          Dec 5, 2023 05:28:54.987500906 CET4981716458192.168.2.43.127.138.57
                                                          Dec 5, 2023 05:28:55.019912004 CET16458498173.127.138.57192.168.2.4
                                                          Dec 5, 2023 05:28:55.020078897 CET4981716458192.168.2.43.127.138.57
                                                          Dec 5, 2023 05:28:55.046570063 CET4981716458192.168.2.43.127.138.57
                                                          Dec 5, 2023 05:28:55.047774076 CET4981816458192.168.2.43.127.138.57
                                                          Dec 5, 2023 05:28:55.167270899 CET16458498173.127.138.57192.168.2.4
                                                          Dec 5, 2023 05:28:55.200089931 CET16458498173.127.138.57192.168.2.4
                                                          Dec 5, 2023 05:28:55.226771116 CET16458498173.127.138.57192.168.2.4
                                                          Dec 5, 2023 05:28:55.228961945 CET16458498183.127.138.57192.168.2.4
                                                          Dec 5, 2023 05:28:55.229171991 CET4981816458192.168.2.43.127.138.57
                                                          Dec 5, 2023 05:28:55.230885029 CET4981816458192.168.2.43.127.138.57
                                                          Dec 5, 2023 05:28:55.411842108 CET16458498183.127.138.57192.168.2.4
                                                          Dec 5, 2023 05:28:55.412198067 CET4981816458192.168.2.43.127.138.57
                                                          Dec 5, 2023 05:28:55.439945936 CET16458498183.127.138.57192.168.2.4
                                                          Dec 5, 2023 05:28:55.440278053 CET4981816458192.168.2.43.127.138.57
                                                          Dec 5, 2023 05:28:55.468458891 CET4981816458192.168.2.43.127.138.57
                                                          Dec 5, 2023 05:28:55.469435930 CET4981916458192.168.2.43.127.138.57
                                                          Dec 5, 2023 05:28:55.595963955 CET16458498183.127.138.57192.168.2.4
                                                          Dec 5, 2023 05:28:55.621373892 CET16458498183.127.138.57192.168.2.4
                                                          Dec 5, 2023 05:28:55.649600029 CET16458498183.127.138.57192.168.2.4
                                                          Dec 5, 2023 05:28:55.649632931 CET16458498193.127.138.57192.168.2.4
                                                          Dec 5, 2023 05:28:55.649868011 CET4981916458192.168.2.43.127.138.57
                                                          Dec 5, 2023 05:28:55.651700020 CET4981916458192.168.2.43.127.138.57
                                                          Dec 5, 2023 05:28:55.831572056 CET16458498193.127.138.57192.168.2.4
                                                          Dec 5, 2023 05:28:55.831748009 CET4981916458192.168.2.43.127.138.57
                                                          Dec 5, 2023 05:28:55.856345892 CET16458498193.127.138.57192.168.2.4
                                                          Dec 5, 2023 05:28:55.856514931 CET4981916458192.168.2.43.127.138.57
                                                          Dec 5, 2023 05:28:55.876115084 CET4981916458192.168.2.43.127.138.57
                                                          Dec 5, 2023 05:28:55.877607107 CET4982016458192.168.2.43.127.138.57
                                                          Dec 5, 2023 05:28:56.011471987 CET16458498193.127.138.57192.168.2.4
                                                          Dec 5, 2023 05:28:56.036339045 CET16458498193.127.138.57192.168.2.4
                                                          Dec 5, 2023 05:28:56.055876970 CET16458498193.127.138.57192.168.2.4
                                                          Dec 5, 2023 05:28:56.057373047 CET16458498203.127.138.57192.168.2.4
                                                          Dec 5, 2023 05:28:56.057600975 CET4982016458192.168.2.43.127.138.57
                                                          Dec 5, 2023 05:28:56.060305119 CET4982016458192.168.2.43.127.138.57
                                                          Dec 5, 2023 05:28:56.240156889 CET16458498203.127.138.57192.168.2.4
                                                          Dec 5, 2023 05:28:56.240385056 CET4982016458192.168.2.43.127.138.57
                                                          Dec 5, 2023 05:28:56.266671896 CET16458498203.127.138.57192.168.2.4
                                                          Dec 5, 2023 05:28:56.266865969 CET4982016458192.168.2.43.127.138.57
                                                          Dec 5, 2023 05:28:56.297605038 CET4982016458192.168.2.43.127.138.57
                                                          Dec 5, 2023 05:28:56.300162077 CET4982116458192.168.2.43.127.138.57
                                                          Dec 5, 2023 05:28:56.420114040 CET16458498203.127.138.57192.168.2.4
                                                          Dec 5, 2023 05:28:56.447365999 CET16458498203.127.138.57192.168.2.4
                                                          Dec 5, 2023 05:28:56.477137089 CET16458498203.127.138.57192.168.2.4
                                                          Dec 5, 2023 05:28:56.481086969 CET16458498213.127.138.57192.168.2.4
                                                          Dec 5, 2023 05:28:56.481314898 CET4982116458192.168.2.43.127.138.57
                                                          Dec 5, 2023 05:28:56.483117104 CET4982116458192.168.2.43.127.138.57
                                                          Dec 5, 2023 05:28:56.663835049 CET16458498213.127.138.57192.168.2.4
                                                          Dec 5, 2023 05:28:56.664047956 CET4982116458192.168.2.43.127.138.57
                                                          Dec 5, 2023 05:28:56.693588018 CET16458498213.127.138.57192.168.2.4
                                                          Dec 5, 2023 05:28:56.693794966 CET4982116458192.168.2.43.127.138.57
                                                          Dec 5, 2023 05:28:56.718482971 CET4982116458192.168.2.43.127.138.57
                                                          Dec 5, 2023 05:28:56.719779015 CET4982216458192.168.2.43.127.138.57
                                                          Dec 5, 2023 05:28:56.844928980 CET16458498213.127.138.57192.168.2.4
                                                          Dec 5, 2023 05:28:56.874912977 CET16458498213.127.138.57192.168.2.4
                                                          Dec 5, 2023 05:28:56.899523020 CET16458498213.127.138.57192.168.2.4
                                                          Dec 5, 2023 05:28:56.901209116 CET16458498223.127.138.57192.168.2.4
                                                          Dec 5, 2023 05:28:56.901298046 CET4982216458192.168.2.43.127.138.57
                                                          Dec 5, 2023 05:28:56.903126955 CET4982216458192.168.2.43.127.138.57
                                                          Dec 5, 2023 05:28:57.084044933 CET16458498223.127.138.57192.168.2.4
                                                          Dec 5, 2023 05:28:57.084253073 CET4982216458192.168.2.43.127.138.57
                                                          Dec 5, 2023 05:28:57.115459919 CET16458498223.127.138.57192.168.2.4
                                                          Dec 5, 2023 05:28:57.115681887 CET4982216458192.168.2.43.127.138.57
                                                          Dec 5, 2023 05:28:57.140340090 CET4982216458192.168.2.43.127.138.57
                                                          Dec 5, 2023 05:28:57.141526937 CET4982316458192.168.2.43.127.138.57
                                                          Dec 5, 2023 05:28:57.265208960 CET16458498223.127.138.57192.168.2.4
                                                          Dec 5, 2023 05:28:57.296766043 CET16458498223.127.138.57192.168.2.4
                                                          Dec 5, 2023 05:28:57.320759058 CET16458498233.127.138.57192.168.2.4
                                                          Dec 5, 2023 05:28:57.320805073 CET16458498223.127.138.57192.168.2.4
                                                          Dec 5, 2023 05:28:57.320848942 CET4982316458192.168.2.43.127.138.57
                                                          Dec 5, 2023 05:28:57.324326992 CET4982316458192.168.2.43.127.138.57
                                                          Dec 5, 2023 05:28:57.503695965 CET16458498233.127.138.57192.168.2.4
                                                          Dec 5, 2023 05:28:57.503766060 CET4982316458192.168.2.43.127.138.57
                                                          Dec 5, 2023 05:28:57.528657913 CET16458498233.127.138.57192.168.2.4
                                                          Dec 5, 2023 05:28:57.528753042 CET4982316458192.168.2.43.127.138.57
                                                          Dec 5, 2023 05:28:57.546485901 CET4982316458192.168.2.43.127.138.57
                                                          Dec 5, 2023 05:28:57.547982931 CET4982416458192.168.2.43.127.138.57
                                                          Dec 5, 2023 05:28:57.682948112 CET16458498233.127.138.57192.168.2.4
                                                          Dec 5, 2023 05:28:57.707958937 CET16458498233.127.138.57192.168.2.4
                                                          Dec 5, 2023 05:28:57.725771904 CET16458498233.127.138.57192.168.2.4
                                                          Dec 5, 2023 05:28:57.727356911 CET16458498243.127.138.57192.168.2.4
                                                          Dec 5, 2023 05:28:57.727598906 CET4982416458192.168.2.43.127.138.57
                                                          Dec 5, 2023 05:28:57.730392933 CET4982416458192.168.2.43.127.138.57
                                                          Dec 5, 2023 05:28:57.913820982 CET16458498243.127.138.57192.168.2.4
                                                          Dec 5, 2023 05:28:57.913903952 CET4982416458192.168.2.43.127.138.57
                                                          Dec 5, 2023 05:28:57.945646048 CET16458498243.127.138.57192.168.2.4
                                                          Dec 5, 2023 05:28:57.945797920 CET4982416458192.168.2.43.127.138.57
                                                          Dec 5, 2023 05:28:57.968360901 CET4982416458192.168.2.43.127.138.57
                                                          Dec 5, 2023 05:28:57.969500065 CET4982516458192.168.2.43.127.138.57
                                                          Dec 5, 2023 05:28:58.093453884 CET16458498243.127.138.57192.168.2.4
                                                          Dec 5, 2023 05:28:58.125556946 CET16458498243.127.138.57192.168.2.4
                                                          Dec 5, 2023 05:28:58.149010897 CET16458498243.127.138.57192.168.2.4
                                                          Dec 5, 2023 05:28:58.150295973 CET16458498253.127.138.57192.168.2.4
                                                          Dec 5, 2023 05:28:58.150546074 CET4982516458192.168.2.43.127.138.57
                                                          Dec 5, 2023 05:28:58.152157068 CET4982516458192.168.2.43.127.138.57
                                                          Dec 5, 2023 05:28:58.332488060 CET16458498253.127.138.57192.168.2.4
                                                          Dec 5, 2023 05:28:58.332619905 CET4982516458192.168.2.43.127.138.57
                                                          Dec 5, 2023 05:28:58.361489058 CET16458498253.127.138.57192.168.2.4
                                                          Dec 5, 2023 05:28:58.361705065 CET4982516458192.168.2.43.127.138.57
                                                          Dec 5, 2023 05:28:58.374711990 CET4982516458192.168.2.43.127.138.57
                                                          Dec 5, 2023 05:28:58.375932932 CET4982616458192.168.2.43.127.138.57
                                                          Dec 5, 2023 05:28:58.513019085 CET16458498253.127.138.57192.168.2.4
                                                          Dec 5, 2023 05:28:58.542017937 CET16458498253.127.138.57192.168.2.4
                                                          Dec 5, 2023 05:28:58.555125952 CET16458498253.127.138.57192.168.2.4
                                                          Dec 5, 2023 05:28:58.556449890 CET16458498263.127.138.57192.168.2.4
                                                          Dec 5, 2023 05:28:58.556658030 CET4982616458192.168.2.43.127.138.57
                                                          Dec 5, 2023 05:28:58.558789015 CET4982616458192.168.2.43.127.138.57
                                                          Dec 5, 2023 05:28:58.738882065 CET16458498263.127.138.57192.168.2.4
                                                          Dec 5, 2023 05:28:58.738961935 CET4982616458192.168.2.43.127.138.57
                                                          Dec 5, 2023 05:28:58.775928020 CET16458498263.127.138.57192.168.2.4
                                                          Dec 5, 2023 05:28:58.776007891 CET4982616458192.168.2.43.127.138.57
                                                          Dec 5, 2023 05:28:58.796566963 CET4982616458192.168.2.43.127.138.57
                                                          Dec 5, 2023 05:28:58.797621965 CET4982716458192.168.2.43.127.138.57
                                                          Dec 5, 2023 05:28:58.918946028 CET16458498263.127.138.57192.168.2.4
                                                          Dec 5, 2023 05:28:58.956135035 CET16458498263.127.138.57192.168.2.4
                                                          Dec 5, 2023 05:28:58.976778030 CET16458498263.127.138.57192.168.2.4
                                                          Dec 5, 2023 05:28:58.977086067 CET16458498273.127.138.57192.168.2.4
                                                          Dec 5, 2023 05:28:58.977180004 CET4982716458192.168.2.43.127.138.57
                                                          Dec 5, 2023 05:28:58.978981018 CET4982716458192.168.2.43.127.138.57
                                                          Dec 5, 2023 05:28:59.158231020 CET16458498273.127.138.57192.168.2.4
                                                          Dec 5, 2023 05:28:59.158313036 CET4982716458192.168.2.43.127.138.57
                                                          Dec 5, 2023 05:28:59.185214996 CET16458498273.127.138.57192.168.2.4
                                                          Dec 5, 2023 05:28:59.185286045 CET4982716458192.168.2.43.127.138.57
                                                          Dec 5, 2023 05:28:59.202714920 CET4982716458192.168.2.43.127.138.57
                                                          Dec 5, 2023 05:28:59.204135895 CET4982816458192.168.2.43.127.138.57
                                                          Dec 5, 2023 05:28:59.337721109 CET16458498273.127.138.57192.168.2.4
                                                          Dec 5, 2023 05:28:59.364679098 CET16458498273.127.138.57192.168.2.4
                                                          Dec 5, 2023 05:28:59.385555983 CET16458498273.127.138.57192.168.2.4
                                                          Dec 5, 2023 05:28:59.389769077 CET16458498283.127.138.57192.168.2.4
                                                          Dec 5, 2023 05:28:59.390100956 CET4982816458192.168.2.43.127.138.57
                                                          Dec 5, 2023 05:28:59.391597033 CET4982816458192.168.2.43.127.138.57
                                                          Dec 5, 2023 05:28:59.573126078 CET16458498283.127.138.57192.168.2.4
                                                          Dec 5, 2023 05:28:59.573406935 CET4982816458192.168.2.43.127.138.57
                                                          Dec 5, 2023 05:28:59.600668907 CET16458498283.127.138.57192.168.2.4
                                                          Dec 5, 2023 05:28:59.600960970 CET4982816458192.168.2.43.127.138.57
                                                          Dec 5, 2023 05:28:59.624789000 CET4982816458192.168.2.43.127.138.57
                                                          Dec 5, 2023 05:28:59.625633001 CET4982916458192.168.2.43.127.138.57
                                                          Dec 5, 2023 05:28:59.755048037 CET16458498283.127.138.57192.168.2.4
                                                          Dec 5, 2023 05:28:59.782480955 CET16458498283.127.138.57192.168.2.4
                                                          Dec 5, 2023 05:28:59.806246042 CET16458498293.127.138.57192.168.2.4
                                                          Dec 5, 2023 05:28:59.806276083 CET16458498283.127.138.57192.168.2.4
                                                          Dec 5, 2023 05:28:59.806333065 CET4982916458192.168.2.43.127.138.57
                                                          Dec 5, 2023 05:28:59.808063984 CET4982916458192.168.2.43.127.138.57
                                                          Dec 5, 2023 05:28:59.989557981 CET16458498293.127.138.57192.168.2.4
                                                          Dec 5, 2023 05:28:59.989623070 CET4982916458192.168.2.43.127.138.57
                                                          Dec 5, 2023 05:29:00.018744946 CET16458498293.127.138.57192.168.2.4
                                                          Dec 5, 2023 05:29:00.018826962 CET4982916458192.168.2.43.127.138.57
                                                          Dec 5, 2023 05:29:00.030905962 CET4982916458192.168.2.43.127.138.57
                                                          Dec 5, 2023 05:29:00.032346964 CET4983016458192.168.2.43.127.138.57
                                                          Dec 5, 2023 05:29:00.170062065 CET16458498293.127.138.57192.168.2.4
                                                          Dec 5, 2023 05:29:00.199301004 CET16458498293.127.138.57192.168.2.4
                                                          Dec 5, 2023 05:29:00.212552071 CET16458498293.127.138.57192.168.2.4
                                                          Dec 5, 2023 05:29:00.213937044 CET16458498303.127.138.57192.168.2.4
                                                          Dec 5, 2023 05:29:00.214095116 CET4983016458192.168.2.43.127.138.57
                                                          Dec 5, 2023 05:29:00.216171026 CET4983016458192.168.2.43.127.138.57
                                                          Dec 5, 2023 05:29:00.397706032 CET16458498303.127.138.57192.168.2.4
                                                          Dec 5, 2023 05:29:00.397921085 CET4983016458192.168.2.43.127.138.57
                                                          Dec 5, 2023 05:29:00.422736883 CET16458498303.127.138.57192.168.2.4
                                                          Dec 5, 2023 05:29:00.422956944 CET4983016458192.168.2.43.127.138.57
                                                          Dec 5, 2023 05:29:00.437221050 CET4983016458192.168.2.43.127.138.57
                                                          Dec 5, 2023 05:29:00.438329935 CET4983116458192.168.2.43.127.138.57
                                                          Dec 5, 2023 05:29:00.579524994 CET16458498303.127.138.57192.168.2.4
                                                          Dec 5, 2023 05:29:00.604327917 CET16458498303.127.138.57192.168.2.4
                                                          Dec 5, 2023 05:29:00.618801117 CET16458498303.127.138.57192.168.2.4
                                                          Dec 5, 2023 05:29:00.620398045 CET16458498313.127.138.57192.168.2.4
                                                          Dec 5, 2023 05:29:00.620671034 CET4983116458192.168.2.43.127.138.57
                                                          Dec 5, 2023 05:29:00.622291088 CET4983116458192.168.2.43.127.138.57
                                                          Dec 5, 2023 05:29:00.804003000 CET16458498313.127.138.57192.168.2.4
                                                          Dec 5, 2023 05:29:00.804323912 CET4983116458192.168.2.43.127.138.57
                                                          Dec 5, 2023 05:29:00.835453987 CET16458498313.127.138.57192.168.2.4
                                                          Dec 5, 2023 05:29:00.835613012 CET4983116458192.168.2.43.127.138.57
                                                          Dec 5, 2023 05:29:00.887665987 CET4983116458192.168.2.43.127.138.57
                                                          Dec 5, 2023 05:29:00.888818026 CET4983216458192.168.2.43.127.138.57
                                                          Dec 5, 2023 05:29:00.986073971 CET16458498313.127.138.57192.168.2.4
                                                          Dec 5, 2023 05:29:01.017755032 CET16458498313.127.138.57192.168.2.4
                                                          Dec 5, 2023 05:29:01.069317102 CET16458498323.127.138.57192.168.2.4
                                                          Dec 5, 2023 05:29:01.069369078 CET16458498313.127.138.57192.168.2.4
                                                          Dec 5, 2023 05:29:01.069442987 CET4983216458192.168.2.43.127.138.57
                                                          Dec 5, 2023 05:29:01.288628101 CET16458498323.127.138.57192.168.2.4
                                                          Dec 5, 2023 05:29:01.288825989 CET4983216458192.168.2.43.127.138.57
                                                          Dec 5, 2023 05:29:02.721330881 CET4983216458192.168.2.43.127.138.57
                                                          Dec 5, 2023 05:29:02.733963966 CET4983216458192.168.2.43.127.138.57
                                                          Dec 5, 2023 05:29:02.734932899 CET4983316458192.168.2.43.127.138.57
                                                          Dec 5, 2023 05:29:02.902112007 CET16458498323.127.138.57192.168.2.4
                                                          Dec 5, 2023 05:29:02.914510965 CET16458498323.127.138.57192.168.2.4
                                                          Dec 5, 2023 05:29:02.916419983 CET16458498333.127.138.57192.168.2.4
                                                          Dec 5, 2023 05:29:02.916614056 CET4983316458192.168.2.43.127.138.57
                                                          Dec 5, 2023 05:29:03.064030886 CET4983316458192.168.2.43.127.138.57
                                                          Dec 5, 2023 05:29:03.125094891 CET16458498333.127.138.57192.168.2.4
                                                          Dec 5, 2023 05:29:03.125313997 CET4983316458192.168.2.43.127.138.57
                                                          Dec 5, 2023 05:29:03.155911922 CET4983316458192.168.2.43.127.138.57
                                                          Dec 5, 2023 05:29:03.156922102 CET4983416458192.168.2.43.127.138.57
                                                          Dec 5, 2023 05:29:03.245399952 CET16458498333.127.138.57192.168.2.4
                                                          Dec 5, 2023 05:29:03.306924105 CET16458498333.127.138.57192.168.2.4
                                                          Dec 5, 2023 05:29:03.337683916 CET16458498333.127.138.57192.168.2.4
                                                          Dec 5, 2023 05:29:03.337716103 CET16458498343.127.138.57192.168.2.4
                                                          Dec 5, 2023 05:29:03.337841034 CET4983416458192.168.2.43.127.138.57
                                                          Dec 5, 2023 05:29:03.339550972 CET4983416458192.168.2.43.127.138.57
                                                          Dec 5, 2023 05:29:03.520226002 CET16458498343.127.138.57192.168.2.4
                                                          Dec 5, 2023 05:29:03.520411015 CET4983416458192.168.2.43.127.138.57
                                                          Dec 5, 2023 05:29:03.557545900 CET16458498343.127.138.57192.168.2.4
                                                          Dec 5, 2023 05:29:03.557697058 CET4983416458192.168.2.43.127.138.57
                                                          Dec 5, 2023 05:29:03.577794075 CET4983416458192.168.2.43.127.138.57
                                                          Dec 5, 2023 05:29:03.578751087 CET4983516458192.168.2.43.127.138.57
                                                          Dec 5, 2023 05:29:03.701396942 CET16458498343.127.138.57192.168.2.4
                                                          Dec 5, 2023 05:29:03.738200903 CET16458498343.127.138.57192.168.2.4
                                                          Dec 5, 2023 05:29:03.758414030 CET16458498343.127.138.57192.168.2.4
                                                          Dec 5, 2023 05:29:03.759074926 CET16458498353.127.138.57192.168.2.4
                                                          Dec 5, 2023 05:29:03.759169102 CET4983516458192.168.2.43.127.138.57
                                                          Dec 5, 2023 05:29:03.776156902 CET4983516458192.168.2.43.127.138.57
                                                          Dec 5, 2023 05:29:03.956408024 CET16458498353.127.138.57192.168.2.4
                                                          Dec 5, 2023 05:29:03.956502914 CET4983516458192.168.2.43.127.138.57
                                                          Dec 5, 2023 05:29:03.966351032 CET16458498353.127.138.57192.168.2.4
                                                          Dec 5, 2023 05:29:03.966434002 CET4983516458192.168.2.43.127.138.57
                                                          Dec 5, 2023 05:29:03.985935926 CET4983516458192.168.2.43.127.138.57
                                                          Dec 5, 2023 05:29:03.987159967 CET4983616458192.168.2.43.127.138.57
                                                          Dec 5, 2023 05:29:04.136852980 CET16458498353.127.138.57192.168.2.4
                                                          Dec 5, 2023 05:29:04.146768093 CET16458498353.127.138.57192.168.2.4
                                                          Dec 5, 2023 05:29:04.166321993 CET16458498353.127.138.57192.168.2.4
                                                          Dec 5, 2023 05:29:04.169389009 CET16458498363.127.138.57192.168.2.4
                                                          Dec 5, 2023 05:29:04.169611931 CET4983616458192.168.2.43.127.138.57
                                                          Dec 5, 2023 05:29:04.178159952 CET4983616458192.168.2.43.127.138.57
                                                          Dec 5, 2023 05:29:04.360255003 CET16458498363.127.138.57192.168.2.4
                                                          Dec 5, 2023 05:29:04.360430956 CET4983616458192.168.2.43.127.138.57
                                                          Dec 5, 2023 05:29:04.381715059 CET16458498363.127.138.57192.168.2.4
                                                          Dec 5, 2023 05:29:04.381819010 CET4983616458192.168.2.43.127.138.57
                                                          Dec 5, 2023 05:29:04.390256882 CET4983616458192.168.2.43.127.138.57
                                                          Dec 5, 2023 05:29:04.392908096 CET4983716458192.168.2.43.127.138.57
                                                          Dec 5, 2023 05:29:04.542342901 CET16458498363.127.138.57192.168.2.4
                                                          Dec 5, 2023 05:29:04.563899994 CET16458498363.127.138.57192.168.2.4
                                                          Dec 5, 2023 05:29:04.572452068 CET16458498363.127.138.57192.168.2.4
                                                          Dec 5, 2023 05:29:04.573719025 CET16458498373.127.138.57192.168.2.4
                                                          Dec 5, 2023 05:29:04.573843956 CET4983716458192.168.2.43.127.138.57
                                                          Dec 5, 2023 05:29:04.575623989 CET4983716458192.168.2.43.127.138.57
                                                          Dec 5, 2023 05:29:04.756511927 CET16458498373.127.138.57192.168.2.4
                                                          Dec 5, 2023 05:29:04.756571054 CET4983716458192.168.2.43.127.138.57
                                                          Dec 5, 2023 05:29:04.785155058 CET16458498373.127.138.57192.168.2.4
                                                          Dec 5, 2023 05:29:04.785279036 CET4983716458192.168.2.43.127.138.57
                                                          Dec 5, 2023 05:29:04.796417952 CET4983716458192.168.2.43.127.138.57
                                                          Dec 5, 2023 05:29:04.797682047 CET4983816458192.168.2.43.127.138.57
                                                          Dec 5, 2023 05:29:04.937510014 CET16458498373.127.138.57192.168.2.4
                                                          Dec 5, 2023 05:29:04.966248989 CET16458498373.127.138.57192.168.2.4
                                                          Dec 5, 2023 05:29:04.977272987 CET16458498373.127.138.57192.168.2.4
                                                          Dec 5, 2023 05:29:04.977303028 CET16458498383.127.138.57192.168.2.4
                                                          Dec 5, 2023 05:29:04.977642059 CET4983816458192.168.2.43.127.138.57
                                                          Dec 5, 2023 05:29:04.979284048 CET4983816458192.168.2.43.127.138.57
                                                          Dec 5, 2023 05:29:05.159056902 CET16458498383.127.138.57192.168.2.4
                                                          Dec 5, 2023 05:29:05.159343958 CET4983816458192.168.2.43.127.138.57
                                                          Dec 5, 2023 05:29:05.183664083 CET16458498383.127.138.57192.168.2.4
                                                          Dec 5, 2023 05:29:05.183886051 CET4983816458192.168.2.43.127.138.57
                                                          Dec 5, 2023 05:29:05.202810049 CET4983816458192.168.2.43.127.138.57
                                                          Dec 5, 2023 05:29:05.203795910 CET4983916458192.168.2.43.127.138.57
                                                          Dec 5, 2023 05:29:05.339052916 CET16458498383.127.138.57192.168.2.4
                                                          Dec 5, 2023 05:29:05.363651991 CET16458498383.127.138.57192.168.2.4
                                                          Dec 5, 2023 05:29:05.382514000 CET16458498383.127.138.57192.168.2.4
                                                          Dec 5, 2023 05:29:05.384269953 CET16458498393.127.138.57192.168.2.4
                                                          Dec 5, 2023 05:29:05.384490967 CET4983916458192.168.2.43.127.138.57
                                                          Dec 5, 2023 05:29:05.389966011 CET4983916458192.168.2.43.127.138.57
                                                          Dec 5, 2023 05:29:05.570346117 CET16458498393.127.138.57192.168.2.4
                                                          Dec 5, 2023 05:29:05.570625067 CET4983916458192.168.2.43.127.138.57
                                                          Dec 5, 2023 05:29:05.591093063 CET16458498393.127.138.57192.168.2.4
                                                          Dec 5, 2023 05:29:05.591162920 CET4983916458192.168.2.43.127.138.57
                                                          Dec 5, 2023 05:29:05.609122992 CET4983916458192.168.2.43.127.138.57
                                                          Dec 5, 2023 05:29:05.610346079 CET4984016458192.168.2.43.127.138.57
                                                          Dec 5, 2023 05:29:05.750989914 CET16458498393.127.138.57192.168.2.4
                                                          Dec 5, 2023 05:29:05.771239996 CET16458498393.127.138.57192.168.2.4
                                                          Dec 5, 2023 05:29:05.789577961 CET16458498393.127.138.57192.168.2.4
                                                          Dec 5, 2023 05:29:05.790616035 CET16458498403.127.138.57192.168.2.4
                                                          Dec 5, 2023 05:29:05.790735960 CET4984016458192.168.2.43.127.138.57
                                                          Dec 5, 2023 05:29:05.792517900 CET4984016458192.168.2.43.127.138.57
                                                          Dec 5, 2023 05:29:05.972803116 CET16458498403.127.138.57192.168.2.4
                                                          Dec 5, 2023 05:29:05.972882986 CET4984016458192.168.2.43.127.138.57
                                                          Dec 5, 2023 05:29:06.001490116 CET16458498403.127.138.57192.168.2.4
                                                          Dec 5, 2023 05:29:06.001568079 CET4984016458192.168.2.43.127.138.57
                                                          Dec 5, 2023 05:29:06.015180111 CET4984016458192.168.2.43.127.138.57
                                                          Dec 5, 2023 05:29:06.016280890 CET4984116458192.168.2.43.127.138.57
                                                          Dec 5, 2023 05:29:06.153198004 CET16458498403.127.138.57192.168.2.4
                                                          Dec 5, 2023 05:29:06.182971001 CET16458498403.127.138.57192.168.2.4
                                                          Dec 5, 2023 05:29:06.195450068 CET16458498403.127.138.57192.168.2.4
                                                          Dec 5, 2023 05:29:06.195806980 CET16458498413.127.138.57192.168.2.4
                                                          Dec 5, 2023 05:29:06.196002007 CET4984116458192.168.2.43.127.138.57
                                                          Dec 5, 2023 05:29:06.198721886 CET4984116458192.168.2.43.127.138.57
                                                          Dec 5, 2023 05:29:06.378546000 CET16458498413.127.138.57192.168.2.4
                                                          Dec 5, 2023 05:29:06.378762960 CET4984116458192.168.2.43.127.138.57
                                                          Dec 5, 2023 05:29:06.407423019 CET16458498413.127.138.57192.168.2.4
                                                          Dec 5, 2023 05:29:06.407639980 CET4984116458192.168.2.43.127.138.57
                                                          Dec 5, 2023 05:29:06.421581984 CET4984116458192.168.2.43.127.138.57
                                                          Dec 5, 2023 05:29:06.426959991 CET4984216458192.168.2.43.127.138.57
                                                          Dec 5, 2023 05:29:06.558448076 CET16458498413.127.138.57192.168.2.4
                                                          Dec 5, 2023 05:29:06.587291956 CET16458498413.127.138.57192.168.2.4
                                                          Dec 5, 2023 05:29:06.601172924 CET16458498413.127.138.57192.168.2.4
                                                          Dec 5, 2023 05:29:06.606910944 CET16458498423.127.138.57192.168.2.4
                                                          Dec 5, 2023 05:29:06.607052088 CET4984216458192.168.2.43.127.138.57
                                                          Dec 5, 2023 05:29:06.608819962 CET4984216458192.168.2.43.127.138.57
                                                          Dec 5, 2023 05:29:06.788886070 CET16458498423.127.138.57192.168.2.4
                                                          Dec 5, 2023 05:29:06.788954973 CET4984216458192.168.2.43.127.138.57
                                                          Dec 5, 2023 05:29:06.816282034 CET16458498423.127.138.57192.168.2.4
                                                          Dec 5, 2023 05:29:06.816437006 CET4984216458192.168.2.43.127.138.57
                                                          Dec 5, 2023 05:29:06.827775955 CET4984216458192.168.2.43.127.138.57
                                                          Dec 5, 2023 05:29:06.828886986 CET4984316458192.168.2.43.127.138.57
                                                          Dec 5, 2023 05:29:06.969177961 CET16458498423.127.138.57192.168.2.4
                                                          Dec 5, 2023 05:29:06.996926069 CET16458498423.127.138.57192.168.2.4
                                                          Dec 5, 2023 05:29:07.008250952 CET16458498423.127.138.57192.168.2.4
                                                          Dec 5, 2023 05:29:07.010044098 CET16458498433.127.138.57192.168.2.4
                                                          Dec 5, 2023 05:29:07.010423899 CET4984316458192.168.2.43.127.138.57
                                                          Dec 5, 2023 05:29:07.015804052 CET4984316458192.168.2.43.127.138.57
                                                          Dec 5, 2023 05:29:07.196801901 CET16458498433.127.138.57192.168.2.4
                                                          Dec 5, 2023 05:29:07.197050095 CET4984316458192.168.2.43.127.138.57
                                                          Dec 5, 2023 05:29:07.217529058 CET16458498433.127.138.57192.168.2.4
                                                          Dec 5, 2023 05:29:07.217736959 CET4984316458192.168.2.43.127.138.57
                                                          Dec 5, 2023 05:29:07.234050035 CET4984316458192.168.2.43.127.138.57
                                                          Dec 5, 2023 05:29:07.234972000 CET4984416458192.168.2.43.127.138.57
                                                          Dec 5, 2023 05:29:07.377744913 CET16458498433.127.138.57192.168.2.4
                                                          Dec 5, 2023 05:29:07.398557901 CET16458498433.127.138.57192.168.2.4
                                                          Dec 5, 2023 05:29:07.414266109 CET16458498443.127.138.57192.168.2.4
                                                          Dec 5, 2023 05:29:07.414360046 CET4984416458192.168.2.43.127.138.57
                                                          Dec 5, 2023 05:29:07.414606094 CET16458498433.127.138.57192.168.2.4
                                                          Dec 5, 2023 05:29:07.416316986 CET4984416458192.168.2.43.127.138.57
                                                          Dec 5, 2023 05:29:07.595334053 CET16458498443.127.138.57192.168.2.4
                                                          Dec 5, 2023 05:29:07.595663071 CET4984416458192.168.2.43.127.138.57
                                                          Dec 5, 2023 05:29:07.625451088 CET16458498443.127.138.57192.168.2.4
                                                          Dec 5, 2023 05:29:07.625665903 CET4984416458192.168.2.43.127.138.57
                                                          Dec 5, 2023 05:29:07.640280008 CET4984416458192.168.2.43.127.138.57
                                                          Dec 5, 2023 05:29:07.641482115 CET4984516458192.168.2.43.127.138.57
                                                          Dec 5, 2023 05:29:07.774720907 CET16458498443.127.138.57192.168.2.4
                                                          Dec 5, 2023 05:29:07.804775000 CET16458498443.127.138.57192.168.2.4
                                                          Dec 5, 2023 05:29:07.819472075 CET16458498443.127.138.57192.168.2.4
                                                          Dec 5, 2023 05:29:07.822062016 CET16458498453.127.138.57192.168.2.4
                                                          Dec 5, 2023 05:29:07.822267056 CET4984516458192.168.2.43.127.138.57
                                                          Dec 5, 2023 05:29:07.823910952 CET4984516458192.168.2.43.127.138.57
                                                          Dec 5, 2023 05:29:08.004357100 CET16458498453.127.138.57192.168.2.4
                                                          Dec 5, 2023 05:29:08.004585028 CET4984516458192.168.2.43.127.138.57
                                                          Dec 5, 2023 05:29:08.032964945 CET16458498453.127.138.57192.168.2.4
                                                          Dec 5, 2023 05:29:08.033189058 CET4984516458192.168.2.43.127.138.57
                                                          Dec 5, 2023 05:29:08.047126055 CET4984516458192.168.2.43.127.138.57
                                                          Dec 5, 2023 05:29:08.047980070 CET4984616458192.168.2.43.127.138.57
                                                          Dec 5, 2023 05:29:08.185621977 CET16458498453.127.138.57192.168.2.4
                                                          Dec 5, 2023 05:29:08.213844061 CET16458498453.127.138.57192.168.2.4
                                                          Dec 5, 2023 05:29:08.227679014 CET16458498453.127.138.57192.168.2.4
                                                          Dec 5, 2023 05:29:08.228513002 CET16458498463.127.138.57192.168.2.4
                                                          Dec 5, 2023 05:29:08.228745937 CET4984616458192.168.2.43.127.138.57
                                                          Dec 5, 2023 05:29:08.230515003 CET4984616458192.168.2.43.127.138.57
                                                          Dec 5, 2023 05:29:08.410887003 CET16458498463.127.138.57192.168.2.4
                                                          Dec 5, 2023 05:29:08.411103010 CET4984616458192.168.2.43.127.138.57
                                                          Dec 5, 2023 05:29:08.438992023 CET16458498463.127.138.57192.168.2.4
                                                          Dec 5, 2023 05:29:08.439084053 CET4984616458192.168.2.43.127.138.57
                                                          Dec 5, 2023 05:29:08.452761889 CET4984616458192.168.2.43.127.138.57
                                                          Dec 5, 2023 05:29:08.453927040 CET4984716458192.168.2.43.127.138.57
                                                          Dec 5, 2023 05:29:08.591613054 CET16458498463.127.138.57192.168.2.4
                                                          Dec 5, 2023 05:29:08.619594097 CET16458498463.127.138.57192.168.2.4
                                                          Dec 5, 2023 05:29:08.633083105 CET16458498463.127.138.57192.168.2.4
                                                          Dec 5, 2023 05:29:08.635353088 CET16458498473.127.138.57192.168.2.4
                                                          Dec 5, 2023 05:29:08.635431051 CET4984716458192.168.2.43.127.138.57
                                                          Dec 5, 2023 05:29:08.637131929 CET4984716458192.168.2.43.127.138.57
                                                          Dec 5, 2023 05:29:08.818402052 CET16458498473.127.138.57192.168.2.4
                                                          Dec 5, 2023 05:29:08.818505049 CET4984716458192.168.2.43.127.138.57
                                                          Dec 5, 2023 05:29:08.845720053 CET16458498473.127.138.57192.168.2.4
                                                          Dec 5, 2023 05:29:08.845982075 CET4984716458192.168.2.43.127.138.57
                                                          Dec 5, 2023 05:29:08.858891964 CET4984716458192.168.2.43.127.138.57
                                                          Dec 5, 2023 05:29:08.860021114 CET4984816458192.168.2.43.127.138.57
                                                          Dec 5, 2023 05:29:09.000257015 CET16458498473.127.138.57192.168.2.4
                                                          Dec 5, 2023 05:29:09.027735949 CET16458498473.127.138.57192.168.2.4
                                                          Dec 5, 2023 05:29:09.040134907 CET16458498473.127.138.57192.168.2.4
                                                          Dec 5, 2023 05:29:09.040668964 CET16458498483.127.138.57192.168.2.4
                                                          Dec 5, 2023 05:29:09.040735006 CET4984816458192.168.2.43.127.138.57
                                                          Dec 5, 2023 05:29:09.042695045 CET4984816458192.168.2.43.127.138.57
                                                          Dec 5, 2023 05:29:09.223838091 CET16458498483.127.138.57192.168.2.4
                                                          Dec 5, 2023 05:29:09.223937988 CET4984816458192.168.2.43.127.138.57
                                                          Dec 5, 2023 05:29:09.254219055 CET16458498483.127.138.57192.168.2.4
                                                          Dec 5, 2023 05:29:09.254333019 CET4984816458192.168.2.43.127.138.57
                                                          Dec 5, 2023 05:29:09.265158892 CET4984816458192.168.2.43.127.138.57
                                                          Dec 5, 2023 05:29:09.266371012 CET4984916458192.168.2.43.127.138.57
                                                          Dec 5, 2023 05:29:09.405050039 CET16458498483.127.138.57192.168.2.4
                                                          Dec 5, 2023 05:29:09.435177088 CET16458498483.127.138.57192.168.2.4
                                                          Dec 5, 2023 05:29:09.446168900 CET16458498483.127.138.57192.168.2.4
                                                          Dec 5, 2023 05:29:09.447437048 CET16458498493.127.138.57192.168.2.4
                                                          Dec 5, 2023 05:29:09.447618008 CET4984916458192.168.2.43.127.138.57
                                                          Dec 5, 2023 05:29:09.449021101 CET4984916458192.168.2.43.127.138.57
                                                          Dec 5, 2023 05:29:09.629755974 CET16458498493.127.138.57192.168.2.4
                                                          Dec 5, 2023 05:29:09.629832983 CET4984916458192.168.2.43.127.138.57
                                                          Dec 5, 2023 05:29:09.658922911 CET16458498493.127.138.57192.168.2.4
                                                          Dec 5, 2023 05:29:09.658979893 CET4984916458192.168.2.43.127.138.57
                                                          Dec 5, 2023 05:29:09.671447992 CET4984916458192.168.2.43.127.138.57
                                                          Dec 5, 2023 05:29:09.672667027 CET4985016458192.168.2.43.127.138.57
                                                          Dec 5, 2023 05:29:09.810626030 CET16458498493.127.138.57192.168.2.4
                                                          Dec 5, 2023 05:29:09.839890003 CET16458498493.127.138.57192.168.2.4
                                                          Dec 5, 2023 05:29:09.852322102 CET16458498493.127.138.57192.168.2.4
                                                          Dec 5, 2023 05:29:09.853262901 CET16458498503.127.138.57192.168.2.4
                                                          Dec 5, 2023 05:29:09.853487968 CET4985016458192.168.2.43.127.138.57
                                                          Dec 5, 2023 05:29:09.855333090 CET4985016458192.168.2.43.127.138.57
                                                          Dec 5, 2023 05:29:10.036046982 CET16458498503.127.138.57192.168.2.4
                                                          Dec 5, 2023 05:29:10.036340952 CET4985016458192.168.2.43.127.138.57
                                                          Dec 5, 2023 05:29:10.062278986 CET16458498503.127.138.57192.168.2.4
                                                          Dec 5, 2023 05:29:10.062566996 CET4985016458192.168.2.43.127.138.57
                                                          Dec 5, 2023 05:29:10.077775002 CET4985016458192.168.2.43.127.138.57
                                                          Dec 5, 2023 05:29:10.078900099 CET4985116458192.168.2.43.127.138.57
                                                          Dec 5, 2023 05:29:10.216883898 CET16458498503.127.138.57192.168.2.4
                                                          Dec 5, 2023 05:29:10.243256092 CET16458498503.127.138.57192.168.2.4
                                                          Dec 5, 2023 05:29:10.258480072 CET16458498503.127.138.57192.168.2.4
                                                          Dec 5, 2023 05:29:10.260672092 CET16458498513.127.138.57192.168.2.4
                                                          Dec 5, 2023 05:29:10.260849953 CET4985116458192.168.2.43.127.138.57
                                                          Dec 5, 2023 05:29:10.262590885 CET4985116458192.168.2.43.127.138.57
                                                          Dec 5, 2023 05:29:10.444434881 CET16458498513.127.138.57192.168.2.4
                                                          Dec 5, 2023 05:29:10.444715977 CET4985116458192.168.2.43.127.138.57
                                                          Dec 5, 2023 05:29:10.488329887 CET16458498513.127.138.57192.168.2.4
                                                          Dec 5, 2023 05:29:10.488666058 CET4985116458192.168.2.43.127.138.57
                                                          Dec 5, 2023 05:29:10.499736071 CET4985116458192.168.2.43.127.138.57
                                                          Dec 5, 2023 05:29:10.500658989 CET4985216458192.168.2.43.127.138.57
                                                          Dec 5, 2023 05:29:10.626712084 CET16458498513.127.138.57192.168.2.4
                                                          Dec 5, 2023 05:29:10.670546055 CET16458498513.127.138.57192.168.2.4
                                                          Dec 5, 2023 05:29:10.681010962 CET16458498523.127.138.57192.168.2.4
                                                          Dec 5, 2023 05:29:10.681250095 CET4985216458192.168.2.43.127.138.57
                                                          Dec 5, 2023 05:29:10.681548119 CET16458498513.127.138.57192.168.2.4
                                                          Dec 5, 2023 05:29:10.682965040 CET4985216458192.168.2.43.127.138.57
                                                          Dec 5, 2023 05:29:10.864999056 CET16458498523.127.138.57192.168.2.4
                                                          Dec 5, 2023 05:29:10.865065098 CET4985216458192.168.2.43.127.138.57
                                                          Dec 5, 2023 05:29:10.889401913 CET16458498523.127.138.57192.168.2.4
                                                          Dec 5, 2023 05:29:10.889552116 CET4985216458192.168.2.43.127.138.57
                                                          Dec 5, 2023 05:29:10.906059027 CET4985216458192.168.2.43.127.138.57
                                                          Dec 5, 2023 05:29:10.907247066 CET4985316458192.168.2.43.127.138.57
                                                          Dec 5, 2023 05:29:11.045252085 CET16458498523.127.138.57192.168.2.4
                                                          Dec 5, 2023 05:29:11.070009947 CET16458498523.127.138.57192.168.2.4
                                                          Dec 5, 2023 05:29:11.086703062 CET16458498523.127.138.57192.168.2.4
                                                          Dec 5, 2023 05:29:11.087538004 CET16458498533.127.138.57192.168.2.4
                                                          Dec 5, 2023 05:29:11.087739944 CET4985316458192.168.2.43.127.138.57
                                                          Dec 5, 2023 05:29:11.089595079 CET4985316458192.168.2.43.127.138.57
                                                          Dec 5, 2023 05:29:11.270036936 CET16458498533.127.138.57192.168.2.4
                                                          Dec 5, 2023 05:29:11.270246029 CET4985316458192.168.2.43.127.138.57
                                                          Dec 5, 2023 05:29:11.295067072 CET16458498533.127.138.57192.168.2.4
                                                          Dec 5, 2023 05:29:11.295304060 CET4985316458192.168.2.43.127.138.57
                                                          Dec 5, 2023 05:29:11.312222004 CET4985316458192.168.2.43.127.138.57
                                                          Dec 5, 2023 05:29:11.313200951 CET4985416458192.168.2.43.127.138.57
                                                          Dec 5, 2023 05:29:11.450833082 CET16458498533.127.138.57192.168.2.4
                                                          Dec 5, 2023 05:29:11.475455046 CET16458498533.127.138.57192.168.2.4
                                                          Dec 5, 2023 05:29:11.492479086 CET16458498543.127.138.57192.168.2.4
                                                          Dec 5, 2023 05:29:11.492510080 CET16458498533.127.138.57192.168.2.4
                                                          Dec 5, 2023 05:29:11.492607117 CET4985416458192.168.2.43.127.138.57
                                                          Dec 5, 2023 05:29:11.494402885 CET4985416458192.168.2.43.127.138.57
                                                          Dec 5, 2023 05:29:11.673388958 CET16458498543.127.138.57192.168.2.4
                                                          Dec 5, 2023 05:29:11.673501015 CET4985416458192.168.2.43.127.138.57
                                                          Dec 5, 2023 05:29:11.701750994 CET16458498543.127.138.57192.168.2.4
                                                          Dec 5, 2023 05:29:11.702012062 CET4985416458192.168.2.43.127.138.57
                                                          Dec 5, 2023 05:29:11.718518019 CET4985416458192.168.2.43.127.138.57
                                                          Dec 5, 2023 05:29:11.719599962 CET4985516458192.168.2.43.127.138.57
                                                          Dec 5, 2023 05:29:11.852632999 CET16458498543.127.138.57192.168.2.4
                                                          Dec 5, 2023 05:29:11.881331921 CET16458498543.127.138.57192.168.2.4
                                                          Dec 5, 2023 05:29:11.897706032 CET16458498543.127.138.57192.168.2.4
                                                          Dec 5, 2023 05:29:11.898895025 CET16458498553.127.138.57192.168.2.4
                                                          Dec 5, 2023 05:29:11.898979902 CET4985516458192.168.2.43.127.138.57
                                                          Dec 5, 2023 05:29:11.900738955 CET4985516458192.168.2.43.127.138.57
                                                          Dec 5, 2023 05:29:12.080269098 CET16458498553.127.138.57192.168.2.4
                                                          Dec 5, 2023 05:29:12.080389977 CET4985516458192.168.2.43.127.138.57
                                                          Dec 5, 2023 05:29:12.116094112 CET16458498553.127.138.57192.168.2.4
                                                          Dec 5, 2023 05:29:12.116247892 CET4985516458192.168.2.43.127.138.57
                                                          Dec 5, 2023 05:29:12.124685049 CET4985516458192.168.2.43.127.138.57
                                                          Dec 5, 2023 05:29:12.125726938 CET4985616458192.168.2.43.127.138.57
                                                          Dec 5, 2023 05:29:12.259926081 CET16458498553.127.138.57192.168.2.4
                                                          Dec 5, 2023 05:29:12.295505047 CET16458498553.127.138.57192.168.2.4
                                                          Dec 5, 2023 05:29:12.304620981 CET16458498553.127.138.57192.168.2.4
                                                          Dec 5, 2023 05:29:12.306834936 CET16458498563.127.138.57192.168.2.4
                                                          Dec 5, 2023 05:29:12.306936026 CET4985616458192.168.2.43.127.138.57
                                                          Dec 5, 2023 05:29:12.308733940 CET4985616458192.168.2.43.127.138.57
                                                          Dec 5, 2023 05:29:12.490200043 CET16458498563.127.138.57192.168.2.4
                                                          Dec 5, 2023 05:29:12.490359068 CET4985616458192.168.2.43.127.138.57
                                                          Dec 5, 2023 05:29:12.520459890 CET16458498563.127.138.57192.168.2.4
                                                          Dec 5, 2023 05:29:12.520601988 CET4985616458192.168.2.43.127.138.57
                                                          Dec 5, 2023 05:29:12.530814886 CET4985616458192.168.2.43.127.138.57
                                                          Dec 5, 2023 05:29:12.531887054 CET4985716458192.168.2.43.127.138.57
                                                          Dec 5, 2023 05:29:12.671068907 CET16458498563.127.138.57192.168.2.4
                                                          Dec 5, 2023 05:29:12.701155901 CET16458498563.127.138.57192.168.2.4
                                                          Dec 5, 2023 05:29:12.711720943 CET16458498563.127.138.57192.168.2.4
                                                          Dec 5, 2023 05:29:12.712712049 CET16458498573.127.138.57192.168.2.4
                                                          Dec 5, 2023 05:29:12.712801933 CET4985716458192.168.2.43.127.138.57
                                                          Dec 5, 2023 05:29:12.714596987 CET4985716458192.168.2.43.127.138.57
                                                          Dec 5, 2023 05:29:12.895579100 CET16458498573.127.138.57192.168.2.4
                                                          Dec 5, 2023 05:29:12.895684004 CET4985716458192.168.2.43.127.138.57
                                                          Dec 5, 2023 05:29:12.920675993 CET16458498573.127.138.57192.168.2.4
                                                          Dec 5, 2023 05:29:12.920772076 CET4985716458192.168.2.43.127.138.57
                                                          Dec 5, 2023 05:29:12.937113047 CET4985716458192.168.2.43.127.138.57
                                                          Dec 5, 2023 05:29:12.938483953 CET4985816458192.168.2.43.127.138.57
                                                          Dec 5, 2023 05:29:13.076502085 CET16458498573.127.138.57192.168.2.4
                                                          Dec 5, 2023 05:29:13.101798058 CET16458498573.127.138.57192.168.2.4
                                                          Dec 5, 2023 05:29:13.118762970 CET16458498573.127.138.57192.168.2.4
                                                          Dec 5, 2023 05:29:13.118946075 CET16458498583.127.138.57192.168.2.4
                                                          Dec 5, 2023 05:29:13.119144917 CET4985816458192.168.2.43.127.138.57
                                                          Dec 5, 2023 05:29:13.120862007 CET4985816458192.168.2.43.127.138.57
                                                          Dec 5, 2023 05:29:13.301470995 CET16458498583.127.138.57192.168.2.4
                                                          Dec 5, 2023 05:29:13.301651001 CET4985816458192.168.2.43.127.138.57
                                                          Dec 5, 2023 05:29:13.326132059 CET16458498583.127.138.57192.168.2.4
                                                          Dec 5, 2023 05:29:13.326328993 CET4985816458192.168.2.43.127.138.57
                                                          Dec 5, 2023 05:29:13.327661991 CET4985816458192.168.2.43.127.138.57
                                                          Dec 5, 2023 05:29:13.439342022 CET4985916458192.168.2.418.157.68.73
                                                          Dec 5, 2023 05:29:13.482211113 CET16458498583.127.138.57192.168.2.4
                                                          Dec 5, 2023 05:29:13.506753922 CET16458498583.127.138.57192.168.2.4
                                                          Dec 5, 2023 05:29:13.508003950 CET16458498583.127.138.57192.168.2.4
                                                          Dec 5, 2023 05:29:13.619863033 CET164584985918.157.68.73192.168.2.4
                                                          Dec 5, 2023 05:29:13.619988918 CET4985916458192.168.2.418.157.68.73
                                                          Dec 5, 2023 05:29:13.621777058 CET4985916458192.168.2.418.157.68.73
                                                          Dec 5, 2023 05:29:13.802397013 CET164584985918.157.68.73192.168.2.4
                                                          Dec 5, 2023 05:29:13.802515030 CET4985916458192.168.2.418.157.68.73
                                                          Dec 5, 2023 05:29:13.835834026 CET164584985918.157.68.73192.168.2.4
                                                          Dec 5, 2023 05:29:13.835975885 CET4985916458192.168.2.418.157.68.73
                                                          Dec 5, 2023 05:29:13.843417883 CET4985916458192.168.2.418.157.68.73
                                                          Dec 5, 2023 05:29:13.844482899 CET4986016458192.168.2.418.157.68.73
                                                          Dec 5, 2023 05:29:13.983475924 CET164584985918.157.68.73192.168.2.4
                                                          Dec 5, 2023 05:29:14.016644001 CET164584985918.157.68.73192.168.2.4
                                                          Dec 5, 2023 05:29:14.023737907 CET164584985918.157.68.73192.168.2.4
                                                          Dec 5, 2023 05:29:14.026319981 CET164584986018.157.68.73192.168.2.4
                                                          Dec 5, 2023 05:29:14.026386023 CET4986016458192.168.2.418.157.68.73
                                                          Dec 5, 2023 05:29:14.048224926 CET4986016458192.168.2.418.157.68.73
                                                          Dec 5, 2023 05:29:14.230597973 CET164584986018.157.68.73192.168.2.4
                                                          Dec 5, 2023 05:29:14.230650902 CET4986016458192.168.2.418.157.68.73
                                                          Dec 5, 2023 05:29:14.236846924 CET164584986018.157.68.73192.168.2.4
                                                          Dec 5, 2023 05:29:14.236908913 CET4986016458192.168.2.418.157.68.73
                                                          Dec 5, 2023 05:29:14.412820101 CET164584986018.157.68.73192.168.2.4
                                                          Dec 5, 2023 05:29:14.418596029 CET164584986018.157.68.73192.168.2.4
                                                          Dec 5, 2023 05:29:16.251066923 CET4986116458192.168.2.418.157.68.73
                                                          Dec 5, 2023 05:29:16.432774067 CET164584986118.157.68.73192.168.2.4
                                                          Dec 5, 2023 05:29:16.432977915 CET4986116458192.168.2.418.157.68.73
                                                          Dec 5, 2023 05:29:16.435009003 CET4986116458192.168.2.418.157.68.73
                                                          Dec 5, 2023 05:29:16.616642952 CET164584986118.157.68.73192.168.2.4
                                                          Dec 5, 2023 05:29:16.616751909 CET4986116458192.168.2.418.157.68.73
                                                          Dec 5, 2023 05:29:16.646568060 CET164584986118.157.68.73192.168.2.4
                                                          Dec 5, 2023 05:29:16.646642923 CET4986116458192.168.2.418.157.68.73
                                                          Dec 5, 2023 05:29:16.798571110 CET164584986118.157.68.73192.168.2.4
                                                          Dec 5, 2023 05:29:16.828409910 CET164584986118.157.68.73192.168.2.4
                                                          Dec 5, 2023 05:29:18.844085932 CET4986216458192.168.2.418.157.68.73
                                                          Dec 5, 2023 05:29:19.025021076 CET164584986218.157.68.73192.168.2.4
                                                          Dec 5, 2023 05:29:19.025320053 CET4986216458192.168.2.418.157.68.73
                                                          Dec 5, 2023 05:29:19.027009964 CET4986216458192.168.2.418.157.68.73
                                                          Dec 5, 2023 05:29:19.207935095 CET164584986218.157.68.73192.168.2.4
                                                          Dec 5, 2023 05:29:19.208172083 CET4986216458192.168.2.418.157.68.73
                                                          Dec 5, 2023 05:29:19.234363079 CET164584986218.157.68.73192.168.2.4
                                                          Dec 5, 2023 05:29:19.234608889 CET4986216458192.168.2.418.157.68.73
                                                          Dec 5, 2023 05:29:19.389238119 CET164584986218.157.68.73192.168.2.4
                                                          Dec 5, 2023 05:29:19.415752888 CET164584986218.157.68.73192.168.2.4
                                                          Dec 5, 2023 05:29:21.250992060 CET4986316458192.168.2.418.157.68.73
                                                          Dec 5, 2023 05:29:21.430718899 CET164584986318.157.68.73192.168.2.4
                                                          Dec 5, 2023 05:29:21.430938959 CET4986316458192.168.2.418.157.68.73
                                                          Dec 5, 2023 05:29:21.432689905 CET4986316458192.168.2.418.157.68.73
                                                          Dec 5, 2023 05:29:21.612039089 CET164584986318.157.68.73192.168.2.4
                                                          Dec 5, 2023 05:29:21.612390995 CET4986316458192.168.2.418.157.68.73
                                                          Dec 5, 2023 05:29:21.637207985 CET164584986318.157.68.73192.168.2.4
                                                          Dec 5, 2023 05:29:21.637479067 CET4986316458192.168.2.418.157.68.73
                                                          Dec 5, 2023 05:29:21.791970015 CET164584986318.157.68.73192.168.2.4
                                                          Dec 5, 2023 05:29:21.817135096 CET164584986318.157.68.73192.168.2.4
                                                          Dec 5, 2023 05:29:23.641510963 CET4986416458192.168.2.418.157.68.73
                                                          Dec 5, 2023 05:29:23.825051069 CET164584986418.157.68.73192.168.2.4
                                                          Dec 5, 2023 05:29:23.825215101 CET4986416458192.168.2.418.157.68.73
                                                          Dec 5, 2023 05:29:23.827162027 CET4986416458192.168.2.418.157.68.73
                                                          Dec 5, 2023 05:29:24.008991957 CET164584986418.157.68.73192.168.2.4
                                                          Dec 5, 2023 05:29:24.009108067 CET4986416458192.168.2.418.157.68.73
                                                          Dec 5, 2023 05:29:24.034179926 CET164584986418.157.68.73192.168.2.4
                                                          Dec 5, 2023 05:29:24.034324884 CET4986416458192.168.2.418.157.68.73
                                                          Dec 5, 2023 05:29:24.190973997 CET164584986418.157.68.73192.168.2.4
                                                          Dec 5, 2023 05:29:24.216058969 CET164584986418.157.68.73192.168.2.4
                                                          Dec 5, 2023 05:29:26.054150105 CET4986516458192.168.2.418.157.68.73
                                                          Dec 5, 2023 05:29:26.234951019 CET164584986518.157.68.73192.168.2.4
                                                          Dec 5, 2023 05:29:26.235331059 CET4986516458192.168.2.418.157.68.73
                                                          Dec 5, 2023 05:29:26.237214088 CET4986516458192.168.2.418.157.68.73
                                                          Dec 5, 2023 05:29:26.417594910 CET164584986518.157.68.73192.168.2.4
                                                          Dec 5, 2023 05:29:26.417983055 CET4986516458192.168.2.418.157.68.73
                                                          Dec 5, 2023 05:29:26.448712111 CET164584986518.157.68.73192.168.2.4
                                                          Dec 5, 2023 05:29:26.449008942 CET4986516458192.168.2.418.157.68.73
                                                          Dec 5, 2023 05:29:26.598597050 CET164584986518.157.68.73192.168.2.4
                                                          Dec 5, 2023 05:29:26.629362106 CET164584986518.157.68.73192.168.2.4
                                                          Dec 5, 2023 05:29:28.454042912 CET4986616458192.168.2.418.157.68.73
                                                          Dec 5, 2023 05:29:28.635037899 CET164584986618.157.68.73192.168.2.4
                                                          Dec 5, 2023 05:29:28.635133982 CET4986616458192.168.2.418.157.68.73
                                                          Dec 5, 2023 05:29:28.636956930 CET4986616458192.168.2.418.157.68.73
                                                          Dec 5, 2023 05:29:28.817698002 CET164584986618.157.68.73192.168.2.4
                                                          Dec 5, 2023 05:29:28.817889929 CET4986616458192.168.2.418.157.68.73
                                                          Dec 5, 2023 05:29:28.843363047 CET164584986618.157.68.73192.168.2.4
                                                          Dec 5, 2023 05:29:28.843452930 CET4986616458192.168.2.418.157.68.73
                                                          Dec 5, 2023 05:29:28.998657942 CET164584986618.157.68.73192.168.2.4
                                                          Dec 5, 2023 05:29:29.024509907 CET164584986618.157.68.73192.168.2.4
                                                          Dec 5, 2023 05:29:30.864568949 CET4986716458192.168.2.418.157.68.73
                                                          Dec 5, 2023 05:29:31.046268940 CET164584986718.157.68.73192.168.2.4
                                                          Dec 5, 2023 05:29:31.046420097 CET4986716458192.168.2.418.157.68.73
                                                          Dec 5, 2023 05:29:31.048279047 CET4986716458192.168.2.418.157.68.73
                                                          Dec 5, 2023 05:29:31.229305029 CET164584986718.157.68.73192.168.2.4
                                                          Dec 5, 2023 05:29:31.229374886 CET4986716458192.168.2.418.157.68.73
                                                          Dec 5, 2023 05:29:31.254573107 CET164584986718.157.68.73192.168.2.4
                                                          Dec 5, 2023 05:29:31.254650116 CET4986716458192.168.2.418.157.68.73
                                                          Dec 5, 2023 05:29:31.410294056 CET164584986718.157.68.73192.168.2.4
                                                          Dec 5, 2023 05:29:31.437678099 CET164584986718.157.68.73192.168.2.4
                                                          Dec 5, 2023 05:29:33.285880089 CET4986816458192.168.2.418.157.68.73
                                                          Dec 5, 2023 05:29:33.469705105 CET164584986818.157.68.73192.168.2.4
                                                          Dec 5, 2023 05:29:33.469819069 CET4986816458192.168.2.418.157.68.73
                                                          Dec 5, 2023 05:29:33.471781015 CET4986816458192.168.2.418.157.68.73
                                                          Dec 5, 2023 05:29:33.652235031 CET164584986818.157.68.73192.168.2.4
                                                          Dec 5, 2023 05:29:33.652497053 CET4986816458192.168.2.418.157.68.73
                                                          Dec 5, 2023 05:29:33.681174040 CET164584986818.157.68.73192.168.2.4
                                                          Dec 5, 2023 05:29:33.681349039 CET4986816458192.168.2.418.157.68.73
                                                          Dec 5, 2023 05:29:33.833173990 CET164584986818.157.68.73192.168.2.4
                                                          Dec 5, 2023 05:29:33.862234116 CET164584986818.157.68.73192.168.2.4
                                                          Dec 5, 2023 05:29:35.688137054 CET4986916458192.168.2.418.157.68.73
                                                          Dec 5, 2023 05:29:35.867960930 CET164584986918.157.68.73192.168.2.4
                                                          Dec 5, 2023 05:29:35.868097067 CET4986916458192.168.2.418.157.68.73
                                                          Dec 5, 2023 05:29:35.897456884 CET4986916458192.168.2.418.157.68.73
                                                          Dec 5, 2023 05:29:36.076350927 CET164584986918.157.68.73192.168.2.4
                                                          Dec 5, 2023 05:29:36.076725960 CET4986916458192.168.2.418.157.68.73
                                                          Dec 5, 2023 05:29:36.077291012 CET164584986918.157.68.73192.168.2.4
                                                          Dec 5, 2023 05:29:36.256367922 CET164584986918.157.68.73192.168.2.4
                                                          Dec 5, 2023 05:29:38.078676939 CET4987016458192.168.2.418.157.68.73
                                                          Dec 5, 2023 05:29:38.259485960 CET164584987018.157.68.73192.168.2.4
                                                          Dec 5, 2023 05:29:38.259696007 CET4987016458192.168.2.418.157.68.73
                                                          Dec 5, 2023 05:29:38.261259079 CET4987016458192.168.2.418.157.68.73
                                                          Dec 5, 2023 05:29:38.440797091 CET164584987018.157.68.73192.168.2.4
                                                          Dec 5, 2023 05:29:38.440887928 CET4987016458192.168.2.418.157.68.73
                                                          Dec 5, 2023 05:29:38.472301960 CET164584987018.157.68.73192.168.2.4
                                                          Dec 5, 2023 05:29:38.472374916 CET4987016458192.168.2.418.157.68.73
                                                          Dec 5, 2023 05:29:38.620522022 CET164584987018.157.68.73192.168.2.4
                                                          Dec 5, 2023 05:29:38.651599884 CET164584987018.157.68.73192.168.2.4
                                                          Dec 5, 2023 05:29:40.485512018 CET4987116458192.168.2.418.157.68.73
                                                          Dec 5, 2023 05:29:40.665481091 CET164584987118.157.68.73192.168.2.4
                                                          Dec 5, 2023 05:29:40.665805101 CET4987116458192.168.2.418.157.68.73
                                                          Dec 5, 2023 05:29:40.670022964 CET4987116458192.168.2.418.157.68.73
                                                          Dec 5, 2023 05:29:40.849823952 CET164584987118.157.68.73192.168.2.4
                                                          Dec 5, 2023 05:29:40.850091934 CET4987116458192.168.2.418.157.68.73
                                                          Dec 5, 2023 05:29:40.873572111 CET164584987118.157.68.73192.168.2.4
                                                          Dec 5, 2023 05:29:40.873847008 CET4987116458192.168.2.418.157.68.73
                                                          Dec 5, 2023 05:29:41.030113935 CET164584987118.157.68.73192.168.2.4
                                                          Dec 5, 2023 05:29:41.053956985 CET164584987118.157.68.73192.168.2.4
                                                          Dec 5, 2023 05:29:42.876121998 CET4987216458192.168.2.418.157.68.73
                                                          Dec 5, 2023 05:29:43.057300091 CET164584987218.157.68.73192.168.2.4
                                                          Dec 5, 2023 05:29:43.057420969 CET4987216458192.168.2.418.157.68.73
                                                          Dec 5, 2023 05:29:43.064038992 CET4987216458192.168.2.418.157.68.73
                                                          Dec 5, 2023 05:29:43.245124102 CET164584987218.157.68.73192.168.2.4
                                                          Dec 5, 2023 05:29:43.245198011 CET4987216458192.168.2.418.157.68.73
                                                          Dec 5, 2023 05:29:43.268312931 CET164584987218.157.68.73192.168.2.4
                                                          Dec 5, 2023 05:29:43.268398046 CET4987216458192.168.2.418.157.68.73
                                                          Dec 5, 2023 05:29:43.426409960 CET164584987218.157.68.73192.168.2.4
                                                          Dec 5, 2023 05:29:43.449096918 CET164584987218.157.68.73192.168.2.4
                                                          Dec 5, 2023 05:29:45.282015085 CET4987316458192.168.2.418.157.68.73
                                                          Dec 5, 2023 05:29:45.462116003 CET164584987318.157.68.73192.168.2.4
                                                          Dec 5, 2023 05:29:45.462399006 CET4987316458192.168.2.418.157.68.73
                                                          Dec 5, 2023 05:29:45.464085102 CET4987316458192.168.2.418.157.68.73
                                                          Dec 5, 2023 05:29:45.643817902 CET164584987318.157.68.73192.168.2.4
                                                          Dec 5, 2023 05:29:45.643969059 CET4987316458192.168.2.418.157.68.73
                                                          Dec 5, 2023 05:29:45.673856974 CET164584987318.157.68.73192.168.2.4
                                                          Dec 5, 2023 05:29:45.673953056 CET4987316458192.168.2.418.157.68.73
                                                          Dec 5, 2023 05:29:45.823698044 CET164584987318.157.68.73192.168.2.4
                                                          Dec 5, 2023 05:29:45.854655981 CET164584987318.157.68.73192.168.2.4
                                                          Dec 5, 2023 05:29:47.688568115 CET4987416458192.168.2.418.157.68.73
                                                          Dec 5, 2023 05:29:47.869105101 CET164584987418.157.68.73192.168.2.4
                                                          Dec 5, 2023 05:29:47.869308949 CET4987416458192.168.2.418.157.68.73
                                                          Dec 5, 2023 05:29:47.871256113 CET4987416458192.168.2.418.157.68.73
                                                          Dec 5, 2023 05:29:48.051865101 CET164584987418.157.68.73192.168.2.4
                                                          Dec 5, 2023 05:29:48.052087069 CET4987416458192.168.2.418.157.68.73
                                                          Dec 5, 2023 05:29:48.079173088 CET164584987418.157.68.73192.168.2.4
                                                          Dec 5, 2023 05:29:48.079468966 CET4987416458192.168.2.418.157.68.73
                                                          Dec 5, 2023 05:29:48.232505083 CET164584987418.157.68.73192.168.2.4
                                                          Dec 5, 2023 05:29:48.259974003 CET164584987418.157.68.73192.168.2.4
                                                          Dec 5, 2023 05:29:50.097044945 CET4987516458192.168.2.418.157.68.73
                                                          Dec 5, 2023 05:29:50.278306961 CET164584987518.157.68.73192.168.2.4
                                                          Dec 5, 2023 05:29:50.278738022 CET4987516458192.168.2.418.157.68.73
                                                          Dec 5, 2023 05:29:50.280324936 CET4987516458192.168.2.418.157.68.73
                                                          Dec 5, 2023 05:29:50.461129904 CET164584987518.157.68.73192.168.2.4
                                                          Dec 5, 2023 05:29:50.461328030 CET4987516458192.168.2.418.157.68.73
                                                          Dec 5, 2023 05:29:50.489483118 CET164584987518.157.68.73192.168.2.4
                                                          Dec 5, 2023 05:29:50.489818096 CET4987516458192.168.2.418.157.68.73
                                                          Dec 5, 2023 05:29:50.642268896 CET164584987518.157.68.73192.168.2.4
                                                          Dec 5, 2023 05:29:50.670806885 CET164584987518.157.68.73192.168.2.4
                                                          Dec 5, 2023 05:29:52.503617048 CET4987616458192.168.2.418.157.68.73
                                                          Dec 5, 2023 05:29:52.686332941 CET164584987618.157.68.73192.168.2.4
                                                          Dec 5, 2023 05:29:52.686582088 CET4987616458192.168.2.418.157.68.73
                                                          Dec 5, 2023 05:29:52.688608885 CET4987616458192.168.2.418.157.68.73
                                                          Dec 5, 2023 05:29:52.869370937 CET164584987618.157.68.73192.168.2.4
                                                          Dec 5, 2023 05:29:52.869609118 CET4987616458192.168.2.418.157.68.73
                                                          Dec 5, 2023 05:29:52.893824100 CET164584987618.157.68.73192.168.2.4
                                                          Dec 5, 2023 05:29:52.894011021 CET4987616458192.168.2.418.157.68.73
                                                          Dec 5, 2023 05:29:53.050863028 CET164584987618.157.68.73192.168.2.4
                                                          Dec 5, 2023 05:29:53.075139999 CET164584987618.157.68.73192.168.2.4
                                                          Dec 5, 2023 05:29:54.928508043 CET4987716458192.168.2.418.157.68.73
                                                          Dec 5, 2023 05:29:55.111475945 CET164584987718.157.68.73192.168.2.4
                                                          Dec 5, 2023 05:29:55.111582994 CET4987716458192.168.2.418.157.68.73
                                                          Dec 5, 2023 05:29:55.113455057 CET4987716458192.168.2.418.157.68.73
                                                          Dec 5, 2023 05:29:55.294153929 CET164584987718.157.68.73192.168.2.4
                                                          Dec 5, 2023 05:29:55.294408083 CET4987716458192.168.2.418.157.68.73
                                                          Dec 5, 2023 05:29:55.348447084 CET164584987718.157.68.73192.168.2.4
                                                          Dec 5, 2023 05:29:55.348789930 CET4987716458192.168.2.418.157.68.73
                                                          Dec 5, 2023 05:29:55.475600958 CET164584987718.157.68.73192.168.2.4
                                                          Dec 5, 2023 05:29:55.529604912 CET164584987718.157.68.73192.168.2.4
                                                          Dec 5, 2023 05:29:57.219870090 CET4987816458192.168.2.418.157.68.73
                                                          Dec 5, 2023 05:29:57.401216030 CET164584987818.157.68.73192.168.2.4
                                                          Dec 5, 2023 05:29:57.401313066 CET4987816458192.168.2.418.157.68.73
                                                          Dec 5, 2023 05:29:57.403315067 CET4987816458192.168.2.418.157.68.73
                                                          Dec 5, 2023 05:29:57.584517002 CET164584987818.157.68.73192.168.2.4
                                                          Dec 5, 2023 05:29:57.584690094 CET4987816458192.168.2.418.157.68.73
                                                          Dec 5, 2023 05:29:57.611991882 CET164584987818.157.68.73192.168.2.4
                                                          Dec 5, 2023 05:29:57.612138033 CET4987816458192.168.2.418.157.68.73
                                                          Dec 5, 2023 05:29:57.765708923 CET164584987818.157.68.73192.168.2.4
                                                          Dec 5, 2023 05:29:57.792939901 CET164584987818.157.68.73192.168.2.4
                                                          Dec 5, 2023 05:29:59.359961987 CET4987916458192.168.2.418.157.68.73
                                                          Dec 5, 2023 05:29:59.540031910 CET164584987918.157.68.73192.168.2.4
                                                          Dec 5, 2023 05:29:59.540242910 CET4987916458192.168.2.418.157.68.73
                                                          Dec 5, 2023 05:29:59.542092085 CET4987916458192.168.2.418.157.68.73
                                                          Dec 5, 2023 05:29:59.721846104 CET164584987918.157.68.73192.168.2.4
                                                          Dec 5, 2023 05:29:59.721935034 CET4987916458192.168.2.418.157.68.73
                                                          Dec 5, 2023 05:29:59.749380112 CET164584987918.157.68.73192.168.2.4
                                                          Dec 5, 2023 05:29:59.749686003 CET4987916458192.168.2.418.157.68.73
                                                          Dec 5, 2023 05:29:59.901568890 CET164584987918.157.68.73192.168.2.4
                                                          Dec 5, 2023 05:29:59.929142952 CET164584987918.157.68.73192.168.2.4
                                                          Dec 5, 2023 05:30:01.391187906 CET4988016458192.168.2.418.157.68.73
                                                          Dec 5, 2023 05:30:01.574001074 CET164584988018.157.68.73192.168.2.4
                                                          Dec 5, 2023 05:30:01.574157953 CET4988016458192.168.2.418.157.68.73
                                                          Dec 5, 2023 05:30:01.575901031 CET4988016458192.168.2.418.157.68.73
                                                          Dec 5, 2023 05:30:01.757204056 CET164584988018.157.68.73192.168.2.4
                                                          Dec 5, 2023 05:30:01.757294893 CET4988016458192.168.2.418.157.68.73
                                                          Dec 5, 2023 05:30:01.782088041 CET164584988018.157.68.73192.168.2.4
                                                          Dec 5, 2023 05:30:01.782193899 CET4988016458192.168.2.418.157.68.73
                                                          Dec 5, 2023 05:30:01.937923908 CET164584988018.157.68.73192.168.2.4
                                                          Dec 5, 2023 05:30:01.963182926 CET164584988018.157.68.73192.168.2.4
                                                          Dec 5, 2023 05:30:03.313529015 CET4988116458192.168.2.418.157.68.73
                                                          Dec 5, 2023 05:30:03.493103027 CET164584988118.157.68.73192.168.2.4
                                                          Dec 5, 2023 05:30:03.493252993 CET4988116458192.168.2.418.157.68.73
                                                          Dec 5, 2023 05:30:03.495299101 CET4988116458192.168.2.418.157.68.73
                                                          Dec 5, 2023 05:30:03.674776077 CET164584988118.157.68.73192.168.2.4
                                                          Dec 5, 2023 05:30:03.674869061 CET4988116458192.168.2.418.157.68.73
                                                          Dec 5, 2023 05:30:03.702719927 CET164584988118.157.68.73192.168.2.4
                                                          Dec 5, 2023 05:30:03.702810049 CET4988116458192.168.2.418.157.68.73
                                                          Dec 5, 2023 05:30:03.854264021 CET164584988118.157.68.73192.168.2.4
                                                          Dec 5, 2023 05:30:03.882141113 CET164584988118.157.68.73192.168.2.4
                                                          Dec 5, 2023 05:30:05.125746012 CET4988216458192.168.2.418.157.68.73
                                                          Dec 5, 2023 05:30:05.308202982 CET164584988218.157.68.73192.168.2.4
                                                          Dec 5, 2023 05:30:05.308438063 CET4988216458192.168.2.418.157.68.73
                                                          Dec 5, 2023 05:30:05.310312033 CET4988216458192.168.2.418.157.68.73
                                                          Dec 5, 2023 05:30:05.492139101 CET164584988218.157.68.73192.168.2.4
                                                          Dec 5, 2023 05:30:05.492294073 CET4988216458192.168.2.418.157.68.73
                                                          Dec 5, 2023 05:30:05.524243116 CET164584988218.157.68.73192.168.2.4
                                                          Dec 5, 2023 05:30:05.524418116 CET4988216458192.168.2.418.157.68.73
                                                          Dec 5, 2023 05:30:05.674526930 CET164584988218.157.68.73192.168.2.4
                                                          Dec 5, 2023 05:30:05.706351995 CET164584988218.157.68.73192.168.2.4
                                                          Dec 5, 2023 05:30:06.860487938 CET4988316458192.168.2.418.157.68.73
                                                          Dec 5, 2023 05:30:07.041829109 CET164584988318.157.68.73192.168.2.4
                                                          Dec 5, 2023 05:30:07.042087078 CET4988316458192.168.2.418.157.68.73
                                                          Dec 5, 2023 05:30:07.044152021 CET4988316458192.168.2.418.157.68.73
                                                          Dec 5, 2023 05:30:07.225135088 CET164584988318.157.68.73192.168.2.4
                                                          Dec 5, 2023 05:30:07.225302935 CET4988316458192.168.2.418.157.68.73
                                                          Dec 5, 2023 05:30:07.249809027 CET164584988318.157.68.73192.168.2.4
                                                          Dec 5, 2023 05:30:07.250027895 CET4988316458192.168.2.418.157.68.73
                                                          Dec 5, 2023 05:30:07.406089067 CET164584988318.157.68.73192.168.2.4
                                                          Dec 5, 2023 05:30:07.430947065 CET164584988318.157.68.73192.168.2.4
                                                          Dec 5, 2023 05:30:08.500771999 CET4988416458192.168.2.418.157.68.73
                                                          Dec 5, 2023 05:30:08.681950092 CET164584988418.157.68.73192.168.2.4
                                                          Dec 5, 2023 05:30:08.682117939 CET4988416458192.168.2.418.157.68.73
                                                          Dec 5, 2023 05:30:08.683875084 CET4988416458192.168.2.418.157.68.73
                                                          Dec 5, 2023 05:30:08.864217997 CET164584988418.157.68.73192.168.2.4
                                                          Dec 5, 2023 05:30:08.864320993 CET4988416458192.168.2.418.157.68.73
                                                          Dec 5, 2023 05:30:08.890060902 CET164584988418.157.68.73192.168.2.4
                                                          Dec 5, 2023 05:30:08.890147924 CET4988416458192.168.2.418.157.68.73
                                                          Dec 5, 2023 05:30:09.045161963 CET164584988418.157.68.73192.168.2.4
                                                          Dec 5, 2023 05:30:09.070745945 CET164584988418.157.68.73192.168.2.4
                                                          Dec 5, 2023 05:30:10.051690102 CET4988516458192.168.2.418.157.68.73
                                                          Dec 5, 2023 05:30:10.232503891 CET164584988518.157.68.73192.168.2.4
                                                          Dec 5, 2023 05:30:10.232623100 CET4988516458192.168.2.418.157.68.73
                                                          Dec 5, 2023 05:30:10.234340906 CET4988516458192.168.2.418.157.68.73
                                                          Dec 5, 2023 05:30:10.413703918 CET164584988518.157.68.73192.168.2.4
                                                          Dec 5, 2023 05:30:10.413799047 CET4988516458192.168.2.418.157.68.73
                                                          Dec 5, 2023 05:30:10.442544937 CET164584988518.157.68.73192.168.2.4
                                                          Dec 5, 2023 05:30:10.442728996 CET4988516458192.168.2.418.157.68.73
                                                          Dec 5, 2023 05:30:10.593638897 CET164584988518.157.68.73192.168.2.4
                                                          Dec 5, 2023 05:30:10.622637987 CET164584988518.157.68.73192.168.2.4
                                                          Dec 5, 2023 05:30:11.532300949 CET4988616458192.168.2.418.157.68.73
                                                          Dec 5, 2023 05:30:11.714741945 CET164584988618.157.68.73192.168.2.4
                                                          Dec 5, 2023 05:30:11.714888096 CET4988616458192.168.2.418.157.68.73
                                                          Dec 5, 2023 05:30:11.725388050 CET4988616458192.168.2.418.157.68.73
                                                          Dec 5, 2023 05:30:11.907488108 CET164584988618.157.68.73192.168.2.4
                                                          Dec 5, 2023 05:30:11.907628059 CET4988616458192.168.2.418.157.68.73
                                                          Dec 5, 2023 05:30:11.925981998 CET164584988618.157.68.73192.168.2.4
                                                          Dec 5, 2023 05:30:11.926060915 CET4988616458192.168.2.418.157.68.73
                                                          Dec 5, 2023 05:30:12.089809895 CET164584988618.157.68.73192.168.2.4
                                                          Dec 5, 2023 05:30:12.108338118 CET164584988618.157.68.73192.168.2.4
                                                          Dec 5, 2023 05:30:13.238750935 CET4988716458192.168.2.418.156.13.209
                                                          Dec 5, 2023 05:30:13.418870926 CET164584988718.156.13.209192.168.2.4
                                                          Dec 5, 2023 05:30:13.419162989 CET4988716458192.168.2.418.156.13.209
                                                          Dec 5, 2023 05:30:13.422497034 CET4988716458192.168.2.418.156.13.209
                                                          Dec 5, 2023 05:30:13.602500916 CET164584988718.156.13.209192.168.2.4
                                                          Dec 5, 2023 05:30:13.602632999 CET4988716458192.168.2.418.156.13.209
                                                          Dec 5, 2023 05:30:13.645848036 CET164584988718.156.13.209192.168.2.4
                                                          Dec 5, 2023 05:30:13.645979881 CET4988716458192.168.2.418.156.13.209
                                                          Dec 5, 2023 05:30:13.782377005 CET164584988718.156.13.209192.168.2.4
                                                          Dec 5, 2023 05:30:13.825480938 CET164584988718.156.13.209192.168.2.4
                                                          Dec 5, 2023 05:30:14.594480991 CET4988816458192.168.2.418.156.13.209
                                                          Dec 5, 2023 05:30:14.775093079 CET164584988818.156.13.209192.168.2.4
                                                          Dec 5, 2023 05:30:14.775249004 CET4988816458192.168.2.418.156.13.209
                                                          Dec 5, 2023 05:30:14.777264118 CET4988816458192.168.2.418.156.13.209
                                                          Dec 5, 2023 05:30:14.957629919 CET164584988818.156.13.209192.168.2.4
                                                          Dec 5, 2023 05:30:14.957726955 CET4988816458192.168.2.418.156.13.209
                                                          Dec 5, 2023 05:30:14.982228994 CET164584988818.156.13.209192.168.2.4
                                                          Dec 5, 2023 05:30:14.982328892 CET4988816458192.168.2.418.156.13.209
                                                          Dec 5, 2023 05:30:15.138187885 CET164584988818.156.13.209192.168.2.4
                                                          Dec 5, 2023 05:30:15.164901018 CET164584988818.156.13.209192.168.2.4
                                                          Dec 5, 2023 05:30:15.861591101 CET4988916458192.168.2.418.156.13.209
                                                          Dec 5, 2023 05:30:16.042175055 CET164584988918.156.13.209192.168.2.4
                                                          Dec 5, 2023 05:30:16.042442083 CET4988916458192.168.2.418.156.13.209
                                                          Dec 5, 2023 05:30:16.047233105 CET4988916458192.168.2.418.156.13.209
                                                          Dec 5, 2023 05:30:16.227793932 CET164584988918.156.13.209192.168.2.4
                                                          Dec 5, 2023 05:30:16.228002071 CET4988916458192.168.2.418.156.13.209
                                                          Dec 5, 2023 05:30:16.252938032 CET164584988918.156.13.209192.168.2.4
                                                          Dec 5, 2023 05:30:16.253082991 CET4988916458192.168.2.418.156.13.209
                                                          Dec 5, 2023 05:30:16.408601999 CET164584988918.156.13.209192.168.2.4
                                                          Dec 5, 2023 05:30:16.433931112 CET164584988918.156.13.209192.168.2.4
                                                          Dec 5, 2023 05:30:17.079291105 CET4989016458192.168.2.418.156.13.209
                                                          Dec 5, 2023 05:30:17.260179996 CET164584989018.156.13.209192.168.2.4
                                                          Dec 5, 2023 05:30:17.260395050 CET4989016458192.168.2.418.156.13.209
                                                          Dec 5, 2023 05:30:17.263123035 CET4989016458192.168.2.418.156.13.209
                                                          Dec 5, 2023 05:30:17.444113970 CET164584989018.156.13.209192.168.2.4
                                                          Dec 5, 2023 05:30:17.444365025 CET4989016458192.168.2.418.156.13.209
                                                          Dec 5, 2023 05:30:17.473184109 CET164584989018.156.13.209192.168.2.4
                                                          Dec 5, 2023 05:30:17.473427057 CET4989016458192.168.2.418.156.13.209
                                                          Dec 5, 2023 05:30:17.625406027 CET164584989018.156.13.209192.168.2.4
                                                          Dec 5, 2023 05:30:17.654309034 CET164584989018.156.13.209192.168.2.4
                                                          Dec 5, 2023 05:30:18.251841068 CET4989116458192.168.2.418.156.13.209
                                                          Dec 5, 2023 05:30:18.434133053 CET164584989118.156.13.209192.168.2.4
                                                          Dec 5, 2023 05:30:18.434386015 CET4989116458192.168.2.418.156.13.209
                                                          Dec 5, 2023 05:30:18.437391043 CET4989116458192.168.2.418.156.13.209
                                                          Dec 5, 2023 05:30:18.619640112 CET164584989118.156.13.209192.168.2.4
                                                          Dec 5, 2023 05:30:18.619993925 CET4989116458192.168.2.418.156.13.209
                                                          Dec 5, 2023 05:30:18.642858028 CET164584989118.156.13.209192.168.2.4
                                                          Dec 5, 2023 05:30:18.643043995 CET4989116458192.168.2.418.156.13.209
                                                          Dec 5, 2023 05:30:18.802212954 CET164584989118.156.13.209192.168.2.4
                                                          Dec 5, 2023 05:30:18.825108051 CET164584989118.156.13.209192.168.2.4
                                                          Dec 5, 2023 05:30:19.361035109 CET4989216458192.168.2.418.156.13.209
                                                          Dec 5, 2023 05:30:19.540920973 CET164584989218.156.13.209192.168.2.4
                                                          Dec 5, 2023 05:30:19.541165113 CET4989216458192.168.2.418.156.13.209
                                                          Dec 5, 2023 05:30:19.543185949 CET4989216458192.168.2.418.156.13.209
                                                          Dec 5, 2023 05:30:19.723035097 CET164584989218.156.13.209192.168.2.4
                                                          Dec 5, 2023 05:30:19.723319054 CET4989216458192.168.2.418.156.13.209
                                                          Dec 5, 2023 05:30:19.766635895 CET164584989218.156.13.209192.168.2.4
                                                          Dec 5, 2023 05:30:19.766823053 CET4989216458192.168.2.418.156.13.209
                                                          Dec 5, 2023 05:30:19.904274940 CET164584989218.156.13.209192.168.2.4
                                                          Dec 5, 2023 05:30:19.946782112 CET164584989218.156.13.209192.168.2.4
                                                          Dec 5, 2023 05:30:20.438987970 CET4989316458192.168.2.418.156.13.209
                                                          Dec 5, 2023 05:30:20.620874882 CET164584989318.156.13.209192.168.2.4
                                                          Dec 5, 2023 05:30:20.621133089 CET4989316458192.168.2.418.156.13.209
                                                          Dec 5, 2023 05:30:20.623303890 CET4989316458192.168.2.418.156.13.209
                                                          Dec 5, 2023 05:30:20.805218935 CET164584989318.156.13.209192.168.2.4
                                                          Dec 5, 2023 05:30:20.805581093 CET4989316458192.168.2.418.156.13.209
                                                          Dec 5, 2023 05:30:20.835196018 CET164584989318.156.13.209192.168.2.4
                                                          Dec 5, 2023 05:30:20.835457087 CET4989316458192.168.2.418.156.13.209
                                                          Dec 5, 2023 05:30:20.987704992 CET164584989318.156.13.209192.168.2.4
                                                          Dec 5, 2023 05:30:21.017396927 CET164584989318.156.13.209192.168.2.4
                                                          Dec 5, 2023 05:30:21.470029116 CET4989416458192.168.2.418.156.13.209
                                                          Dec 5, 2023 05:30:21.650711060 CET164584989418.156.13.209192.168.2.4
                                                          Dec 5, 2023 05:30:21.650799036 CET4989416458192.168.2.418.156.13.209
                                                          Dec 5, 2023 05:30:21.652534008 CET4989416458192.168.2.418.156.13.209
                                                          Dec 5, 2023 05:30:21.833009958 CET164584989418.156.13.209192.168.2.4
                                                          Dec 5, 2023 05:30:21.833129883 CET4989416458192.168.2.418.156.13.209
                                                          Dec 5, 2023 05:30:21.861036062 CET164584989418.156.13.209192.168.2.4
                                                          Dec 5, 2023 05:30:21.861224890 CET4989416458192.168.2.418.156.13.209
                                                          Dec 5, 2023 05:30:22.013818979 CET164584989418.156.13.209192.168.2.4
                                                          Dec 5, 2023 05:30:22.041832924 CET164584989418.156.13.209192.168.2.4
                                                          Dec 5, 2023 05:30:22.455519915 CET4989516458192.168.2.418.156.13.209
                                                          Dec 5, 2023 05:30:22.636642933 CET164584989518.156.13.209192.168.2.4
                                                          Dec 5, 2023 05:30:22.636784077 CET4989516458192.168.2.418.156.13.209
                                                          Dec 5, 2023 05:30:22.638933897 CET4989516458192.168.2.418.156.13.209
                                                          Dec 5, 2023 05:30:22.819873095 CET164584989518.156.13.209192.168.2.4
                                                          Dec 5, 2023 05:30:22.820058107 CET4989516458192.168.2.418.156.13.209
                                                          Dec 5, 2023 05:30:22.844372988 CET164584989518.156.13.209192.168.2.4
                                                          Dec 5, 2023 05:30:22.844495058 CET4989516458192.168.2.418.156.13.209
                                                          Dec 5, 2023 05:30:23.001317024 CET164584989518.156.13.209192.168.2.4
                                                          Dec 5, 2023 05:30:23.025777102 CET164584989518.156.13.209192.168.2.4
                                                          Dec 5, 2023 05:30:23.391676903 CET4989616458192.168.2.418.156.13.209
                                                          Dec 5, 2023 05:30:23.572220087 CET164584989618.156.13.209192.168.2.4
                                                          Dec 5, 2023 05:30:23.572331905 CET4989616458192.168.2.418.156.13.209
                                                          Dec 5, 2023 05:30:23.575815916 CET4989616458192.168.2.418.156.13.209
                                                          Dec 5, 2023 05:30:23.755563974 CET164584989618.156.13.209192.168.2.4
                                                          Dec 5, 2023 05:30:23.755759954 CET4989616458192.168.2.418.156.13.209
                                                          Dec 5, 2023 05:30:23.778721094 CET164584989618.156.13.209192.168.2.4
                                                          Dec 5, 2023 05:30:23.778824091 CET4989616458192.168.2.418.156.13.209
                                                          Dec 5, 2023 05:30:23.935280085 CET164584989618.156.13.209192.168.2.4
                                                          Dec 5, 2023 05:30:23.958430052 CET164584989618.156.13.209192.168.2.4
                                                          Dec 5, 2023 05:30:24.299787998 CET4989716458192.168.2.418.156.13.209
                                                          Dec 5, 2023 05:30:24.480612993 CET164584989718.156.13.209192.168.2.4
                                                          Dec 5, 2023 05:30:24.480763912 CET4989716458192.168.2.418.156.13.209
                                                          Dec 5, 2023 05:30:24.482673883 CET4989716458192.168.2.418.156.13.209
                                                          Dec 5, 2023 05:30:24.663626909 CET164584989718.156.13.209192.168.2.4
                                                          Dec 5, 2023 05:30:24.663748980 CET4989716458192.168.2.418.156.13.209
                                                          Dec 5, 2023 05:30:24.691092014 CET164584989718.156.13.209192.168.2.4
                                                          Dec 5, 2023 05:30:24.691262007 CET4989716458192.168.2.418.156.13.209
                                                          Dec 5, 2023 05:30:24.844938040 CET164584989718.156.13.209192.168.2.4
                                                          Dec 5, 2023 05:30:24.872293949 CET164584989718.156.13.209192.168.2.4
                                                          Dec 5, 2023 05:30:25.173329115 CET4989816458192.168.2.418.156.13.209
                                                          Dec 5, 2023 05:30:25.355654001 CET164584989818.156.13.209192.168.2.4
                                                          Dec 5, 2023 05:30:25.356031895 CET4989816458192.168.2.418.156.13.209
                                                          Dec 5, 2023 05:30:25.358299017 CET4989816458192.168.2.418.156.13.209
                                                          Dec 5, 2023 05:30:25.539351940 CET164584989818.156.13.209192.168.2.4
                                                          Dec 5, 2023 05:30:25.539552927 CET4989816458192.168.2.418.156.13.209
                                                          Dec 5, 2023 05:30:25.567764044 CET164584989818.156.13.209192.168.2.4
                                                          Dec 5, 2023 05:30:25.568018913 CET4989816458192.168.2.418.156.13.209
                                                          Dec 5, 2023 05:30:25.720767021 CET164584989818.156.13.209192.168.2.4
                                                          Dec 5, 2023 05:30:25.749236107 CET164584989818.156.13.209192.168.2.4
                                                          Dec 5, 2023 05:30:26.016602993 CET4989916458192.168.2.418.156.13.209
                                                          Dec 5, 2023 05:30:26.196281910 CET164584989918.156.13.209192.168.2.4
                                                          Dec 5, 2023 05:30:26.196511984 CET4989916458192.168.2.418.156.13.209
                                                          Dec 5, 2023 05:30:26.198574066 CET4989916458192.168.2.418.156.13.209
                                                          Dec 5, 2023 05:30:26.378550053 CET164584989918.156.13.209192.168.2.4
                                                          Dec 5, 2023 05:30:26.378798008 CET4989916458192.168.2.418.156.13.209
                                                          Dec 5, 2023 05:30:26.408813953 CET164584989918.156.13.209192.168.2.4
                                                          Dec 5, 2023 05:30:26.409023046 CET4989916458192.168.2.418.156.13.209
                                                          Dec 5, 2023 05:30:26.558623075 CET164584989918.156.13.209192.168.2.4
                                                          Dec 5, 2023 05:30:26.588869095 CET164584989918.156.13.209192.168.2.4
                                                          Dec 5, 2023 05:30:26.830560923 CET4990016458192.168.2.418.156.13.209
                                                          Dec 5, 2023 05:30:27.011837959 CET164584990018.156.13.209192.168.2.4
                                                          Dec 5, 2023 05:30:27.012204885 CET4990016458192.168.2.418.156.13.209
                                                          Dec 5, 2023 05:30:27.014168024 CET4990016458192.168.2.418.156.13.209
                                                          Dec 5, 2023 05:30:27.194818974 CET164584990018.156.13.209192.168.2.4
                                                          Dec 5, 2023 05:30:27.195060968 CET4990016458192.168.2.418.156.13.209
                                                          Dec 5, 2023 05:30:27.223808050 CET164584990018.156.13.209192.168.2.4
                                                          Dec 5, 2023 05:30:27.224070072 CET4990016458192.168.2.418.156.13.209
                                                          Dec 5, 2023 05:30:27.376413107 CET164584990018.156.13.209192.168.2.4
                                                          Dec 5, 2023 05:30:27.405112028 CET164584990018.156.13.209192.168.2.4
                                                          Dec 5, 2023 05:30:27.610795021 CET4990116458192.168.2.418.156.13.209
                                                          Dec 5, 2023 05:30:27.791841030 CET164584990118.156.13.209192.168.2.4
                                                          Dec 5, 2023 05:30:27.791939974 CET4990116458192.168.2.418.156.13.209
                                                          Dec 5, 2023 05:30:27.794286966 CET4990116458192.168.2.418.156.13.209
                                                          Dec 5, 2023 05:30:27.975189924 CET164584990118.156.13.209192.168.2.4
                                                          Dec 5, 2023 05:30:27.975475073 CET4990116458192.168.2.418.156.13.209
                                                          Dec 5, 2023 05:30:28.004673004 CET164584990118.156.13.209192.168.2.4
                                                          Dec 5, 2023 05:30:28.005029917 CET4990116458192.168.2.418.156.13.209
                                                          Dec 5, 2023 05:30:28.156599045 CET164584990118.156.13.209192.168.2.4
                                                          Dec 5, 2023 05:30:28.186038017 CET164584990118.156.13.209192.168.2.4
                                                          Dec 5, 2023 05:30:28.375641108 CET4990216458192.168.2.418.156.13.209
                                                          Dec 5, 2023 05:30:28.555183887 CET164584990218.156.13.209192.168.2.4
                                                          Dec 5, 2023 05:30:28.555449963 CET4990216458192.168.2.418.156.13.209
                                                          Dec 5, 2023 05:30:28.619323969 CET4990216458192.168.2.418.156.13.209
                                                          Dec 5, 2023 05:30:28.764462948 CET164584990218.156.13.209192.168.2.4
                                                          Dec 5, 2023 05:30:28.764552116 CET4990216458192.168.2.418.156.13.209
                                                          Dec 5, 2023 05:30:28.798628092 CET164584990218.156.13.209192.168.2.4
                                                          Dec 5, 2023 05:30:28.943743944 CET164584990218.156.13.209192.168.2.4
                                                          Dec 5, 2023 05:30:29.110177040 CET4990316458192.168.2.418.156.13.209
                                                          Dec 5, 2023 05:30:29.289588928 CET164584990318.156.13.209192.168.2.4
                                                          Dec 5, 2023 05:30:29.289705038 CET4990316458192.168.2.418.156.13.209
                                                          Dec 5, 2023 05:30:29.293853998 CET4990316458192.168.2.418.156.13.209
                                                          Dec 5, 2023 05:30:29.473365068 CET164584990318.156.13.209192.168.2.4
                                                          Dec 5, 2023 05:30:29.473490000 CET4990316458192.168.2.418.156.13.209
                                                          Dec 5, 2023 05:30:29.498414993 CET164584990318.156.13.209192.168.2.4
                                                          Dec 5, 2023 05:30:29.498534918 CET4990316458192.168.2.418.156.13.209
                                                          Dec 5, 2023 05:30:29.653147936 CET164584990318.156.13.209192.168.2.4
                                                          Dec 5, 2023 05:30:29.678066015 CET164584990318.156.13.209192.168.2.4
                                                          Dec 5, 2023 05:30:30.073905945 CET4990416458192.168.2.418.156.13.209
                                                          Dec 5, 2023 05:30:30.254925013 CET164584990418.156.13.209192.168.2.4
                                                          Dec 5, 2023 05:30:30.255016088 CET4990416458192.168.2.418.156.13.209
                                                          Dec 5, 2023 05:30:30.260267973 CET4990416458192.168.2.418.156.13.209
                                                          Dec 5, 2023 05:30:30.441023111 CET164584990418.156.13.209192.168.2.4
                                                          Dec 5, 2023 05:30:30.441220045 CET4990416458192.168.2.418.156.13.209
                                                          Dec 5, 2023 05:30:30.464502096 CET164584990418.156.13.209192.168.2.4
                                                          Dec 5, 2023 05:30:30.464620113 CET4990416458192.168.2.418.156.13.209
                                                          Dec 5, 2023 05:30:30.621870995 CET164584990418.156.13.209192.168.2.4
                                                          Dec 5, 2023 05:30:30.645315886 CET164584990418.156.13.209192.168.2.4
                                                          Dec 5, 2023 05:30:30.770421982 CET4990516458192.168.2.418.156.13.209
                                                          Dec 5, 2023 05:30:30.950213909 CET164584990518.156.13.209192.168.2.4
                                                          Dec 5, 2023 05:30:30.950424910 CET4990516458192.168.2.418.156.13.209
                                                          Dec 5, 2023 05:30:30.952686071 CET4990516458192.168.2.418.156.13.209
                                                          Dec 5, 2023 05:30:31.132024050 CET164584990518.156.13.209192.168.2.4
                                                          Dec 5, 2023 05:30:31.132289886 CET4990516458192.168.2.418.156.13.209
                                                          Dec 5, 2023 05:30:31.160190105 CET164584990518.156.13.209192.168.2.4
                                                          Dec 5, 2023 05:30:31.160387993 CET4990516458192.168.2.418.156.13.209
                                                          Dec 5, 2023 05:30:31.311892986 CET164584990518.156.13.209192.168.2.4
                                                          Dec 5, 2023 05:30:31.340236902 CET164584990518.156.13.209192.168.2.4
                                                          Dec 5, 2023 05:30:31.443056107 CET4990616458192.168.2.418.156.13.209
                                                          Dec 5, 2023 05:30:31.625114918 CET164584990618.156.13.209192.168.2.4
                                                          Dec 5, 2023 05:30:31.625230074 CET4990616458192.168.2.418.156.13.209
                                                          Dec 5, 2023 05:30:31.627151012 CET4990616458192.168.2.418.156.13.209
                                                          Dec 5, 2023 05:30:31.808821917 CET164584990618.156.13.209192.168.2.4
                                                          Dec 5, 2023 05:30:31.808906078 CET4990616458192.168.2.418.156.13.209
                                                          Dec 5, 2023 05:30:31.836874008 CET164584990618.156.13.209192.168.2.4
                                                          Dec 5, 2023 05:30:31.836966991 CET4990616458192.168.2.418.156.13.209
                                                          Dec 5, 2023 05:30:31.990698099 CET164584990618.156.13.209192.168.2.4
                                                          Dec 5, 2023 05:30:32.019004107 CET164584990618.156.13.209192.168.2.4
                                                          Dec 5, 2023 05:30:32.096364021 CET4990716458192.168.2.418.156.13.209
                                                          Dec 5, 2023 05:30:32.277112007 CET164584990718.156.13.209192.168.2.4
                                                          Dec 5, 2023 05:30:32.277209044 CET4990716458192.168.2.418.156.13.209
                                                          Dec 5, 2023 05:30:32.280121088 CET4990716458192.168.2.418.156.13.209
                                                          Dec 5, 2023 05:30:32.460338116 CET164584990718.156.13.209192.168.2.4
                                                          Dec 5, 2023 05:30:32.460493088 CET4990716458192.168.2.418.156.13.209
                                                          Dec 5, 2023 05:30:32.487437963 CET164584990718.156.13.209192.168.2.4
                                                          Dec 5, 2023 05:30:32.487586975 CET4990716458192.168.2.418.156.13.209
                                                          Dec 5, 2023 05:30:32.640985966 CET164584990718.156.13.209192.168.2.4
                                                          Dec 5, 2023 05:30:32.667915106 CET164584990718.156.13.209192.168.2.4
                                                          Dec 5, 2023 05:30:32.735225916 CET4990816458192.168.2.418.156.13.209
                                                          Dec 5, 2023 05:30:32.920176029 CET164584990818.156.13.209192.168.2.4
                                                          Dec 5, 2023 05:30:32.920257092 CET4990816458192.168.2.418.156.13.209
                                                          Dec 5, 2023 05:30:32.925072908 CET4990816458192.168.2.418.156.13.209
                                                          Dec 5, 2023 05:30:33.106692076 CET164584990818.156.13.209192.168.2.4
                                                          Dec 5, 2023 05:30:33.106811047 CET4990816458192.168.2.418.156.13.209
                                                          Dec 5, 2023 05:30:33.131772041 CET164584990818.156.13.209192.168.2.4
                                                          Dec 5, 2023 05:30:33.131856918 CET4990816458192.168.2.418.156.13.209
                                                          Dec 5, 2023 05:30:33.288927078 CET164584990818.156.13.209192.168.2.4
                                                          Dec 5, 2023 05:30:33.313999891 CET164584990818.156.13.209192.168.2.4
                                                          Dec 5, 2023 05:30:33.362376928 CET4990916458192.168.2.418.156.13.209
                                                          Dec 5, 2023 05:30:33.543273926 CET164584990918.156.13.209192.168.2.4
                                                          Dec 5, 2023 05:30:33.543391943 CET4990916458192.168.2.418.156.13.209
                                                          Dec 5, 2023 05:30:33.545653105 CET4990916458192.168.2.418.156.13.209
                                                          Dec 5, 2023 05:30:33.726341963 CET164584990918.156.13.209192.168.2.4
                                                          Dec 5, 2023 05:30:33.726723909 CET4990916458192.168.2.418.156.13.209
                                                          Dec 5, 2023 05:30:33.755235910 CET164584990918.156.13.209192.168.2.4
                                                          Dec 5, 2023 05:30:33.755342960 CET4990916458192.168.2.418.156.13.209
                                                          Dec 5, 2023 05:30:33.907476902 CET164584990918.156.13.209192.168.2.4
                                                          Dec 5, 2023 05:30:33.936090946 CET164584990918.156.13.209192.168.2.4
                                                          Dec 5, 2023 05:30:33.972055912 CET4991016458192.168.2.418.156.13.209
                                                          Dec 5, 2023 05:30:34.153404951 CET164584991018.156.13.209192.168.2.4
                                                          Dec 5, 2023 05:30:34.153673887 CET4991016458192.168.2.418.156.13.209
                                                          Dec 5, 2023 05:30:34.155857086 CET4991016458192.168.2.418.156.13.209
                                                          Dec 5, 2023 05:30:34.336548090 CET164584991018.156.13.209192.168.2.4
                                                          Dec 5, 2023 05:30:34.336694956 CET4991016458192.168.2.418.156.13.209
                                                          Dec 5, 2023 05:30:34.365974903 CET164584991018.156.13.209192.168.2.4
                                                          Dec 5, 2023 05:30:34.366214991 CET4991016458192.168.2.418.156.13.209
                                                          Dec 5, 2023 05:30:34.517720938 CET164584991018.156.13.209192.168.2.4
                                                          Dec 5, 2023 05:30:34.547544956 CET164584991018.156.13.209192.168.2.4
                                                          Dec 5, 2023 05:30:34.564105034 CET4991116458192.168.2.418.156.13.209
                                                          Dec 5, 2023 05:30:34.747772932 CET164584991118.156.13.209192.168.2.4
                                                          Dec 5, 2023 05:30:34.747930050 CET4991116458192.168.2.418.156.13.209
                                                          Dec 5, 2023 05:30:34.750260115 CET4991116458192.168.2.418.156.13.209
                                                          Dec 5, 2023 05:30:34.933773041 CET164584991118.156.13.209192.168.2.4
                                                          Dec 5, 2023 05:30:34.933998108 CET4991116458192.168.2.418.156.13.209
                                                          Dec 5, 2023 05:30:34.955583096 CET164584991118.156.13.209192.168.2.4
                                                          Dec 5, 2023 05:30:34.955712080 CET4991116458192.168.2.418.156.13.209
                                                          Dec 5, 2023 05:30:35.114739895 CET164584991118.156.13.209192.168.2.4
                                                          Dec 5, 2023 05:30:35.136446953 CET164584991118.156.13.209192.168.2.4
                                                          Dec 5, 2023 05:30:35.141798019 CET4991216458192.168.2.418.156.13.209
                                                          Dec 5, 2023 05:30:35.321461916 CET164584991218.156.13.209192.168.2.4
                                                          Dec 5, 2023 05:30:35.321692944 CET4991216458192.168.2.418.156.13.209
                                                          Dec 5, 2023 05:30:35.324208021 CET4991216458192.168.2.418.156.13.209
                                                          Dec 5, 2023 05:30:35.503652096 CET164584991218.156.13.209192.168.2.4
                                                          Dec 5, 2023 05:30:35.503776073 CET4991216458192.168.2.418.156.13.209
                                                          Dec 5, 2023 05:30:35.530527115 CET164584991218.156.13.209192.168.2.4
                                                          Dec 5, 2023 05:30:35.530750990 CET4991216458192.168.2.418.156.13.209
                                                          Dec 5, 2023 05:30:35.683554888 CET164584991218.156.13.209192.168.2.4
                                                          Dec 5, 2023 05:30:35.704943895 CET4991216458192.168.2.418.156.13.209
                                                          Dec 5, 2023 05:30:35.706391096 CET4991316458192.168.2.418.156.13.209
                                                          Dec 5, 2023 05:30:35.709969044 CET164584991218.156.13.209192.168.2.4
                                                          Dec 5, 2023 05:30:35.884991884 CET164584991218.156.13.209192.168.2.4
                                                          Dec 5, 2023 05:30:35.886626959 CET164584991318.156.13.209192.168.2.4
                                                          Dec 5, 2023 05:30:35.886940956 CET4991316458192.168.2.418.156.13.209
                                                          Dec 5, 2023 05:30:35.889028072 CET4991316458192.168.2.418.156.13.209
                                                          Dec 5, 2023 05:30:36.068259954 CET164584991318.156.13.209192.168.2.4
                                                          Dec 5, 2023 05:30:36.068567991 CET4991316458192.168.2.418.156.13.209
                                                          Dec 5, 2023 05:30:36.095675945 CET164584991318.156.13.209192.168.2.4
                                                          Dec 5, 2023 05:30:36.095812082 CET4991316458192.168.2.418.156.13.209
                                                          Dec 5, 2023 05:30:36.248404026 CET164584991318.156.13.209192.168.2.4
                                                          Dec 5, 2023 05:30:36.265325069 CET4991316458192.168.2.418.156.13.209
                                                          Dec 5, 2023 05:30:36.270579100 CET4991416458192.168.2.418.156.13.209
                                                          Dec 5, 2023 05:30:36.275813103 CET164584991318.156.13.209192.168.2.4
                                                          Dec 5, 2023 05:30:36.445625067 CET164584991318.156.13.209192.168.2.4
                                                          Dec 5, 2023 05:30:36.452569008 CET164584991418.156.13.209192.168.2.4
                                                          Dec 5, 2023 05:30:36.452761889 CET4991416458192.168.2.418.156.13.209
                                                          Dec 5, 2023 05:30:36.454498053 CET4991416458192.168.2.418.156.13.209
                                                          Dec 5, 2023 05:30:36.635649920 CET164584991418.156.13.209192.168.2.4
                                                          Dec 5, 2023 05:30:36.635876894 CET4991416458192.168.2.418.156.13.209
                                                          Dec 5, 2023 05:30:36.666213036 CET164584991418.156.13.209192.168.2.4
                                                          Dec 5, 2023 05:30:36.666424036 CET4991416458192.168.2.418.156.13.209
                                                          Dec 5, 2023 05:30:36.811958075 CET4991416458192.168.2.418.156.13.209
                                                          Dec 5, 2023 05:30:36.816930056 CET164584991418.156.13.209192.168.2.4
                                                          Dec 5, 2023 05:30:36.817612886 CET4991516458192.168.2.418.156.13.209
                                                          Dec 5, 2023 05:30:36.847457886 CET164584991418.156.13.209192.168.2.4
                                                          Dec 5, 2023 05:30:36.993201017 CET164584991418.156.13.209192.168.2.4
                                                          Dec 5, 2023 05:30:36.997575045 CET164584991518.156.13.209192.168.2.4
                                                          Dec 5, 2023 05:30:36.997728109 CET4991516458192.168.2.418.156.13.209
                                                          Dec 5, 2023 05:30:37.000009060 CET4991516458192.168.2.418.156.13.209
                                                          Dec 5, 2023 05:30:37.180006027 CET164584991518.156.13.209192.168.2.4
                                                          Dec 5, 2023 05:30:37.180129051 CET4991516458192.168.2.418.156.13.209
                                                          Dec 5, 2023 05:30:37.210988998 CET164584991518.156.13.209192.168.2.4
                                                          Dec 5, 2023 05:30:37.211086035 CET4991516458192.168.2.418.156.13.209
                                                          Dec 5, 2023 05:30:37.358942986 CET4991516458192.168.2.418.156.13.209
                                                          Dec 5, 2023 05:30:37.359972954 CET164584991518.156.13.209192.168.2.4
                                                          Dec 5, 2023 05:30:37.360481977 CET4991616458192.168.2.418.156.13.209
                                                          Dec 5, 2023 05:30:37.390918970 CET164584991518.156.13.209192.168.2.4
                                                          Dec 5, 2023 05:30:37.539110899 CET164584991518.156.13.209192.168.2.4
                                                          Dec 5, 2023 05:30:37.542588949 CET164584991618.156.13.209192.168.2.4
                                                          Dec 5, 2023 05:30:37.542732000 CET4991616458192.168.2.418.156.13.209
                                                          Dec 5, 2023 05:30:37.544761896 CET4991616458192.168.2.418.156.13.209
                                                          Dec 5, 2023 05:30:37.726751089 CET164584991618.156.13.209192.168.2.4
                                                          Dec 5, 2023 05:30:37.726849079 CET4991616458192.168.2.418.156.13.209
                                                          Dec 5, 2023 05:30:37.753931046 CET164584991618.156.13.209192.168.2.4
                                                          Dec 5, 2023 05:30:37.754035950 CET4991616458192.168.2.418.156.13.209
                                                          Dec 5, 2023 05:30:37.890646935 CET4991616458192.168.2.418.156.13.209
                                                          Dec 5, 2023 05:30:37.892067909 CET4991716458192.168.2.418.156.13.209
                                                          Dec 5, 2023 05:30:37.908996105 CET164584991618.156.13.209192.168.2.4
                                                          Dec 5, 2023 05:30:37.935827971 CET164584991618.156.13.209192.168.2.4
                                                          Dec 5, 2023 05:30:38.072511911 CET164584991618.156.13.209192.168.2.4
                                                          Dec 5, 2023 05:30:38.072705984 CET164584991718.156.13.209192.168.2.4
                                                          Dec 5, 2023 05:30:38.072807074 CET4991716458192.168.2.418.156.13.209
                                                          Dec 5, 2023 05:30:38.074827909 CET4991716458192.168.2.418.156.13.209
                                                          Dec 5, 2023 05:30:38.255295038 CET164584991718.156.13.209192.168.2.4
                                                          Dec 5, 2023 05:30:38.255594015 CET4991716458192.168.2.418.156.13.209
                                                          Dec 5, 2023 05:30:38.279849052 CET164584991718.156.13.209192.168.2.4
                                                          Dec 5, 2023 05:30:38.280164957 CET4991716458192.168.2.418.156.13.209
                                                          Dec 5, 2023 05:30:38.405875921 CET4991716458192.168.2.418.156.13.209
                                                          Dec 5, 2023 05:30:38.407584906 CET4991816458192.168.2.418.156.13.209
                                                          Dec 5, 2023 05:30:38.436871052 CET164584991718.156.13.209192.168.2.4
                                                          Dec 5, 2023 05:30:38.461191893 CET164584991718.156.13.209192.168.2.4
                                                          Dec 5, 2023 05:30:38.586550951 CET164584991718.156.13.209192.168.2.4
                                                          Dec 5, 2023 05:30:38.588818073 CET164584991818.156.13.209192.168.2.4
                                                          Dec 5, 2023 05:30:38.589142084 CET4991816458192.168.2.418.156.13.209
                                                          Dec 5, 2023 05:30:38.592922926 CET4991816458192.168.2.418.156.13.209
                                                          Dec 5, 2023 05:30:38.774209976 CET164584991818.156.13.209192.168.2.4
                                                          Dec 5, 2023 05:30:38.774492025 CET4991816458192.168.2.418.156.13.209
                                                          Dec 5, 2023 05:30:38.800786972 CET164584991818.156.13.209192.168.2.4
                                                          Dec 5, 2023 05:30:38.801073074 CET4991816458192.168.2.418.156.13.209
                                                          Dec 5, 2023 05:30:38.921489954 CET4991816458192.168.2.418.156.13.209
                                                          Dec 5, 2023 05:30:38.923065901 CET4991916458192.168.2.418.156.13.209
                                                          Dec 5, 2023 05:30:38.955759048 CET164584991818.156.13.209192.168.2.4
                                                          Dec 5, 2023 05:30:38.982336998 CET164584991818.156.13.209192.168.2.4
                                                          Dec 5, 2023 05:30:39.102513075 CET164584991918.156.13.209192.168.2.4
                                                          Dec 5, 2023 05:30:39.102762938 CET4991916458192.168.2.418.156.13.209
                                                          Dec 5, 2023 05:30:39.102945089 CET164584991818.156.13.209192.168.2.4
                                                          Dec 5, 2023 05:30:39.105483055 CET4991916458192.168.2.418.156.13.209
                                                          Dec 5, 2023 05:30:39.285428047 CET164584991918.156.13.209192.168.2.4
                                                          Dec 5, 2023 05:30:39.285677910 CET4991916458192.168.2.418.156.13.209
                                                          Dec 5, 2023 05:30:39.310280085 CET164584991918.156.13.209192.168.2.4
                                                          Dec 5, 2023 05:30:39.310478926 CET4991916458192.168.2.418.156.13.209
                                                          Dec 5, 2023 05:30:39.421593904 CET4991916458192.168.2.418.156.13.209
                                                          Dec 5, 2023 05:30:39.422965050 CET4992016458192.168.2.418.156.13.209
                                                          Dec 5, 2023 05:30:39.465478897 CET164584991918.156.13.209192.168.2.4
                                                          Dec 5, 2023 05:30:39.490118027 CET164584991918.156.13.209192.168.2.4
                                                          Dec 5, 2023 05:30:39.602351904 CET164584991918.156.13.209192.168.2.4
                                                          Dec 5, 2023 05:30:39.604121923 CET164584992018.156.13.209192.168.2.4
                                                          Dec 5, 2023 05:30:39.604228973 CET4992016458192.168.2.418.156.13.209
                                                          Dec 5, 2023 05:30:39.606447935 CET4992016458192.168.2.418.156.13.209
                                                          Dec 5, 2023 05:30:39.787206888 CET164584992018.156.13.209192.168.2.4
                                                          Dec 5, 2023 05:30:39.787305117 CET4992016458192.168.2.418.156.13.209
                                                          Dec 5, 2023 05:30:39.811960936 CET164584992018.156.13.209192.168.2.4
                                                          Dec 5, 2023 05:30:39.812072039 CET4992016458192.168.2.418.156.13.209
                                                          Dec 5, 2023 05:30:39.921520948 CET4992016458192.168.2.418.156.13.209
                                                          Dec 5, 2023 05:30:39.922940016 CET4992116458192.168.2.418.156.13.209
                                                          Dec 5, 2023 05:30:39.967912912 CET164584992018.156.13.209192.168.2.4
                                                          Dec 5, 2023 05:30:39.992571115 CET164584992018.156.13.209192.168.2.4
                                                          Dec 5, 2023 05:30:40.102128029 CET164584992018.156.13.209192.168.2.4
                                                          Dec 5, 2023 05:30:40.103585958 CET164584992118.156.13.209192.168.2.4
                                                          Dec 5, 2023 05:30:40.103806019 CET4992116458192.168.2.418.156.13.209
                                                          Dec 5, 2023 05:30:40.105865002 CET4992116458192.168.2.418.156.13.209
                                                          Dec 5, 2023 05:30:40.286355972 CET164584992118.156.13.209192.168.2.4
                                                          Dec 5, 2023 05:30:40.286453009 CET4992116458192.168.2.418.156.13.209
                                                          Dec 5, 2023 05:30:40.311052084 CET164584992118.156.13.209192.168.2.4
                                                          Dec 5, 2023 05:30:40.311211109 CET4992116458192.168.2.418.156.13.209
                                                          Dec 5, 2023 05:30:40.406126022 CET4992116458192.168.2.418.156.13.209
                                                          Dec 5, 2023 05:30:40.407727003 CET4992216458192.168.2.418.156.13.209
                                                          Dec 5, 2023 05:30:40.467339993 CET164584992118.156.13.209192.168.2.4
                                                          Dec 5, 2023 05:30:40.491889000 CET164584992118.156.13.209192.168.2.4
                                                          Dec 5, 2023 05:30:40.587001085 CET164584992118.156.13.209192.168.2.4
                                                          Dec 5, 2023 05:30:40.588818073 CET164584992218.156.13.209192.168.2.4
                                                          Dec 5, 2023 05:30:40.589183092 CET4992216458192.168.2.418.156.13.209
                                                          Dec 5, 2023 05:30:40.591479063 CET4992216458192.168.2.418.156.13.209
                                                          Dec 5, 2023 05:30:40.772263050 CET164584992218.156.13.209192.168.2.4
                                                          Dec 5, 2023 05:30:40.772511005 CET4992216458192.168.2.418.156.13.209
                                                          Dec 5, 2023 05:30:40.800242901 CET164584992218.156.13.209192.168.2.4
                                                          Dec 5, 2023 05:30:40.800477982 CET4992216458192.168.2.418.156.13.209
                                                          Dec 5, 2023 05:30:40.890140057 CET4992216458192.168.2.418.156.13.209
                                                          Dec 5, 2023 05:30:40.891427040 CET4992316458192.168.2.418.156.13.209
                                                          Dec 5, 2023 05:30:40.953464031 CET164584992218.156.13.209192.168.2.4
                                                          Dec 5, 2023 05:30:40.981424093 CET164584992218.156.13.209192.168.2.4
                                                          Dec 5, 2023 05:30:41.071063995 CET164584992218.156.13.209192.168.2.4
                                                          Dec 5, 2023 05:30:41.072133064 CET164584992318.156.13.209192.168.2.4
                                                          Dec 5, 2023 05:30:41.072318077 CET4992316458192.168.2.418.156.13.209
                                                          Dec 5, 2023 05:30:41.077603102 CET4992316458192.168.2.418.156.13.209
                                                          Dec 5, 2023 05:30:41.258301020 CET164584992318.156.13.209192.168.2.4
                                                          Dec 5, 2023 05:30:41.258614063 CET4992316458192.168.2.418.156.13.209
                                                          Dec 5, 2023 05:30:41.284692049 CET164584992318.156.13.209192.168.2.4
                                                          Dec 5, 2023 05:30:41.284784079 CET4992316458192.168.2.418.156.13.209
                                                          Dec 5, 2023 05:30:41.377096891 CET4992316458192.168.2.418.156.13.209
                                                          Dec 5, 2023 05:30:41.378460884 CET4992416458192.168.2.418.156.13.209
                                                          Dec 5, 2023 05:30:41.439264059 CET164584992318.156.13.209192.168.2.4
                                                          Dec 5, 2023 05:30:41.465426922 CET164584992318.156.13.209192.168.2.4
                                                          Dec 5, 2023 05:30:41.558034897 CET164584992318.156.13.209192.168.2.4
                                                          Dec 5, 2023 05:30:41.559541941 CET164584992418.156.13.209192.168.2.4
                                                          Dec 5, 2023 05:30:41.559770107 CET4992416458192.168.2.418.156.13.209
                                                          Dec 5, 2023 05:30:41.561599016 CET4992416458192.168.2.418.156.13.209
                                                          Dec 5, 2023 05:30:41.742160082 CET164584992418.156.13.209192.168.2.4
                                                          Dec 5, 2023 05:30:41.742428064 CET4992416458192.168.2.418.156.13.209
                                                          Dec 5, 2023 05:30:41.768301964 CET164584992418.156.13.209192.168.2.4
                                                          Dec 5, 2023 05:30:41.768511057 CET4992416458192.168.2.418.156.13.209
                                                          Dec 5, 2023 05:30:41.843766928 CET4992416458192.168.2.418.156.13.209
                                                          Dec 5, 2023 05:30:41.845743895 CET4992516458192.168.2.418.156.13.209
                                                          Dec 5, 2023 05:30:41.923223972 CET164584992418.156.13.209192.168.2.4
                                                          Dec 5, 2023 05:30:41.949610949 CET164584992418.156.13.209192.168.2.4
                                                          Dec 5, 2023 05:30:42.024843931 CET164584992418.156.13.209192.168.2.4
                                                          Dec 5, 2023 05:30:42.025726080 CET164584992518.156.13.209192.168.2.4
                                                          Dec 5, 2023 05:30:42.025968075 CET4992516458192.168.2.418.156.13.209
                                                          Dec 5, 2023 05:30:42.030272961 CET4992516458192.168.2.418.156.13.209
                                                          Dec 5, 2023 05:30:42.209907055 CET164584992518.156.13.209192.168.2.4
                                                          Dec 5, 2023 05:30:42.210119963 CET4992516458192.168.2.418.156.13.209
                                                          Dec 5, 2023 05:30:42.237406015 CET164584992518.156.13.209192.168.2.4
                                                          Dec 5, 2023 05:30:42.237624884 CET4992516458192.168.2.418.156.13.209
                                                          Dec 5, 2023 05:30:42.312315941 CET4992516458192.168.2.418.156.13.209
                                                          Dec 5, 2023 05:30:42.313657045 CET4992616458192.168.2.418.156.13.209
                                                          Dec 5, 2023 05:30:42.389880896 CET164584992518.156.13.209192.168.2.4
                                                          Dec 5, 2023 05:30:42.417321920 CET164584992518.156.13.209192.168.2.4
                                                          Dec 5, 2023 05:30:42.492176056 CET164584992518.156.13.209192.168.2.4
                                                          Dec 5, 2023 05:30:42.495681047 CET164584992618.156.13.209192.168.2.4
                                                          Dec 5, 2023 05:30:42.495857000 CET4992616458192.168.2.418.156.13.209
                                                          Dec 5, 2023 05:30:42.500560045 CET4992616458192.168.2.418.156.13.209
                                                          Dec 5, 2023 05:30:42.682656050 CET164584992618.156.13.209192.168.2.4
                                                          Dec 5, 2023 05:30:42.682748079 CET4992616458192.168.2.418.156.13.209
                                                          Dec 5, 2023 05:30:42.709836006 CET164584992618.156.13.209192.168.2.4
                                                          Dec 5, 2023 05:30:42.709917068 CET4992616458192.168.2.418.156.13.209
                                                          Dec 5, 2023 05:30:42.780946970 CET4992616458192.168.2.418.156.13.209
                                                          Dec 5, 2023 05:30:42.788011074 CET4992716458192.168.2.418.156.13.209
                                                          Dec 5, 2023 05:30:42.864901066 CET164584992618.156.13.209192.168.2.4
                                                          Dec 5, 2023 05:30:42.891861916 CET164584992618.156.13.209192.168.2.4
                                                          Dec 5, 2023 05:30:42.963025093 CET164584992618.156.13.209192.168.2.4
                                                          Dec 5, 2023 05:30:42.968697071 CET164584992718.156.13.209192.168.2.4
                                                          Dec 5, 2023 05:30:42.968827963 CET4992716458192.168.2.418.156.13.209
                                                          Dec 5, 2023 05:30:42.970863104 CET4992716458192.168.2.418.156.13.209
                                                          Dec 5, 2023 05:30:43.151102066 CET164584992718.156.13.209192.168.2.4
                                                          Dec 5, 2023 05:30:43.151299000 CET4992716458192.168.2.418.156.13.209
                                                          Dec 5, 2023 05:30:43.175975084 CET164584992718.156.13.209192.168.2.4
                                                          Dec 5, 2023 05:30:43.176156044 CET4992716458192.168.2.418.156.13.209
                                                          Dec 5, 2023 05:30:43.249852896 CET4992716458192.168.2.418.156.13.209
                                                          Dec 5, 2023 05:30:43.253557920 CET4992816458192.168.2.418.156.13.209
                                                          Dec 5, 2023 05:30:43.331783056 CET164584992718.156.13.209192.168.2.4
                                                          Dec 5, 2023 05:30:43.356333971 CET164584992718.156.13.209192.168.2.4
                                                          Dec 5, 2023 05:30:43.430351973 CET164584992718.156.13.209192.168.2.4
                                                          Dec 5, 2023 05:30:43.434542894 CET164584992818.156.13.209192.168.2.4
                                                          Dec 5, 2023 05:30:43.434719086 CET4992816458192.168.2.418.156.13.209
                                                          Dec 5, 2023 05:30:43.440980911 CET4992816458192.168.2.418.156.13.209
                                                          Dec 5, 2023 05:30:43.621805906 CET164584992818.156.13.209192.168.2.4
                                                          Dec 5, 2023 05:30:43.621927023 CET4992816458192.168.2.418.156.13.209
                                                          Dec 5, 2023 05:30:43.649650097 CET164584992818.156.13.209192.168.2.4
                                                          Dec 5, 2023 05:30:43.649749994 CET4992816458192.168.2.418.156.13.209
                                                          Dec 5, 2023 05:30:43.718066931 CET4992816458192.168.2.418.156.13.209
                                                          Dec 5, 2023 05:30:43.719568968 CET4992916458192.168.2.418.156.13.209
                                                          Dec 5, 2023 05:30:43.803320885 CET164584992818.156.13.209192.168.2.4
                                                          Dec 5, 2023 05:30:43.830856085 CET164584992818.156.13.209192.168.2.4
                                                          Dec 5, 2023 05:30:43.898977041 CET164584992818.156.13.209192.168.2.4
                                                          Dec 5, 2023 05:30:43.902107954 CET164584992918.156.13.209192.168.2.4
                                                          Dec 5, 2023 05:30:43.902409077 CET4992916458192.168.2.418.156.13.209
                                                          Dec 5, 2023 05:30:43.904813051 CET4992916458192.168.2.418.156.13.209
                                                          Dec 5, 2023 05:30:44.086836100 CET164584992918.156.13.209192.168.2.4
                                                          Dec 5, 2023 05:30:44.086997032 CET4992916458192.168.2.418.156.13.209
                                                          Dec 5, 2023 05:30:44.112272978 CET164584992918.156.13.209192.168.2.4
                                                          Dec 5, 2023 05:30:44.112482071 CET4992916458192.168.2.418.156.13.209
                                                          Dec 5, 2023 05:30:44.171400070 CET4992916458192.168.2.418.156.13.209
                                                          Dec 5, 2023 05:30:44.172770023 CET4993016458192.168.2.418.156.13.209
                                                          Dec 5, 2023 05:30:44.269102097 CET164584992918.156.13.209192.168.2.4
                                                          Dec 5, 2023 05:30:44.294557095 CET164584992918.156.13.209192.168.2.4
                                                          Dec 5, 2023 05:30:44.353327990 CET164584992918.156.13.209192.168.2.4
                                                          Dec 5, 2023 05:30:44.354247093 CET164584993018.156.13.209192.168.2.4
                                                          Dec 5, 2023 05:30:44.354352951 CET4993016458192.168.2.418.156.13.209
                                                          Dec 5, 2023 05:30:44.358557940 CET4993016458192.168.2.418.156.13.209
                                                          Dec 5, 2023 05:30:44.540359974 CET164584993018.156.13.209192.168.2.4
                                                          Dec 5, 2023 05:30:44.540750027 CET4993016458192.168.2.418.156.13.209
                                                          Dec 5, 2023 05:30:44.562305927 CET164584993018.156.13.209192.168.2.4
                                                          Dec 5, 2023 05:30:44.562439919 CET4993016458192.168.2.418.156.13.209
                                                          Dec 5, 2023 05:30:44.625009060 CET4993016458192.168.2.418.156.13.209
                                                          Dec 5, 2023 05:30:44.626154900 CET4993116458192.168.2.418.156.13.209
                                                          Dec 5, 2023 05:30:44.722579002 CET164584993018.156.13.209192.168.2.4
                                                          Dec 5, 2023 05:30:44.744265079 CET164584993018.156.13.209192.168.2.4
                                                          Dec 5, 2023 05:30:44.806890011 CET164584993018.156.13.209192.168.2.4
                                                          Dec 5, 2023 05:30:44.808319092 CET164584993118.156.13.209192.168.2.4
                                                          Dec 5, 2023 05:30:44.808501959 CET4993116458192.168.2.418.156.13.209
                                                          Dec 5, 2023 05:30:44.810827971 CET4993116458192.168.2.418.156.13.209
                                                          Dec 5, 2023 05:30:44.997323990 CET164584993118.156.13.209192.168.2.4
                                                          Dec 5, 2023 05:30:44.997410059 CET4993116458192.168.2.418.156.13.209
                                                          Dec 5, 2023 05:30:45.021228075 CET164584993118.156.13.209192.168.2.4
                                                          Dec 5, 2023 05:30:45.021280050 CET4993116458192.168.2.418.156.13.209
                                                          Dec 5, 2023 05:30:45.077425003 CET4993116458192.168.2.418.156.13.209
                                                          Dec 5, 2023 05:30:45.078907013 CET4993216458192.168.2.418.156.13.209
                                                          Dec 5, 2023 05:30:45.184006929 CET164584993118.156.13.209192.168.2.4
                                                          Dec 5, 2023 05:30:45.203299999 CET164584993118.156.13.209192.168.2.4
                                                          Dec 5, 2023 05:30:45.259529114 CET164584993118.156.13.209192.168.2.4
                                                          Dec 5, 2023 05:30:45.260390043 CET164584993218.156.13.209192.168.2.4
                                                          Dec 5, 2023 05:30:45.260668993 CET4993216458192.168.2.418.156.13.209
                                                          Dec 5, 2023 05:30:45.262465000 CET4993216458192.168.2.418.156.13.209
                                                          Dec 5, 2023 05:30:45.445235014 CET164584993218.156.13.209192.168.2.4
                                                          Dec 5, 2023 05:30:45.445445061 CET4993216458192.168.2.418.156.13.209
                                                          Dec 5, 2023 05:30:45.476332903 CET164584993218.156.13.209192.168.2.4
                                                          Dec 5, 2023 05:30:45.476649046 CET4993216458192.168.2.418.156.13.209
                                                          Dec 5, 2023 05:30:45.550951004 CET4993216458192.168.2.418.156.13.209
                                                          Dec 5, 2023 05:30:45.552599907 CET4993316458192.168.2.418.156.13.209
                                                          Dec 5, 2023 05:30:45.626831055 CET164584993218.156.13.209192.168.2.4
                                                          Dec 5, 2023 05:30:45.657751083 CET164584993218.156.13.209192.168.2.4
                                                          Dec 5, 2023 05:30:45.732326031 CET164584993218.156.13.209192.168.2.4
                                                          Dec 5, 2023 05:30:45.733366966 CET164584993318.156.13.209192.168.2.4
                                                          Dec 5, 2023 05:30:45.733479977 CET4993316458192.168.2.418.156.13.209
                                                          Dec 5, 2023 05:30:45.736475945 CET4993316458192.168.2.418.156.13.209
                                                          Dec 5, 2023 05:30:45.916872978 CET164584993318.156.13.209192.168.2.4
                                                          Dec 5, 2023 05:30:45.917138100 CET4993316458192.168.2.418.156.13.209
                                                          Dec 5, 2023 05:30:45.942708969 CET164584993318.156.13.209192.168.2.4
                                                          Dec 5, 2023 05:30:45.942912102 CET4993316458192.168.2.418.156.13.209
                                                          Dec 5, 2023 05:30:46.077640057 CET4993316458192.168.2.418.156.13.209
                                                          Dec 5, 2023 05:30:46.082340956 CET4993416458192.168.2.418.156.13.209
                                                          Dec 5, 2023 05:30:46.097666025 CET164584993318.156.13.209192.168.2.4
                                                          Dec 5, 2023 05:30:46.123330116 CET164584993318.156.13.209192.168.2.4
                                                          Dec 5, 2023 05:30:46.259066105 CET164584993318.156.13.209192.168.2.4
                                                          Dec 5, 2023 05:30:46.264008045 CET164584993418.156.13.209192.168.2.4
                                                          Dec 5, 2023 05:30:46.264125109 CET4993416458192.168.2.418.156.13.209
                                                          Dec 5, 2023 05:30:46.266393900 CET4993416458192.168.2.418.156.13.209
                                                          Dec 5, 2023 05:30:46.446767092 CET164584993418.156.13.209192.168.2.4
                                                          Dec 5, 2023 05:30:46.446917057 CET4993416458192.168.2.418.156.13.209
                                                          Dec 5, 2023 05:30:46.471913099 CET164584993418.156.13.209192.168.2.4
                                                          Dec 5, 2023 05:30:46.472111940 CET4993416458192.168.2.418.156.13.209
                                                          Dec 5, 2023 05:30:46.608695030 CET4993416458192.168.2.418.156.13.209
                                                          Dec 5, 2023 05:30:46.610115051 CET4993516458192.168.2.418.156.13.209
                                                          Dec 5, 2023 05:30:46.627408028 CET164584993418.156.13.209192.168.2.4
                                                          Dec 5, 2023 05:30:46.652643919 CET164584993418.156.13.209192.168.2.4
                                                          Dec 5, 2023 05:30:46.789402962 CET164584993418.156.13.209192.168.2.4
                                                          Dec 5, 2023 05:30:46.791311979 CET164584993518.156.13.209192.168.2.4
                                                          Dec 5, 2023 05:30:46.791503906 CET4993516458192.168.2.418.156.13.209
                                                          Dec 5, 2023 05:30:47.004575968 CET164584993518.156.13.209192.168.2.4
                                                          Dec 5, 2023 05:30:47.004659891 CET4993516458192.168.2.418.156.13.209
                                                          Dec 5, 2023 05:30:47.019124985 CET4993516458192.168.2.418.156.13.209
                                                          Dec 5, 2023 05:30:47.061770916 CET4993516458192.168.2.418.156.13.209
                                                          Dec 5, 2023 05:30:47.063070059 CET4993616458192.168.2.418.156.13.209
                                                          Dec 5, 2023 05:30:47.200200081 CET164584993518.156.13.209192.168.2.4
                                                          Dec 5, 2023 05:30:47.242706060 CET164584993518.156.13.209192.168.2.4
                                                          Dec 5, 2023 05:30:47.243612051 CET164584993618.156.13.209192.168.2.4
                                                          Dec 5, 2023 05:30:47.243803024 CET4993616458192.168.2.418.156.13.209
                                                          Dec 5, 2023 05:30:47.245573997 CET4993616458192.168.2.418.156.13.209
                                                          Dec 5, 2023 05:30:47.425765991 CET164584993618.156.13.209192.168.2.4
                                                          Dec 5, 2023 05:30:47.426018000 CET4993616458192.168.2.418.156.13.209
                                                          Dec 5, 2023 05:30:47.453380108 CET164584993618.156.13.209192.168.2.4
                                                          Dec 5, 2023 05:30:47.453588009 CET4993616458192.168.2.418.156.13.209
                                                          Dec 5, 2023 05:30:47.515095949 CET4993616458192.168.2.418.156.13.209
                                                          Dec 5, 2023 05:30:47.516578913 CET4993716458192.168.2.418.156.13.209
                                                          Dec 5, 2023 05:30:47.606673956 CET164584993618.156.13.209192.168.2.4
                                                          Dec 5, 2023 05:30:47.633951902 CET164584993618.156.13.209192.168.2.4
                                                          Dec 5, 2023 05:30:47.695339918 CET164584993618.156.13.209192.168.2.4
                                                          Dec 5, 2023 05:30:47.697344065 CET164584993718.156.13.209192.168.2.4
                                                          Dec 5, 2023 05:30:47.697441101 CET4993716458192.168.2.418.156.13.209
                                                          Dec 5, 2023 05:30:47.699644089 CET4993716458192.168.2.418.156.13.209
                                                          Dec 5, 2023 05:30:47.880462885 CET164584993718.156.13.209192.168.2.4
                                                          Dec 5, 2023 05:30:47.880675077 CET4993716458192.168.2.418.156.13.209
                                                          Dec 5, 2023 05:30:47.908545971 CET164584993718.156.13.209192.168.2.4
                                                          Dec 5, 2023 05:30:47.908761978 CET4993716458192.168.2.418.156.13.209
                                                          Dec 5, 2023 05:30:47.952431917 CET4993716458192.168.2.418.156.13.209
                                                          Dec 5, 2023 05:30:47.953769922 CET4993816458192.168.2.418.156.13.209
                                                          Dec 5, 2023 05:30:48.061885118 CET164584993718.156.13.209192.168.2.4
                                                          Dec 5, 2023 05:30:48.090018034 CET164584993718.156.13.209192.168.2.4
                                                          Dec 5, 2023 05:30:48.133239031 CET164584993818.156.13.209192.168.2.4
                                                          Dec 5, 2023 05:30:48.133462906 CET4993816458192.168.2.418.156.13.209
                                                          Dec 5, 2023 05:30:48.133639097 CET164584993718.156.13.209192.168.2.4
                                                          Dec 5, 2023 05:30:48.135570049 CET4993816458192.168.2.418.156.13.209
                                                          Dec 5, 2023 05:30:48.315251112 CET164584993818.156.13.209192.168.2.4
                                                          Dec 5, 2023 05:30:48.315387011 CET4993816458192.168.2.418.156.13.209
                                                          Dec 5, 2023 05:30:48.342650890 CET164584993818.156.13.209192.168.2.4
                                                          Dec 5, 2023 05:30:48.342753887 CET4993816458192.168.2.418.156.13.209
                                                          Dec 5, 2023 05:30:48.374597073 CET4993816458192.168.2.418.156.13.209
                                                          Dec 5, 2023 05:30:48.375888109 CET4993916458192.168.2.418.156.13.209
                                                          Dec 5, 2023 05:30:48.495198011 CET164584993818.156.13.209192.168.2.4
                                                          Dec 5, 2023 05:30:48.522708893 CET164584993818.156.13.209192.168.2.4
                                                          Dec 5, 2023 05:30:48.554256916 CET164584993818.156.13.209192.168.2.4
                                                          Dec 5, 2023 05:30:48.555917978 CET164584993918.156.13.209192.168.2.4
                                                          Dec 5, 2023 05:30:48.556036949 CET4993916458192.168.2.418.156.13.209
                                                          Dec 5, 2023 05:30:48.560194016 CET4993916458192.168.2.418.156.13.209
                                                          Dec 5, 2023 05:30:48.740645885 CET164584993918.156.13.209192.168.2.4
                                                          Dec 5, 2023 05:30:48.740783930 CET4993916458192.168.2.418.156.13.209
                                                          Dec 5, 2023 05:30:48.763206959 CET164584993918.156.13.209192.168.2.4
                                                          Dec 5, 2023 05:30:48.763380051 CET4993916458192.168.2.418.156.13.209
                                                          Dec 5, 2023 05:30:48.796313047 CET4993916458192.168.2.418.156.13.209
                                                          Dec 5, 2023 05:30:48.797600985 CET4994016458192.168.2.418.156.13.209
                                                          Dec 5, 2023 05:30:48.920803070 CET164584993918.156.13.209192.168.2.4
                                                          Dec 5, 2023 05:30:48.943335056 CET164584993918.156.13.209192.168.2.4
                                                          Dec 5, 2023 05:30:48.976808071 CET164584993918.156.13.209192.168.2.4
                                                          Dec 5, 2023 05:30:48.978390932 CET164584994018.156.13.209192.168.2.4
                                                          Dec 5, 2023 05:30:48.978478909 CET4994016458192.168.2.418.156.13.209
                                                          Dec 5, 2023 05:30:48.980773926 CET4994016458192.168.2.418.156.13.209
                                                          Dec 5, 2023 05:30:49.161149025 CET164584994018.156.13.209192.168.2.4
                                                          Dec 5, 2023 05:30:49.161326885 CET4994016458192.168.2.418.156.13.209
                                                          Dec 5, 2023 05:30:49.191401958 CET164584994018.156.13.209192.168.2.4
                                                          Dec 5, 2023 05:30:49.191606045 CET4994016458192.168.2.418.156.13.209
                                                          Dec 5, 2023 05:30:49.218482018 CET4994016458192.168.2.418.156.13.209
                                                          Dec 5, 2023 05:30:49.219798088 CET4994116458192.168.2.418.156.13.209
                                                          Dec 5, 2023 05:30:49.341850996 CET164584994018.156.13.209192.168.2.4
                                                          Dec 5, 2023 05:30:49.372205019 CET164584994018.156.13.209192.168.2.4
                                                          Dec 5, 2023 05:30:49.401725054 CET164584994018.156.13.209192.168.2.4
                                                          Dec 5, 2023 05:30:49.401787996 CET164584994118.156.13.209192.168.2.4
                                                          Dec 5, 2023 05:30:49.401936054 CET4994116458192.168.2.418.156.13.209
                                                          Dec 5, 2023 05:30:49.404746056 CET4994116458192.168.2.418.156.13.209
                                                          Dec 5, 2023 05:30:49.585764885 CET164584994118.156.13.209192.168.2.4
                                                          Dec 5, 2023 05:30:49.585913897 CET4994116458192.168.2.418.156.13.209
                                                          Dec 5, 2023 05:30:49.609916925 CET164584994118.156.13.209192.168.2.4
                                                          Dec 5, 2023 05:30:49.610079050 CET4994116458192.168.2.418.156.13.209
                                                          Dec 5, 2023 05:30:49.640887976 CET4994116458192.168.2.418.156.13.209
                                                          Dec 5, 2023 05:30:49.642074108 CET4994216458192.168.2.418.156.13.209
                                                          Dec 5, 2023 05:30:49.767059088 CET164584994118.156.13.209192.168.2.4
                                                          Dec 5, 2023 05:30:49.791305065 CET164584994118.156.13.209192.168.2.4
                                                          Dec 5, 2023 05:30:49.821935892 CET164584994118.156.13.209192.168.2.4
                                                          Dec 5, 2023 05:30:49.823688984 CET164584994218.156.13.209192.168.2.4
                                                          Dec 5, 2023 05:30:49.824039936 CET4994216458192.168.2.418.156.13.209
                                                          Dec 5, 2023 05:30:49.830003977 CET4994216458192.168.2.418.156.13.209
                                                          Dec 5, 2023 05:30:50.011651993 CET164584994218.156.13.209192.168.2.4
                                                          Dec 5, 2023 05:30:50.011928082 CET4994216458192.168.2.418.156.13.209
                                                          Dec 5, 2023 05:30:50.032284021 CET164584994218.156.13.209192.168.2.4
                                                          Dec 5, 2023 05:30:50.032623053 CET4994216458192.168.2.418.156.13.209
                                                          Dec 5, 2023 05:30:50.062380075 CET4994216458192.168.2.418.156.13.209
                                                          Dec 5, 2023 05:30:50.063836098 CET4994316458192.168.2.418.156.13.209
                                                          Dec 5, 2023 05:30:50.194166899 CET164584994218.156.13.209192.168.2.4
                                                          Dec 5, 2023 05:30:50.214423895 CET164584994218.156.13.209192.168.2.4
                                                          Dec 5, 2023 05:30:50.244384050 CET164584994218.156.13.209192.168.2.4
                                                          Dec 5, 2023 05:30:50.244975090 CET164584994318.156.13.209192.168.2.4
                                                          Dec 5, 2023 05:30:50.245170116 CET4994316458192.168.2.418.156.13.209
                                                          Dec 5, 2023 05:30:50.247555971 CET4994316458192.168.2.418.156.13.209
                                                          Dec 5, 2023 05:30:50.428409100 CET164584994318.156.13.209192.168.2.4
                                                          Dec 5, 2023 05:30:50.428669930 CET4994316458192.168.2.418.156.13.209
                                                          Dec 5, 2023 05:30:50.454844952 CET164584994318.156.13.209192.168.2.4
                                                          Dec 5, 2023 05:30:50.455151081 CET4994316458192.168.2.418.156.13.209
                                                          Dec 5, 2023 05:30:50.484138012 CET4994316458192.168.2.418.156.13.209
                                                          Dec 5, 2023 05:30:50.485642910 CET4994416458192.168.2.418.156.13.209
                                                          Dec 5, 2023 05:30:50.609620094 CET164584994318.156.13.209192.168.2.4
                                                          Dec 5, 2023 05:30:50.636054039 CET164584994318.156.13.209192.168.2.4
                                                          Dec 5, 2023 05:30:50.666085958 CET164584994318.156.13.209192.168.2.4
                                                          Dec 5, 2023 05:30:50.667594910 CET164584994418.156.13.209192.168.2.4
                                                          Dec 5, 2023 05:30:50.667915106 CET4994416458192.168.2.418.156.13.209
                                                          Dec 5, 2023 05:30:50.669939041 CET4994416458192.168.2.418.156.13.209
                                                          Dec 5, 2023 05:30:50.851006031 CET164584994418.156.13.209192.168.2.4
                                                          Dec 5, 2023 05:30:50.851324081 CET4994416458192.168.2.418.156.13.209
                                                          Dec 5, 2023 05:30:50.875824928 CET164584994418.156.13.209192.168.2.4
                                                          Dec 5, 2023 05:30:50.876133919 CET4994416458192.168.2.418.156.13.209
                                                          Dec 5, 2023 05:30:50.905778885 CET4994416458192.168.2.418.156.13.209
                                                          Dec 5, 2023 05:30:50.907263041 CET4994516458192.168.2.418.156.13.209
                                                          Dec 5, 2023 05:30:51.032416105 CET164584994418.156.13.209192.168.2.4
                                                          Dec 5, 2023 05:30:51.057014942 CET164584994418.156.13.209192.168.2.4
                                                          Dec 5, 2023 05:30:51.087249994 CET164584994518.156.13.209192.168.2.4
                                                          Dec 5, 2023 05:30:51.087315083 CET164584994418.156.13.209192.168.2.4
                                                          Dec 5, 2023 05:30:51.087469101 CET4994516458192.168.2.418.156.13.209
                                                          Dec 5, 2023 05:30:51.089533091 CET4994516458192.168.2.418.156.13.209
                                                          Dec 5, 2023 05:30:51.269589901 CET164584994518.156.13.209192.168.2.4
                                                          Dec 5, 2023 05:30:51.269913912 CET4994516458192.168.2.418.156.13.209
                                                          Dec 5, 2023 05:30:51.294384956 CET164584994518.156.13.209192.168.2.4
                                                          Dec 5, 2023 05:30:51.294878960 CET4994516458192.168.2.418.156.13.209
                                                          Dec 5, 2023 05:30:51.327790976 CET4994516458192.168.2.418.156.13.209
                                                          Dec 5, 2023 05:30:51.328999043 CET4994616458192.168.2.418.156.13.209
                                                          Dec 5, 2023 05:30:51.449961901 CET164584994518.156.13.209192.168.2.4
                                                          Dec 5, 2023 05:30:51.474993944 CET164584994518.156.13.209192.168.2.4
                                                          Dec 5, 2023 05:30:51.507853985 CET164584994518.156.13.209192.168.2.4
                                                          Dec 5, 2023 05:30:51.509912968 CET164584994618.156.13.209192.168.2.4
                                                          Dec 5, 2023 05:30:51.510018110 CET4994616458192.168.2.418.156.13.209
                                                          Dec 5, 2023 05:30:51.512099028 CET4994616458192.168.2.418.156.13.209
                                                          Dec 5, 2023 05:30:51.693628073 CET164584994618.156.13.209192.168.2.4
                                                          Dec 5, 2023 05:30:51.693922997 CET4994616458192.168.2.418.156.13.209
                                                          Dec 5, 2023 05:30:51.719166040 CET164584994618.156.13.209192.168.2.4
                                                          Dec 5, 2023 05:30:51.719285965 CET4994616458192.168.2.418.156.13.209
                                                          Dec 5, 2023 05:30:51.749887943 CET4994616458192.168.2.418.156.13.209
                                                          Dec 5, 2023 05:30:51.751110077 CET4994716458192.168.2.418.156.13.209
                                                          Dec 5, 2023 05:30:51.875149012 CET164584994618.156.13.209192.168.2.4
                                                          Dec 5, 2023 05:30:51.900505066 CET164584994618.156.13.209192.168.2.4
                                                          Dec 5, 2023 05:30:51.930891991 CET164584994618.156.13.209192.168.2.4
                                                          Dec 5, 2023 05:30:51.931740999 CET164584994718.156.13.209192.168.2.4
                                                          Dec 5, 2023 05:30:51.931864023 CET4994716458192.168.2.418.156.13.209
                                                          Dec 5, 2023 05:30:51.933916092 CET4994716458192.168.2.418.156.13.209
                                                          Dec 5, 2023 05:30:52.114567041 CET164584994718.156.13.209192.168.2.4
                                                          Dec 5, 2023 05:30:52.114676952 CET4994716458192.168.2.418.156.13.209
                                                          Dec 5, 2023 05:30:52.141958952 CET164584994718.156.13.209192.168.2.4
                                                          Dec 5, 2023 05:30:52.142054081 CET4994716458192.168.2.418.156.13.209
                                                          Dec 5, 2023 05:30:52.171331882 CET4994716458192.168.2.418.156.13.209
                                                          Dec 5, 2023 05:30:52.173321962 CET4994816458192.168.2.418.156.13.209
                                                          Dec 5, 2023 05:30:52.295464993 CET164584994718.156.13.209192.168.2.4
                                                          Dec 5, 2023 05:30:52.322658062 CET164584994718.156.13.209192.168.2.4
                                                          Dec 5, 2023 05:30:52.351861954 CET164584994718.156.13.209192.168.2.4
                                                          Dec 5, 2023 05:30:52.354368925 CET164584994818.156.13.209192.168.2.4
                                                          Dec 5, 2023 05:30:52.354666948 CET4994816458192.168.2.418.156.13.209
                                                          Dec 5, 2023 05:30:52.356571913 CET4994816458192.168.2.418.156.13.209
                                                          Dec 5, 2023 05:30:52.537446022 CET164584994818.156.13.209192.168.2.4
                                                          Dec 5, 2023 05:30:52.537767887 CET4994816458192.168.2.418.156.13.209
                                                          Dec 5, 2023 05:30:52.602749109 CET164584994818.156.13.209192.168.2.4
                                                          Dec 5, 2023 05:30:52.602936029 CET4994816458192.168.2.418.156.13.209
                                                          Dec 5, 2023 05:30:52.624502897 CET4994816458192.168.2.418.156.13.209
                                                          Dec 5, 2023 05:30:52.625847101 CET4994916458192.168.2.418.156.13.209
                                                          Dec 5, 2023 05:30:52.718861103 CET164584994818.156.13.209192.168.2.4
                                                          Dec 5, 2023 05:30:52.784046888 CET164584994818.156.13.209192.168.2.4
                                                          Dec 5, 2023 05:30:52.805507898 CET164584994818.156.13.209192.168.2.4
                                                          Dec 5, 2023 05:30:52.806828976 CET164584994918.156.13.209192.168.2.4
                                                          Dec 5, 2023 05:30:52.807029963 CET4994916458192.168.2.418.156.13.209
                                                          Dec 5, 2023 05:30:52.809099913 CET4994916458192.168.2.418.156.13.209
                                                          Dec 5, 2023 05:30:52.989660978 CET164584994918.156.13.209192.168.2.4
                                                          Dec 5, 2023 05:30:52.989912987 CET4994916458192.168.2.418.156.13.209
                                                          Dec 5, 2023 05:30:53.035077095 CET164584994918.156.13.209192.168.2.4
                                                          Dec 5, 2023 05:30:53.035296917 CET4994916458192.168.2.418.156.13.209
                                                          Dec 5, 2023 05:30:53.062376976 CET4994916458192.168.2.418.156.13.209
                                                          Dec 5, 2023 05:30:53.063692093 CET4995016458192.168.2.418.156.13.209
                                                          Dec 5, 2023 05:30:53.170919895 CET164584994918.156.13.209192.168.2.4
                                                          Dec 5, 2023 05:30:53.217349052 CET164584994918.156.13.209192.168.2.4
                                                          Dec 5, 2023 05:30:53.244146109 CET164584994918.156.13.209192.168.2.4
                                                          Dec 5, 2023 05:30:53.245649099 CET164584995018.156.13.209192.168.2.4
                                                          Dec 5, 2023 05:30:53.245728970 CET4995016458192.168.2.418.156.13.209
                                                          Dec 5, 2023 05:30:53.248119116 CET4995016458192.168.2.418.156.13.209
                                                          Dec 5, 2023 05:30:53.430100918 CET164584995018.156.13.209192.168.2.4
                                                          Dec 5, 2023 05:30:53.430532932 CET4995016458192.168.2.418.156.13.209
                                                          Dec 5, 2023 05:30:53.454926968 CET164584995018.156.13.209192.168.2.4
                                                          Dec 5, 2023 05:30:53.455141068 CET4995016458192.168.2.418.156.13.209
                                                          Dec 5, 2023 05:30:53.468048096 CET4995016458192.168.2.418.156.13.209
                                                          Dec 5, 2023 05:30:53.469413042 CET4995116458192.168.2.418.156.13.209
                                                          Dec 5, 2023 05:30:53.612457991 CET164584995018.156.13.209192.168.2.4
                                                          Dec 5, 2023 05:30:53.636908054 CET164584995018.156.13.209192.168.2.4
                                                          Dec 5, 2023 05:30:53.648869991 CET164584995118.156.13.209192.168.2.4
                                                          Dec 5, 2023 05:30:53.649113894 CET4995116458192.168.2.418.156.13.209
                                                          Dec 5, 2023 05:30:53.649552107 CET164584995018.156.13.209192.168.2.4
                                                          Dec 5, 2023 05:30:53.651041985 CET4995116458192.168.2.418.156.13.209
                                                          Dec 5, 2023 05:30:53.830434084 CET164584995118.156.13.209192.168.2.4
                                                          Dec 5, 2023 05:30:53.830683947 CET4995116458192.168.2.418.156.13.209
                                                          Dec 5, 2023 05:30:53.858632088 CET164584995118.156.13.209192.168.2.4
                                                          Dec 5, 2023 05:30:53.858855009 CET4995116458192.168.2.418.156.13.209
                                                          Dec 5, 2023 05:30:53.874480009 CET4995116458192.168.2.418.156.13.209
                                                          Dec 5, 2023 05:30:53.876072884 CET4995216458192.168.2.418.156.13.209
                                                          Dec 5, 2023 05:30:54.010128021 CET164584995118.156.13.209192.168.2.4
                                                          Dec 5, 2023 05:30:54.038187027 CET164584995118.156.13.209192.168.2.4
                                                          Dec 5, 2023 05:30:54.054052114 CET164584995118.156.13.209192.168.2.4
                                                          Dec 5, 2023 05:30:54.057389975 CET164584995218.156.13.209192.168.2.4
                                                          Dec 5, 2023 05:30:54.057488918 CET4995216458192.168.2.418.156.13.209
                                                          Dec 5, 2023 05:30:54.059520960 CET4995216458192.168.2.418.156.13.209
                                                          Dec 5, 2023 05:30:54.240345955 CET164584995218.156.13.209192.168.2.4
                                                          Dec 5, 2023 05:30:54.240437031 CET4995216458192.168.2.418.156.13.209
                                                          Dec 5, 2023 05:30:54.266361952 CET164584995218.156.13.209192.168.2.4
                                                          Dec 5, 2023 05:30:54.266565084 CET4995216458192.168.2.418.156.13.209
                                                          Dec 5, 2023 05:30:54.280837059 CET4995216458192.168.2.418.156.13.209
                                                          Dec 5, 2023 05:30:54.286106110 CET4995316458192.168.2.418.156.13.209
                                                          Dec 5, 2023 05:30:54.421719074 CET164584995218.156.13.209192.168.2.4
                                                          Dec 5, 2023 05:30:54.447599888 CET164584995218.156.13.209192.168.2.4
                                                          Dec 5, 2023 05:30:54.462075949 CET164584995218.156.13.209192.168.2.4
                                                          Dec 5, 2023 05:30:54.468223095 CET164584995318.156.13.209192.168.2.4
                                                          Dec 5, 2023 05:30:54.468317986 CET4995316458192.168.2.418.156.13.209
                                                          Dec 5, 2023 05:30:54.470334053 CET4995316458192.168.2.418.156.13.209
                                                          Dec 5, 2023 05:30:54.652215004 CET164584995318.156.13.209192.168.2.4
                                                          Dec 5, 2023 05:30:54.652575970 CET4995316458192.168.2.418.156.13.209
                                                          Dec 5, 2023 05:30:54.680392027 CET164584995318.156.13.209192.168.2.4
                                                          Dec 5, 2023 05:30:54.680593014 CET4995316458192.168.2.418.156.13.209
                                                          Dec 5, 2023 05:30:54.702442884 CET4995316458192.168.2.418.156.13.209
                                                          Dec 5, 2023 05:30:54.704154968 CET4995416458192.168.2.418.156.13.209
                                                          Dec 5, 2023 05:30:54.835319042 CET164584995318.156.13.209192.168.2.4
                                                          Dec 5, 2023 05:30:54.862715006 CET164584995318.156.13.209192.168.2.4
                                                          Dec 5, 2023 05:30:54.883949041 CET164584995418.156.13.209192.168.2.4
                                                          Dec 5, 2023 05:30:54.884229898 CET4995416458192.168.2.418.156.13.209
                                                          Dec 5, 2023 05:30:54.884438992 CET164584995318.156.13.209192.168.2.4
                                                          Dec 5, 2023 05:30:54.887033939 CET4995416458192.168.2.418.156.13.209
                                                          Dec 5, 2023 05:30:55.066881895 CET164584995418.156.13.209192.168.2.4
                                                          Dec 5, 2023 05:30:55.067188025 CET4995416458192.168.2.418.156.13.209
                                                          Dec 5, 2023 05:30:55.096165895 CET164584995418.156.13.209192.168.2.4
                                                          Dec 5, 2023 05:30:55.096362114 CET4995416458192.168.2.418.156.13.209
                                                          Dec 5, 2023 05:30:55.109029055 CET4995416458192.168.2.418.156.13.209
                                                          Dec 5, 2023 05:30:55.110775948 CET4995516458192.168.2.418.156.13.209
                                                          Dec 5, 2023 05:30:55.247030020 CET164584995418.156.13.209192.168.2.4
                                                          Dec 5, 2023 05:30:55.276101112 CET164584995418.156.13.209192.168.2.4
                                                          Dec 5, 2023 05:30:55.288902998 CET164584995418.156.13.209192.168.2.4
                                                          Dec 5, 2023 05:30:55.291665077 CET164584995518.156.13.209192.168.2.4
                                                          Dec 5, 2023 05:30:55.291941881 CET4995516458192.168.2.418.156.13.209
                                                          Dec 5, 2023 05:30:55.293993950 CET4995516458192.168.2.418.156.13.209
                                                          Dec 5, 2023 05:30:55.474674940 CET164584995518.156.13.209192.168.2.4
                                                          Dec 5, 2023 05:30:55.475002050 CET4995516458192.168.2.418.156.13.209
                                                          Dec 5, 2023 05:30:55.505570889 CET164584995518.156.13.209192.168.2.4
                                                          Dec 5, 2023 05:30:55.505757093 CET4995516458192.168.2.418.156.13.209
                                                          Dec 5, 2023 05:30:55.515018940 CET4995516458192.168.2.418.156.13.209
                                                          Dec 5, 2023 05:30:55.516282082 CET4995616458192.168.2.418.156.13.209
                                                          Dec 5, 2023 05:30:55.655724049 CET164584995518.156.13.209192.168.2.4
                                                          Dec 5, 2023 05:30:55.686594009 CET164584995518.156.13.209192.168.2.4
                                                          Dec 5, 2023 05:30:55.695945024 CET164584995518.156.13.209192.168.2.4
                                                          Dec 5, 2023 05:30:55.696008921 CET164584995618.156.13.209192.168.2.4
                                                          Dec 5, 2023 05:30:55.696155071 CET4995616458192.168.2.418.156.13.209
                                                          Dec 5, 2023 05:30:55.698324919 CET4995616458192.168.2.418.156.13.209
                                                          Dec 5, 2023 05:30:55.877868891 CET164584995618.156.13.209192.168.2.4
                                                          Dec 5, 2023 05:30:55.878098965 CET4995616458192.168.2.418.156.13.209
                                                          Dec 5, 2023 05:30:55.902333975 CET164584995618.156.13.209192.168.2.4
                                                          Dec 5, 2023 05:30:55.902484894 CET4995616458192.168.2.418.156.13.209
                                                          Dec 5, 2023 05:30:55.921345949 CET4995616458192.168.2.418.156.13.209
                                                          Dec 5, 2023 05:30:55.924997091 CET4995716458192.168.2.418.156.13.209
                                                          Dec 5, 2023 05:30:56.057823896 CET164584995618.156.13.209192.168.2.4
                                                          Dec 5, 2023 05:30:56.082391024 CET164584995618.156.13.209192.168.2.4
                                                          Dec 5, 2023 05:30:56.101068020 CET164584995618.156.13.209192.168.2.4
                                                          Dec 5, 2023 05:30:56.105715990 CET164584995718.156.13.209192.168.2.4
                                                          Dec 5, 2023 05:30:56.106003046 CET4995716458192.168.2.418.156.13.209
                                                          Dec 5, 2023 05:30:56.108139038 CET4995716458192.168.2.418.156.13.209
                                                          Dec 5, 2023 05:30:56.288572073 CET164584995718.156.13.209192.168.2.4
                                                          Dec 5, 2023 05:30:56.288832903 CET4995716458192.168.2.418.156.13.209
                                                          Dec 5, 2023 05:30:56.318269014 CET164584995718.156.13.209192.168.2.4
                                                          Dec 5, 2023 05:30:56.318511009 CET4995716458192.168.2.418.156.13.209
                                                          Dec 5, 2023 05:30:56.327666998 CET4995716458192.168.2.418.156.13.209
                                                          Dec 5, 2023 05:30:56.336313963 CET4995816458192.168.2.418.156.13.209
                                                          Dec 5, 2023 05:30:56.469373941 CET164584995718.156.13.209192.168.2.4
                                                          Dec 5, 2023 05:30:56.499149084 CET164584995718.156.13.209192.168.2.4
                                                          Dec 5, 2023 05:30:56.508253098 CET164584995718.156.13.209192.168.2.4
                                                          Dec 5, 2023 05:30:56.516936064 CET164584995818.156.13.209192.168.2.4
                                                          Dec 5, 2023 05:30:56.517163992 CET4995816458192.168.2.418.156.13.209
                                                          Dec 5, 2023 05:30:56.519011974 CET4995816458192.168.2.418.156.13.209
                                                          Dec 5, 2023 05:30:56.699495077 CET164584995818.156.13.209192.168.2.4
                                                          Dec 5, 2023 05:30:56.699748993 CET4995816458192.168.2.418.156.13.209
                                                          Dec 5, 2023 05:30:56.726542950 CET164584995818.156.13.209192.168.2.4
                                                          Dec 5, 2023 05:30:56.726974010 CET4995816458192.168.2.418.156.13.209
                                                          Dec 5, 2023 05:30:56.749516964 CET4995816458192.168.2.418.156.13.209
                                                          Dec 5, 2023 05:30:56.750920057 CET4995916458192.168.2.418.156.13.209
                                                          Dec 5, 2023 05:30:56.880516052 CET164584995818.156.13.209192.168.2.4
                                                          Dec 5, 2023 05:30:56.907814026 CET164584995818.156.13.209192.168.2.4
                                                          Dec 5, 2023 05:30:56.930310011 CET164584995818.156.13.209192.168.2.4
                                                          Dec 5, 2023 05:30:56.932221889 CET164584995918.156.13.209192.168.2.4
                                                          Dec 5, 2023 05:30:56.932326078 CET4995916458192.168.2.418.156.13.209
                                                          Dec 5, 2023 05:30:56.934539080 CET4995916458192.168.2.418.156.13.209
                                                          Dec 5, 2023 05:30:57.115500927 CET164584995918.156.13.209192.168.2.4
                                                          Dec 5, 2023 05:30:57.115660906 CET4995916458192.168.2.418.156.13.209
                                                          Dec 5, 2023 05:30:57.142040014 CET164584995918.156.13.209192.168.2.4
                                                          Dec 5, 2023 05:30:57.142220020 CET4995916458192.168.2.418.156.13.209
                                                          Dec 5, 2023 05:30:57.155698061 CET4995916458192.168.2.418.156.13.209
                                                          Dec 5, 2023 05:30:57.157042980 CET4996016458192.168.2.418.156.13.209
                                                          Dec 5, 2023 05:30:57.296930075 CET164584995918.156.13.209192.168.2.4
                                                          Dec 5, 2023 05:30:57.323174000 CET164584995918.156.13.209192.168.2.4
                                                          Dec 5, 2023 05:30:57.336986065 CET164584995918.156.13.209192.168.2.4
                                                          Dec 5, 2023 05:30:57.339108944 CET164584996018.156.13.209192.168.2.4
                                                          Dec 5, 2023 05:30:57.339207888 CET4996016458192.168.2.418.156.13.209
                                                          Dec 5, 2023 05:30:57.341100931 CET4996016458192.168.2.418.156.13.209
                                                          Dec 5, 2023 05:30:57.522603035 CET164584996018.156.13.209192.168.2.4
                                                          Dec 5, 2023 05:30:57.522842884 CET4996016458192.168.2.418.156.13.209
                                                          Dec 5, 2023 05:30:57.547460079 CET164584996018.156.13.209192.168.2.4
                                                          Dec 5, 2023 05:30:57.547734022 CET4996016458192.168.2.418.156.13.209
                                                          Dec 5, 2023 05:30:57.561908007 CET4996016458192.168.2.418.156.13.209
                                                          Dec 5, 2023 05:30:57.565350056 CET4996116458192.168.2.418.156.13.209
                                                          Dec 5, 2023 05:30:57.704777956 CET164584996018.156.13.209192.168.2.4
                                                          Dec 5, 2023 05:30:57.729588985 CET164584996018.156.13.209192.168.2.4
                                                          Dec 5, 2023 05:30:57.743629932 CET164584996018.156.13.209192.168.2.4
                                                          Dec 5, 2023 05:30:57.747205973 CET164584996118.156.13.209192.168.2.4
                                                          Dec 5, 2023 05:30:57.747423887 CET4996116458192.168.2.418.156.13.209
                                                          Dec 5, 2023 05:30:57.751368046 CET4996116458192.168.2.418.156.13.209
                                                          Dec 5, 2023 05:30:57.931902885 CET164584996118.156.13.209192.168.2.4
                                                          Dec 5, 2023 05:30:57.932002068 CET4996116458192.168.2.418.156.13.209
                                                          Dec 5, 2023 05:30:57.955061913 CET164584996118.156.13.209192.168.2.4
                                                          Dec 5, 2023 05:30:57.955140114 CET4996116458192.168.2.418.156.13.209
                                                          Dec 5, 2023 05:30:57.967984915 CET4996116458192.168.2.418.156.13.209
                                                          Dec 5, 2023 05:30:57.970413923 CET4996216458192.168.2.418.156.13.209
                                                          Dec 5, 2023 05:30:58.112744093 CET164584996118.156.13.209192.168.2.4
                                                          Dec 5, 2023 05:30:58.135796070 CET164584996118.156.13.209192.168.2.4
                                                          Dec 5, 2023 05:30:58.149010897 CET164584996118.156.13.209192.168.2.4
                                                          Dec 5, 2023 05:30:58.151359081 CET164584996218.156.13.209192.168.2.4
                                                          Dec 5, 2023 05:30:58.151607990 CET4996216458192.168.2.418.156.13.209
                                                          Dec 5, 2023 05:30:58.158127069 CET4996216458192.168.2.418.156.13.209
                                                          Dec 5, 2023 05:30:58.338742018 CET164584996218.156.13.209192.168.2.4
                                                          Dec 5, 2023 05:30:58.338916063 CET4996216458192.168.2.418.156.13.209
                                                          Dec 5, 2023 05:30:58.364269018 CET164584996218.156.13.209192.168.2.4
                                                          Dec 5, 2023 05:30:58.364588022 CET4996216458192.168.2.418.156.13.209
                                                          Dec 5, 2023 05:30:58.374392986 CET4996216458192.168.2.418.156.13.209
                                                          Dec 5, 2023 05:30:58.377155066 CET4996316458192.168.2.418.156.13.209
                                                          Dec 5, 2023 05:30:58.519803047 CET164584996218.156.13.209192.168.2.4
                                                          Dec 5, 2023 05:30:58.545644999 CET164584996218.156.13.209192.168.2.4
                                                          Dec 5, 2023 05:30:58.555592060 CET164584996218.156.13.209192.168.2.4
                                                          Dec 5, 2023 05:30:58.559767008 CET164584996318.156.13.209192.168.2.4
                                                          Dec 5, 2023 05:30:58.559869051 CET4996316458192.168.2.418.156.13.209
                                                          Dec 5, 2023 05:30:58.562505007 CET4996316458192.168.2.418.156.13.209
                                                          Dec 5, 2023 05:30:58.744206905 CET164584996318.156.13.209192.168.2.4
                                                          Dec 5, 2023 05:30:58.744491100 CET4996316458192.168.2.418.156.13.209
                                                          Dec 5, 2023 05:30:58.775682926 CET164584996318.156.13.209192.168.2.4
                                                          Dec 5, 2023 05:30:58.776000023 CET4996316458192.168.2.418.156.13.209
                                                          Dec 5, 2023 05:30:58.796236038 CET4996316458192.168.2.418.156.13.209
                                                          Dec 5, 2023 05:30:58.797477007 CET4996416458192.168.2.418.156.13.209
                                                          Dec 5, 2023 05:30:58.926945925 CET164584996318.156.13.209192.168.2.4
                                                          Dec 5, 2023 05:30:58.957942009 CET164584996318.156.13.209192.168.2.4
                                                          Dec 5, 2023 05:30:58.978133917 CET164584996318.156.13.209192.168.2.4
                                                          Dec 5, 2023 05:30:58.978163004 CET164584996418.156.13.209192.168.2.4
                                                          Dec 5, 2023 05:30:58.978244066 CET4996416458192.168.2.418.156.13.209
                                                          Dec 5, 2023 05:30:58.981178045 CET4996416458192.168.2.418.156.13.209
                                                          Dec 5, 2023 05:30:59.161581993 CET164584996418.156.13.209192.168.2.4
                                                          Dec 5, 2023 05:30:59.161643982 CET4996416458192.168.2.418.156.13.209
                                                          Dec 5, 2023 05:30:59.187769890 CET164584996418.156.13.209192.168.2.4
                                                          Dec 5, 2023 05:30:59.187853098 CET4996416458192.168.2.418.156.13.209
                                                          Dec 5, 2023 05:30:59.202358961 CET4996416458192.168.2.418.156.13.209
                                                          Dec 5, 2023 05:30:59.204356909 CET4996516458192.168.2.418.156.13.209
                                                          Dec 5, 2023 05:30:59.342066050 CET164584996418.156.13.209192.168.2.4
                                                          Dec 5, 2023 05:30:59.368844032 CET164584996418.156.13.209192.168.2.4
                                                          Dec 5, 2023 05:30:59.382950068 CET164584996418.156.13.209192.168.2.4
                                                          Dec 5, 2023 05:30:59.385030985 CET164584996518.156.13.209192.168.2.4
                                                          Dec 5, 2023 05:30:59.385337114 CET4996516458192.168.2.418.156.13.209
                                                          Dec 5, 2023 05:30:59.387460947 CET4996516458192.168.2.418.156.13.209
                                                          Dec 5, 2023 05:30:59.568157911 CET164584996518.156.13.209192.168.2.4
                                                          Dec 5, 2023 05:30:59.568413973 CET4996516458192.168.2.418.156.13.209
                                                          Dec 5, 2023 05:30:59.601033926 CET164584996518.156.13.209192.168.2.4
                                                          Dec 5, 2023 05:30:59.601167917 CET4996516458192.168.2.418.156.13.209
                                                          Dec 5, 2023 05:30:59.608779907 CET4996516458192.168.2.418.156.13.209
                                                          Dec 5, 2023 05:30:59.610105038 CET4996616458192.168.2.418.156.13.209
                                                          Dec 5, 2023 05:30:59.749342918 CET164584996518.156.13.209192.168.2.4
                                                          Dec 5, 2023 05:30:59.782259941 CET164584996518.156.13.209192.168.2.4
                                                          Dec 5, 2023 05:30:59.789671898 CET164584996518.156.13.209192.168.2.4
                                                          Dec 5, 2023 05:30:59.790780067 CET164584996618.156.13.209192.168.2.4
                                                          Dec 5, 2023 05:30:59.790985107 CET4996616458192.168.2.418.156.13.209
                                                          Dec 5, 2023 05:30:59.792452097 CET4996616458192.168.2.418.156.13.209
                                                          Dec 5, 2023 05:30:59.972956896 CET164584996618.156.13.209192.168.2.4
                                                          Dec 5, 2023 05:30:59.973325014 CET4996616458192.168.2.418.156.13.209
                                                          Dec 5, 2023 05:31:00.001151085 CET164584996618.156.13.209192.168.2.4
                                                          Dec 5, 2023 05:31:00.001442909 CET4996616458192.168.2.418.156.13.209
                                                          Dec 5, 2023 05:31:00.014983892 CET4996616458192.168.2.418.156.13.209
                                                          Dec 5, 2023 05:31:00.015971899 CET4996716458192.168.2.418.156.13.209
                                                          Dec 5, 2023 05:31:00.155848026 CET164584996618.156.13.209192.168.2.4
                                                          Dec 5, 2023 05:31:00.182323933 CET164584996618.156.13.209192.168.2.4
                                                          Dec 5, 2023 05:31:00.195904016 CET164584996618.156.13.209192.168.2.4
                                                          Dec 5, 2023 05:31:00.198210001 CET164584996718.156.13.209192.168.2.4
                                                          Dec 5, 2023 05:31:00.198395967 CET4996716458192.168.2.418.156.13.209
                                                          Dec 5, 2023 05:31:00.204452038 CET4996716458192.168.2.418.156.13.209
                                                          Dec 5, 2023 05:31:00.387025118 CET164584996718.156.13.209192.168.2.4
                                                          Dec 5, 2023 05:31:00.387110949 CET4996716458192.168.2.418.156.13.209
                                                          Dec 5, 2023 05:31:00.407628059 CET164584996718.156.13.209192.168.2.4
                                                          Dec 5, 2023 05:31:00.407704115 CET4996716458192.168.2.418.156.13.209
                                                          Dec 5, 2023 05:31:00.421108961 CET4996716458192.168.2.418.156.13.209
                                                          Dec 5, 2023 05:31:00.422172070 CET4996816458192.168.2.418.156.13.209
                                                          Dec 5, 2023 05:31:00.568978071 CET164584996718.156.13.209192.168.2.4
                                                          Dec 5, 2023 05:31:00.590291023 CET164584996718.156.13.209192.168.2.4
                                                          Dec 5, 2023 05:31:00.601593971 CET164584996818.156.13.209192.168.2.4
                                                          Dec 5, 2023 05:31:00.601821899 CET4996816458192.168.2.418.156.13.209
                                                          Dec 5, 2023 05:31:00.602652073 CET164584996718.156.13.209192.168.2.4
                                                          Dec 5, 2023 05:31:00.603507042 CET4996816458192.168.2.418.156.13.209
                                                          Dec 5, 2023 05:31:00.782968998 CET164584996818.156.13.209192.168.2.4
                                                          Dec 5, 2023 05:31:00.783546925 CET4996816458192.168.2.418.156.13.209
                                                          Dec 5, 2023 05:31:00.807549000 CET164584996818.156.13.209192.168.2.4
                                                          Dec 5, 2023 05:31:00.809921980 CET4996816458192.168.2.418.156.13.209
                                                          Dec 5, 2023 05:31:00.827624083 CET4996816458192.168.2.418.156.13.209
                                                          Dec 5, 2023 05:31:00.828546047 CET4996916458192.168.2.418.156.13.209
                                                          Dec 5, 2023 05:31:00.963354111 CET164584996818.156.13.209192.168.2.4
                                                          Dec 5, 2023 05:31:00.989475965 CET164584996818.156.13.209192.168.2.4
                                                          Dec 5, 2023 05:31:01.007421017 CET164584996818.156.13.209192.168.2.4
                                                          Dec 5, 2023 05:31:01.009633064 CET164584996918.156.13.209192.168.2.4
                                                          Dec 5, 2023 05:31:01.009840965 CET4996916458192.168.2.418.156.13.209
                                                          Dec 5, 2023 05:31:01.011281013 CET4996916458192.168.2.418.156.13.209
                                                          Dec 5, 2023 05:31:01.192415953 CET164584996918.156.13.209192.168.2.4
                                                          Dec 5, 2023 05:31:01.195485115 CET4996916458192.168.2.418.156.13.209
                                                          Dec 5, 2023 05:31:01.222959995 CET164584996918.156.13.209192.168.2.4
                                                          Dec 5, 2023 05:31:01.223512888 CET4996916458192.168.2.418.156.13.209
                                                          Dec 5, 2023 05:31:01.233701944 CET4996916458192.168.2.418.156.13.209
                                                          Dec 5, 2023 05:31:01.234550953 CET4997016458192.168.2.418.156.13.209
                                                          Dec 5, 2023 05:31:01.376748085 CET164584996918.156.13.209192.168.2.4
                                                          Dec 5, 2023 05:31:01.404763937 CET164584996918.156.13.209192.168.2.4
                                                          Dec 5, 2023 05:31:01.414120913 CET164584997018.156.13.209192.168.2.4
                                                          Dec 5, 2023 05:31:01.414536953 CET164584996918.156.13.209192.168.2.4
                                                          Dec 5, 2023 05:31:01.414645910 CET4997016458192.168.2.418.156.13.209
                                                          Dec 5, 2023 05:31:01.418454885 CET4997016458192.168.2.418.156.13.209
                                                          Dec 5, 2023 05:31:01.597989082 CET164584997018.156.13.209192.168.2.4
                                                          Dec 5, 2023 05:31:01.598067045 CET4997016458192.168.2.418.156.13.209
                                                          Dec 5, 2023 05:31:01.620907068 CET164584997018.156.13.209192.168.2.4
                                                          Dec 5, 2023 05:31:01.620976925 CET4997016458192.168.2.418.156.13.209
                                                          Dec 5, 2023 05:31:01.624236107 CET4997016458192.168.2.418.156.13.209
                                                          Dec 5, 2023 05:31:01.625376940 CET4997116458192.168.2.418.156.13.209
                                                          Dec 5, 2023 05:31:01.777815104 CET164584997018.156.13.209192.168.2.4
                                                          Dec 5, 2023 05:31:01.800359011 CET164584997018.156.13.209192.168.2.4
                                                          Dec 5, 2023 05:31:01.804150105 CET164584997018.156.13.209192.168.2.4
                                                          Dec 5, 2023 05:31:01.805982113 CET164584997118.156.13.209192.168.2.4
                                                          Dec 5, 2023 05:31:01.806082010 CET4997116458192.168.2.418.156.13.209
                                                          Dec 5, 2023 05:31:01.807809114 CET4997116458192.168.2.418.156.13.209
                                                          Dec 5, 2023 05:31:01.989108086 CET164584997118.156.13.209192.168.2.4
                                                          Dec 5, 2023 05:31:01.989272118 CET4997116458192.168.2.418.156.13.209
                                                          Dec 5, 2023 05:31:02.013547897 CET164584997118.156.13.209192.168.2.4
                                                          Dec 5, 2023 05:31:02.013736963 CET4997116458192.168.2.418.156.13.209
                                                          Dec 5, 2023 05:31:02.030900002 CET4997116458192.168.2.418.156.13.209
                                                          Dec 5, 2023 05:31:02.031886101 CET4997216458192.168.2.418.156.13.209
                                                          Dec 5, 2023 05:31:02.170773029 CET164584997118.156.13.209192.168.2.4
                                                          Dec 5, 2023 05:31:02.194698095 CET164584997118.156.13.209192.168.2.4
                                                          Dec 5, 2023 05:31:02.212053061 CET164584997118.156.13.209192.168.2.4
                                                          Dec 5, 2023 05:31:02.213212013 CET164584997218.156.13.209192.168.2.4
                                                          Dec 5, 2023 05:31:02.213368893 CET4997216458192.168.2.418.156.13.209
                                                          Dec 5, 2023 05:31:02.215266943 CET4997216458192.168.2.418.156.13.209
                                                          Dec 5, 2023 05:31:02.395951033 CET164584997218.156.13.209192.168.2.4
                                                          Dec 5, 2023 05:31:02.396050930 CET4997216458192.168.2.418.156.13.209
                                                          Dec 5, 2023 05:31:02.421139002 CET164584997218.156.13.209192.168.2.4
                                                          Dec 5, 2023 05:31:02.421219110 CET4997216458192.168.2.418.156.13.209
                                                          Dec 5, 2023 05:31:02.436707020 CET4997216458192.168.2.418.156.13.209
                                                          Dec 5, 2023 05:31:02.437711000 CET4997316458192.168.2.418.156.13.209
                                                          Dec 5, 2023 05:31:02.577140093 CET164584997218.156.13.209192.168.2.4
                                                          Dec 5, 2023 05:31:02.602191925 CET164584997218.156.13.209192.168.2.4
                                                          Dec 5, 2023 05:31:02.617389917 CET164584997318.156.13.209192.168.2.4
                                                          Dec 5, 2023 05:31:02.617499113 CET164584997218.156.13.209192.168.2.4
                                                          Dec 5, 2023 05:31:02.617769003 CET4997316458192.168.2.418.156.13.209
                                                          Dec 5, 2023 05:31:02.622147083 CET4997316458192.168.2.418.156.13.209
                                                          Dec 5, 2023 05:31:02.802010059 CET164584997318.156.13.209192.168.2.4
                                                          Dec 5, 2023 05:31:02.802170038 CET4997316458192.168.2.418.156.13.209
                                                          Dec 5, 2023 05:31:02.824178934 CET164584997318.156.13.209192.168.2.4
                                                          Dec 5, 2023 05:31:02.824409962 CET4997316458192.168.2.418.156.13.209
                                                          Dec 5, 2023 05:31:02.827357054 CET4997316458192.168.2.418.156.13.209
                                                          Dec 5, 2023 05:31:02.828547001 CET4997416458192.168.2.418.156.13.209
                                                          Dec 5, 2023 05:31:02.981827021 CET164584997318.156.13.209192.168.2.4
                                                          Dec 5, 2023 05:31:03.004437923 CET164584997318.156.13.209192.168.2.4
                                                          Dec 5, 2023 05:31:03.007544994 CET164584997318.156.13.209192.168.2.4
                                                          Dec 5, 2023 05:31:03.010344982 CET164584997418.156.13.209192.168.2.4
                                                          Dec 5, 2023 05:31:03.010442972 CET4997416458192.168.2.418.156.13.209
                                                          Dec 5, 2023 05:31:03.014633894 CET4997416458192.168.2.418.156.13.209
                                                          Dec 5, 2023 05:31:03.198739052 CET164584997418.156.13.209192.168.2.4
                                                          Dec 5, 2023 05:31:03.198944092 CET4997416458192.168.2.418.156.13.209
                                                          Dec 5, 2023 05:31:03.226788998 CET164584997418.156.13.209192.168.2.4
                                                          Dec 5, 2023 05:31:03.227013111 CET4997416458192.168.2.418.156.13.209
                                                          Dec 5, 2023 05:31:03.234023094 CET4997416458192.168.2.418.156.13.209
                                                          Dec 5, 2023 05:31:03.235943079 CET4997516458192.168.2.418.156.13.209
                                                          Dec 5, 2023 05:31:03.381174088 CET164584997418.156.13.209192.168.2.4
                                                          Dec 5, 2023 05:31:03.409034014 CET164584997418.156.13.209192.168.2.4
                                                          Dec 5, 2023 05:31:03.416312933 CET164584997418.156.13.209192.168.2.4
                                                          Dec 5, 2023 05:31:03.416378975 CET164584997518.156.13.209192.168.2.4
                                                          Dec 5, 2023 05:31:03.416615009 CET4997516458192.168.2.418.156.13.209
                                                          Dec 5, 2023 05:31:03.517119884 CET4997516458192.168.2.418.156.13.209
                                                          Dec 5, 2023 05:31:03.623796940 CET164584997518.156.13.209192.168.2.4
                                                          Dec 5, 2023 05:31:03.623892069 CET4997516458192.168.2.418.156.13.209
                                                          Dec 5, 2023 05:31:03.697572947 CET164584997518.156.13.209192.168.2.4
                                                          Dec 5, 2023 05:31:03.804148912 CET164584997518.156.13.209192.168.2.4
                                                          TimestampSource PortDest PortSource IPDest IP
                                                          Dec 5, 2023 05:27:12.951633930 CET5831253192.168.2.41.1.1.1
                                                          Dec 5, 2023 05:27:13.069809914 CET53583121.1.1.1192.168.2.4
                                                          Dec 5, 2023 05:28:13.330605030 CET5219353192.168.2.41.1.1.1
                                                          Dec 5, 2023 05:28:13.427877903 CET53521931.1.1.1192.168.2.4
                                                          Dec 5, 2023 05:29:13.328475952 CET6394553192.168.2.41.1.1.1
                                                          Dec 5, 2023 05:29:13.438481092 CET53639451.1.1.1192.168.2.4
                                                          Dec 5, 2023 05:30:13.127235889 CET6263253192.168.2.41.1.1.1
                                                          Dec 5, 2023 05:30:13.237802029 CET53626321.1.1.1192.168.2.4
                                                          TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                          Dec 5, 2023 05:27:12.951633930 CET192.168.2.41.1.1.10x9aa7Standard query (0)2.tcp.eu.ngrok.ioA (IP address)IN (0x0001)false
                                                          Dec 5, 2023 05:28:13.330605030 CET192.168.2.41.1.1.10x1011Standard query (0)2.tcp.eu.ngrok.ioA (IP address)IN (0x0001)false
                                                          Dec 5, 2023 05:29:13.328475952 CET192.168.2.41.1.1.10x46a8Standard query (0)2.tcp.eu.ngrok.ioA (IP address)IN (0x0001)false
                                                          Dec 5, 2023 05:30:13.127235889 CET192.168.2.41.1.1.10xcfa4Standard query (0)2.tcp.eu.ngrok.ioA (IP address)IN (0x0001)false
                                                          TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                          Dec 5, 2023 05:27:13.069809914 CET1.1.1.1192.168.2.40x9aa7No error (0)2.tcp.eu.ngrok.io18.192.93.86A (IP address)IN (0x0001)false
                                                          Dec 5, 2023 05:28:13.427877903 CET1.1.1.1192.168.2.40x1011No error (0)2.tcp.eu.ngrok.io3.127.138.57A (IP address)IN (0x0001)false
                                                          Dec 5, 2023 05:29:13.438481092 CET1.1.1.1192.168.2.40x46a8No error (0)2.tcp.eu.ngrok.io18.157.68.73A (IP address)IN (0x0001)false
                                                          Dec 5, 2023 05:30:13.237802029 CET1.1.1.1192.168.2.40xcfa4No error (0)2.tcp.eu.ngrok.io18.156.13.209A (IP address)IN (0x0001)false

                                                          Click to jump to process

                                                          Click to jump to process

                                                          Click to dive into process behavior distribution

                                                          Click to jump to process

                                                          Target ID:0
                                                          Start time:05:26:56
                                                          Start date:05/12/2023
                                                          Path:C:\Users\user\Desktop\RWqHoCWEPI.exe
                                                          Wow64 process (32bit):true
                                                          Commandline:C:\Users\user\Desktop\RWqHoCWEPI.exe
                                                          Imagebase:0xc90000
                                                          File size:36'864 bytes
                                                          MD5 hash:149069598DB31DB305DBD822B156E249
                                                          Has elevated privileges:true
                                                          Has administrator privileges:true
                                                          Programmed in:.Net C# or VB.NET
                                                          Yara matches:
                                                          • Rule: JoeSecurity_Njrat, Description: Yara detected Njrat, Source: 00000000.00000000.1670598790.0000000000C92000.00000002.00000001.01000000.00000003.sdmp, Author: Joe Security
                                                          • Rule: Windows_Trojan_Njrat_30f3c220, Description: unknown, Source: 00000000.00000000.1670598790.0000000000C92000.00000002.00000001.01000000.00000003.sdmp, Author: unknown
                                                          • Rule: njrat1, Description: Identify njRat, Source: 00000000.00000000.1670598790.0000000000C92000.00000002.00000001.01000000.00000003.sdmp, Author: Brian Wallace @botnet_hunter
                                                          Reputation:low
                                                          Has exited:true

                                                          Target ID:1
                                                          Start time:05:27:03
                                                          Start date:05/12/2023
                                                          Path:C:\Users\user\AppData\Roaming\server.exe
                                                          Wow64 process (32bit):true
                                                          Commandline:"C:\Users\user\AppData\Roaming\server.exe"
                                                          Imagebase:0x5f0000
                                                          File size:36'864 bytes
                                                          MD5 hash:149069598DB31DB305DBD822B156E249
                                                          Has elevated privileges:true
                                                          Has administrator privileges:true
                                                          Programmed in:.Net C# or VB.NET
                                                          Yara matches:
                                                          • Rule: JoeSecurity_Njrat, Description: Yara detected Njrat, Source: C:\Users\user\AppData\Roaming\server.exe, Author: Joe Security
                                                          • Rule: Windows_Trojan_Njrat_30f3c220, Description: unknown, Source: C:\Users\user\AppData\Roaming\server.exe, Author: unknown
                                                          • Rule: njrat1, Description: Identify njRat, Source: C:\Users\user\AppData\Roaming\server.exe, Author: Brian Wallace @botnet_hunter
                                                          • Rule: MALWARE_Win_NjRAT, Description: Detects NjRAT / Bladabindi, Source: C:\Users\user\AppData\Roaming\server.exe, Author: ditekSHen
                                                          Antivirus matches:
                                                          • Detection: 100%, Avira
                                                          • Detection: 100%, Joe Sandbox ML
                                                          • Detection: 86%, ReversingLabs
                                                          • Detection: 86%, Virustotal, Browse
                                                          Reputation:low
                                                          Has exited:false

                                                          Target ID:3
                                                          Start time:05:27:09
                                                          Start date:05/12/2023
                                                          Path:C:\Windows\SysWOW64\netsh.exe
                                                          Wow64 process (32bit):true
                                                          Commandline:netsh firewall add allowedprogram "C:\Users\user\AppData\Roaming\server.exe" "server.exe" ENABLE
                                                          Imagebase:0x1560000
                                                          File size:82'432 bytes
                                                          MD5 hash:4E89A1A088BE715D6C946E55AB07C7DF
                                                          Has elevated privileges:true
                                                          Has administrator privileges:true
                                                          Programmed in:C, C++ or other language
                                                          Reputation:moderate
                                                          Has exited:true

                                                          Target ID:4
                                                          Start time:05:27:09
                                                          Start date:05/12/2023
                                                          Path:C:\Windows\System32\conhost.exe
                                                          Wow64 process (32bit):false
                                                          Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                          Imagebase:0x7ff7699e0000
                                                          File size:862'208 bytes
                                                          MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                          Has elevated privileges:true
                                                          Has administrator privileges:true
                                                          Programmed in:C, C++ or other language
                                                          Reputation:high
                                                          Has exited:true

                                                          Target ID:8
                                                          Start time:05:27:21
                                                          Start date:05/12/2023
                                                          Path:C:\Users\user\AppData\Roaming\server.exe
                                                          Wow64 process (32bit):true
                                                          Commandline:"C:\Users\user\AppData\Roaming\server.exe" ..
                                                          Imagebase:0x520000
                                                          File size:36'864 bytes
                                                          MD5 hash:149069598DB31DB305DBD822B156E249
                                                          Has elevated privileges:false
                                                          Has administrator privileges:false
                                                          Programmed in:.Net C# or VB.NET
                                                          Reputation:low
                                                          Has exited:true

                                                          Target ID:9
                                                          Start time:05:27:30
                                                          Start date:05/12/2023
                                                          Path:C:\Users\user\AppData\Roaming\server.exe
                                                          Wow64 process (32bit):true
                                                          Commandline:"C:\Users\user\AppData\Roaming\server.exe" ..
                                                          Imagebase:0x5f0000
                                                          File size:36'864 bytes
                                                          MD5 hash:149069598DB31DB305DBD822B156E249
                                                          Has elevated privileges:false
                                                          Has administrator privileges:false
                                                          Programmed in:.Net C# or VB.NET
                                                          Reputation:low
                                                          Has exited:true

                                                          Target ID:10
                                                          Start time:05:27:39
                                                          Start date:05/12/2023
                                                          Path:C:\Users\user\AppData\Roaming\server.exe
                                                          Wow64 process (32bit):true
                                                          Commandline:"C:\Users\user\AppData\Roaming\server.exe" ..
                                                          Imagebase:0x20000
                                                          File size:36'864 bytes
                                                          MD5 hash:149069598DB31DB305DBD822B156E249
                                                          Has elevated privileges:false
                                                          Has administrator privileges:false
                                                          Programmed in:.Net C# or VB.NET
                                                          Reputation:low
                                                          Has exited:true

                                                          Reset < >

                                                            Execution Graph

                                                            Execution Coverage:12.4%
                                                            Dynamic/Decrypted Code Coverage:100%
                                                            Signature Coverage:0%
                                                            Total number of Nodes:37
                                                            Total number of Limit Nodes:1
                                                            execution_graph 1720 148a361 1721 148a392 RegQueryValueExW 1720->1721 1723 148a41b 1721->1723 1724 148a462 1726 148a486 RegSetValueExW 1724->1726 1727 148a507 1726->1727 1736 148a8a4 1737 148a8c6 SetFileAttributesW 1736->1737 1739 148a90b 1737->1739 1740 148ac24 1742 148ac46 ShellExecuteExW 1740->1742 1743 148ac88 1742->1743 1700 148ac46 1702 148ac6c ShellExecuteExW 1700->1702 1703 148ac88 1702->1703 1704 148a8c6 1707 148a8ef SetFileAttributesW 1704->1707 1706 148a90b 1707->1706 1708 148a646 1709 148a67e CreateMutexW 1708->1709 1711 148a6c1 1709->1711 1728 148aa07 1730 148aa3e CopyFileW 1728->1730 1731 148aa8e 1730->1731 1688 148a2fe 1689 148a32a SetErrorMode 1688->1689 1690 148a353 1688->1690 1691 148a33f 1689->1691 1690->1689 1692 148aa3e 1693 148aa67 CopyFileW 1692->1693 1695 148aa8e 1693->1695 1716 148a2d2 1719 148a2d6 SetErrorMode 1716->1719 1718 148a33f 1719->1718 1732 148a612 1735 148a646 CreateMutexW 1732->1735 1734 148a6c1 1735->1734

                                                            Callgraph

                                                            • Executed
                                                            • Not Executed
                                                            • Opacity -> Relevance
                                                            • Disassembly available
                                                            callgraph 0 Function_05580F58 1 Function_016F026D 2 Function_016F066A 3 Function_0148A74E 4 Function_0148AACF 5 Function_0148A140 6 Function_0148A540 7 Function_05580E55 8 Function_0148A646 9 Function_0148A8C6 10 Function_0148AC46 11 Function_0148A7C7 12 Function_0148ACC7 13 Function_016F05E0 14 Function_016F067F 15 Function_01482458 16 Function_0148A45C 17 Function_0148A25E 18 Function_05580D40 19 Function_014820D0 20 Function_014825D1 21 Function_0148A2D2 22 Function_0148A952 23 Function_016F0074 24 Function_0148A56E 25 Function_016F0649 25->2 26 Function_0148A361 27 Function_0148AAE1 28 Function_0148A462 29 Function_01482264 30 Function_01482364 31 Function_016F05C0 32 Function_016F0740 33 Function_0148A078 34 Function_0148ACFA 35 Function_0148247C 36 Function_0148A2FE 37 Function_0148A97E 38 Function_014821F0 39 Function_05580761 40 Function_0148AB74 41 Function_014823F4 42 Function_016F05D0 43 Function_05580D98 44 Function_0558069A 45 Function_0148A20C 46 Function_05580310 46->1 46->13 46->31 69 Function_05580938 46->69 73 Function_016F0606 46->73 47 Function_0148A005 48 Function_0148A186 49 Function_0148AB06 50 Function_0148A486 51 Function_01482006 52 Function_0148AA07 53 Function_01482098 54 Function_01482699 55 Function_0558088A 55->1 55->13 55->31 55->73 56 Function_05580C8D 57 Function_0148A81E 58 Function_0148AB9E 59 Function_05580080 60 Function_0148A710 61 Function_05580301 61->1 61->13 61->31 61->69 61->73 62 Function_0148AC11 63 Function_0148A392 64 Function_0148A612 65 Function_05580B03 66 Function_01482194 67 Function_05580F05 68 Function_05580006 68->1 68->13 68->31 68->46 68->61 71 Function_055803BD 68->71 68->73 69->1 69->13 69->31 69->73 70 Function_016F000C 71->1 71->13 71->31 71->69 71->73 72 Function_0148A02E 74 Function_0148A8A4 75 Function_0148AC24 76 Function_016F0001 77 Function_05580BA8 78 Function_0148A23C 79 Function_014823BC 80 Function_0148213C 81 Function_0148A0BE 82 Function_0148AA3E 83 Function_01482430 84 Function_05580C22 85 Function_016F0713

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 0 5580310-5580334 2 558033e-5580346 0->2 3 5580336-5580338 0->3 4 5580348-558034d 2->4 5 558034e-5580391 2->5 3->2 8 55803d8-5580418 5->8 9 5580393-55803ce 5->9 16 558041a 8->16 17 558041f 8->17 9->8 16->17 53 558041f call 5580938 17->53 54 558041f call 16f026d 17->54 55 558041f call 16f0606 17->55 56 558041f call 16f05e0 17->56 57 558041f call 16f05c0 17->57 18 5580425-5580434 19 558046b-5580523 18->19 20 5580436-5580460 18->20 39 5580570-5580587 19->39 40 5580525-5580569 19->40 20->19 41 558058d-55805bf 39->41 42 5580880 39->42 40->39 41->42 53->18 54->18 55->18 56->18 57->18
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1737776442.0000000005580000.00000040.00000800.00020000.00000000.sdmp, Offset: 05580000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_5580000_RWqHoCWEPI.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID: [-k^$-[-k^$2l$2l$2l$=[-k^
                                                            • API String ID: 0-2310754967
                                                            • Opcode ID: 55c0fb376047e554433328b22eb338221f1511cd6dc1807206c0dc366c2884aa
                                                            • Instruction ID: fe640ed4f259459d546e30494764ca2719af5e0a5050a403f4c0bf78f287628b
                                                            • Opcode Fuzzy Hash: 55c0fb376047e554433328b22eb338221f1511cd6dc1807206c0dc366c2884aa
                                                            • Instruction Fuzzy Hash: 0251F3317002018FCB28EB39981567E36E7BB99304B04566ED506DB3E4DF39CC0AD7A2
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 58 55803bd-5580418 66 558041a 58->66 67 558041f 58->67 66->67 103 558041f call 5580938 67->103 104 558041f call 16f026d 67->104 105 558041f call 16f0606 67->105 106 558041f call 16f05e0 67->106 107 558041f call 16f05c0 67->107 68 5580425-5580434 69 558046b-5580523 68->69 70 5580436-5580460 68->70 89 5580570-5580587 69->89 90 5580525-5580569 69->90 70->69 91 558058d-55805bf 89->91 92 5580880 89->92 90->89 91->92 103->68 104->68 105->68 106->68 107->68
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1737776442.0000000005580000.00000040.00000800.00020000.00000000.sdmp, Offset: 05580000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_5580000_RWqHoCWEPI.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID: [-k^$-[-k^$2l$2l$2l$=[-k^
                                                            • API String ID: 0-2310754967
                                                            • Opcode ID: 25353745774c8ec44fe147879c864fb94b59cd80fbd0179fa139cd413a3e4fe1
                                                            • Instruction ID: 0b9f2ecc540142f56f54878b40d98ba76a375f45c4a98876d1e653380ffee8a3
                                                            • Opcode Fuzzy Hash: 25353745774c8ec44fe147879c864fb94b59cd80fbd0179fa139cd413a3e4fe1
                                                            • Instruction Fuzzy Hash: A241D4317001118BCB18BB7588196BE32D7AFE9208B04566DD506DB7E4DF78CD0A97A3
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 108 5580938-5580993 110 5580999-5580a22 108->110 111 5580a2e-5580a30 108->111 261 5580a24 call 16f026d 110->261 262 5580a24 call 16f0606 110->262 263 5580a24 call 16f05e0 110->263 264 5580a24 call 16f05c0 110->264 112 5580a37-5580a3c 111->112 114 5580b1e-5580bc2 112->114 115 5580a42-5580a7a 112->115 152 5580bc8-5580c8b 114->152 153 5580c9e-5580ca7 114->153 131 5580a7c-5580a9a 115->131 132 5580aa1-5580afc 115->132 131->132 169 5580b01 132->169 151 5580a2a-5580a2c 151->111 156 5580a32 151->156 152->153 154 5580cad-5580d3e 153->154 155 5580d51-5580d5a 153->155 154->155 158 5580d7a-5580d83 155->158 159 5580d5c-5580d73 155->159 156->112 161 5580da9-5580db2 158->161 162 5580d85-5580d96 158->162 159->158 166 5580db8-5580e06 161->166 167 5580f33-5580f3a 161->167 162->161 187 5580f1c-5580f2d 166->187 169->114 187->167 190 5580e0b-5580e14 187->190 192 5580e1a-5580f1a 190->192 193 5580f40-5580fd1 190->193 192->187 242 5580f3b 192->242 224 55810ca 193->224 225 5580fd7-5580fe8 193->225 226 55810cc-55810d3 224->226 231 5580fea-558100b 225->231 239 558100d 231->239 240 5581012-5581048 231->240 239->240 248 558104a 240->248 249 558104f-5581077 240->249 242->193 248->249 253 5581079-558107b 249->253 254 558107d-55810a1 249->254 253->226 257 55810aa-55810b4 254->257 258 55810a3-55810a8 254->258 259 55810ba-55810c4 257->259 260 55810b6-55810b8 257->260 258->226 259->224 259->231 260->226 261->151 262->151 263->151 264->151
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1737776442.0000000005580000.00000040.00000800.00020000.00000000.sdmp, Offset: 05580000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_5580000_RWqHoCWEPI.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID: :@k$\Ol
                                                            • API String ID: 0-2913639173
                                                            • Opcode ID: 8d4b1315d5ddc822970a70db93a777dfbe522be15685ff4cdaaf0a47732f4cf6
                                                            • Instruction ID: 3448a18e5a0c2a748c2d23436ff1640cc3c73f4ce24ab86abe81de9ec1848bd3
                                                            • Opcode Fuzzy Hash: 8d4b1315d5ddc822970a70db93a777dfbe522be15685ff4cdaaf0a47732f4cf6
                                                            • Instruction Fuzzy Hash: 22025831700210CFCB28EB78D855ABE77E6EB88308F248569D446DB7A5DF399C46CB91
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 265 148a612-148a695 269 148a69a-148a6a3 265->269 270 148a697 265->270 271 148a6a8-148a6b1 269->271 272 148a6a5 269->272 270->269 273 148a702-148a707 271->273 274 148a6b3-148a6d7 CreateMutexW 271->274 272->271 273->274 277 148a709-148a70e 274->277 278 148a6d9-148a6ff 274->278 277->278
                                                            APIs
                                                            • CreateMutexW.KERNELBASE(?,?), ref: 0148A6B9
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1737400091.000000000148A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0148A000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_148a000_RWqHoCWEPI.jbxd
                                                            Similarity
                                                            • API ID: CreateMutex
                                                            • String ID:
                                                            • API String ID: 1964310414-0
                                                            • Opcode ID: dd43879836135a48fa82331ed87daf804c95d477ff21713b24f6b541a59ed08c
                                                            • Instruction ID: 43c31398fd4316c6b01e1dfea7d650b0659e7fd72d3d23319f69127fae75afe0
                                                            • Opcode Fuzzy Hash: dd43879836135a48fa82331ed87daf804c95d477ff21713b24f6b541a59ed08c
                                                            • Instruction Fuzzy Hash: C531A1715093806FE712DB65DC85B96BFF8EF06314F08849BE988CB292D375E909C762
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 281 148a361-148a3cf 284 148a3d1 281->284 285 148a3d4-148a3dd 281->285 284->285 286 148a3df 285->286 287 148a3e2-148a3e8 285->287 286->287 288 148a3ea 287->288 289 148a3ed-148a404 287->289 288->289 291 148a43b-148a440 289->291 292 148a406-148a419 RegQueryValueExW 289->292 291->292 293 148a41b-148a438 292->293 294 148a442-148a447 292->294 294->293
                                                            APIs
                                                            • RegQueryValueExW.KERNELBASE(?,00000E24,036F9875,00000000,00000000,00000000,00000000), ref: 0148A40C
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1737400091.000000000148A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0148A000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_148a000_RWqHoCWEPI.jbxd
                                                            Similarity
                                                            • API ID: QueryValue
                                                            • String ID:
                                                            • API String ID: 3660427363-0
                                                            • Opcode ID: 7fa99b7a558b7b8ac0aad0dc9faa7d8dfcf4239b201943062a9e2cee6ceb2a9d
                                                            • Instruction ID: b4c9e0472b3b519b09c7ddae0af4d232be58bdfcedef80d458a4cfb34300a75f
                                                            • Opcode Fuzzy Hash: 7fa99b7a558b7b8ac0aad0dc9faa7d8dfcf4239b201943062a9e2cee6ceb2a9d
                                                            • Instruction Fuzzy Hash: CE318075505740AFE722CF15CC84F97BBF8EF06610F08849BE945CB6A2D364E949CB61
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 298 148a462-148a4c3 301 148a4c8-148a4d4 298->301 302 148a4c5 298->302 303 148a4d9-148a4f0 301->303 304 148a4d6 301->304 302->301 306 148a4f2-148a505 RegSetValueExW 303->306 307 148a527-148a52c 303->307 304->303 308 148a52e-148a533 306->308 309 148a507-148a524 306->309 307->306 308->309
                                                            APIs
                                                            • RegSetValueExW.KERNELBASE(?,00000E24,036F9875,00000000,00000000,00000000,00000000), ref: 0148A4F8
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1737400091.000000000148A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0148A000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_148a000_RWqHoCWEPI.jbxd
                                                            Similarity
                                                            • API ID: Value
                                                            • String ID:
                                                            • API String ID: 3702945584-0
                                                            • Opcode ID: 956e3fa3879bd8d2ebac517dad5adeae7fe5a5d64e0f5fcdb27afc540f071ba8
                                                            • Instruction ID: 559c726e37bdd4b0fe71a4d680517e14d0659da7a68ea21328f34580af3a53ad
                                                            • Opcode Fuzzy Hash: 956e3fa3879bd8d2ebac517dad5adeae7fe5a5d64e0f5fcdb27afc540f071ba8
                                                            • Instruction Fuzzy Hash: 1E21B2725043806FD7228F15CC44FA7BFB8EF46610F08849BE989CB662D364E548C771
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 313 148a646-148a695 316 148a69a-148a6a3 313->316 317 148a697 313->317 318 148a6a8-148a6b1 316->318 319 148a6a5 316->319 317->316 320 148a702-148a707 318->320 321 148a6b3-148a6bb CreateMutexW 318->321 319->318 320->321 322 148a6c1-148a6d7 321->322 324 148a709-148a70e 322->324 325 148a6d9-148a6ff 322->325 324->325
                                                            APIs
                                                            • CreateMutexW.KERNELBASE(?,?), ref: 0148A6B9
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1737400091.000000000148A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0148A000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_148a000_RWqHoCWEPI.jbxd
                                                            Similarity
                                                            • API ID: CreateMutex
                                                            • String ID:
                                                            • API String ID: 1964310414-0
                                                            • Opcode ID: ca4807aaf7aaaf1d3f2bdaa69c09d32a61726bde6bfdd87bbafd9cd650f6d0df
                                                            • Instruction ID: e1460a323989baebf6a60762da5791b49f89eef3326ffc5cbdf6fcae2209c9ad
                                                            • Opcode Fuzzy Hash: ca4807aaf7aaaf1d3f2bdaa69c09d32a61726bde6bfdd87bbafd9cd650f6d0df
                                                            • Instruction Fuzzy Hash: F121C5716002009FE710DF69DD45BAAFBE8EF04314F14846AED49CB751D3B1E509CA72
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 328 148aa07-148aa65 330 148aa6a-148aa70 328->330 331 148aa67 328->331 332 148aa72 330->332 333 148aa75-148aa7e 330->333 331->330 332->333 334 148aa80-148aaa0 CopyFileW 333->334 335 148aac1-148aac6 333->335 338 148aac8-148aacd 334->338 339 148aaa2-148aabe 334->339 335->334 338->339
                                                            APIs
                                                            • CopyFileW.KERNELBASE(?,?,?), ref: 0148AA86
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1737400091.000000000148A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0148A000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_148a000_RWqHoCWEPI.jbxd
                                                            Similarity
                                                            • API ID: CopyFile
                                                            • String ID:
                                                            • API String ID: 1304948518-0
                                                            • Opcode ID: ff82d1ee42187e333369519e718908986502ac452032dc1a28ff5f45aa06be71
                                                            • Instruction ID: f7a1b726827af9154cbef48251a1d3810e657ff3908c1db3a355b6edd69ce588
                                                            • Opcode Fuzzy Hash: ff82d1ee42187e333369519e718908986502ac452032dc1a28ff5f45aa06be71
                                                            • Instruction Fuzzy Hash: 3721A1B16053809FE711CB25DC45B57BFF8EF46210F0984ABE984CB663D274D908CB61
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 341 148a392-148a3cf 343 148a3d1 341->343 344 148a3d4-148a3dd 341->344 343->344 345 148a3df 344->345 346 148a3e2-148a3e8 344->346 345->346 347 148a3ea 346->347 348 148a3ed-148a404 346->348 347->348 350 148a43b-148a440 348->350 351 148a406-148a419 RegQueryValueExW 348->351 350->351 352 148a41b-148a438 351->352 353 148a442-148a447 351->353 353->352
                                                            APIs
                                                            • RegQueryValueExW.KERNELBASE(?,00000E24,036F9875,00000000,00000000,00000000,00000000), ref: 0148A40C
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1737400091.000000000148A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0148A000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_148a000_RWqHoCWEPI.jbxd
                                                            Similarity
                                                            • API ID: QueryValue
                                                            • String ID:
                                                            • API String ID: 3660427363-0
                                                            • Opcode ID: 91b28241c5ac3089201a7684301a7414451765a7b3ff7451c35cc6c6509b77b2
                                                            • Instruction ID: c6d58d0f7a22ea41f33aacc1e1c9ceb797192113e1758decbb59618b625048f9
                                                            • Opcode Fuzzy Hash: 91b28241c5ac3089201a7684301a7414451765a7b3ff7451c35cc6c6509b77b2
                                                            • Instruction Fuzzy Hash: CA218175600604AFEB21DE19CC84FA7B7ECEF04610F18846BE945CB761D3B0E949CA72
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 357 148a486-148a4c3 359 148a4c8-148a4d4 357->359 360 148a4c5 357->360 361 148a4d9-148a4f0 359->361 362 148a4d6 359->362 360->359 364 148a4f2-148a505 RegSetValueExW 361->364 365 148a527-148a52c 361->365 362->361 366 148a52e-148a533 364->366 367 148a507-148a524 364->367 365->364 366->367
                                                            APIs
                                                            • RegSetValueExW.KERNELBASE(?,00000E24,036F9875,00000000,00000000,00000000,00000000), ref: 0148A4F8
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1737400091.000000000148A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0148A000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_148a000_RWqHoCWEPI.jbxd
                                                            Similarity
                                                            • API ID: Value
                                                            • String ID:
                                                            • API String ID: 3702945584-0
                                                            • Opcode ID: 14092b7db798a964f545c7d85af603e8826d81e8b024fa38dded3179e88d55aa
                                                            • Instruction ID: 657189601d67e62db7f6d0bc56c0585394d3eacc1732c2fa7dd6e82236a174f2
                                                            • Opcode Fuzzy Hash: 14092b7db798a964f545c7d85af603e8826d81e8b024fa38dded3179e88d55aa
                                                            • Instruction Fuzzy Hash: 7711B471600600AFEB219E19DC45FABBBECEF04614F14845BED49CB751D3B0E5488A72
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 371 148a2d2-148a2d4 372 148a2de-148a328 371->372 373 148a2d6-148a2dd 371->373 375 148a32a-148a33d SetErrorMode 372->375 376 148a353-148a358 372->376 373->372 377 148a35a-148a35f 375->377 378 148a33f-148a352 375->378 376->375 377->378
                                                            APIs
                                                            • SetErrorMode.KERNELBASE(?), ref: 0148A330
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1737400091.000000000148A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0148A000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_148a000_RWqHoCWEPI.jbxd
                                                            Similarity
                                                            • API ID: ErrorMode
                                                            • String ID:
                                                            • API String ID: 2340568224-0
                                                            • Opcode ID: 0c0ec44fc9c0a460d40f4b6e79f37f924e16f6970b22a410b802468d53f0e478
                                                            • Instruction ID: 822ca39c14871bcf6f7e68c507369712b5f725605ec51b0f66ac364d45299286
                                                            • Opcode Fuzzy Hash: 0c0ec44fc9c0a460d40f4b6e79f37f924e16f6970b22a410b802468d53f0e478
                                                            • Instruction Fuzzy Hash: 50214F7150E3C09FD7138B25DC55A56BFB49F47620F0D80DBDD858F2A3D2A5A808DB62
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 381 148ac24-148ac6a 383 148ac6c 381->383 384 148ac6f-148ac78 381->384 383->384 385 148acb9-148acbe 384->385 386 148ac7a-148ac9a ShellExecuteExW 384->386 385->386 389 148ac9c-148acb8 386->389 390 148acc0-148acc5 386->390 390->389
                                                            APIs
                                                            • ShellExecuteExW.SHELL32(?), ref: 0148AC80
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1737400091.000000000148A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0148A000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_148a000_RWqHoCWEPI.jbxd
                                                            Similarity
                                                            • API ID: ExecuteShell
                                                            • String ID:
                                                            • API String ID: 587946157-0
                                                            • Opcode ID: 0dd368b8b99baf3a9f3b1817ede1a2f72cb32356c0cde48d7b704d5dfd052a6b
                                                            • Instruction ID: 400f8bf1299aa5667feb4aceba0d72362e1f805215d30512ea36c4b01d04f510
                                                            • Opcode Fuzzy Hash: 0dd368b8b99baf3a9f3b1817ede1a2f72cb32356c0cde48d7b704d5dfd052a6b
                                                            • Instruction Fuzzy Hash: 6B115E716093809FD712CB25DC95B56BFA89F46220F0884ABED45CB662D275E908CB62
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 392 148a8a4-148a8ed 394 148a8ef 392->394 395 148a8f2-148a8fb 392->395 394->395 396 148a93c-148a941 395->396 397 148a8fd-148a91d SetFileAttributesW 395->397 396->397 400 148a91f-148a93b 397->400 401 148a943-148a948 397->401 401->400
                                                            APIs
                                                            • SetFileAttributesW.KERNELBASE(?,?), ref: 0148A903
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1737400091.000000000148A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0148A000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_148a000_RWqHoCWEPI.jbxd
                                                            Similarity
                                                            • API ID: AttributesFile
                                                            • String ID:
                                                            • API String ID: 3188754299-0
                                                            • Opcode ID: ab03ecfb706021ae46b3d4aa5e624bf6c8ad73ef1251713e79831abf0e3a4928
                                                            • Instruction ID: 9f9e7fe96a0cf122e1f7afa481324dfb0c12b60b3711c53ac35660bcd51d8081
                                                            • Opcode Fuzzy Hash: ab03ecfb706021ae46b3d4aa5e624bf6c8ad73ef1251713e79831abf0e3a4928
                                                            • Instruction Fuzzy Hash: 161193716093809FD711CF25DC85B57BFE8EF46220F0984ABED45CB262D274E844CB62
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 403 148aa3e-148aa65 404 148aa6a-148aa70 403->404 405 148aa67 403->405 406 148aa72 404->406 407 148aa75-148aa7e 404->407 405->404 406->407 408 148aa80-148aa88 CopyFileW 407->408 409 148aac1-148aac6 407->409 410 148aa8e-148aaa0 408->410 409->408 412 148aac8-148aacd 410->412 413 148aaa2-148aabe 410->413 412->413
                                                            APIs
                                                            • CopyFileW.KERNELBASE(?,?,?), ref: 0148AA86
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1737400091.000000000148A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0148A000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_148a000_RWqHoCWEPI.jbxd
                                                            Similarity
                                                            • API ID: CopyFile
                                                            • String ID:
                                                            • API String ID: 1304948518-0
                                                            • Opcode ID: 8c2353068b6aad0c2cc2f14ae363ba9be8c6d8052780d43c521c64bf9acae5ef
                                                            • Instruction ID: a618abaa530d6c18c0de34a3d50825330e2daadd010e4081cf7ab8408c16d606
                                                            • Opcode Fuzzy Hash: 8c2353068b6aad0c2cc2f14ae363ba9be8c6d8052780d43c521c64bf9acae5ef
                                                            • Instruction Fuzzy Hash: B711A1717002009FEB50DF29D985B6BFBE8EF15620F18846BDD49CBB52D3B5E904CA62
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 415 148a8c6-148a8ed 416 148a8ef 415->416 417 148a8f2-148a8fb 415->417 416->417 418 148a93c-148a941 417->418 419 148a8fd-148a905 SetFileAttributesW 417->419 418->419 420 148a90b-148a91d 419->420 422 148a91f-148a93b 420->422 423 148a943-148a948 420->423 423->422
                                                            APIs
                                                            • SetFileAttributesW.KERNELBASE(?,?), ref: 0148A903
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1737400091.000000000148A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0148A000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_148a000_RWqHoCWEPI.jbxd
                                                            Similarity
                                                            • API ID: AttributesFile
                                                            • String ID:
                                                            • API String ID: 3188754299-0
                                                            • Opcode ID: ee94b7ee5c85cf030773c3e7aa3d40444c3b3a3f26a5f6e0e7b78ec2e50b73a7
                                                            • Instruction ID: f0b53d7858615636bdb272e4e6573421cbe9e26b51a8c9e5686ba3fcab43c77c
                                                            • Opcode Fuzzy Hash: ee94b7ee5c85cf030773c3e7aa3d40444c3b3a3f26a5f6e0e7b78ec2e50b73a7
                                                            • Instruction Fuzzy Hash: 340192756042009FEB10DF29D88576AFBE8EF05620F1884ABDD49CB752E2B5D544CE62
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            APIs
                                                            • ShellExecuteExW.SHELL32(?), ref: 0148AC80
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1737400091.000000000148A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0148A000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_148a000_RWqHoCWEPI.jbxd
                                                            Similarity
                                                            • API ID: ExecuteShell
                                                            • String ID:
                                                            • API String ID: 587946157-0
                                                            • Opcode ID: 6031834ca095b84e1e5c9a65ab1da90b501e1329287afe300de15055ab0238c6
                                                            • Instruction ID: d3a31d5adeaa9c5eef6acae95a438650e27b76ecc54a036e967333dd9c0f4423
                                                            • Opcode Fuzzy Hash: 6031834ca095b84e1e5c9a65ab1da90b501e1329287afe300de15055ab0238c6
                                                            • Instruction Fuzzy Hash: A2019271A042009FDB50DF19D88576AFBE8DF05620F18C4ABDD49CB752D3B5E508CB62
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            APIs
                                                            • SetErrorMode.KERNELBASE(?), ref: 0148A330
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1737400091.000000000148A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0148A000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_148a000_RWqHoCWEPI.jbxd
                                                            Similarity
                                                            • API ID: ErrorMode
                                                            • String ID:
                                                            • API String ID: 2340568224-0
                                                            • Opcode ID: 5c055a6d37b3cbf7b22bd797cec5ff2bdf3ee9bddc79b0868b6d6b731200b55f
                                                            • Instruction ID: eada3da0ced344f91d34826e189e4972311a7e963f4e69e7a594122a37736b15
                                                            • Opcode Fuzzy Hash: 5c055a6d37b3cbf7b22bd797cec5ff2bdf3ee9bddc79b0868b6d6b731200b55f
                                                            • Instruction Fuzzy Hash: 90F08C35A04240DFDB109F09D88976AFBE4EF05724F18C09BDD494B762D2F5E408CAA2
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1737520707.00000000016F0000.00000040.00000020.00020000.00000000.sdmp, Offset: 016F0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_16f0000_RWqHoCWEPI.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: e946a434fd53971ada28374b7c943023a1e318173cbceabd5fc31c2f753cc002
                                                            • Instruction ID: f86e67e8f0e6945182e7736a11b9313c2a87be9d7318767a32fbae9120cf7827
                                                            • Opcode Fuzzy Hash: e946a434fd53971ada28374b7c943023a1e318173cbceabd5fc31c2f753cc002
                                                            • Instruction Fuzzy Hash: D231BE6554E7C14FD3139B349C65191BFB19E43120B1E81EBD888CF6A3E22EA80AC763
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1737776442.0000000005580000.00000040.00000800.00020000.00000000.sdmp, Offset: 05580000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_5580000_RWqHoCWEPI.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: beb5d6c784ef4bf14ac9757c1bbe269389b0270381dcc161c2a27040ac40c321
                                                            • Instruction ID: ceebd7a7834ded941f164762ef29b56a60bfa464c2f1465454a2e8e3b48a0805
                                                            • Opcode Fuzzy Hash: beb5d6c784ef4bf14ac9757c1bbe269389b0270381dcc161c2a27040ac40c321
                                                            • Instruction Fuzzy Hash: E0519B31211146CFC724EF34E9459AA77B6FBAD308B00A66DD0844B76DDF389C19CB92
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1737776442.0000000005580000.00000040.00000800.00020000.00000000.sdmp, Offset: 05580000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_5580000_RWqHoCWEPI.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: f5686d38f9bed2b3acb7494e57c7e1d924fa1c50804bd755feb135a8fdb98262
                                                            • Instruction ID: aa577cd6583c938e731e4013de4e1861c378688147cce42ca93ab8113bc002a6
                                                            • Opcode Fuzzy Hash: f5686d38f9bed2b3acb7494e57c7e1d924fa1c50804bd755feb135a8fdb98262
                                                            • Instruction Fuzzy Hash: C701886648E7C18FC74397A49C656903FB1AE0312176F45D7C084CF1A3E55D988ED722
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1737520707.00000000016F0000.00000040.00000020.00020000.00000000.sdmp, Offset: 016F0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_16f0000_RWqHoCWEPI.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 984eefab5a8dd64073efd81c875bcb03e6227407b0430cde7b0d34a894e02d1b
                                                            • Instruction ID: ac7b0539a2873e308bfd82be3b25f50217c8659d7b906dc981fa4fcc66109480
                                                            • Opcode Fuzzy Hash: 984eefab5a8dd64073efd81c875bcb03e6227407b0430cde7b0d34a894e02d1b
                                                            • Instruction Fuzzy Hash: 8E01D6765497806FD7118B15AC51862FFB8EB86620709C4DFEC498B712D225B908CB72
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1737776442.0000000005580000.00000040.00000800.00020000.00000000.sdmp, Offset: 05580000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_5580000_RWqHoCWEPI.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: a738bcc7d960f7ab5f603d5ffb1fbed1b7563a4c13145b3c3d3b15b20da9d9c5
                                                            • Instruction ID: c651f687494f706bf3d93f8598b0ad05e426f7c751cc8f802a341799e8983ce0
                                                            • Opcode Fuzzy Hash: a738bcc7d960f7ab5f603d5ffb1fbed1b7563a4c13145b3c3d3b15b20da9d9c5
                                                            • Instruction Fuzzy Hash: 98019EB1601206CBCB00BF34D81856EB7E2EBB4308F049A1DE9868B3A4DF75C819CB43
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1737520707.00000000016F0000.00000040.00000020.00020000.00000000.sdmp, Offset: 016F0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_16f0000_RWqHoCWEPI.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 51c1a5402e9f652e18818fbb4ccd8405627932adcc40c503d27385f9ab593b4b
                                                            • Instruction ID: 08a023de54ad2bbb469ed8cd494ef2174fd21f6f509410c6d452780c87696e2c
                                                            • Opcode Fuzzy Hash: 51c1a5402e9f652e18818fbb4ccd8405627932adcc40c503d27385f9ab593b4b
                                                            • Instruction Fuzzy Hash: 23E0D836B855408BDF51CA19BC424B57750D785230B2884BEDD1D87702E617A50ACA87
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1737520707.00000000016F0000.00000040.00000020.00020000.00000000.sdmp, Offset: 016F0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_16f0000_RWqHoCWEPI.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: efbbef9ced6b24f033d019415f685581404ef5137097c867fd6ad62f3d523dfe
                                                            • Instruction ID: a9297a0bcca63d22bfd827e5dc372be184c1183dd681794514405c2febbfed86
                                                            • Opcode Fuzzy Hash: efbbef9ced6b24f033d019415f685581404ef5137097c867fd6ad62f3d523dfe
                                                            • Instruction Fuzzy Hash: 0BE092B66006009FD750CF0AEC45452F7D8EB84630708C47FDC0D8B701E276F508CAA6
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1737386103.0000000001482000.00000040.00000800.00020000.00000000.sdmp, Offset: 01482000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_1482000_RWqHoCWEPI.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 9931fcbacfb1afafd5f19a7ed88f57becd36b9c1f5e0328b1409ce4c6c5eccdd
                                                            • Instruction ID: d1d6bc5536575962738a937caa01a376519db45ccce5ffd563bbd9d4941bc96e
                                                            • Opcode Fuzzy Hash: 9931fcbacfb1afafd5f19a7ed88f57becd36b9c1f5e0328b1409ce4c6c5eccdd
                                                            • Instruction Fuzzy Hash: 5AD05E792056D14FE316AA1CC1A4F9A3BE8AB61B14F4A44FAA8008B773C7A8D581D610
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1737386103.0000000001482000.00000040.00000800.00020000.00000000.sdmp, Offset: 01482000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_1482000_RWqHoCWEPI.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: d98e04acd375a3322aaf124159fdc9bd338a24bbc14ed720ee29ae8a860fcd37
                                                            • Instruction ID: 45e4edc0549833fe942dcf26ab7a5619e426d8c490608c991057dc5574d5d478
                                                            • Opcode Fuzzy Hash: d98e04acd375a3322aaf124159fdc9bd338a24bbc14ed720ee29ae8a860fcd37
                                                            • Instruction Fuzzy Hash: 0CD05E342002814BD716EA1CC6E4F5E3BD8AB50B14F1A44E9BC108B772C7B4D9C1CA00
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            Execution Graph

                                                            Execution Coverage:17.5%
                                                            Dynamic/Decrypted Code Coverage:100%
                                                            Signature Coverage:7.9%
                                                            Total number of Nodes:178
                                                            Total number of Limit Nodes:8
                                                            execution_graph 7166 50701c2 7167 5070200 DuplicateHandle 7166->7167 7168 5070238 7166->7168 7169 507020e 7167->7169 7168->7167 7021 b0afb6 7023 b0afeb GetFileType 7021->7023 7024 b0b018 7023->7024 7029 507190a 7031 507193f GetProcessTimes 7029->7031 7032 5071971 7031->7032 7033 b0a0be 7034 b0a10e EnumWindows 7033->7034 7035 b0a116 7034->7035 7170 b0a2fe 7171 b0a353 7170->7171 7172 b0a32a SetErrorMode 7170->7172 7171->7172 7173 b0a33f 7172->7173 7036 5071496 7037 50714ce MapViewOfFile 7036->7037 7039 507151d 7037->7039 7174 5070056 7175 5070082 K32EnumProcesses 7174->7175 7177 507009e 7175->7177 7178 5071bd6 7179 5071c0b WSAConnect 7178->7179 7181 5071c2a 7179->7181 7040 4da17c8 7041 4da1412 7040->7041 7046 4da189f 7041->7046 7055 4da1811 7041->7055 7064 4da1881 7041->7064 7073 4da18b2 7041->7073 7047 4da18a6 7046->7047 7082 4da0310 7047->7082 7050 4da0310 2 API calls 7051 4da19d6 7050->7051 7052 4da19fc 7051->7052 7086 4da263f 7051->7086 7090 4da26a0 7051->7090 7056 4da184b 7055->7056 7057 4da0310 2 API calls 7056->7057 7058 4da196d 7057->7058 7059 4da0310 2 API calls 7058->7059 7060 4da19d6 7059->7060 7061 4da19fc 7060->7061 7062 4da263f 2 API calls 7060->7062 7063 4da26a0 2 API calls 7060->7063 7062->7061 7063->7061 7065 4da1888 7064->7065 7066 4da0310 2 API calls 7065->7066 7067 4da196d 7066->7067 7068 4da0310 2 API calls 7067->7068 7069 4da19d6 7068->7069 7070 4da19fc 7069->7070 7071 4da263f 2 API calls 7069->7071 7072 4da26a0 2 API calls 7069->7072 7071->7070 7072->7070 7074 4da18b9 7073->7074 7075 4da0310 2 API calls 7074->7075 7076 4da196d 7075->7076 7077 4da0310 2 API calls 7076->7077 7078 4da19d6 7077->7078 7079 4da19fc 7078->7079 7080 4da263f 2 API calls 7078->7080 7081 4da26a0 2 API calls 7078->7081 7080->7079 7081->7079 7083 4da0322 7082->7083 7084 4da0348 7083->7084 7094 4da1db7 7083->7094 7084->7050 7087 4da2648 7086->7087 7088 4da2674 7087->7088 7107 4da2cb8 7087->7107 7088->7052 7091 4da26cb 7090->7091 7092 4da2713 7091->7092 7093 4da2cb8 2 API calls 7091->7093 7092->7052 7093->7092 7095 4da1dbd 7094->7095 7097 4da2291 7095->7097 7099 b0bc94 7095->7099 7103 b0bcb6 7095->7103 7097->7084 7100 b0bcb6 NtSetInformationProcess 7099->7100 7102 b0bd00 7100->7102 7102->7097 7104 b0bd16 7103->7104 7105 b0bceb NtSetInformationProcess 7103->7105 7104->7105 7106 b0bd00 7105->7106 7106->7097 7108 4da2ced 7107->7108 7112 5071c62 7108->7112 7116 5071cd2 7108->7116 7109 4da2d28 7109->7088 7113 5071cd2 GetVolumeInformationA 7112->7113 7115 5071d2a 7113->7115 7115->7109 7117 5071d22 GetVolumeInformationA 7116->7117 7118 5071d2a 7117->7118 7118->7109 7182 5070c52 7184 5070c87 ReadFile 7182->7184 7185 5070cb9 7184->7185 7186 5072c52 7187 5072c8a RegCreateKeyExW 7186->7187 7189 5072cfc 7187->7189 7190 5072fd2 7193 5073007 GetProcessWorkingSetSize 7190->7193 7192 5073033 7193->7192 7194 b0b966 7196 b0b995 AdjustTokenPrivileges 7194->7196 7197 b0b9b7 7196->7197 7198 5071f5e 7201 5071f99 LoadLibraryA 7198->7201 7200 5071fd6 7201->7200 7122 507011a 7123 507014f NtQuerySystemInformation 7122->7123 7124 507017a 7122->7124 7125 5070164 7123->7125 7124->7123 7126 b0aaae 7127 b0ab10 7126->7127 7128 b0aada OleInitialize 7126->7128 7127->7128 7129 b0aae8 7128->7129 7202 50712e6 7203 507131e ConvertStringSecurityDescriptorToSecurityDescriptorW 7202->7203 7205 507135f 7203->7205 7130 b0a392 7132 b0a3c7 RegQueryValueExW 7130->7132 7133 b0a41b 7132->7133 7206 b0ab52 7207 b0ab8a RegOpenKeyExW 7206->7207 7209 b0abe0 7207->7209 7134 5072e22 7135 5072e57 ioctlsocket 7134->7135 7137 5072e83 7135->7137 7210 b0add6 7211 b0adff CopyFileW 7210->7211 7213 b0ae26 7211->7213 7214 4da03bd 7215 4da03c4 7214->7215 7216 4da05bf 7215->7216 7217 4da1db7 2 API calls 7215->7217 7217->7216 7218 b0bbda 7220 b0bc0f GetExitCodeProcess 7218->7220 7221 b0bc38 7220->7221 7222 b0ac5a 7224 b0ac83 SetFileAttributesW 7222->7224 7225 b0ac9f 7224->7225 7138 b0ae9e 7140 b0aed6 CreateFileW 7138->7140 7141 b0af25 7140->7141 7142 50730b6 7145 50730eb SetProcessWorkingSetSize 7142->7145 7144 5073117 7145->7144 7226 50719f6 7227 5071a31 getaddrinfo 7226->7227 7229 5071aa3 7227->7229 7146 b0a486 7147 b0a4bb RegSetValueExW 7146->7147 7149 b0a507 7147->7149 7150 b0a186 7151 b0a1f3 7150->7151 7152 b0a1bb send 7150->7152 7151->7152 7153 b0a1c9 7152->7153 7154 b0aa06 7155 b0aa35 WaitForInputIdle 7154->7155 7156 b0aa6b 7154->7156 7157 b0aa43 7155->7157 7156->7155 7230 b0a646 7232 b0a67e CreateMutexW 7230->7232 7233 b0a6c1 7232->7233 7234 5072efe 7235 5072f27 select 7234->7235 7237 5072f5c 7235->7237 7238 4da1120 KiUserExceptionDispatcher 7239 4da1154 7238->7239 7240 b0b74a 7242 b0b773 LookupPrivilegeValueW 7240->7242 7243 b0b79a 7242->7243 7158 507173a 7161 507176f shutdown 7158->7161 7160 5071798 7161->7160 7162 5070eba 7164 5070ef2 WSASocketW 7162->7164 7165 5070f2e 7164->7165 7248 b0a74e 7249 b0a7b9 7248->7249 7250 b0a77a FindCloseChangeNotification 7248->7250 7249->7250 7251 b0a788 7250->7251
                                                            APIs
                                                            • AdjustTokenPrivileges.KERNELBASE(?,?,?,?,?,?), ref: 00B0B9AF
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.4127292440.0000000000B0A000.00000040.00000800.00020000.00000000.sdmp, Offset: 00B0A000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_b0a000_server.jbxd
                                                            Similarity
                                                            • API ID: AdjustPrivilegesToken
                                                            • String ID:
                                                            • API String ID: 2874748243-0
                                                            • Opcode ID: 27852087887f79fa805db1efe8abddcb36e7fac98c15acdc4c907db90a32005f
                                                            • Instruction ID: 8b8ca23f367958272d7b07675abc52be6527fccfb9e3e86719b67c86c7ae71b7
                                                            • Opcode Fuzzy Hash: 27852087887f79fa805db1efe8abddcb36e7fac98c15acdc4c907db90a32005f
                                                            • Instruction Fuzzy Hash: 9321AE765097809FDB228F25DC44B52BFF4EF16310F0885DAEA858B5A3D371A908DB62
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            APIs
                                                            • NtQuerySystemInformation.NTDLL ref: 05070155
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.4133020343.0000000005070000.00000040.00000800.00020000.00000000.sdmp, Offset: 05070000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_5070000_server.jbxd
                                                            Similarity
                                                            • API ID: InformationQuerySystem
                                                            • String ID:
                                                            • API String ID: 3562636166-0
                                                            • Opcode ID: f554bc0567e581676ed4601a17ff3b50d9b017782924e5a7bac6045f89830a2b
                                                            • Instruction ID: d375b267ea7924d5e287b5234e0feac4dd1cc7f258b6bd3f3b8039f88ce137f1
                                                            • Opcode Fuzzy Hash: f554bc0567e581676ed4601a17ff3b50d9b017782924e5a7bac6045f89830a2b
                                                            • Instruction Fuzzy Hash: 8021AE718097C0AFDB238B20DC55A62FFB4EF17314F0980CBE9844B5A3D265A909DB62
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            APIs
                                                            • AdjustTokenPrivileges.KERNELBASE(?,?,?,?,?,?), ref: 00B0B9AF
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.4127292440.0000000000B0A000.00000040.00000800.00020000.00000000.sdmp, Offset: 00B0A000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_b0a000_server.jbxd
                                                            Similarity
                                                            • API ID: AdjustPrivilegesToken
                                                            • String ID:
                                                            • API String ID: 2874748243-0
                                                            • Opcode ID: 6f5fd22ca806715f6305af8434129ea03ffd6a115420bb6f30bd7f0d69a4bf68
                                                            • Instruction ID: 2d8f6c1c20587743ee1fca42975a10317521c2631341efe69d8e494ad3322ac4
                                                            • Opcode Fuzzy Hash: 6f5fd22ca806715f6305af8434129ea03ffd6a115420bb6f30bd7f0d69a4bf68
                                                            • Instruction Fuzzy Hash: 701170716006049FDB20CF55D885B66FFE4EF15320F08C4AAEE468B652D335E518DF62
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            APIs
                                                            • NtSetInformationProcess.NTDLL ref: 00B0BCF1
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.4127292440.0000000000B0A000.00000040.00000800.00020000.00000000.sdmp, Offset: 00B0A000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_b0a000_server.jbxd
                                                            Similarity
                                                            • API ID: InformationProcess
                                                            • String ID:
                                                            • API String ID: 1801817001-0
                                                            • Opcode ID: 4a0558173289f01c516b3161b5c3a720db1c61a7a85be9a3e0fb8f21ee64c4ed
                                                            • Instruction ID: 241ae0e2f8538e92362711a4fc31d6b0888538d7d0221a3f5e58d6ab077e973e
                                                            • Opcode Fuzzy Hash: 4a0558173289f01c516b3161b5c3a720db1c61a7a85be9a3e0fb8f21ee64c4ed
                                                            • Instruction Fuzzy Hash: 2111A071409780AFCB228F11DC45E62FFF4EF46320F08849AEE854B662D275A918DB62
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            APIs
                                                            • NtSetInformationProcess.NTDLL ref: 00B0BCF1
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.4127292440.0000000000B0A000.00000040.00000800.00020000.00000000.sdmp, Offset: 00B0A000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_b0a000_server.jbxd
                                                            Similarity
                                                            • API ID: InformationProcess
                                                            • String ID:
                                                            • API String ID: 1801817001-0
                                                            • Opcode ID: 4b1c544e2b6f24a9d2cf1cbcab387c2c7701a14ed5ec0bac05a85bae9a9abf47
                                                            • Instruction ID: 57f8abe28c9f528922a6b23f7d11f892a8d24a75ac3c94e62d832612b6812ded
                                                            • Opcode Fuzzy Hash: 4b1c544e2b6f24a9d2cf1cbcab387c2c7701a14ed5ec0bac05a85bae9a9abf47
                                                            • Instruction Fuzzy Hash: C1018F315006449FDB208F05D984B61FFE0FF15720F18C5AADE450B662D375E418DF62
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            APIs
                                                            • NtQuerySystemInformation.NTDLL ref: 05070155
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.4133020343.0000000005070000.00000040.00000800.00020000.00000000.sdmp, Offset: 05070000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_5070000_server.jbxd
                                                            Similarity
                                                            • API ID: InformationQuerySystem
                                                            • String ID:
                                                            • API String ID: 3562636166-0
                                                            • Opcode ID: 201fc687b4f58d95d9251356407d64d11c7b1a8edfab217878ddafdfdfe49a79
                                                            • Instruction ID: 27aee02995b3427168b2a8981f1d01044ec05469300b0c713ed38ebe38b1a92b
                                                            • Opcode Fuzzy Hash: 201fc687b4f58d95d9251356407d64d11c7b1a8edfab217878ddafdfdfe49a79
                                                            • Instruction Fuzzy Hash: 63018F319006449FDB60CF05E849B66FBE4FF15720F08C19ADE490A762C376E518CF66
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 876 4da1120-4da115b KiUserExceptionDispatcher 879 4da1163 876->879 880 4da1165-4da119e 879->880 884 4da11ed-4da11f0 880->884 885 4da11a0-4da11a2 880->885 886 4da126d-4da128a 884->886 887 4da11f2-4da1200 884->887 909 4da11a4 call 10a05df 885->909 910 4da11a4 call 4da22b0 885->910 911 4da11a4 call 10a0606 885->911 887->880 888 4da1206-4da120a 887->888 891 4da125e-4da1268 888->891 892 4da120c-4da121d 888->892 889 4da11aa-4da11b9 893 4da11ea 889->893 894 4da11bb-4da11c0 call 4da3109 889->894 891->879 892->886 899 4da121f-4da122f 892->899 893->884 895 4da11c6-4da11e2 894->895 895->893 901 4da1250-4da1256 899->901 902 4da1231-4da123c 899->902 901->891 902->886 904 4da123e-4da1248 902->904 904->901 909->889 910->889 911->889
                                                            APIs
                                                            • KiUserExceptionDispatcher.NTDLL ref: 04DA1147
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.4132645443.0000000004DA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04DA0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_4da0000_server.jbxd
                                                            Similarity
                                                            • API ID: DispatcherExceptionUser
                                                            • String ID:
                                                            • API String ID: 6842923-0
                                                            • Opcode ID: a8a05f386ae686ef0d20c5b3972230c9c0cf02bd1ee3121eb39ccd4ececc2344
                                                            • Instruction ID: 794ee84a9f39aea2bc457d82ca5bd72549197e03625d1fa7feff966a46458a4d
                                                            • Opcode Fuzzy Hash: a8a05f386ae686ef0d20c5b3972230c9c0cf02bd1ee3121eb39ccd4ececc2344
                                                            • Instruction Fuzzy Hash: A44181317002058FCB04EF74C9896AE77E6AF84218F188069D809DF39ADF39DD55C7A1
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 913 4da110f-4da111e 914 4da1120-4da114d KiUserExceptionDispatcher 913->914 915 4da1154-4da115b 914->915 917 4da1163 915->917 918 4da1165-4da119e 917->918 922 4da11ed-4da11f0 918->922 923 4da11a0-4da11a2 918->923 924 4da126d-4da128a 922->924 925 4da11f2-4da1200 922->925 948 4da11a4 call 10a05df 923->948 949 4da11a4 call 4da22b0 923->949 950 4da11a4 call 10a0606 923->950 925->918 926 4da1206-4da120a 925->926 929 4da125e-4da1268 926->929 930 4da120c-4da121d 926->930 927 4da11aa-4da11b9 931 4da11ea 927->931 932 4da11bb-4da11c0 call 4da3109 927->932 929->917 930->924 937 4da121f-4da122f 930->937 931->922 933 4da11c6-4da11e2 932->933 933->931 939 4da1250-4da1256 937->939 940 4da1231-4da123c 937->940 939->929 940->924 942 4da123e-4da1248 940->942 942->939 948->927 949->927 950->927
                                                            APIs
                                                            • KiUserExceptionDispatcher.NTDLL ref: 04DA1147
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.4132645443.0000000004DA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04DA0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_4da0000_server.jbxd
                                                            Similarity
                                                            • API ID: DispatcherExceptionUser
                                                            • String ID:
                                                            • API String ID: 6842923-0
                                                            • Opcode ID: 2df88e38f8aaef53369e6feb092d55c32771839cb652881938c89596a8423e3f
                                                            • Instruction ID: a3a8f34e4e03df6d1e58b4a5e61f3cd711e56fc3263bf76e448385664fd8390f
                                                            • Opcode Fuzzy Hash: 2df88e38f8aaef53369e6feb092d55c32771839cb652881938c89596a8423e3f
                                                            • Instruction Fuzzy Hash: 18415F317002058FCB44EF78C9996AEB7E6AF84304F5484699809DF39ADF38DD55CBA1
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 951 5072c26-5072caa 955 5072caf-5072cbb 951->955 956 5072cac 951->956 957 5072cc0-5072cc9 955->957 958 5072cbd 955->958 956->955 959 5072cce-5072ce5 957->959 960 5072ccb 957->960 958->957 962 5072d27-5072d2c 959->962 963 5072ce7-5072cfa RegCreateKeyExW 959->963 960->959 962->963 964 5072d2e-5072d33 963->964 965 5072cfc-5072d24 963->965 964->965
                                                            APIs
                                                            • RegCreateKeyExW.KERNELBASE(?,00000E24), ref: 05072CED
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.4133020343.0000000005070000.00000040.00000800.00020000.00000000.sdmp, Offset: 05070000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_5070000_server.jbxd
                                                            Similarity
                                                            • API ID: Create
                                                            • String ID:
                                                            • API String ID: 2289755597-0
                                                            • Opcode ID: e13c3739e67d9b3fa2b8a54b4cc06f2f376ba4ea3703e93b67b193f864672ea5
                                                            • Instruction ID: 54c9ef24f71d67a7a53af9677bb4a625a77543d96337fda5e2c01f9ac12e8814
                                                            • Opcode Fuzzy Hash: e13c3739e67d9b3fa2b8a54b4cc06f2f376ba4ea3703e93b67b193f864672ea5
                                                            • Instruction Fuzzy Hash: 2C31B076504744AFE722CB65DC44FA7BBFCEF09210F08859AE989CB652D324E948CB71
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 970 5070da7-5070dc7 971 5070de9-5070e1b 970->971 972 5070dc9-5070de8 970->972 976 5070e1e-5070e76 RegQueryValueExW 971->976 972->971 978 5070e7c-5070e92 976->978
                                                            APIs
                                                            • RegQueryValueExW.KERNELBASE(?,00000E24,?,?), ref: 05070E6E
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.4133020343.0000000005070000.00000040.00000800.00020000.00000000.sdmp, Offset: 05070000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_5070000_server.jbxd
                                                            Similarity
                                                            • API ID: QueryValue
                                                            • String ID:
                                                            • API String ID: 3660427363-0
                                                            • Opcode ID: 1ce5953a9cc6176bc80494d1396acf50c58d2247bdd64c34fa1fd1fafc0d2a71
                                                            • Instruction ID: d38beac0ffa22657b2857a0640005f0dc0c578bb8cc8811b9fafbbcddb9585e1
                                                            • Opcode Fuzzy Hash: 1ce5953a9cc6176bc80494d1396acf50c58d2247bdd64c34fa1fd1fafc0d2a71
                                                            • Instruction Fuzzy Hash: 89319E6550E7C06FD3138B318C65A61BFB4EF47610B0E45CBE8C48F6A3D2296909C7B2
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 979 50719d4-5071a93 985 5071ae5-5071aea 979->985 986 5071a95-5071a9d getaddrinfo 979->986 985->986 987 5071aa3-5071ab5 986->987 989 5071ab7-5071ae2 987->989 990 5071aec-5071af1 987->990 990->989
                                                            APIs
                                                            • getaddrinfo.WS2_32(?,00000E24), ref: 05071A9B
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.4133020343.0000000005070000.00000040.00000800.00020000.00000000.sdmp, Offset: 05070000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_5070000_server.jbxd
                                                            Similarity
                                                            • API ID: getaddrinfo
                                                            • String ID:
                                                            • API String ID: 300660673-0
                                                            • Opcode ID: 12de3e1967280748a4520ef9cbed8cec92cdad793906ada2bc33d1cd53c2122b
                                                            • Instruction ID: f7fa33c79c416905014938a12aca8576a728bb81401c80d66cac945d85f49992
                                                            • Opcode Fuzzy Hash: 12de3e1967280748a4520ef9cbed8cec92cdad793906ada2bc33d1cd53c2122b
                                                            • Instruction Fuzzy Hash: 5931AFB1500344AFEB21CB51DD85FA7BBACEB04314F04489AFA489B282D375A94CCB71
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 994 5071c62-5071d24 GetVolumeInformationA 997 5071d2a-5071d53 994->997
                                                            APIs
                                                            • GetVolumeInformationA.KERNELBASE(?,00000E24,?,?), ref: 05071D22
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.4133020343.0000000005070000.00000040.00000800.00020000.00000000.sdmp, Offset: 05070000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_5070000_server.jbxd
                                                            Similarity
                                                            • API ID: InformationVolume
                                                            • String ID:
                                                            • API String ID: 2039140958-0
                                                            • Opcode ID: e54db0b573b855458d2d653c92aad32dc2685abbae73313bee49f6232d95d600
                                                            • Instruction ID: bd5ed9dbacd62c51fadb16354ef26685f309056a90adab832f3e18597aa27fa1
                                                            • Opcode Fuzzy Hash: e54db0b573b855458d2d653c92aad32dc2685abbae73313bee49f6232d95d600
                                                            • Instruction Fuzzy Hash: 1E31607150D3C06FD3138B358C61AA2BFB4AF47210F1981DBE8C4DF6A3D2256959C7A2
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 999 b0ab1e-b0ab84 1001 b0ab8a-b0ab9b 999->1001 1002 b0aba1-b0abad 1001->1002 1003 b0abb2-b0abc9 1002->1003 1004 b0abaf 1002->1004 1006 b0ac0b-b0ac10 1003->1006 1007 b0abcb-b0abde RegOpenKeyExW 1003->1007 1004->1003 1006->1007 1008 b0abe0-b0ac08 1007->1008 1009 b0ac12-b0ac17 1007->1009 1009->1008
                                                            APIs
                                                            • RegOpenKeyExW.KERNELBASE(?,00000E24), ref: 00B0ABD1
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.4127292440.0000000000B0A000.00000040.00000800.00020000.00000000.sdmp, Offset: 00B0A000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_b0a000_server.jbxd
                                                            Similarity
                                                            • API ID: Open
                                                            • String ID:
                                                            • API String ID: 71445658-0
                                                            • Opcode ID: 9b3e4d712cab37651ae0831b796855ec6c9aa35e2f0856a81af423e10ff3dbb5
                                                            • Instruction ID: 55a96211a2907446418e401a0fca8f2ce9059043125a647bd0a8d4cda877f0a7
                                                            • Opcode Fuzzy Hash: 9b3e4d712cab37651ae0831b796855ec6c9aa35e2f0856a81af423e10ff3dbb5
                                                            • Instruction Fuzzy Hash: A031A1715097806FE7228B61CC84FA6BFB8EF06210F08849AE984CB192D224A94CC772
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            APIs
                                                            • GetProcessTimes.KERNELBASE(?,00000E24,5350A5DA,00000000,00000000,00000000,00000000), ref: 05071969
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.4133020343.0000000005070000.00000040.00000800.00020000.00000000.sdmp, Offset: 05070000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_5070000_server.jbxd
                                                            Similarity
                                                            • API ID: ProcessTimes
                                                            • String ID:
                                                            • API String ID: 1995159646-0
                                                            • Opcode ID: a9272665a7be7cf65e268aa00b4b6d9d709548dfaa942bef487c794b6f390972
                                                            • Instruction ID: 0907e3f9f3d951fa0f534382273fea4e31f1ab6d7c60b84d3ebf68f1c670eb54
                                                            • Opcode Fuzzy Hash: a9272665a7be7cf65e268aa00b4b6d9d709548dfaa942bef487c794b6f390972
                                                            • Instruction Fuzzy Hash: A031F7725097806FEB228F61DC45FA6BFB8EF06310F0884DAE985CB193D2259949C7B1
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            APIs
                                                            • CreateMutexW.KERNELBASE(?,?), ref: 00B0A6B9
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.4127292440.0000000000B0A000.00000040.00000800.00020000.00000000.sdmp, Offset: 00B0A000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_b0a000_server.jbxd
                                                            Similarity
                                                            • API ID: CreateMutex
                                                            • String ID:
                                                            • API String ID: 1964310414-0
                                                            • Opcode ID: e21a9e87192a44506b2b055b952fca38c54769f5ce01d796847350a6290432bf
                                                            • Instruction ID: 163530f3155eea395e095a1f273e2fa01ec0040cba0ce7d1ebdf70bb99ea9087
                                                            • Opcode Fuzzy Hash: e21a9e87192a44506b2b055b952fca38c54769f5ce01d796847350a6290432bf
                                                            • Instruction Fuzzy Hash: 843181715097805FE711CB65DC85B96BFF8EF06310F08889AE984CB292D375E909C762
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            APIs
                                                            • GetExitCodeProcess.KERNELBASE(?,00000E24,5350A5DA,00000000,00000000,00000000,00000000), ref: 00B0BC30
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.4127292440.0000000000B0A000.00000040.00000800.00020000.00000000.sdmp, Offset: 00B0A000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_b0a000_server.jbxd
                                                            Similarity
                                                            • API ID: CodeExitProcess
                                                            • String ID:
                                                            • API String ID: 3861947596-0
                                                            • Opcode ID: 5f6c874c7f65404e017478632c45b354bc6f29a77ad2620b4230e64463364103
                                                            • Instruction ID: 432e2d876d29a34dc42b68aa69bea37f6683ee59ce2a655623fdcfbcd8788b3d
                                                            • Opcode Fuzzy Hash: 5f6c874c7f65404e017478632c45b354bc6f29a77ad2620b4230e64463364103
                                                            • Instruction Fuzzy Hash: EF2101B15097805FE7128B21DC85BA6BFB8EF43320F0884DAE984CF193D364A909CB61
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            APIs
                                                            • ConvertStringSecurityDescriptorToSecurityDescriptorW.ADVAPI32(?,00000E24), ref: 05071357
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.4133020343.0000000005070000.00000040.00000800.00020000.00000000.sdmp, Offset: 05070000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_5070000_server.jbxd
                                                            Similarity
                                                            • API ID: DescriptorSecurity$ConvertString
                                                            • String ID:
                                                            • API String ID: 3907675253-0
                                                            • Opcode ID: 4665d077367fe01b6be0eb7e2da81e2d02ef1fef619787a99e52a8caae40fce3
                                                            • Instruction ID: 02446bea6aefed3277eee9e1bf2ac145ccb8d3d4a947a6d614b9f317d3b4b606
                                                            • Opcode Fuzzy Hash: 4665d077367fe01b6be0eb7e2da81e2d02ef1fef619787a99e52a8caae40fce3
                                                            • Instruction Fuzzy Hash: 5D31B1719043846FE7218B65DC45FABBBF8EF05210F08849AF984DB652D324E948CB61
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            APIs
                                                            • CreateFileW.KERNELBASE(?,?,?,?,?,?), ref: 00B0AF1D
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.4127292440.0000000000B0A000.00000040.00000800.00020000.00000000.sdmp, Offset: 00B0A000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_b0a000_server.jbxd
                                                            Similarity
                                                            • API ID: CreateFile
                                                            • String ID:
                                                            • API String ID: 823142352-0
                                                            • Opcode ID: 5a40d9f9147c31f658c2b81df7c1a388c79e847784c707069c30061d90f7a39f
                                                            • Instruction ID: ed0542f028b3731e774d9e3946a5736c8ee6c92366d94e971802773a4c6e5f0c
                                                            • Opcode Fuzzy Hash: 5a40d9f9147c31f658c2b81df7c1a388c79e847784c707069c30061d90f7a39f
                                                            • Instruction Fuzzy Hash: 27318FB1504740AFE721CF65DC85FA2BBF8EF05710F088899E9898B692D375E908CB61
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            APIs
                                                            • RegCreateKeyExW.KERNELBASE(?,00000E24), ref: 05072CED
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.4133020343.0000000005070000.00000040.00000800.00020000.00000000.sdmp, Offset: 05070000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_5070000_server.jbxd
                                                            Similarity
                                                            • API ID: Create
                                                            • String ID:
                                                            • API String ID: 2289755597-0
                                                            • Opcode ID: ab882fd3ae429ed5983f482199c656b55283edd74cbac2dbc8bd5a58f7d19f0e
                                                            • Instruction ID: 4c7d798ecf7582a7f513d69c62480e108eda5541348422152367f221198be2a2
                                                            • Opcode Fuzzy Hash: ab882fd3ae429ed5983f482199c656b55283edd74cbac2dbc8bd5a58f7d19f0e
                                                            • Instruction Fuzzy Hash: F621EF76A00608AFEB21CF15DD40FABBBECFF08214F08841AE949C7651D330E5488A75
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            APIs
                                                            • RegQueryValueExW.KERNELBASE(?,00000E24,5350A5DA,00000000,00000000,00000000,00000000), ref: 00B0A40C
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.4127292440.0000000000B0A000.00000040.00000800.00020000.00000000.sdmp, Offset: 00B0A000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_b0a000_server.jbxd
                                                            Similarity
                                                            • API ID: QueryValue
                                                            • String ID:
                                                            • API String ID: 3660427363-0
                                                            • Opcode ID: c9101c72219f9c7cbaaef7cac19530ef5d9eda4015aa9a5f685edc26e4e1a7a7
                                                            • Instruction ID: 93bb782dcfd342e40a7ea6d12755b718c3fb864a2849b3607b4cd4c9514de1ff
                                                            • Opcode Fuzzy Hash: c9101c72219f9c7cbaaef7cac19530ef5d9eda4015aa9a5f685edc26e4e1a7a7
                                                            • Instruction Fuzzy Hash: 88317F75505780AFD721CB15CC84B92BFF8EF06310F08849AE945CB292D364E949CB62
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            APIs
                                                            • GetProcessWorkingSetSize.KERNEL32(?,00000E24,5350A5DA,00000000,00000000,00000000,00000000), ref: 0507302B
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.4133020343.0000000005070000.00000040.00000800.00020000.00000000.sdmp, Offset: 05070000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_5070000_server.jbxd
                                                            Similarity
                                                            • API ID: ProcessSizeWorking
                                                            • String ID:
                                                            • API String ID: 3584180929-0
                                                            • Opcode ID: 3025edf75efbf6ec48f81a6d253c9030dca64c85020bf8fb062c6cf15dfd4b67
                                                            • Instruction ID: 193490d4ca31dd2118d5235b9eda3139c66fbfa669842cae50ada0c07626e5b6
                                                            • Opcode Fuzzy Hash: 3025edf75efbf6ec48f81a6d253c9030dca64c85020bf8fb062c6cf15dfd4b67
                                                            • Instruction Fuzzy Hash: 8621D5715093C45FEB12CB20DC55BA6BFB8AF46214F0884DBE9888F193D225A948C772
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            APIs
                                                            • getaddrinfo.WS2_32(?,00000E24), ref: 05071A9B
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.4133020343.0000000005070000.00000040.00000800.00020000.00000000.sdmp, Offset: 05070000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_5070000_server.jbxd
                                                            Similarity
                                                            • API ID: getaddrinfo
                                                            • String ID:
                                                            • API String ID: 300660673-0
                                                            • Opcode ID: 8eb0df6956cc7e94e26ec5bd05c72556ac9ef58a021c38dddd426a45d376fd32
                                                            • Instruction ID: 03712c53358750afc0601aa709d820ee1bf68dcc572e24937490536d77532cd8
                                                            • Opcode Fuzzy Hash: 8eb0df6956cc7e94e26ec5bd05c72556ac9ef58a021c38dddd426a45d376fd32
                                                            • Instruction Fuzzy Hash: 0821BF71500304AEEB20DB50DD85FBAF7ACEF04714F04885AFA489A681D7B5A54DCB75
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            APIs
                                                            • GetFileType.KERNELBASE(?,00000E24,5350A5DA,00000000,00000000,00000000,00000000), ref: 00B0B009
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.4127292440.0000000000B0A000.00000040.00000800.00020000.00000000.sdmp, Offset: 00B0A000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_b0a000_server.jbxd
                                                            Similarity
                                                            • API ID: FileType
                                                            • String ID:
                                                            • API String ID: 3081899298-0
                                                            • Opcode ID: 039c3737ee916700396eae257e64543e0b86a0e959c826635cc918a95204df83
                                                            • Instruction ID: 57b186a4dd47c9a430e528f00244feca268a53af2e8906603690a48faff821da
                                                            • Opcode Fuzzy Hash: 039c3737ee916700396eae257e64543e0b86a0e959c826635cc918a95204df83
                                                            • Instruction Fuzzy Hash: 73210A755097806FD7128B25DC45BA2BFBCEF47724F0880DAE9848B293D364A90DC771
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            APIs
                                                            • K32EnumProcesses.KERNEL32(?,?,?,5350A5DA,00000000,?,?,?,?,?,?,?,?,6C9C3C58), ref: 05070096
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.4133020343.0000000005070000.00000040.00000800.00020000.00000000.sdmp, Offset: 05070000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_5070000_server.jbxd
                                                            Similarity
                                                            • API ID: EnumProcesses
                                                            • String ID:
                                                            • API String ID: 84517404-0
                                                            • Opcode ID: 4c62dd2347de2a13acd325e43d9ee8b83815cbcece0c760d5ec76bda96a77987
                                                            • Instruction ID: f2b5b8f7b492bf8f8733cd859a20149351b2a323f0ee6f17a807f11e0dfcf049
                                                            • Opcode Fuzzy Hash: 4c62dd2347de2a13acd325e43d9ee8b83815cbcece0c760d5ec76bda96a77987
                                                            • Instruction Fuzzy Hash: 9A318B715093C49FD7138B64DC54AA2BFB4AF07220F0D84EBE984CB1A3D2249948CB62
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            APIs
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.4133020343.0000000005070000.00000040.00000800.00020000.00000000.sdmp, Offset: 05070000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_5070000_server.jbxd
                                                            Similarity
                                                            • API ID: select
                                                            • String ID:
                                                            • API String ID: 1274211008-0
                                                            • Opcode ID: 1369b26af461864fcc50abe3a5a240ea983ecc8df81ce7bbf6eb363fda89efa7
                                                            • Instruction ID: 7ad7b017a5f93eced89e669ad10fd8bd288a5ef661c5864e5db2c02dfff80685
                                                            • Opcode Fuzzy Hash: 1369b26af461864fcc50abe3a5a240ea983ecc8df81ce7bbf6eb363fda89efa7
                                                            • Instruction Fuzzy Hash: 77215C755093859FDB62CF25D844AA6FFF8FF06210B0884DAE984CB162D365A908DB61
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            APIs
                                                            • EnumWindows.USER32(?,00000E24,?,?), ref: 00B0A10E
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.4127292440.0000000000B0A000.00000040.00000800.00020000.00000000.sdmp, Offset: 00B0A000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_b0a000_server.jbxd
                                                            Similarity
                                                            • API ID: EnumWindows
                                                            • String ID:
                                                            • API String ID: 1129996299-0
                                                            • Opcode ID: 3c9e5540e971a49dfcdd1ed13b0656781e801c1230772c4499e874d68e54870c
                                                            • Instruction ID: f33ff8245893d6a877d1096481514cb201c887357ada9293035e30a9d76bf999
                                                            • Opcode Fuzzy Hash: 3c9e5540e971a49dfcdd1ed13b0656781e801c1230772c4499e874d68e54870c
                                                            • Instruction Fuzzy Hash: C421F57150D3C06FC3128B21CC51B66BFB4EF87620F1981DBE884CB693D239A919C7A2
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            APIs
                                                            • RegSetValueExW.KERNELBASE(?,00000E24,5350A5DA,00000000,00000000,00000000,00000000), ref: 00B0A4F8
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.4127292440.0000000000B0A000.00000040.00000800.00020000.00000000.sdmp, Offset: 00B0A000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_b0a000_server.jbxd
                                                            Similarity
                                                            • API ID: Value
                                                            • String ID:
                                                            • API String ID: 3702945584-0
                                                            • Opcode ID: 205220ed9d4f340eb4475e1459aa5f8834f2b5d3566ffde84662b1ae219d97bb
                                                            • Instruction ID: 5af47387e7dc5aaebfb514a70ac40bd7abf8e669c0f5898efb7d76c7da7acf63
                                                            • Opcode Fuzzy Hash: 205220ed9d4f340eb4475e1459aa5f8834f2b5d3566ffde84662b1ae219d97bb
                                                            • Instruction Fuzzy Hash: 8721B0765043806FD7228F11DC44FA7BFF8EF46210F08849AE985CB692C364E948C772
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            APIs
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.4133020343.0000000005070000.00000040.00000800.00020000.00000000.sdmp, Offset: 05070000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_5070000_server.jbxd
                                                            Similarity
                                                            • API ID: FileView
                                                            • String ID:
                                                            • API String ID: 3314676101-0
                                                            • Opcode ID: a6fc8570e1f27461bf23689bff460b14eace39a9eaeada1de4f00caae91a278c
                                                            • Instruction ID: fb7817b6ffb058ced87bd2e24637a844a02269ce23c3e3e9e39410424c707b25
                                                            • Opcode Fuzzy Hash: a6fc8570e1f27461bf23689bff460b14eace39a9eaeada1de4f00caae91a278c
                                                            • Instruction Fuzzy Hash: 1221B171405384AFE722CF55DD44FA6FBF8EF09214F04849EE9898B252D375E548CB61
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            APIs
                                                            • WSASocketW.WS2_32(?,?,?,?,?), ref: 05070F26
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.4133020343.0000000005070000.00000040.00000800.00020000.00000000.sdmp, Offset: 05070000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_5070000_server.jbxd
                                                            Similarity
                                                            • API ID: Socket
                                                            • String ID:
                                                            • API String ID: 38366605-0
                                                            • Opcode ID: b07ca2ec067919e7abf295089247a1b3577bcbfa415e2c495a8e19815f55db6b
                                                            • Instruction ID: 36f0a8b8bf4e1cdbc7d5e32c19210d8d7a724e7104f1661066327109fa0f7fbe
                                                            • Opcode Fuzzy Hash: b07ca2ec067919e7abf295089247a1b3577bcbfa415e2c495a8e19815f55db6b
                                                            • Instruction Fuzzy Hash: 8321B171505380AFE721CF55DC45FA6FFF8EF05210F08889EE9858B652D375A508CB62
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            APIs
                                                            • CreateFileW.KERNELBASE(?,?,?,?,?,?), ref: 00B0AF1D
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.4127292440.0000000000B0A000.00000040.00000800.00020000.00000000.sdmp, Offset: 00B0A000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_b0a000_server.jbxd
                                                            Similarity
                                                            • API ID: CreateFile
                                                            • String ID:
                                                            • API String ID: 823142352-0
                                                            • Opcode ID: 044cf74e3c9dc2d68912f317ad3a029616ac7bb9ace6bc26cfb9efd788d7429f
                                                            • Instruction ID: e25980a28a4558b2872bb6e37a1a795c698462e621617c194b3f67b036e8091b
                                                            • Opcode Fuzzy Hash: 044cf74e3c9dc2d68912f317ad3a029616ac7bb9ace6bc26cfb9efd788d7429f
                                                            • Instruction Fuzzy Hash: 6A2171B1500740AFE720DF65DD45B66FBE8EF08714F148859E949CB691D371E508CB62
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            APIs
                                                            • RegQueryValueExW.KERNELBASE(?,00000E24,5350A5DA,00000000,00000000,00000000,00000000), ref: 0507126C
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.4133020343.0000000005070000.00000040.00000800.00020000.00000000.sdmp, Offset: 05070000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_5070000_server.jbxd
                                                            Similarity
                                                            • API ID: QueryValue
                                                            • String ID:
                                                            • API String ID: 3660427363-0
                                                            • Opcode ID: 9d3c3ca1968696128a580ee2d0f647ac75149ba01c922774d4e8e2f704e774e7
                                                            • Instruction ID: 91d1cf8650726dd3ac0ac468dff94debff9de49292c561d5da3340997e21da24
                                                            • Opcode Fuzzy Hash: 9d3c3ca1968696128a580ee2d0f647ac75149ba01c922774d4e8e2f704e774e7
                                                            • Instruction Fuzzy Hash: 1121D171905784AFE722CB15DC44FA7BBF8EF45210F08849AE945DB292D320E908CB75
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            APIs
                                                            • ConvertStringSecurityDescriptorToSecurityDescriptorW.ADVAPI32(?,00000E24), ref: 05071357
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.4133020343.0000000005070000.00000040.00000800.00020000.00000000.sdmp, Offset: 05070000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_5070000_server.jbxd
                                                            Similarity
                                                            • API ID: DescriptorSecurity$ConvertString
                                                            • String ID:
                                                            • API String ID: 3907675253-0
                                                            • Opcode ID: 0e571da882d485a6749ac42dcea18fde7ff805507d936dde55705f0172abe6ad
                                                            • Instruction ID: c21ebf81bc6d3c9484515fde5bc37b02a5210b62dafebe9bd8891b4b0afc105d
                                                            • Opcode Fuzzy Hash: 0e571da882d485a6749ac42dcea18fde7ff805507d936dde55705f0172abe6ad
                                                            • Instruction Fuzzy Hash: 1D21F272A00204AFEB20DF25DD40FAABBECEF04214F04846AE944CBA81D334E508CA76
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            APIs
                                                            • RegOpenKeyExW.KERNELBASE(?,00000E24), ref: 00B0ABD1
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.4127292440.0000000000B0A000.00000040.00000800.00020000.00000000.sdmp, Offset: 00B0A000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_b0a000_server.jbxd
                                                            Similarity
                                                            • API ID: Open
                                                            • String ID:
                                                            • API String ID: 71445658-0
                                                            • Opcode ID: 8b1856134f748afc56c46bbe33567bc46153db3e8162d281e0201f853fbee7d8
                                                            • Instruction ID: b73f3ad75fc8aff9b1ac494c7f1b5d08c864216119aeca705a79720af1af1fb6
                                                            • Opcode Fuzzy Hash: 8b1856134f748afc56c46bbe33567bc46153db3e8162d281e0201f853fbee7d8
                                                            • Instruction Fuzzy Hash: C621CF72500704AEE7209F55CD84FABFBECEF14314F04885AE9458B691D764E94C8AB2
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            APIs
                                                            • SetProcessWorkingSetSize.KERNEL32(?,00000E24,5350A5DA,00000000,00000000,00000000,00000000), ref: 0507310F
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.4133020343.0000000005070000.00000040.00000800.00020000.00000000.sdmp, Offset: 05070000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_5070000_server.jbxd
                                                            Similarity
                                                            • API ID: ProcessSizeWorking
                                                            • String ID:
                                                            • API String ID: 3584180929-0
                                                            • Opcode ID: 2f289f6798bb4ff1fcffdeadb0db3a3307b9bafe5a90864de7634eda0b6c1589
                                                            • Instruction ID: 2db35d122d1d57c9f7085ec24bcded04f70a3ba4d9f0a49ad43d0670eb83876b
                                                            • Opcode Fuzzy Hash: 2f289f6798bb4ff1fcffdeadb0db3a3307b9bafe5a90864de7634eda0b6c1589
                                                            • Instruction Fuzzy Hash: D221D4715053846FEB21CB25DC44FA7BFB8EF46210F0884AAE948CB252D374A548CB75
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            APIs
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.4127292440.0000000000B0A000.00000040.00000800.00020000.00000000.sdmp, Offset: 00B0A000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_b0a000_server.jbxd
                                                            Similarity
                                                            • API ID: send
                                                            • String ID:
                                                            • API String ID: 2809346765-0
                                                            • Opcode ID: 677d28c54173396cd577da5d40a3c651a1f8d97ab02e183baefd48ef745a5b04
                                                            • Instruction ID: 6d5462615b4d00fa75d830412704f1f94d1faa183fbe19632b0441d83492302b
                                                            • Opcode Fuzzy Hash: 677d28c54173396cd577da5d40a3c651a1f8d97ab02e183baefd48ef745a5b04
                                                            • Instruction Fuzzy Hash: 0221AF7150D3C05FDB138B20DC54A52BFB0EF47210F0984DBD9858F5A3C269A919D762
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            APIs
                                                            • CreateMutexW.KERNELBASE(?,?), ref: 00B0A6B9
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.4127292440.0000000000B0A000.00000040.00000800.00020000.00000000.sdmp, Offset: 00B0A000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_b0a000_server.jbxd
                                                            Similarity
                                                            • API ID: CreateMutex
                                                            • String ID:
                                                            • API String ID: 1964310414-0
                                                            • Opcode ID: f955d71d0802a8d19e116cde213339dba05cb304a83a6767853467432056b28b
                                                            • Instruction ID: 38e907df57be82b7c3e08d9203ed77f5b336941f219c759e1f621d767d26d697
                                                            • Opcode Fuzzy Hash: f955d71d0802a8d19e116cde213339dba05cb304a83a6767853467432056b28b
                                                            • Instruction Fuzzy Hash: 0C2180716002409FE720DB65DD85BA6FBE8EF14314F0888A9ED48CB781D775E909CA76
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            APIs
                                                            • shutdown.WS2_32(?,00000E24,5350A5DA,00000000,00000000,00000000,00000000), ref: 05071790
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.4133020343.0000000005070000.00000040.00000800.00020000.00000000.sdmp, Offset: 05070000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_5070000_server.jbxd
                                                            Similarity
                                                            • API ID: shutdown
                                                            • String ID:
                                                            • API String ID: 2510479042-0
                                                            • Opcode ID: 6aaaa3f9b71e77556223892bd8867be619c3c09207a833ede4925935c453f42e
                                                            • Instruction ID: 23755761bda8bc7111ac1f4b16b789ec80db2f3b5daba69c47a5b0d239c398b6
                                                            • Opcode Fuzzy Hash: 6aaaa3f9b71e77556223892bd8867be619c3c09207a833ede4925935c453f42e
                                                            • Instruction Fuzzy Hash: 3B21C5715093846FD7128B55DC54BA6BFB8EF46210F0884DAE984DB592C368A548C772
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            APIs
                                                            • LookupPrivilegeValueW.ADVAPI32(?,?,?), ref: 00B0B792
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.4127292440.0000000000B0A000.00000040.00000800.00020000.00000000.sdmp, Offset: 00B0A000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_b0a000_server.jbxd
                                                            Similarity
                                                            • API ID: LookupPrivilegeValue
                                                            • String ID:
                                                            • API String ID: 3899507212-0
                                                            • Opcode ID: 8186e783fe175385669cbcdd083f742c02bf4e86d55f69e066c90b60f94f2ec1
                                                            • Instruction ID: 120d4a2d3c0b9a3ff60d7efc208d2b45c603cf4e59e7f61552096ad998573163
                                                            • Opcode Fuzzy Hash: 8186e783fe175385669cbcdd083f742c02bf4e86d55f69e066c90b60f94f2ec1
                                                            • Instruction Fuzzy Hash: 9B216F716093809FD7228F25DC54B52BFF8EF46710F0884EAED45CB693D225E808CB61
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            APIs
                                                            • ReadFile.KERNELBASE(?,00000E24,5350A5DA,00000000,00000000,00000000,00000000), ref: 05070CB1
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.4133020343.0000000005070000.00000040.00000800.00020000.00000000.sdmp, Offset: 05070000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_5070000_server.jbxd
                                                            Similarity
                                                            • API ID: FileRead
                                                            • String ID:
                                                            • API String ID: 2738559852-0
                                                            • Opcode ID: 1bc1fe2dd0da4e8f4fcbecdf3fe046a32d4370f490b47ede77fa84716f8f5302
                                                            • Instruction ID: 6c0279a1b998cf34ab2f60699bd75600079106516f79e63a4f67eba71a94013a
                                                            • Opcode Fuzzy Hash: 1bc1fe2dd0da4e8f4fcbecdf3fe046a32d4370f490b47ede77fa84716f8f5302
                                                            • Instruction Fuzzy Hash: 5821D172505380AFDB22CF51DC44FA7BFF8EF45210F08849AE9848B552C335A508CBB2
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            APIs
                                                            • RegQueryValueExW.KERNELBASE(?,00000E24,5350A5DA,00000000,00000000,00000000,00000000), ref: 00B0A40C
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.4127292440.0000000000B0A000.00000040.00000800.00020000.00000000.sdmp, Offset: 00B0A000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_b0a000_server.jbxd
                                                            Similarity
                                                            • API ID: QueryValue
                                                            • String ID:
                                                            • API String ID: 3660427363-0
                                                            • Opcode ID: 4ca1d502b6e122cd9840211fbc77b3a383fd426763601a5b6b1285122b885033
                                                            • Instruction ID: d2001488d36d7603cab9928fc1f44e4d8167134231889de6320a57f736b4d147
                                                            • Opcode Fuzzy Hash: 4ca1d502b6e122cd9840211fbc77b3a383fd426763601a5b6b1285122b885033
                                                            • Instruction Fuzzy Hash: 9E218E75600704AFE720CE15DC84FA6BBECEF14710F08889AE946CB791D760E949CA76
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            APIs
                                                            • ioctlsocket.WS2_32(?,00000E24,5350A5DA,00000000,00000000,00000000,00000000), ref: 05072E7B
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.4133020343.0000000005070000.00000040.00000800.00020000.00000000.sdmp, Offset: 05070000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_5070000_server.jbxd
                                                            Similarity
                                                            • API ID: ioctlsocket
                                                            • String ID:
                                                            • API String ID: 3577187118-0
                                                            • Opcode ID: b0d351a3e4c5b4e4a3d60150b0cf010c0d9a86859f84d25538218805d6f0833b
                                                            • Instruction ID: f7a45418d4b7de808216439ec0769e344ae920a39ec5631566565f4e4e34b520
                                                            • Opcode Fuzzy Hash: b0d351a3e4c5b4e4a3d60150b0cf010c0d9a86859f84d25538218805d6f0833b
                                                            • Instruction Fuzzy Hash: 8D21C3715093846FD722CF55DC44FA7BFB8EF46214F08849AE948DB652C374A508C7B6
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            APIs
                                                            • FindCloseChangeNotification.KERNELBASE(?), ref: 00B0A780
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.4127292440.0000000000B0A000.00000040.00000800.00020000.00000000.sdmp, Offset: 00B0A000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_b0a000_server.jbxd
                                                            Similarity
                                                            • API ID: ChangeCloseFindNotification
                                                            • String ID:
                                                            • API String ID: 2591292051-0
                                                            • Opcode ID: 51a6c58ef8618a42f4a2c400d21e6e6eefae5df5004837e3e66accd11a17d156
                                                            • Instruction ID: e056812aca658bb0518ed728115d3b939bf5c66573fcd5fa385e45f59a199fb3
                                                            • Opcode Fuzzy Hash: 51a6c58ef8618a42f4a2c400d21e6e6eefae5df5004837e3e66accd11a17d156
                                                            • Instruction Fuzzy Hash: F221D5B55057809FDB118F25DD85792BFB4EF02320F0884EBDD858B693D2359909DBA2
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            APIs
                                                            • SetFileAttributesW.KERNELBASE(?,?), ref: 00B0AC97
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.4127292440.0000000000B0A000.00000040.00000800.00020000.00000000.sdmp, Offset: 00B0A000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_b0a000_server.jbxd
                                                            Similarity
                                                            • API ID: AttributesFile
                                                            • String ID:
                                                            • API String ID: 3188754299-0
                                                            • Opcode ID: f0a5e5aad514f59492888943d460d198c2b8b4e39460633d8af38a17265ccf79
                                                            • Instruction ID: 0f86055b4d7a8024cc0cb3df25e58536221ad9e970537923eb2018b7024363c9
                                                            • Opcode Fuzzy Hash: f0a5e5aad514f59492888943d460d198c2b8b4e39460633d8af38a17265ccf79
                                                            • Instruction Fuzzy Hash: 7521D4715093C05FEB22CB25DC85B92BFE8EF07314F0984DAD8858B293D2749849CB62
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            APIs
                                                            • FindCloseChangeNotification.KERNELBASE(?), ref: 00B0BA68
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.4127292440.0000000000B0A000.00000040.00000800.00020000.00000000.sdmp, Offset: 00B0A000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_b0a000_server.jbxd
                                                            Similarity
                                                            • API ID: ChangeCloseFindNotification
                                                            • String ID:
                                                            • API String ID: 2591292051-0
                                                            • Opcode ID: 58a6172b7330ebccd904774f2dce2926c7ab92ddbd40a2abd111b8a1d691ec80
                                                            • Instruction ID: b4f3e9271ffeacf1a8b1239e4f4d59b5123069440c27eff3ab1ef892e5b953dd
                                                            • Opcode Fuzzy Hash: 58a6172b7330ebccd904774f2dce2926c7ab92ddbd40a2abd111b8a1d691ec80
                                                            • Instruction Fuzzy Hash: 5221A1715093C05FDB128B25DC54B92BFF4EF47324F0984DAE9858F663D2659908CB72
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            APIs
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.4133020343.0000000005070000.00000040.00000800.00020000.00000000.sdmp, Offset: 05070000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_5070000_server.jbxd
                                                            Similarity
                                                            • API ID: FileView
                                                            • String ID:
                                                            • API String ID: 3314676101-0
                                                            • Opcode ID: b4484637f3c729d6608834ae293e3e2726a52568019b7489bb4a2cf89e38f448
                                                            • Instruction ID: 011c4ac964195f824977c238105ec5ce2cc3e66f9cbd76d5c2da592ddf35e895
                                                            • Opcode Fuzzy Hash: b4484637f3c729d6608834ae293e3e2726a52568019b7489bb4a2cf89e38f448
                                                            • Instruction Fuzzy Hash: 5121F071500244AFE721CF55DD85FAAFBE8EF08324F048459E9498B681D375E548CBB6
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            APIs
                                                            • WSAConnect.WS2_32(?,?,?,?,?,?,?), ref: 05071C22
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.4133020343.0000000005070000.00000040.00000800.00020000.00000000.sdmp, Offset: 05070000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_5070000_server.jbxd
                                                            Similarity
                                                            • API ID: Connect
                                                            • String ID:
                                                            • API String ID: 3144859779-0
                                                            • Opcode ID: 69ebd37b8654144d3051f1495cfb1c1a96799736eaaa550b5a7fcdc9c7870a0a
                                                            • Instruction ID: fdf9b46b9ad778be5ebef0492e7189df84863f3cc5a6c169325040f6a8e01d26
                                                            • Opcode Fuzzy Hash: 69ebd37b8654144d3051f1495cfb1c1a96799736eaaa550b5a7fcdc9c7870a0a
                                                            • Instruction Fuzzy Hash: B5219F71508784AFDB228F51DC44B62BFF4FF0A210F0884DAE9858B563D235A918DB61
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            APIs
                                                            • WSASocketW.WS2_32(?,?,?,?,?), ref: 05070F26
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.4133020343.0000000005070000.00000040.00000800.00020000.00000000.sdmp, Offset: 05070000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_5070000_server.jbxd
                                                            Similarity
                                                            • API ID: Socket
                                                            • String ID:
                                                            • API String ID: 38366605-0
                                                            • Opcode ID: f6bc0419d1429b7465200e0535f91bc55401aedce20cb4c49f9a2aa96ed5b10d
                                                            • Instruction ID: 115448b592d1308acb98d6943699e81d234780a7751570e757de88fd60432e9a
                                                            • Opcode Fuzzy Hash: f6bc0419d1429b7465200e0535f91bc55401aedce20cb4c49f9a2aa96ed5b10d
                                                            • Instruction Fuzzy Hash: 0621CF71900204AFEB21CF55DD45BAAFBE8EF08224F04885AE9498AA51D376E508CB76
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            APIs
                                                            • LoadLibraryA.KERNELBASE(?,00000E24), ref: 05071FC7
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.4133020343.0000000005070000.00000040.00000800.00020000.00000000.sdmp, Offset: 05070000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_5070000_server.jbxd
                                                            Similarity
                                                            • API ID: LibraryLoad
                                                            • String ID:
                                                            • API String ID: 1029625771-0
                                                            • Opcode ID: 41d6f08141398ec858a1ecbdbe8715ebfc3787c264234c368c5fe411c26cc49a
                                                            • Instruction ID: c260196be9d208a5b027f4ddab1c9412827c80d4b1b07cd48a655dcdeafb63dc
                                                            • Opcode Fuzzy Hash: 41d6f08141398ec858a1ecbdbe8715ebfc3787c264234c368c5fe411c26cc49a
                                                            • Instruction Fuzzy Hash: D01106715053806FE721CB15DC85FA6FFB8EF45320F08809AF9488B292C3B4A948CB66
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            APIs
                                                            • RegSetValueExW.KERNELBASE(?,00000E24,5350A5DA,00000000,00000000,00000000,00000000), ref: 00B0A4F8
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.4127292440.0000000000B0A000.00000040.00000800.00020000.00000000.sdmp, Offset: 00B0A000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_b0a000_server.jbxd
                                                            Similarity
                                                            • API ID: Value
                                                            • String ID:
                                                            • API String ID: 3702945584-0
                                                            • Opcode ID: 1aea48de953730559607c9e89807e4af8e6530526d9d04d2987653fea301789b
                                                            • Instruction ID: 2a84179faf8af026cf4d496dcf1930f46461e31b7e8841cb0dc5b69df7abbaaf
                                                            • Opcode Fuzzy Hash: 1aea48de953730559607c9e89807e4af8e6530526d9d04d2987653fea301789b
                                                            • Instruction Fuzzy Hash: 1611B176600700AFEB208E15DC45FA7BBECEF15710F08849AED45CA781D360E9488AB2
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            APIs
                                                            • RegQueryValueExW.KERNELBASE(?,00000E24,5350A5DA,00000000,00000000,00000000,00000000), ref: 0507126C
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.4133020343.0000000005070000.00000040.00000800.00020000.00000000.sdmp, Offset: 05070000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_5070000_server.jbxd
                                                            Similarity
                                                            • API ID: QueryValue
                                                            • String ID:
                                                            • API String ID: 3660427363-0
                                                            • Opcode ID: 7f689bfcd41604eea904d20f6a9234c5464e1dc9d92c3f5619d7a10e96609d40
                                                            • Instruction ID: 740885260d874bed27e776575e19a6ab806040ce249ca50dec46cc4dc695d64f
                                                            • Opcode Fuzzy Hash: 7f689bfcd41604eea904d20f6a9234c5464e1dc9d92c3f5619d7a10e96609d40
                                                            • Instruction Fuzzy Hash: A511B172A00604AFEB61CF15DC44FABF7F8FF14620F08845AE946CB691D360E559CAB6
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            APIs
                                                            • CopyFileW.KERNELBASE(?,?,?), ref: 00B0AE1E
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.4127292440.0000000000B0A000.00000040.00000800.00020000.00000000.sdmp, Offset: 00B0A000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_b0a000_server.jbxd
                                                            Similarity
                                                            • API ID: CopyFile
                                                            • String ID:
                                                            • API String ID: 1304948518-0
                                                            • Opcode ID: f50ed60d5e3f514959435927e81ad703d640d1604b60f15837addf8c9b5d16df
                                                            • Instruction ID: 4a8e90e9b7c63b59b33fd49768b9d9b33b24e978a7be449e2329094058e2ffc2
                                                            • Opcode Fuzzy Hash: f50ed60d5e3f514959435927e81ad703d640d1604b60f15837addf8c9b5d16df
                                                            • Instruction Fuzzy Hash: 2D11A2716053809FD721CF65DC85B93BFE8EF05210F0888EAE945DB652D234E804CB62
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            APIs
                                                            • GetProcessTimes.KERNELBASE(?,00000E24,5350A5DA,00000000,00000000,00000000,00000000), ref: 05071969
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.4133020343.0000000005070000.00000040.00000800.00020000.00000000.sdmp, Offset: 05070000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_5070000_server.jbxd
                                                            Similarity
                                                            • API ID: ProcessTimes
                                                            • String ID:
                                                            • API String ID: 1995159646-0
                                                            • Opcode ID: 5e2c020fa11fcf40edd528d3c91e5aea008c067b3acc326e7ec753cabebeee68
                                                            • Instruction ID: 4027134f7c1d1b83a683cf3ebee2b3814b85e680a7f893d1d408d446a6863457
                                                            • Opcode Fuzzy Hash: 5e2c020fa11fcf40edd528d3c91e5aea008c067b3acc326e7ec753cabebeee68
                                                            • Instruction Fuzzy Hash: 4D11E672A00204AFEB21CF55DC44FAAF7E8EF45320F04846AE945CB691D375E549CBB6
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            APIs
                                                            • SetProcessWorkingSetSize.KERNEL32(?,00000E24,5350A5DA,00000000,00000000,00000000,00000000), ref: 0507310F
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.4133020343.0000000005070000.00000040.00000800.00020000.00000000.sdmp, Offset: 05070000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_5070000_server.jbxd
                                                            Similarity
                                                            • API ID: ProcessSizeWorking
                                                            • String ID:
                                                            • API String ID: 3584180929-0
                                                            • Opcode ID: 2a87a93566bd5744b9f960f5d4501bcfdd75ae052d36e0bb4820af1fcfd70ba5
                                                            • Instruction ID: 3e130db936f93d8f6afbcbae7d58756888c0f70e7f36dc61f2130ad0f024c26b
                                                            • Opcode Fuzzy Hash: 2a87a93566bd5744b9f960f5d4501bcfdd75ae052d36e0bb4820af1fcfd70ba5
                                                            • Instruction Fuzzy Hash: 2711C471A00204AFEB20CF55DC45BEAF7E8EF45224F08886AE949CB641D774E5488AB6
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            APIs
                                                            • GetProcessWorkingSetSize.KERNEL32(?,00000E24,5350A5DA,00000000,00000000,00000000,00000000), ref: 0507302B
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.4133020343.0000000005070000.00000040.00000800.00020000.00000000.sdmp, Offset: 05070000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_5070000_server.jbxd
                                                            Similarity
                                                            • API ID: ProcessSizeWorking
                                                            • String ID:
                                                            • API String ID: 3584180929-0
                                                            • Opcode ID: 2a87a93566bd5744b9f960f5d4501bcfdd75ae052d36e0bb4820af1fcfd70ba5
                                                            • Instruction ID: c0ee2c5771568e68be0b79e44d47218e022f31b5f044a422644a8c8974997c0d
                                                            • Opcode Fuzzy Hash: 2a87a93566bd5744b9f960f5d4501bcfdd75ae052d36e0bb4820af1fcfd70ba5
                                                            • Instruction Fuzzy Hash: CB110471A00204AFEB20CF15DC54BEAFBE8EF05720F08846AEA05CB641D774E5088BB6
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            APIs
                                                            • GetExitCodeProcess.KERNELBASE(?,00000E24,5350A5DA,00000000,00000000,00000000,00000000), ref: 00B0BC30
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.4127292440.0000000000B0A000.00000040.00000800.00020000.00000000.sdmp, Offset: 00B0A000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_b0a000_server.jbxd
                                                            Similarity
                                                            • API ID: CodeExitProcess
                                                            • String ID:
                                                            • API String ID: 3861947596-0
                                                            • Opcode ID: 21b24994abf4e3bc49371f84719c4a383e80acadeb61a9677897416c6c1ed5cc
                                                            • Instruction ID: 858063cb967c9a80c473b431e2eb14c9f4fa7549624d40f518aaf78fc2fcfbcc
                                                            • Opcode Fuzzy Hash: 21b24994abf4e3bc49371f84719c4a383e80acadeb61a9677897416c6c1ed5cc
                                                            • Instruction Fuzzy Hash: DE11E771600200AFEB208B15DD85FA6BBE8DF45724F1484AAED05CB691D774E5488AB5
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            APIs
                                                            • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 05070206
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.4133020343.0000000005070000.00000040.00000800.00020000.00000000.sdmp, Offset: 05070000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_5070000_server.jbxd
                                                            Similarity
                                                            • API ID: DuplicateHandle
                                                            • String ID:
                                                            • API String ID: 3793708945-0
                                                            • Opcode ID: 77033b1a5d39ad6c500051c1514df5a0aa8d51293d58a9f6fdb86442487ae240
                                                            • Instruction ID: 2c8b80b3fbc17af8b0e6d0ed7e6cd6f26cd1022875e8461326f7e35a062a6b81
                                                            • Opcode Fuzzy Hash: 77033b1a5d39ad6c500051c1514df5a0aa8d51293d58a9f6fdb86442487ae240
                                                            • Instruction Fuzzy Hash: A021D8314493809FCB228F50DC44A56FFF4FF46320F0889DAE9858F562C275A419CF62
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            APIs
                                                            • ReadFile.KERNELBASE(?,00000E24,5350A5DA,00000000,00000000,00000000,00000000), ref: 05070CB1
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.4133020343.0000000005070000.00000040.00000800.00020000.00000000.sdmp, Offset: 05070000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_5070000_server.jbxd
                                                            Similarity
                                                            • API ID: FileRead
                                                            • String ID:
                                                            • API String ID: 2738559852-0
                                                            • Opcode ID: 866207119e81f50d24d2886d4c3cb06bc24f8610828049fc500b07cdfe622198
                                                            • Instruction ID: af4dccc32801447417140d03a3bb574471f061f82e6d5b270213b09234cdda42
                                                            • Opcode Fuzzy Hash: 866207119e81f50d24d2886d4c3cb06bc24f8610828049fc500b07cdfe622198
                                                            • Instruction Fuzzy Hash: D2110472900204AFEB21CF55DD44FAAFBE8EF04314F08855AE9498B641C375A508CFB6
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            APIs
                                                            • ioctlsocket.WS2_32(?,00000E24,5350A5DA,00000000,00000000,00000000,00000000), ref: 05072E7B
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.4133020343.0000000005070000.00000040.00000800.00020000.00000000.sdmp, Offset: 05070000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_5070000_server.jbxd
                                                            Similarity
                                                            • API ID: ioctlsocket
                                                            • String ID:
                                                            • API String ID: 3577187118-0
                                                            • Opcode ID: 2cce27a14a3caad75d6de7b491d12903bdfc52c54c8efb87af22e6dd56f00071
                                                            • Instruction ID: 3f60815f533d9072148305902c0ece89278fa72efc9e6192d99479c0f0173a46
                                                            • Opcode Fuzzy Hash: 2cce27a14a3caad75d6de7b491d12903bdfc52c54c8efb87af22e6dd56f00071
                                                            • Instruction Fuzzy Hash: 3E110675900244AFEB20CF55DD44FAAFBE8EF04324F08846AEE48DB641C374A548CBB6
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            APIs
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.4127292440.0000000000B0A000.00000040.00000800.00020000.00000000.sdmp, Offset: 00B0A000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_b0a000_server.jbxd
                                                            Similarity
                                                            • API ID: Initialize
                                                            • String ID:
                                                            • API String ID: 2538663250-0
                                                            • Opcode ID: 0938bbec7b620f80b5236e87b1195ce5d1b1b2a4dd9e3951dbeb40d4e5dd053f
                                                            • Instruction ID: 64e166ff5fce60e59dd2e637cc84532f4c2a7ade92840b1120e50c27672875c9
                                                            • Opcode Fuzzy Hash: 0938bbec7b620f80b5236e87b1195ce5d1b1b2a4dd9e3951dbeb40d4e5dd053f
                                                            • Instruction Fuzzy Hash: 001160715493C05FDB128B25DC45792BFB4EF47220F0888DADD848F563C275A948DB62
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            APIs
                                                            • shutdown.WS2_32(?,00000E24,5350A5DA,00000000,00000000,00000000,00000000), ref: 05071790
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.4133020343.0000000005070000.00000040.00000800.00020000.00000000.sdmp, Offset: 05070000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_5070000_server.jbxd
                                                            Similarity
                                                            • API ID: shutdown
                                                            • String ID:
                                                            • API String ID: 2510479042-0
                                                            • Opcode ID: 8c4d10fa9cf23c91a26f3875061e9bbfe690ca2987fcaf4c93048ca84338c20f
                                                            • Instruction ID: 6e23db882e69d01b11dd5899aa11315bfe0458aeede0b698fc52bc616badec0d
                                                            • Opcode Fuzzy Hash: 8c4d10fa9cf23c91a26f3875061e9bbfe690ca2987fcaf4c93048ca84338c20f
                                                            • Instruction Fuzzy Hash: 2011C671A00204AFEB10CF55DD84BAAB7E8EF45624F148496ED44DB681D374A548CAB6
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            APIs
                                                            • SetErrorMode.KERNELBASE(?), ref: 00B0A330
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.4127292440.0000000000B0A000.00000040.00000800.00020000.00000000.sdmp, Offset: 00B0A000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_b0a000_server.jbxd
                                                            Similarity
                                                            • API ID: ErrorMode
                                                            • String ID:
                                                            • API String ID: 2340568224-0
                                                            • Opcode ID: 0ceb80cbfca5cbf94da5d1199e1a8c918f227ea33a3e0052be70551077a1ca8c
                                                            • Instruction ID: 103a5e0324609009b4affbae63153c68e9102f3fd3726a2fb66f718acebcb271
                                                            • Opcode Fuzzy Hash: 0ceb80cbfca5cbf94da5d1199e1a8c918f227ea33a3e0052be70551077a1ca8c
                                                            • Instruction Fuzzy Hash: A71182714093C06FDB128B25DC54662BFB4DF47220F0984DBED858F1A3C2656918D772
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            APIs
                                                            • LoadLibraryA.KERNELBASE(?,00000E24), ref: 05071FC7
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.4133020343.0000000005070000.00000040.00000800.00020000.00000000.sdmp, Offset: 05070000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_5070000_server.jbxd
                                                            Similarity
                                                            • API ID: LibraryLoad
                                                            • String ID:
                                                            • API String ID: 1029625771-0
                                                            • Opcode ID: 7eaeb1cd283108f2c74d964749d3fa7e599e841d484fb0fb149b0677de86c05c
                                                            • Instruction ID: d95544480de8f5b4549f540f2feb8d9e4ae5974fe44f675a8bec0a93a5707534
                                                            • Opcode Fuzzy Hash: 7eaeb1cd283108f2c74d964749d3fa7e599e841d484fb0fb149b0677de86c05c
                                                            • Instruction Fuzzy Hash: E311E571A04604AEE720DB15ED42FBAF7E8EF04724F148059EE488A781D3B5A548CAB6
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            APIs
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.4133020343.0000000005070000.00000040.00000800.00020000.00000000.sdmp, Offset: 05070000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_5070000_server.jbxd
                                                            Similarity
                                                            • API ID: select
                                                            • String ID:
                                                            • API String ID: 1274211008-0
                                                            • Opcode ID: 2dbd298a2ccff06bb3679c4af492f651f6621f0b9f73ae7e74e717d80450dc00
                                                            • Instruction ID: 1b1a585abaae901b1e73cc94e8d2b84d562742d5e450f13fe1b38d2b2e832701
                                                            • Opcode Fuzzy Hash: 2dbd298a2ccff06bb3679c4af492f651f6621f0b9f73ae7e74e717d80450dc00
                                                            • Instruction Fuzzy Hash: 86118F75A002459FDB60CF15E885F6AFBE8FF08610F0884AADD49CB656D371E508CB76
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            APIs
                                                            • CopyFileW.KERNELBASE(?,?,?), ref: 00B0AE1E
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.4127292440.0000000000B0A000.00000040.00000800.00020000.00000000.sdmp, Offset: 00B0A000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_b0a000_server.jbxd
                                                            Similarity
                                                            • API ID: CopyFile
                                                            • String ID:
                                                            • API String ID: 1304948518-0
                                                            • Opcode ID: 2eec607f7f28281ce4ba1608afd60c0cb70a5048e0274e964ca2461d1a818d7d
                                                            • Instruction ID: 906283af631b785ce87065792db38bbfe964e6f8d84ec220f84d49dcc0d0cbf9
                                                            • Opcode Fuzzy Hash: 2eec607f7f28281ce4ba1608afd60c0cb70a5048e0274e964ca2461d1a818d7d
                                                            • Instruction Fuzzy Hash: CD1182726003008FDB10CF25D885B56FFE8EF14710F1888AADD49DB682D235D844CA62
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            APIs
                                                            • LookupPrivilegeValueW.ADVAPI32(?,?,?), ref: 00B0B792
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.4127292440.0000000000B0A000.00000040.00000800.00020000.00000000.sdmp, Offset: 00B0A000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_b0a000_server.jbxd
                                                            Similarity
                                                            • API ID: LookupPrivilegeValue
                                                            • String ID:
                                                            • API String ID: 3899507212-0
                                                            • Opcode ID: 2eec607f7f28281ce4ba1608afd60c0cb70a5048e0274e964ca2461d1a818d7d
                                                            • Instruction ID: e9b134483391b628f3c03e1d6fbfbb6bec90d65f52c1bbca9dc999a693741356
                                                            • Opcode Fuzzy Hash: 2eec607f7f28281ce4ba1608afd60c0cb70a5048e0274e964ca2461d1a818d7d
                                                            • Instruction Fuzzy Hash: 0F11A172A002409FDB60CF25D885B66FBE8EF55720F08C4AADD49CB782D735E804CA72
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            APIs
                                                            • GetFileType.KERNELBASE(?,00000E24,5350A5DA,00000000,00000000,00000000,00000000), ref: 00B0B009
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.4127292440.0000000000B0A000.00000040.00000800.00020000.00000000.sdmp, Offset: 00B0A000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_b0a000_server.jbxd
                                                            Similarity
                                                            • API ID: FileType
                                                            • String ID:
                                                            • API String ID: 3081899298-0
                                                            • Opcode ID: dbf22dfced573817ade8a38146cf57f180a2335e3f09662bf9bb0037de719bc7
                                                            • Instruction ID: 6f1fa04d6e5092781fb3638c9f05d8acca279e0517880ed528a0abaec3869493
                                                            • Opcode Fuzzy Hash: dbf22dfced573817ade8a38146cf57f180a2335e3f09662bf9bb0037de719bc7
                                                            • Instruction Fuzzy Hash: CC01C471500200AEE7208B05DD85FA7BBECEF15724F188096ED098B681D375E5488AB6
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            APIs
                                                            • WaitForInputIdle.USER32(?,?), ref: 00B0AA3B
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.4127292440.0000000000B0A000.00000040.00000800.00020000.00000000.sdmp, Offset: 00B0A000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_b0a000_server.jbxd
                                                            Similarity
                                                            • API ID: IdleInputWait
                                                            • String ID:
                                                            • API String ID: 2200289081-0
                                                            • Opcode ID: 21d37300ba3ffeb659baf399756542556e16921e200af69bc1c706c8a665fc15
                                                            • Instruction ID: afcd3cb678345597906f5ad75bc3587fcbd537c65e1a5fff4b01b806aee003ec
                                                            • Opcode Fuzzy Hash: 21d37300ba3ffeb659baf399756542556e16921e200af69bc1c706c8a665fc15
                                                            • Instruction Fuzzy Hash: E2119E715097809FDB118F55DD84B56BFF4EF46320F0888DAED858B2A2D279A908CB62
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            APIs
                                                            • K32EnumProcesses.KERNEL32(?,?,?,5350A5DA,00000000,?,?,?,?,?,?,?,?,6C9C3C58), ref: 05070096
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.4133020343.0000000005070000.00000040.00000800.00020000.00000000.sdmp, Offset: 05070000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_5070000_server.jbxd
                                                            Similarity
                                                            • API ID: EnumProcesses
                                                            • String ID:
                                                            • API String ID: 84517404-0
                                                            • Opcode ID: da5ca134cb5db454a579de05d577cccb6e3bff4f70888dad337ddfb67f85be81
                                                            • Instruction ID: fd23d3006f2f5e99c23ed642e4a4505d5b53c741c158b65f808fcf7585cfc56e
                                                            • Opcode Fuzzy Hash: da5ca134cb5db454a579de05d577cccb6e3bff4f70888dad337ddfb67f85be81
                                                            • Instruction Fuzzy Hash: C611A571A002449FDB50CF65D844B6AFBE4FF04220F08C46ADD45CB652D675E544CFA6
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            APIs
                                                            • WSAConnect.WS2_32(?,?,?,?,?,?,?), ref: 05071C22
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.4133020343.0000000005070000.00000040.00000800.00020000.00000000.sdmp, Offset: 05070000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_5070000_server.jbxd
                                                            Similarity
                                                            • API ID: Connect
                                                            • String ID:
                                                            • API String ID: 3144859779-0
                                                            • Opcode ID: 2559f521966b17eb113467169aae7a279ba6cada54fd31ef33c38ff049c7b4e8
                                                            • Instruction ID: 2875a64212193d39a6d714669a2ef43c0cac3be7d18fba78b9659773a56f94b3
                                                            • Opcode Fuzzy Hash: 2559f521966b17eb113467169aae7a279ba6cada54fd31ef33c38ff049c7b4e8
                                                            • Instruction Fuzzy Hash: FE1170719006489FDB20CF95D844B66FBF5FF08210F0884AADD458B652D335E518DF66
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            APIs
                                                            • SetFileAttributesW.KERNELBASE(?,?), ref: 00B0AC97
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.4127292440.0000000000B0A000.00000040.00000800.00020000.00000000.sdmp, Offset: 00B0A000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_b0a000_server.jbxd
                                                            Similarity
                                                            • API ID: AttributesFile
                                                            • String ID:
                                                            • API String ID: 3188754299-0
                                                            • Opcode ID: 97b150ddd8cd9f8e41d0706f7328cb717caac9f8b1e2d2bfb0babdf975d1a8e9
                                                            • Instruction ID: 52b5611360c105552a56a3ce8cfda8282a941c30fa5f2b47d0366475bcb0bf12
                                                            • Opcode Fuzzy Hash: 97b150ddd8cd9f8e41d0706f7328cb717caac9f8b1e2d2bfb0babdf975d1a8e9
                                                            • Instruction Fuzzy Hash: 4D0180716003409FEB60CF15DC85766FBE8EF15320F0888AADD45CB782D675D944DA62
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            APIs
                                                            • EnumWindows.USER32(?,00000E24,?,?), ref: 00B0A10E
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.4127292440.0000000000B0A000.00000040.00000800.00020000.00000000.sdmp, Offset: 00B0A000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_b0a000_server.jbxd
                                                            Similarity
                                                            • API ID: EnumWindows
                                                            • String ID:
                                                            • API String ID: 1129996299-0
                                                            • Opcode ID: 347276b476c20f37876d39377097fead5342e6b784f2bd946a8318020807f654
                                                            • Instruction ID: 528e995d36d2de3b1f840bcd3cf778411f6c162d0a48ad6aa55f12ee95c4aec6
                                                            • Opcode Fuzzy Hash: 347276b476c20f37876d39377097fead5342e6b784f2bd946a8318020807f654
                                                            • Instruction Fuzzy Hash: 5901BC71A00200AFD310DF16DD86B66FBE8FB88A20F14816AED089BB41D735B915CBE5
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            APIs
                                                            • GetVolumeInformationA.KERNELBASE(?,00000E24,?,?), ref: 05071D22
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.4133020343.0000000005070000.00000040.00000800.00020000.00000000.sdmp, Offset: 05070000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_5070000_server.jbxd
                                                            Similarity
                                                            • API ID: InformationVolume
                                                            • String ID:
                                                            • API String ID: 2039140958-0
                                                            • Opcode ID: 7eb81f5ef438f5aa5f21e13296efe92aeb95073d3e1cfdf1d0a46c9fff6721ed
                                                            • Instruction ID: a9610c70029c429c09e26eff283954a97d98d2e2f97b1dee8b6f8e4f61427105
                                                            • Opcode Fuzzy Hash: 7eb81f5ef438f5aa5f21e13296efe92aeb95073d3e1cfdf1d0a46c9fff6721ed
                                                            • Instruction Fuzzy Hash: AC01B171A00200AFD310DF16DD45B66FBE8FB88A20F14811AED089BB41D731B915CBE5
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            APIs
                                                            • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 05070206
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.4133020343.0000000005070000.00000040.00000800.00020000.00000000.sdmp, Offset: 05070000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_5070000_server.jbxd
                                                            Similarity
                                                            • API ID: DuplicateHandle
                                                            • String ID:
                                                            • API String ID: 3793708945-0
                                                            • Opcode ID: 7af997591f15b6456c86904ab53279485f07584fe19ac69bfa9c7d458332d145
                                                            • Instruction ID: 1ac5eed7c278734a2ee13ce601be371f31f5eb57d98c8d642dea189e98a5e117
                                                            • Opcode Fuzzy Hash: 7af997591f15b6456c86904ab53279485f07584fe19ac69bfa9c7d458332d145
                                                            • Instruction Fuzzy Hash: 2F01A1329007449FDB60CF51E944B66FBE1FF09310F08855ADE454A612C336E019DF62
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            APIs
                                                            • FindCloseChangeNotification.KERNELBASE(?), ref: 00B0BA68
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.4127292440.0000000000B0A000.00000040.00000800.00020000.00000000.sdmp, Offset: 00B0A000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_b0a000_server.jbxd
                                                            Similarity
                                                            • API ID: ChangeCloseFindNotification
                                                            • String ID:
                                                            • API String ID: 2591292051-0
                                                            • Opcode ID: a9d0961e43f1087304e1646f139896bdaa9a99fdf46d250e42a5633f3a4c747b
                                                            • Instruction ID: 6975a088155f8b75fa349ea9d3da28d4537d22bfc8ffc597637827fdd432d627
                                                            • Opcode Fuzzy Hash: a9d0961e43f1087304e1646f139896bdaa9a99fdf46d250e42a5633f3a4c747b
                                                            • Instruction Fuzzy Hash: B901BC71A002408FDB108F15D884B62BBE4EF55320F08C0AADD498BA96D775E908CAB2
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            APIs
                                                            • FindCloseChangeNotification.KERNELBASE(?), ref: 00B0A780
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.4127292440.0000000000B0A000.00000040.00000800.00020000.00000000.sdmp, Offset: 00B0A000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_b0a000_server.jbxd
                                                            Similarity
                                                            • API ID: ChangeCloseFindNotification
                                                            • String ID:
                                                            • API String ID: 2591292051-0
                                                            • Opcode ID: a38cefed1e02dba5bd7f94c0db93660a241d8648fe7cba64fab868b1a933be2e
                                                            • Instruction ID: 0cc53e13c0d239c4dcb7d8485aaace55a7da49352a7102166e8f15ffe816421d
                                                            • Opcode Fuzzy Hash: a38cefed1e02dba5bd7f94c0db93660a241d8648fe7cba64fab868b1a933be2e
                                                            • Instruction Fuzzy Hash: 9A01DF71A003408FEB108F15D985766FBE4EF15320F08C8ABDD498B782D675E908CEA2
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            APIs
                                                            • RegQueryValueExW.KERNELBASE(?,00000E24,?,?), ref: 05070E6E
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.4133020343.0000000005070000.00000040.00000800.00020000.00000000.sdmp, Offset: 05070000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_5070000_server.jbxd
                                                            Similarity
                                                            • API ID: QueryValue
                                                            • String ID:
                                                            • API String ID: 3660427363-0
                                                            • Opcode ID: 8fc5d6bc21203cac34908224125f9d70a0d01ce83206470f923a794490c5fec5
                                                            • Instruction ID: 118378bced550c9301c2edb3bbfce7622fefed8807433d4a903d94acbdf19544
                                                            • Opcode Fuzzy Hash: 8fc5d6bc21203cac34908224125f9d70a0d01ce83206470f923a794490c5fec5
                                                            • Instruction Fuzzy Hash: A401A271500600ABD210DF16DD46B66FBE8FB88A20F14811AED089BB41D771F955CBE5
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            APIs
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.4127292440.0000000000B0A000.00000040.00000800.00020000.00000000.sdmp, Offset: 00B0A000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_b0a000_server.jbxd
                                                            Similarity
                                                            • API ID: send
                                                            • String ID:
                                                            • API String ID: 2809346765-0
                                                            • Opcode ID: 2d63e88e8852096802cba43fd98c9d58d6a3bf539cf1b90f048ce5be4e3ea240
                                                            • Instruction ID: 539780549e32b876b085f2fb36ff97ca2540f621b16b96bdf26e7adbc1f8ff9f
                                                            • Opcode Fuzzy Hash: 2d63e88e8852096802cba43fd98c9d58d6a3bf539cf1b90f048ce5be4e3ea240
                                                            • Instruction Fuzzy Hash: 37019E319043409FDB20CF55D884B62FFE4FF15720F08889ADD499B652C275E518DBA2
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            APIs
                                                            • WaitForInputIdle.USER32(?,?), ref: 00B0AA3B
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.4127292440.0000000000B0A000.00000040.00000800.00020000.00000000.sdmp, Offset: 00B0A000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_b0a000_server.jbxd
                                                            Similarity
                                                            • API ID: IdleInputWait
                                                            • String ID:
                                                            • API String ID: 2200289081-0
                                                            • Opcode ID: 92a3e940c86db0b49bc28f033934a3c501708f6416b16865dd88e861cc22d16d
                                                            • Instruction ID: 20262eefddeb44ac085d70cf3d0ed2ee8e5c1f249a73e9bcbf1bacc57b4b8842
                                                            • Opcode Fuzzy Hash: 92a3e940c86db0b49bc28f033934a3c501708f6416b16865dd88e861cc22d16d
                                                            • Instruction Fuzzy Hash: D7018F71A006409FDB10CF15D984766FFE4EF15720F08C8AADD498B696D275E508CEA2
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            APIs
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.4127292440.0000000000B0A000.00000040.00000800.00020000.00000000.sdmp, Offset: 00B0A000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_b0a000_server.jbxd
                                                            Similarity
                                                            • API ID: Initialize
                                                            • String ID:
                                                            • API String ID: 2538663250-0
                                                            • Opcode ID: 7aa2dde8c486268be79f7ceb28ce6e703bbb148d1012eae5e96bc0d15ee49ff8
                                                            • Instruction ID: b1a9b8cc7eae0cdbd10d087245a93aa2da6fa3891baace3a8c5356d23b6690c7
                                                            • Opcode Fuzzy Hash: 7aa2dde8c486268be79f7ceb28ce6e703bbb148d1012eae5e96bc0d15ee49ff8
                                                            • Instruction Fuzzy Hash: AF018B71A003409FDB10CF15D984762FFE4EF15320F08C8EADD498B696D279A948CAA2
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            APIs
                                                            • SetErrorMode.KERNELBASE(?), ref: 00B0A330
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.4127292440.0000000000B0A000.00000040.00000800.00020000.00000000.sdmp, Offset: 00B0A000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_b0a000_server.jbxd
                                                            Similarity
                                                            • API ID: ErrorMode
                                                            • String ID:
                                                            • API String ID: 2340568224-0
                                                            • Opcode ID: f40358177e011d405e5ac9ecb511b5e5720d3008ba27757217a5d96e8ee2bf92
                                                            • Instruction ID: c0f940ebb6364be40ab382131ec3e59db830a21e23ff9b52816fdeef54451ef6
                                                            • Opcode Fuzzy Hash: f40358177e011d405e5ac9ecb511b5e5720d3008ba27757217a5d96e8ee2bf92
                                                            • Instruction Fuzzy Hash: 36F087359047409FDB208F19D889762FFE4EF15720F08C4DADE494B792D2B9E908DAA7
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.4128092085.00000000010A0000.00000040.00000020.00020000.00000000.sdmp, Offset: 010A0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_10a0000_server.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: f0b932333b46cff4d1bbdc288b83cf39c3e6147adbc43c5e118718d0279f3a4b
                                                            • Instruction ID: f75f8025dbe64b251f4b88e62af4b26600b1c15dc10ccccea066ceff432b52ec
                                                            • Opcode Fuzzy Hash: f0b932333b46cff4d1bbdc288b83cf39c3e6147adbc43c5e118718d0279f3a4b
                                                            • Instruction Fuzzy Hash: 9E212F7550D7C09FD7138B299855B62BFB8EF43614F0A84DBD8848F5A3C2296808CBB2
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.4128092085.00000000010A0000.00000040.00000020.00020000.00000000.sdmp, Offset: 010A0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_10a0000_server.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 07f3c33f8d4fdad7179731cb83e1e8328f71a5ae0b2bcac7412107287f9a98f7
                                                            • Instruction ID: e3e8f54948f0c37b294f0bd8f27ecfb176e09e2413e5947abfad5ecc14695ea4
                                                            • Opcode Fuzzy Hash: 07f3c33f8d4fdad7179731cb83e1e8328f71a5ae0b2bcac7412107287f9a98f7
                                                            • Instruction Fuzzy Hash: 7D21E2316083C48FD707CB60D850B55BFB1AB47318F1986EEE4C94BAA7C3368816C752
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.4128092085.00000000010A0000.00000040.00000020.00020000.00000000.sdmp, Offset: 010A0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_10a0000_server.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 0fc8a3efbc20b381f9892bfe22b4100c4211e330072d63e004162ab5d9a68790
                                                            • Instruction ID: 2b97526636b22470e3404be89828a9a3f32474ad08be9bab76f88c837689d3dd
                                                            • Opcode Fuzzy Hash: 0fc8a3efbc20b381f9892bfe22b4100c4211e330072d63e004162ab5d9a68790
                                                            • Instruction Fuzzy Hash: 7711B47154D7C09FD752CF15DC54B62BFF8EB42620F0984EBE9848B693C279A808CB62
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.4136602609.00000000055E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 055E0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_55e0000_server.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: bb31479f443fbb5100171644a593876acb2234e9c8e0c63d2ea8a3d3b081cdf8
                                                            • Instruction ID: 6c7fde84f1fe1db651a5818adef1ff904dc281fec3ecae8ca31dfda01518a1e4
                                                            • Opcode Fuzzy Hash: bb31479f443fbb5100171644a593876acb2234e9c8e0c63d2ea8a3d3b081cdf8
                                                            • Instruction Fuzzy Hash: F311BAB5A08341AFD350CF19D840A5BFBE4FB98664F04895EF998D7311D231E9048FA2
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.4128092085.00000000010A0000.00000040.00000020.00020000.00000000.sdmp, Offset: 010A0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_10a0000_server.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: ab2b6342902666777232a6c37d1bdd437fa53a7af611f13f3bae943f8f0246f9
                                                            • Instruction ID: b6c54e5594b6a266392ed829c76719b399108a380a3a337f6ce1a87c73a1f5ef
                                                            • Opcode Fuzzy Hash: ab2b6342902666777232a6c37d1bdd437fa53a7af611f13f3bae943f8f0246f9
                                                            • Instruction Fuzzy Hash: 6911E4302042889FE311CB54D940B25FBE5EB89718F24C99CF9894B757C737D813CA41
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.4127660109.0000000000DEA000.00000040.00000800.00020000.00000000.sdmp, Offset: 00DEA000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_dea000_server.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 7399b37d134aafae4a85cee3cc4ee02c71be98472cfe8500c9247e395605f8f3
                                                            • Instruction ID: 9d1ba37e899541c170b4362c6c8b6779df10d085f99a71fa846a5d4f8039f92d
                                                            • Opcode Fuzzy Hash: 7399b37d134aafae4a85cee3cc4ee02c71be98472cfe8500c9247e395605f8f3
                                                            • Instruction Fuzzy Hash: 8611BAB5A08301AFD750CF09DC41E57FBE8FB98660F04895EF95997711D271E9088FA2
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.4128092085.00000000010A0000.00000040.00000020.00020000.00000000.sdmp, Offset: 010A0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_10a0000_server.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 51778d0e55a54df2b5a7b8ee0f5bd8f0455e841626af14eefda8229295d968ab
                                                            • Instruction ID: 1fdaaed356f1095520d148d9f5475c376cfc7eb6ff9404d1684bfe96f2f6a55a
                                                            • Opcode Fuzzy Hash: 51778d0e55a54df2b5a7b8ee0f5bd8f0455e841626af14eefda8229295d968ab
                                                            • Instruction Fuzzy Hash: DA01D4316086C0DFD7518F59D980766FBE8EB45664F08C4AADD4A4BB42C379E408CBA2
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.4128092085.00000000010A0000.00000040.00000020.00020000.00000000.sdmp, Offset: 010A0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_10a0000_server.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 267b73a485027d5d378c7d68a2ef436162dfe26682f53bfafff037151d65f7ea
                                                            • Instruction ID: 7a2306cf7c9cd1c12ec53220932a81d9d675edaa50a0fe8f4ab0127a3c0ca96a
                                                            • Opcode Fuzzy Hash: 267b73a485027d5d378c7d68a2ef436162dfe26682f53bfafff037151d65f7ea
                                                            • Instruction Fuzzy Hash: 8A0126B54097805FC3118B16EC40893BFF8EF8623070980ABEC498B612D125B908CBA2
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.4128092085.00000000010A0000.00000040.00000020.00020000.00000000.sdmp, Offset: 010A0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_10a0000_server.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: e6850d79e688ef7387407e307c00caab001beb49244c143f541758b1d055de9a
                                                            • Instruction ID: ed45481b99281e1bee1bef3a459d0b5012ae02ab9d52edd67d7f80a0d2a3d2d8
                                                            • Opcode Fuzzy Hash: e6850d79e688ef7387407e307c00caab001beb49244c143f541758b1d055de9a
                                                            • Instruction Fuzzy Hash: 38F01D35104644DFD306CF44D540B15FBE2EB89718F24CAADE98907756C737E813DA81
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.4128092085.00000000010A0000.00000040.00000020.00020000.00000000.sdmp, Offset: 010A0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_10a0000_server.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 14e73779090d804e37b2972d940f5b5600cc8e0258b1e56252a5f443b47911ad
                                                            • Instruction ID: c1d5936912db44bb002b1b22396ac3097931826189b5b0da335d45ad75a12476
                                                            • Opcode Fuzzy Hash: 14e73779090d804e37b2972d940f5b5600cc8e0258b1e56252a5f443b47911ad
                                                            • Instruction Fuzzy Hash: ADE092B6600A404B9750DF0AFC41452F7E8EB84630708C07FDC0D8BB01D636F508CAA5
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.4136602609.00000000055E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 055E0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_55e0000_server.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: e956ef5b5b07496910f1975204c73c993947cb60a20eddab4f8ec66cff0a8ca5
                                                            • Instruction ID: fa63e7c037bf69c0638c7655e11700c899502541dac7633637160898db5c1339
                                                            • Opcode Fuzzy Hash: e956ef5b5b07496910f1975204c73c993947cb60a20eddab4f8ec66cff0a8ca5
                                                            • Instruction Fuzzy Hash: 72E0D8B254030067D7109E06AC45F53FBD8EB54A71F04C467EE081B742D172B51489E6
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.4136602609.00000000055E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 055E0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_55e0000_server.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: b2e576dd0e363e81b3a5016b778b8f44e9350cabf58bafcafe42cce23b8274ba
                                                            • Instruction ID: 28dcb83a4309c2c2317b0c3f9d2b297e85337e0526e20219523a2f47631b1ccd
                                                            • Opcode Fuzzy Hash: b2e576dd0e363e81b3a5016b778b8f44e9350cabf58bafcafe42cce23b8274ba
                                                            • Instruction Fuzzy Hash: D7E0D8B260020067D210DE06AC45F53FB98EB50A70F04C457EE091B702D172B514CDE6
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.4127660109.0000000000DEA000.00000040.00000800.00020000.00000000.sdmp, Offset: 00DEA000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_dea000_server.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 924bc4bb904a3e8076035bfd0d8fb15c7e16dbecf080d5233244bb8c99ebbf5e
                                                            • Instruction ID: 60b2c4e38d169a1e3cab8ddfb8011ee564ef16aeee2a3fbcef7f8641a24cad7d
                                                            • Opcode Fuzzy Hash: 924bc4bb904a3e8076035bfd0d8fb15c7e16dbecf080d5233244bb8c99ebbf5e
                                                            • Instruction Fuzzy Hash: 58E0D8B254020467D2109E06AC45F53FB98EB50A31F04C557EE091B702D172B50489F6
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.4127276605.0000000000B02000.00000040.00000800.00020000.00000000.sdmp, Offset: 00B02000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_b02000_server.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: e68369b0af3616730d07cbd3a726766d501bb35ee9b1fa1a8ec3d5a727c850c3
                                                            • Instruction ID: 203cb6d266a76c33bb469bb11c5bf7ed6a8b70733b0b0d983cf54bcac1ccee40
                                                            • Opcode Fuzzy Hash: e68369b0af3616730d07cbd3a726766d501bb35ee9b1fa1a8ec3d5a727c850c3
                                                            • Instruction Fuzzy Hash: 2FD05E792056C14FD3169B1CC1A9B993BD8AB61714F4A44F9AC008B7B3C768D985D600
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.4127276605.0000000000B02000.00000040.00000800.00020000.00000000.sdmp, Offset: 00B02000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_b02000_server.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: c0b64d37259a502dbed9d922b58d2bff0f3e9ed4804bcf037fbb6077edbdc4b7
                                                            • Instruction ID: 5ac64cd7b69bac3c2670126269a0920fb752f62a69bd487ad9c5b1dcb0371130
                                                            • Opcode Fuzzy Hash: c0b64d37259a502dbed9d922b58d2bff0f3e9ed4804bcf037fbb6077edbdc4b7
                                                            • Instruction Fuzzy Hash: 6BD05E342002814FCB15DB0CD6D9F593BD8AB50B14F1A44E8AC108B7A2C7B8D8C5CA00
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            Execution Graph

                                                            Execution Coverage:11%
                                                            Dynamic/Decrypted Code Coverage:100%
                                                            Signature Coverage:0%
                                                            Total number of Nodes:12
                                                            Total number of Limit Nodes:0
                                                            execution_graph 528 e1a361 530 e1a392 RegQueryValueExW 528->530 531 e1a41b 530->531 532 e1a462 534 e1a486 RegSetValueExW 532->534 535 e1a507 534->535 536 e1a612 539 e1a646 CreateMutexW 536->539 538 e1a6c1 539->538 520 e1a646 522 e1a67e CreateMutexW 520->522 523 e1a6c1 522->523

                                                            Callgraph

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 0 1230310-1230334 2 1230336-1230338 0->2 3 123033e-1230346 0->3 2->3 4 1230348-123034d 3->4 5 123034e-123035c 3->5 7 1230362-1230391 5->7 8 123035e-1230360 5->8 11 1230393-12303bb 7->11 12 12303d8-12303ff 7->12 8->7 17 12303ce 11->17 18 123040a-1230418 12->18 17->12 19 123041a 18->19 20 123041f-1230434 18->20 19->20 22 1230436-1230460 20->22 23 123046b-1230523 20->23 22->23 42 1230570-1230587 23->42 43 1230525-1230569 23->43 44 1230880 42->44 45 123058d-12305bf 42->45 43->42 45->44
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000008.00000002.1972603089.0000000001230000.00000040.00000800.00020000.00000000.sdmp, Offset: 01230000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_8_2_1230000_server.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID: 2l$2l$2l
                                                            • API String ID: 0-1498361692
                                                            • Opcode ID: b83d7c96fbacada1f8c31f3531058a6e08137c399544cd936899d87511c51a80
                                                            • Instruction ID: 6407f0ad263cea15671284a2d2a7ae95fd2d08654990a25e8c2d5ed79ae48a77
                                                            • Opcode Fuzzy Hash: b83d7c96fbacada1f8c31f3531058a6e08137c399544cd936899d87511c51a80
                                                            • Instruction Fuzzy Hash: FD5134307102018FD718EB3998216BE37E7ABC92087144569E106EB7E5DF79CD06CBA6
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 56 12303bd-1230418 64 123041a 56->64 65 123041f-1230434 56->65 64->65 67 1230436-1230460 65->67 68 123046b-1230523 65->68 67->68 87 1230570-1230587 68->87 88 1230525-1230569 68->88 89 1230880 87->89 90 123058d-12305bf 87->90 88->87 90->89
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000008.00000002.1972603089.0000000001230000.00000040.00000800.00020000.00000000.sdmp, Offset: 01230000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_8_2_1230000_server.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID: 2l$2l$2l
                                                            • API String ID: 0-1498361692
                                                            • Opcode ID: a0e9b373198d6c6fb5b25445f9249ae1beab6a172ffb332b9c680fe12a18a82c
                                                            • Instruction ID: 7ddd8876dff6be858e125e9846e971402b80c7a5c60f51c320d79a7ad40b236a
                                                            • Opcode Fuzzy Hash: a0e9b373198d6c6fb5b25445f9249ae1beab6a172ffb332b9c680fe12a18a82c
                                                            • Instruction Fuzzy Hash: A141E3307001118FCB18AB7A94267BD32D35FD9208714556DE106EBBA5EF68CD0A97E7
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 101 e1a612-e1a695 105 e1a697 101->105 106 e1a69a-e1a6a3 101->106 105->106 107 e1a6a5 106->107 108 e1a6a8-e1a6b1 106->108 107->108 109 e1a6b3-e1a6d7 CreateMutexW 108->109 110 e1a702-e1a707 108->110 113 e1a709-e1a70e 109->113 114 e1a6d9-e1a6ff 109->114 110->109 113->114
                                                            APIs
                                                            • CreateMutexW.KERNELBASE(?,?), ref: 00E1A6B9
                                                            Memory Dump Source
                                                            • Source File: 00000008.00000002.1972417597.0000000000E1A000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E1A000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_8_2_e1a000_server.jbxd
                                                            Similarity
                                                            • API ID: CreateMutex
                                                            • String ID:
                                                            • API String ID: 1964310414-0
                                                            • Opcode ID: 7c1f44407afa941523934b7bcfe8dde4470de5c4026fcd0cfa4b8e4faae3c92f
                                                            • Instruction ID: 17b6fb398133d129a0f36c2717cab7729fd2a36ba4526e3b76cd8e9790316f34
                                                            • Opcode Fuzzy Hash: 7c1f44407afa941523934b7bcfe8dde4470de5c4026fcd0cfa4b8e4faae3c92f
                                                            • Instruction Fuzzy Hash: 9231A1715093805FE712CB65CD85BA6BFF8EF06314F0884AAE984CB292D375E909C762
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 117 e1a361-e1a3cf 120 e1a3d1 117->120 121 e1a3d4-e1a3dd 117->121 120->121 122 e1a3e2-e1a3e8 121->122 123 e1a3df 121->123 124 e1a3ea 122->124 125 e1a3ed-e1a404 122->125 123->122 124->125 127 e1a406-e1a419 RegQueryValueExW 125->127 128 e1a43b-e1a440 125->128 129 e1a442-e1a447 127->129 130 e1a41b-e1a438 127->130 128->127 129->130
                                                            APIs
                                                            • RegQueryValueExW.KERNELBASE(?,00000E24,D1785727,00000000,00000000,00000000,00000000), ref: 00E1A40C
                                                            Memory Dump Source
                                                            • Source File: 00000008.00000002.1972417597.0000000000E1A000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E1A000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_8_2_e1a000_server.jbxd
                                                            Similarity
                                                            • API ID: QueryValue
                                                            • String ID:
                                                            • API String ID: 3660427363-0
                                                            • Opcode ID: 1bb65d6b4df2c1fb6f89eaa3fd8364cf842dc4f1cb003f1fae1aa496c8f223fc
                                                            • Instruction ID: fd465016b397d490ee7ede62e481de3fb9f9c53432adb08480b6bc8d93f1929b
                                                            • Opcode Fuzzy Hash: 1bb65d6b4df2c1fb6f89eaa3fd8364cf842dc4f1cb003f1fae1aa496c8f223fc
                                                            • Instruction Fuzzy Hash: 5B319375505740AFD721CF15CC84FA6BBF8EF06314F08849AE985DB292D364E949CB72
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 134 e1a462-e1a4c3 137 e1a4c5 134->137 138 e1a4c8-e1a4d4 134->138 137->138 139 e1a4d6 138->139 140 e1a4d9-e1a4f0 138->140 139->140 142 e1a4f2-e1a505 RegSetValueExW 140->142 143 e1a527-e1a52c 140->143 144 e1a507-e1a524 142->144 145 e1a52e-e1a533 142->145 143->142 145->144
                                                            APIs
                                                            • RegSetValueExW.KERNELBASE(?,00000E24,D1785727,00000000,00000000,00000000,00000000), ref: 00E1A4F8
                                                            Memory Dump Source
                                                            • Source File: 00000008.00000002.1972417597.0000000000E1A000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E1A000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_8_2_e1a000_server.jbxd
                                                            Similarity
                                                            • API ID: Value
                                                            • String ID:
                                                            • API String ID: 3702945584-0
                                                            • Opcode ID: 3b41a0daedb167053f4e6bc6cf5a93699d21fad95f6475e4f8be335d1712e185
                                                            • Instruction ID: cf9c3bfdc799f74519a595dfbcaefa7fd4502e20efcf1fb8db4fd79495460d5b
                                                            • Opcode Fuzzy Hash: 3b41a0daedb167053f4e6bc6cf5a93699d21fad95f6475e4f8be335d1712e185
                                                            • Instruction Fuzzy Hash: 7D21C472505380AFD7228F11CC44FA3BFB8EF46314F08849AE985DB652C364E848C772
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 149 e1a646-e1a695 152 e1a697 149->152 153 e1a69a-e1a6a3 149->153 152->153 154 e1a6a5 153->154 155 e1a6a8-e1a6b1 153->155 154->155 156 e1a6b3-e1a6bb CreateMutexW 155->156 157 e1a702-e1a707 155->157 158 e1a6c1-e1a6d7 156->158 157->156 160 e1a709-e1a70e 158->160 161 e1a6d9-e1a6ff 158->161 160->161
                                                            APIs
                                                            • CreateMutexW.KERNELBASE(?,?), ref: 00E1A6B9
                                                            Memory Dump Source
                                                            • Source File: 00000008.00000002.1972417597.0000000000E1A000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E1A000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_8_2_e1a000_server.jbxd
                                                            Similarity
                                                            • API ID: CreateMutex
                                                            • String ID:
                                                            • API String ID: 1964310414-0
                                                            • Opcode ID: e57ade3b5c39528d045fb2881fbfb50d47c37f6846a8b0d66d2242c9952adb4f
                                                            • Instruction ID: 2f5b81917fecf115b993938a96448d899fe23d4033946da21a60ef27360210e9
                                                            • Opcode Fuzzy Hash: e57ade3b5c39528d045fb2881fbfb50d47c37f6846a8b0d66d2242c9952adb4f
                                                            • Instruction Fuzzy Hash: 1721CF71601200AFE720DF65CD85BA6FBE8EF05324F08846AED49DB781D371E948CA72
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 164 e1a392-e1a3cf 166 e1a3d1 164->166 167 e1a3d4-e1a3dd 164->167 166->167 168 e1a3e2-e1a3e8 167->168 169 e1a3df 167->169 170 e1a3ea 168->170 171 e1a3ed-e1a404 168->171 169->168 170->171 173 e1a406-e1a419 RegQueryValueExW 171->173 174 e1a43b-e1a440 171->174 175 e1a442-e1a447 173->175 176 e1a41b-e1a438 173->176 174->173 175->176
                                                            APIs
                                                            • RegQueryValueExW.KERNELBASE(?,00000E24,D1785727,00000000,00000000,00000000,00000000), ref: 00E1A40C
                                                            Memory Dump Source
                                                            • Source File: 00000008.00000002.1972417597.0000000000E1A000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E1A000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_8_2_e1a000_server.jbxd
                                                            Similarity
                                                            • API ID: QueryValue
                                                            • String ID:
                                                            • API String ID: 3660427363-0
                                                            • Opcode ID: ce78db38c39d7c74bb8504e940acb76fb92e93c53ba0dcb8e7faf7b15fc6586a
                                                            • Instruction ID: c22eb571d49f7704fffb094229377f1be3c651768502dedb3ed94f654d5ac15c
                                                            • Opcode Fuzzy Hash: ce78db38c39d7c74bb8504e940acb76fb92e93c53ba0dcb8e7faf7b15fc6586a
                                                            • Instruction Fuzzy Hash: 0F218C75601604AFE720CE15CC84FE6F7ECEF14714F18846AE946DB651D360E989CAB2
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 180 e1a486-e1a4c3 182 e1a4c5 180->182 183 e1a4c8-e1a4d4 180->183 182->183 184 e1a4d6 183->184 185 e1a4d9-e1a4f0 183->185 184->185 187 e1a4f2-e1a505 RegSetValueExW 185->187 188 e1a527-e1a52c 185->188 189 e1a507-e1a524 187->189 190 e1a52e-e1a533 187->190 188->187 190->189
                                                            APIs
                                                            • RegSetValueExW.KERNELBASE(?,00000E24,D1785727,00000000,00000000,00000000,00000000), ref: 00E1A4F8
                                                            Memory Dump Source
                                                            • Source File: 00000008.00000002.1972417597.0000000000E1A000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E1A000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_8_2_e1a000_server.jbxd
                                                            Similarity
                                                            • API ID: Value
                                                            • String ID:
                                                            • API String ID: 3702945584-0
                                                            • Opcode ID: b96ba52074cbc8887b6c53ebb2d627b18346284f57d2d60b46b188fe91c7637b
                                                            • Instruction ID: 6dc55dc37c8a1b17cd515ca361497da174f6d948f553e2e24f65b1f2ce1bed0b
                                                            • Opcode Fuzzy Hash: b96ba52074cbc8887b6c53ebb2d627b18346284f57d2d60b46b188fe91c7637b
                                                            • Instruction Fuzzy Hash: E111B176600600AFE7218E15CD45FF6FBECEF14714F08846AED45DA651D370E9888AB2
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 194 107026d-10705b1 196 10705b3-10705be 194->196 197 10705ee-1070603 194->197 201 1070606-1070620 197->201 202 1070626-1070643 201->202
                                                            Memory Dump Source
                                                            • Source File: 00000008.00000002.1972534397.0000000001070000.00000040.00000020.00020000.00000000.sdmp, Offset: 01070000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_8_2_1070000_server.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 9409034ba566f01a30e1b992b04ae5f26b96304c35cd5fdc1712c4ff4162c679
                                                            • Instruction ID: 061e198b69462f4408dd895339c53201318e0873b04fc827d9e0661741815584
                                                            • Opcode Fuzzy Hash: 9409034ba566f01a30e1b992b04ae5f26b96304c35cd5fdc1712c4ff4162c679
                                                            • Instruction Fuzzy Hash: 8631E1B654E3C15FD3038B319C655927FB4AE47224B0E80DBE885CF5A3D22D990AC772
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 203 1230080-12300ad 206 12300b8-12302f9 203->206
                                                            Memory Dump Source
                                                            • Source File: 00000008.00000002.1972603089.0000000001230000.00000040.00000800.00020000.00000000.sdmp, Offset: 01230000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_8_2_1230000_server.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 23115e0858675bd671622d0f3c167f2aedd547f6070e34e5b43a3e00eb5e73c0
                                                            • Instruction ID: e267be819fa107598d5f077f45fb9cd874bd020de1f85a33ef3b4911467f1490
                                                            • Opcode Fuzzy Hash: 23115e0858675bd671622d0f3c167f2aedd547f6070e34e5b43a3e00eb5e73c0
                                                            • Instruction Fuzzy Hash: 6E515430605646CFD704FF39E7A588977B2ABA520C3408929D0048FB6EFFB4994DCB92
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 244 1230006-1230076
                                                            Memory Dump Source
                                                            • Source File: 00000008.00000002.1972603089.0000000001230000.00000040.00000800.00020000.00000000.sdmp, Offset: 01230000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_8_2_1230000_server.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: d99c69f7ca4b1194f452dea36183b46bbb921e3b736f2d8ab9aa0004ebc2c8ae
                                                            • Instruction ID: fa37726905524f05d43f6c022528e91c2ffd036057ce34141200dbe0feac0289
                                                            • Opcode Fuzzy Hash: d99c69f7ca4b1194f452dea36183b46bbb921e3b736f2d8ab9aa0004ebc2c8ae
                                                            • Instruction Fuzzy Hash: 031101621AE3D08FD71387748C629903FB1AE9721434F41DBC480CF1A3D66E685AD772
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 247 10705df-10705e4 249 10705e6-10705f6 247->249 250 10705fa-1070603 247->250 249->250 253 1070606-1070620 250->253 254 1070626-1070643 253->254
                                                            Memory Dump Source
                                                            • Source File: 00000008.00000002.1972534397.0000000001070000.00000040.00000020.00020000.00000000.sdmp, Offset: 01070000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_8_2_1070000_server.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: b98eb67ceff204ff72f729dd2b0a1bc7c7f33449d6201eca8e0b024c9a06455d
                                                            • Instruction ID: e1a056ead5116e9fda5b671c443bf35b17105f82fd6e3a95e8a81fd8a3a83ef9
                                                            • Opcode Fuzzy Hash: b98eb67ceff204ff72f729dd2b0a1bc7c7f33449d6201eca8e0b024c9a06455d
                                                            • Instruction Fuzzy Hash: E501D8B550D7C45FC7028B119C50853FFB8DE87220309C4EFF8898B653D229B808C766
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 255 10705bf-10705c1 256 10705c3-10705ce 255->256 257 10705fe-1070603 255->257 258 1070606-1070620 257->258 259 1070626-1070643 258->259
                                                            Memory Dump Source
                                                            • Source File: 00000008.00000002.1972534397.0000000001070000.00000040.00000020.00020000.00000000.sdmp, Offset: 01070000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_8_2_1070000_server.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: d4a7d719f199966fec7542de56d84b59a1b82556bf8ffe6900a6cae6975df851
                                                            • Instruction ID: 4ea71076ad8530ab33e000b9982df849986cc605b2d6e784ac8378f8799121af
                                                            • Opcode Fuzzy Hash: d4a7d719f199966fec7542de56d84b59a1b82556bf8ffe6900a6cae6975df851
                                                            • Instruction Fuzzy Hash: 98F096776056409FC710DF0AED41852FBE4EB84630B08C46EED4987711D235F509CFA2
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 260 10705cf-10705d1 261 10705d3-10705de 260->261 262 107060e-1070620 260->262 263 1070626-1070643 262->263
                                                            Memory Dump Source
                                                            • Source File: 00000008.00000002.1972534397.0000000001070000.00000040.00000020.00020000.00000000.sdmp, Offset: 01070000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_8_2_1070000_server.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: cfb2a9150c5d4a24189de87ea36df7ce581579cbca5882db596b2b5775ab97d1
                                                            • Instruction ID: 8a318f7cd71c474b53806adc7595f0815ee88dd3003c68bf200f1b6d826cd55b
                                                            • Opcode Fuzzy Hash: cfb2a9150c5d4a24189de87ea36df7ce581579cbca5882db596b2b5775ab97d1
                                                            • Instruction Fuzzy Hash: A0F0A077A056408FCB00CF16EC810A1FB90EF95630718C4ABD8498B711D236E609CFA2
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 264 1070606-1070620 265 1070626-1070643 264->265
                                                            Memory Dump Source
                                                            • Source File: 00000008.00000002.1972534397.0000000001070000.00000040.00000020.00020000.00000000.sdmp, Offset: 01070000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_8_2_1070000_server.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 304b6b425121ede929386ed86141087fe4c1f2e2565e1c3b1234a284b3cc6f3a
                                                            • Instruction ID: ec9db1729fc5404e75fcb57309abba40a5d1fd26f241e387620ca1e5dbe2ac84
                                                            • Opcode Fuzzy Hash: 304b6b425121ede929386ed86141087fe4c1f2e2565e1c3b1234a284b3cc6f3a
                                                            • Instruction Fuzzy Hash: CFE092B66006008B9750DF0BEC81462F7D8EB88630B18C07FDC0D8B711D235F508CEA5
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            Memory Dump Source
                                                            • Source File: 00000008.00000002.1972407623.0000000000E12000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E12000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_8_2_e12000_server.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 347047d4e6124d17e3713dcdccfb5d69e9125ca4037a58fb26bac5a2ed712881
                                                            • Instruction ID: 0cc2a51dbecde3483e6aa515cf3a11a1f1d19280749d07b1a25ce69971a9f3c0
                                                            • Opcode Fuzzy Hash: 347047d4e6124d17e3713dcdccfb5d69e9125ca4037a58fb26bac5a2ed712881
                                                            • Instruction Fuzzy Hash: 14D05EB92056C14FD3169A1CC5A4BD537D8AB61718F4A54FDA8008B763C768E9D1E600
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            Memory Dump Source
                                                            • Source File: 00000008.00000002.1972407623.0000000000E12000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E12000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_8_2_e12000_server.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: d7c3e14a7a7ffa8ddadda3a7fb86b373e1583079d5fbb2c83827e5d21a281756
                                                            • Instruction ID: f4e7be095df5123eb74ff26f81ec20992e7b7095b3a3e238c98d45ef69c5bdca
                                                            • Opcode Fuzzy Hash: d7c3e14a7a7ffa8ddadda3a7fb86b373e1583079d5fbb2c83827e5d21a281756
                                                            • Instruction Fuzzy Hash: 8BD05E342002824FC715DA0CCAD4F9937D8AB50B18F1A54ECAC208B762C7A8D8D1DA00
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            Execution Graph

                                                            Execution Coverage:10.2%
                                                            Dynamic/Decrypted Code Coverage:100%
                                                            Signature Coverage:0%
                                                            Total number of Nodes:12
                                                            Total number of Limit Nodes:0
                                                            execution_graph 572 d7a646 575 d7a67e CreateMutexW 572->575 574 d7a6c1 575->574 584 d7a462 585 d7a486 RegSetValueExW 584->585 587 d7a507 585->587 592 d7a612 594 d7a646 CreateMutexW 592->594 595 d7a6c1 594->595 588 d7a361 590 d7a392 RegQueryValueExW 588->590 591 d7a41b 590->591

                                                            Callgraph

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 0 4db0310-4db0334 2 4db033e-4db0346 0->2 3 4db0336-4db0338 0->3 4 4db0348-4db034d 2->4 5 4db034e-4db0391 2->5 3->2 8 4db03d8-4db03ff 5->8 9 4db0393-4db03bb 5->9 15 4db040a-4db0418 8->15 14 4db03ce 9->14 14->8 16 4db041a 15->16 17 4db041f-4db0434 15->17 16->17 19 4db046b-4db0523 17->19 20 4db0436-4db0460 17->20 39 4db0570-4db0587 19->39 40 4db0525-4db0569 19->40 20->19 41 4db058d-4db05bf 39->41 42 4db0880 39->42 40->39 41->42
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000009.00000002.2065913851.0000000004DB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04DB0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_9_2_4db0000_server.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID: 2l$2l$2l
                                                            • API String ID: 0-1498361692
                                                            • Opcode ID: 0510906741268a867e040df70ebee8a689d198e1f444a90863e7308bf7334a88
                                                            • Instruction ID: 17e08be0ef04268d6c00ef1e56fb072903fea8ee69fe27cac66116ef7c6a03ab
                                                            • Opcode Fuzzy Hash: 0510906741268a867e040df70ebee8a689d198e1f444a90863e7308bf7334a88
                                                            • Instruction Fuzzy Hash: E3510F307002018BC709AB79D4556BE37E6AF85308B5485AAE046DF7E6EF39DD0687F2
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 53 4db03bd-4db0418 61 4db041a 53->61 62 4db041f-4db0434 53->62 61->62 64 4db046b-4db0523 62->64 65 4db0436-4db0460 62->65 84 4db0570-4db0587 64->84 85 4db0525-4db0569 64->85 65->64 86 4db058d-4db05bf 84->86 87 4db0880 84->87 85->84 86->87
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000009.00000002.2065913851.0000000004DB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04DB0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_9_2_4db0000_server.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID: 2l$2l$2l
                                                            • API String ID: 0-1498361692
                                                            • Opcode ID: bfc597a8223ed73831d5a053452c1dbd343c40cc06d8d3100cde8f53a36670d0
                                                            • Instruction ID: 582ba6b661411cfc539d559607e63c81ce53f5b2f0424cc5ba878d14d418c63e
                                                            • Opcode Fuzzy Hash: bfc597a8223ed73831d5a053452c1dbd343c40cc06d8d3100cde8f53a36670d0
                                                            • Instruction Fuzzy Hash: C141E1307002118B8708BB7984156BE32D39FD5308B18816AE046DFBA6EF38DD0597F3
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 98 d7a612-d7a695 102 d7a697 98->102 103 d7a69a-d7a6a3 98->103 102->103 104 d7a6a5 103->104 105 d7a6a8-d7a6b1 103->105 104->105 106 d7a6b3-d7a6d7 CreateMutexW 105->106 107 d7a702-d7a707 105->107 110 d7a709-d7a70e 106->110 111 d7a6d9-d7a6ff 106->111 107->106 110->111
                                                            APIs
                                                            • CreateMutexW.KERNELBASE(?,?), ref: 00D7A6B9
                                                            Memory Dump Source
                                                            • Source File: 00000009.00000002.2064750190.0000000000D7A000.00000040.00000800.00020000.00000000.sdmp, Offset: 00D7A000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_9_2_d7a000_server.jbxd
                                                            Similarity
                                                            • API ID: CreateMutex
                                                            • String ID:
                                                            • API String ID: 1964310414-0
                                                            • Opcode ID: 1a515889de1d859b0a6020dff2979241c6e5651897ddc3d1da6454c5ff8d9cc9
                                                            • Instruction ID: 1b4590865bc06949be09c8a160414a7163e5820a6048beaa32e11faa8f0faa0f
                                                            • Opcode Fuzzy Hash: 1a515889de1d859b0a6020dff2979241c6e5651897ddc3d1da6454c5ff8d9cc9
                                                            • Instruction Fuzzy Hash: 363170715097806FE711CB65CC85B96BFF8EF46214F08849AE988CB292E365E909C772
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 114 d7a361-d7a3cf 117 d7a3d4-d7a3dd 114->117 118 d7a3d1 114->118 119 d7a3e2-d7a3e8 117->119 120 d7a3df 117->120 118->117 121 d7a3ed-d7a404 119->121 122 d7a3ea 119->122 120->119 124 d7a406-d7a419 RegQueryValueExW 121->124 125 d7a43b-d7a440 121->125 122->121 126 d7a442-d7a447 124->126 127 d7a41b-d7a438 124->127 125->124 126->127
                                                            APIs
                                                            • RegQueryValueExW.KERNELBASE(?,00000E24,D9BB793B,00000000,00000000,00000000,00000000), ref: 00D7A40C
                                                            Memory Dump Source
                                                            • Source File: 00000009.00000002.2064750190.0000000000D7A000.00000040.00000800.00020000.00000000.sdmp, Offset: 00D7A000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_9_2_d7a000_server.jbxd
                                                            Similarity
                                                            • API ID: QueryValue
                                                            • String ID:
                                                            • API String ID: 3660427363-0
                                                            • Opcode ID: a937e3c0a723a86a4b6266f4a2f1ffd56865abdc8b93f43bf740014b3ba4aa75
                                                            • Instruction ID: 1dc93e400057eaf6ac9b0de7194e0fc07dce4e97a97e4663d84d5525acbb872c
                                                            • Opcode Fuzzy Hash: a937e3c0a723a86a4b6266f4a2f1ffd56865abdc8b93f43bf740014b3ba4aa75
                                                            • Instruction Fuzzy Hash: B931D571509740AFE721CF15CC84F96BBF8EF46310F08849AE989CB292D324E948CB72
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 131 d7a462-d7a4c3 134 d7a4c5 131->134 135 d7a4c8-d7a4d4 131->135 134->135 136 d7a4d6 135->136 137 d7a4d9-d7a4f0 135->137 136->137 139 d7a527-d7a52c 137->139 140 d7a4f2-d7a505 RegSetValueExW 137->140 139->140 141 d7a507-d7a524 140->141 142 d7a52e-d7a533 140->142 142->141
                                                            APIs
                                                            • RegSetValueExW.KERNELBASE(?,00000E24,D9BB793B,00000000,00000000,00000000,00000000), ref: 00D7A4F8
                                                            Memory Dump Source
                                                            • Source File: 00000009.00000002.2064750190.0000000000D7A000.00000040.00000800.00020000.00000000.sdmp, Offset: 00D7A000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_9_2_d7a000_server.jbxd
                                                            Similarity
                                                            • API ID: Value
                                                            • String ID:
                                                            • API String ID: 3702945584-0
                                                            • Opcode ID: e35e23134eee97ccca3e291aac4295f1d1d337321f74765439c35ae15d5e1612
                                                            • Instruction ID: af61363026148cf7ef5236efd5bd74e977191629ed96f44cd8878690285e8242
                                                            • Opcode Fuzzy Hash: e35e23134eee97ccca3e291aac4295f1d1d337321f74765439c35ae15d5e1612
                                                            • Instruction Fuzzy Hash: 0121A4B25043806FD7228F15DC44FA7BFB8EF46714F08849AE989CB692D364E948C772
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 146 d7a646-d7a695 149 d7a697 146->149 150 d7a69a-d7a6a3 146->150 149->150 151 d7a6a5 150->151 152 d7a6a8-d7a6b1 150->152 151->152 153 d7a6b3-d7a6bb CreateMutexW 152->153 154 d7a702-d7a707 152->154 155 d7a6c1-d7a6d7 153->155 154->153 157 d7a709-d7a70e 155->157 158 d7a6d9-d7a6ff 155->158 157->158
                                                            APIs
                                                            • CreateMutexW.KERNELBASE(?,?), ref: 00D7A6B9
                                                            Memory Dump Source
                                                            • Source File: 00000009.00000002.2064750190.0000000000D7A000.00000040.00000800.00020000.00000000.sdmp, Offset: 00D7A000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_9_2_d7a000_server.jbxd
                                                            Similarity
                                                            • API ID: CreateMutex
                                                            • String ID:
                                                            • API String ID: 1964310414-0
                                                            • Opcode ID: 9a075ad8213ed8c849afd448b56fc2359e5b157d3a1b946ece178d04e3e3e085
                                                            • Instruction ID: 445aeb91c0e74534f1ebf96e669ec6323f1eaf52ca06bfef770491f6adf42b82
                                                            • Opcode Fuzzy Hash: 9a075ad8213ed8c849afd448b56fc2359e5b157d3a1b946ece178d04e3e3e085
                                                            • Instruction Fuzzy Hash: BF2183716002409FE710CF69CD45BAAF7E8EF54714F188469E948CB641E375E909CA76
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 161 d7a392-d7a3cf 163 d7a3d4-d7a3dd 161->163 164 d7a3d1 161->164 165 d7a3e2-d7a3e8 163->165 166 d7a3df 163->166 164->163 167 d7a3ed-d7a404 165->167 168 d7a3ea 165->168 166->165 170 d7a406-d7a419 RegQueryValueExW 167->170 171 d7a43b-d7a440 167->171 168->167 172 d7a442-d7a447 170->172 173 d7a41b-d7a438 170->173 171->170 172->173
                                                            APIs
                                                            • RegQueryValueExW.KERNELBASE(?,00000E24,D9BB793B,00000000,00000000,00000000,00000000), ref: 00D7A40C
                                                            Memory Dump Source
                                                            • Source File: 00000009.00000002.2064750190.0000000000D7A000.00000040.00000800.00020000.00000000.sdmp, Offset: 00D7A000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_9_2_d7a000_server.jbxd
                                                            Similarity
                                                            • API ID: QueryValue
                                                            • String ID:
                                                            • API String ID: 3660427363-0
                                                            • Opcode ID: 354ff4fd608c494d9a652ca18a0c1b1ceb93b09aa4eb2a157520c08d60c4ba31
                                                            • Instruction ID: 70a6e9694c4fd276820ee677dead342f4ef835aa79db3e83ef0103c49da3990c
                                                            • Opcode Fuzzy Hash: 354ff4fd608c494d9a652ca18a0c1b1ceb93b09aa4eb2a157520c08d60c4ba31
                                                            • Instruction Fuzzy Hash: FA218E75600604AFE720CF59CC84FA6B7ECEF54714F08C45AE949CB651E361E949CAB2
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 177 d7a486-d7a4c3 179 d7a4c5 177->179 180 d7a4c8-d7a4d4 177->180 179->180 181 d7a4d6 180->181 182 d7a4d9-d7a4f0 180->182 181->182 184 d7a527-d7a52c 182->184 185 d7a4f2-d7a505 RegSetValueExW 182->185 184->185 186 d7a507-d7a524 185->186 187 d7a52e-d7a533 185->187 187->186
                                                            APIs
                                                            • RegSetValueExW.KERNELBASE(?,00000E24,D9BB793B,00000000,00000000,00000000,00000000), ref: 00D7A4F8
                                                            Memory Dump Source
                                                            • Source File: 00000009.00000002.2064750190.0000000000D7A000.00000040.00000800.00020000.00000000.sdmp, Offset: 00D7A000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_9_2_d7a000_server.jbxd
                                                            Similarity
                                                            • API ID: Value
                                                            • String ID:
                                                            • API String ID: 3702945584-0
                                                            • Opcode ID: 28206c0905363d1123af0744d84f66ac2da4941f211df8962603a16cd5ff6bad
                                                            • Instruction ID: 439230260a4b8bb2daeb7623ce1596c2fca451f0591864de8eb5510eaad7bc45
                                                            • Opcode Fuzzy Hash: 28206c0905363d1123af0744d84f66ac2da4941f211df8962603a16cd5ff6bad
                                                            • Instruction Fuzzy Hash: E6118476600600AFE7218E15DC45FABB7ECEF54714F08C45AED4DCA691E361E9488AB2
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 191 ff026d-ff05b2 194 ff05b4-ff05be 191->194 195 ff0610-ff061b 191->195 196 ff0620 195->196 198 ff0626-ff0643 196->198
                                                            Memory Dump Source
                                                            • Source File: 00000009.00000002.2065457339.0000000000FF0000.00000040.00000020.00020000.00000000.sdmp, Offset: 00FF0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_9_2_ff0000_server.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: a71109302f0892c4f707159cb1537a192174c31047349a3f644af2050f1846b1
                                                            • Instruction ID: 2f0534b753b85e893b571e9bf82cb8f3adfcdd94abc211be7c1212f1329c2a2a
                                                            • Opcode Fuzzy Hash: a71109302f0892c4f707159cb1537a192174c31047349a3f644af2050f1846b1
                                                            • Instruction Fuzzy Hash: 73218A6654E3C14FD7134B759C641A0BFB0AE93220B0E80EBC8C9CF5B3D1695909DB63
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 199 4db0080-4db00ad 202 4db00b8-4db02f9 199->202
                                                            Memory Dump Source
                                                            • Source File: 00000009.00000002.2065913851.0000000004DB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04DB0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_9_2_4db0000_server.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 4458579456cfaec111cef875a01c961066539a9fe9278a43666e0537a719aadb
                                                            • Instruction ID: cc193391c33ca25097dab4c7538942755b543f320a2694362236db7485ed641a
                                                            • Opcode Fuzzy Hash: 4458579456cfaec111cef875a01c961066539a9fe9278a43666e0537a719aadb
                                                            • Instruction Fuzzy Hash: C4513D30201646CBD704FF3CE78589A77B2ABA520D3508929D0048FBAFEF749949CBD2
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 240 4db0007-4db0076
                                                            Memory Dump Source
                                                            • Source File: 00000009.00000002.2065913851.0000000004DB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04DB0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_9_2_4db0000_server.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 1ac259364506d369c5a9ffe21c45e903c64ad1504cac0c0f5822de8b1c3fa113
                                                            • Instruction ID: 12e37638e842df186bdf9e86e8d72f36193ce6ee8a146b31107cd06560692815
                                                            • Opcode Fuzzy Hash: 1ac259364506d369c5a9ffe21c45e903c64ad1504cac0c0f5822de8b1c3fa113
                                                            • Instruction Fuzzy Hash: 4D01E9A698F7C04FD3031A742CB41913F70AA1B21AB5E44DBC9C0CB0A7E11D6A0EA332
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 241 ff05e0-ff05e2 242 ff0637-ff0643 241->242 243 ff05e4-ff061b 241->243 245 ff0620 243->245 246 ff0626-ff0643 245->246
                                                            Memory Dump Source
                                                            • Source File: 00000009.00000002.2065457339.0000000000FF0000.00000040.00000020.00020000.00000000.sdmp, Offset: 00FF0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_9_2_ff0000_server.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 3ac2ca07a3b4e648ef883ba2d342cf2fa671eaaf2f7203c471ccd8684e805f5c
                                                            • Instruction ID: 1c01ce5cf1e4b4256b726eb569838d2d26163c185cc478657be4edc93c0b7ea3
                                                            • Opcode Fuzzy Hash: 3ac2ca07a3b4e648ef883ba2d342cf2fa671eaaf2f7203c471ccd8684e805f5c
                                                            • Instruction Fuzzy Hash: 6701DBB65087806FC7118F059C44862FFA8EBC5620709C49FED4D8B752D125B809C7B2
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 247 ff0606-ff0620 249 ff0626-ff0643 247->249
                                                            Memory Dump Source
                                                            • Source File: 00000009.00000002.2065457339.0000000000FF0000.00000040.00000020.00020000.00000000.sdmp, Offset: 00FF0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_9_2_ff0000_server.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 6404cb0d337230a375bf30db672db1defd6df8c5cf5eb5f95502f5c7bcfc78be
                                                            • Instruction ID: 0c5374674220fc3731723228d71aff08eb3595368d215a39d37c4fc2a9f33437
                                                            • Opcode Fuzzy Hash: 6404cb0d337230a375bf30db672db1defd6df8c5cf5eb5f95502f5c7bcfc78be
                                                            • Instruction Fuzzy Hash: 74E092B66006009BD750CF0BEC85462F7E8EB84630708C47FDC0D8BB01E235F508CAA5
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 250 ff05c0-ff05c2 251 ff05c4-ff05ce 250->251 252 ff0620 250->252 251->252 253 ff0626-ff0643 252->253
                                                            Memory Dump Source
                                                            • Source File: 00000009.00000002.2065457339.0000000000FF0000.00000040.00000020.00020000.00000000.sdmp, Offset: 00FF0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_9_2_ff0000_server.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 0dcdbcabe9d07880599470c50c33a5fa1fbea6253cfd9e707d62b722548554e1
                                                            • Instruction ID: 7ccc463112b4d7b6c6be4d84e22d6fbe9849636ded269217a3cf9b9909d391b4
                                                            • Opcode Fuzzy Hash: 0dcdbcabe9d07880599470c50c33a5fa1fbea6253cfd9e707d62b722548554e1
                                                            • Instruction Fuzzy Hash: E5E08C36B055154BAA40CA0AFC415BAB380EBC1231B18807BC809CB751DA26E559D696
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 254 d723f4-d723ff 255 d72412-d72417 254->255 256 d72401-d7240e 254->256 257 d7241a 255->257 258 d72419 255->258 256->255 259 d72420-d72421 257->259
                                                            Memory Dump Source
                                                            • Source File: 00000009.00000002.2064690210.0000000000D72000.00000040.00000800.00020000.00000000.sdmp, Offset: 00D72000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_9_2_d72000_server.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: a573176fdab6f55818380781ef8947f387223f07b2f9ca20201514bcf608925c
                                                            • Instruction ID: 2874a2f2d74fdbf7c70513a269c1ed5639dfba32ab1ad5c2e3d5b8145acc1c68
                                                            • Opcode Fuzzy Hash: a573176fdab6f55818380781ef8947f387223f07b2f9ca20201514bcf608925c
                                                            • Instruction Fuzzy Hash: EAD05E7A2056C18FD3169A1CC1A5BA537D8AB61718F4A84F9A8048B763C768D981D610
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            Memory Dump Source
                                                            • Source File: 00000009.00000002.2064690210.0000000000D72000.00000040.00000800.00020000.00000000.sdmp, Offset: 00D72000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_9_2_d72000_server.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: fc7b463710959ae6534a9a9266b62264eb65f2c56c2f79acda3de7879966f69f
                                                            • Instruction ID: a8d2c413a751cfe18f27f74c107289e698c61e424dd91cf3e21b3a4f4f3f1f7e
                                                            • Opcode Fuzzy Hash: fc7b463710959ae6534a9a9266b62264eb65f2c56c2f79acda3de7879966f69f
                                                            • Instruction Fuzzy Hash: 35D05E342006C14BC715DA0CC6D4F6937D8AB50B14F1A84ECAC108B762C7A8D8C1CA10
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            Execution Graph

                                                            Execution Coverage:12.5%
                                                            Dynamic/Decrypted Code Coverage:100%
                                                            Signature Coverage:0%
                                                            Total number of Nodes:19
                                                            Total number of Limit Nodes:1
                                                            execution_graph 503 60a710 504 60a74e FindCloseChangeNotification 503->504 506 60a788 504->506 495 60a361 497 60a392 RegQueryValueExW 495->497 498 60a41b 497->498 499 60a462 501 60a486 RegSetValueExW 499->501 502 60a507 501->502 507 60a612 510 60a646 CreateMutexW 507->510 509 60a6c1 510->509 483 60a646 485 60a67e CreateMutexW 483->485 486 60a6c1 485->486 491 60a74e 492 60a7b9 491->492 493 60a77a FindCloseChangeNotification 491->493 492->493 494 60a788 493->494

                                                            Callgraph

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 0 b00310-b00334 2 b00336-b00338 0->2 3 b0033e-b00346 0->3 2->3 4 b00348-b0034d 3->4 5 b0034e-b0035c 3->5 7 b00362-b00391 5->7 8 b0035e-b00360 5->8 10 b00393-b003bb 7->10 11 b003d8-b003ff 7->11 8->7 16 b003ce 10->16 17 b0040a-b00418 11->17 16->11 18 b0041a 17->18 19 b0041f-b00434 17->19 18->19 21 b00436-b00460 19->21 22 b0046b-b00523 19->22 21->22 41 b00570-b00587 22->41 42 b00525-b00569 22->42 43 b00880 41->43 44 b0058d-b005bf 41->44 42->41 44->43
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 0000000A.00000002.2146800267.0000000000B00000.00000040.00000800.00020000.00000000.sdmp, Offset: 00B00000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_10_2_b00000_server.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID: [:l^$-[:l^$2l$2l$2l$=[:l^
                                                            • API String ID: 0-161321113
                                                            • Opcode ID: 275096062fe62a38c763629573a5ccaeb130ddfd846dca1597b3948d24e15cb1
                                                            • Instruction ID: d5125c17c964340d0c093ada6aed5d0e329cf9b604b2ef0dc50bd62cca73fe8f
                                                            • Opcode Fuzzy Hash: 275096062fe62a38c763629573a5ccaeb130ddfd846dca1597b3948d24e15cb1
                                                            • Instruction Fuzzy Hash: 3A5134307046118FC718EB3594657BE3AE3AF99304B1994AAE006DB7E9DF34CD4687A2
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 55 b003bd-b00418 63 b0041a 55->63 64 b0041f-b00434 55->64 63->64 66 b00436-b00460 64->66 67 b0046b-b00523 64->67 66->67 86 b00570-b00587 67->86 87 b00525-b00569 67->87 88 b00880 86->88 89 b0058d-b005bf 86->89 87->86 89->88
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 0000000A.00000002.2146800267.0000000000B00000.00000040.00000800.00020000.00000000.sdmp, Offset: 00B00000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_10_2_b00000_server.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID: [:l^$-[:l^$2l$2l$2l$=[:l^
                                                            • API String ID: 0-161321113
                                                            • Opcode ID: 82c0aab541eb498278422e2d9f0b7cc5749084e608164549c6cc676b7c22e72a
                                                            • Instruction ID: e77d5fcd8ef8b61e5fd0f82e8772131a372d347503a8f3a8d0751ca01149c067
                                                            • Opcode Fuzzy Hash: 82c0aab541eb498278422e2d9f0b7cc5749084e608164549c6cc676b7c22e72a
                                                            • Instruction Fuzzy Hash: EC41E3307005118BCB18BB7984257FE36D39FD6308B09A06AE006DB7E5DF28CD0A97A7
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 100 60a612-60a695 104 60a697 100->104 105 60a69a-60a6a3 100->105 104->105 106 60a6a5 105->106 107 60a6a8-60a6b1 105->107 106->107 108 60a702-60a707 107->108 109 60a6b3-60a6d7 CreateMutexW 107->109 108->109 112 60a709-60a70e 109->112 113 60a6d9-60a6ff 109->113 112->113
                                                            APIs
                                                            • CreateMutexW.KERNELBASE(?,?), ref: 0060A6B9
                                                            Memory Dump Source
                                                            • Source File: 0000000A.00000002.2146392816.000000000060A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0060A000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_10_2_60a000_server.jbxd
                                                            Similarity
                                                            • API ID: CreateMutex
                                                            • String ID:
                                                            • API String ID: 1964310414-0
                                                            • Opcode ID: af28417036d3878fb717f07310f566e06ed0630df752bf71697cfa61977f3f56
                                                            • Instruction ID: 3aeb31311f26d95997b0f0b1f091f505d94cbe99d83d956b21ba36b76e2f6f41
                                                            • Opcode Fuzzy Hash: af28417036d3878fb717f07310f566e06ed0630df752bf71697cfa61977f3f56
                                                            • Instruction Fuzzy Hash: 2A3181B55097805FE712CB65CD85B96BFF8EF06310F08849AE984CF292D375E909C762
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 116 60a361-60a3cf 119 60a3d1 116->119 120 60a3d4-60a3dd 116->120 119->120 121 60a3e2-60a3e8 120->121 122 60a3df 120->122 123 60a3ea 121->123 124 60a3ed-60a404 121->124 122->121 123->124 126 60a406-60a419 RegQueryValueExW 124->126 127 60a43b-60a440 124->127 128 60a442-60a447 126->128 129 60a41b-60a438 126->129 127->126 128->129
                                                            APIs
                                                            • RegQueryValueExW.KERNELBASE(?,00000E24,6D8DEACA,00000000,00000000,00000000,00000000), ref: 0060A40C
                                                            Memory Dump Source
                                                            • Source File: 0000000A.00000002.2146392816.000000000060A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0060A000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_10_2_60a000_server.jbxd
                                                            Similarity
                                                            • API ID: QueryValue
                                                            • String ID:
                                                            • API String ID: 3660427363-0
                                                            • Opcode ID: acf2ba78d2423e1edd3bb4b187ae995c9ab53b3eab3cbd6113d53311d70449b7
                                                            • Instruction ID: 0e68e5b5670094b6ffd9ef7443fad1ce26320e5f46ac789e62e10c877fbaea41
                                                            • Opcode Fuzzy Hash: acf2ba78d2423e1edd3bb4b187ae995c9ab53b3eab3cbd6113d53311d70449b7
                                                            • Instruction Fuzzy Hash: F5315075505740AFD722CF55CC84FA3BBF8EF06710F08849AE985CB292D364E949CB62
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 133 60a462-60a4c3 136 60a4c5 133->136 137 60a4c8-60a4d4 133->137 136->137 138 60a4d6 137->138 139 60a4d9-60a4f0 137->139 138->139 141 60a4f2-60a505 RegSetValueExW 139->141 142 60a527-60a52c 139->142 143 60a507-60a524 141->143 144 60a52e-60a533 141->144 142->141 144->143
                                                            APIs
                                                            • RegSetValueExW.KERNELBASE(?,00000E24,6D8DEACA,00000000,00000000,00000000,00000000), ref: 0060A4F8
                                                            Memory Dump Source
                                                            • Source File: 0000000A.00000002.2146392816.000000000060A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0060A000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_10_2_60a000_server.jbxd
                                                            Similarity
                                                            • API ID: Value
                                                            • String ID:
                                                            • API String ID: 3702945584-0
                                                            • Opcode ID: 8889d0ad726e6f265068228f70bf2863b29de3f91030b1d6b549b8a3a50c231b
                                                            • Instruction ID: 1d41573547ac19033932eab463af96ab41629df93787fc0ae6f14a29eede489e
                                                            • Opcode Fuzzy Hash: 8889d0ad726e6f265068228f70bf2863b29de3f91030b1d6b549b8a3a50c231b
                                                            • Instruction Fuzzy Hash: 8D21B0B65043806FD7228F51CC44FA3BFB8EF46210F08849AE985CB692C364E848C772
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 148 60a646-60a695 151 60a697 148->151 152 60a69a-60a6a3 148->152 151->152 153 60a6a5 152->153 154 60a6a8-60a6b1 152->154 153->154 155 60a702-60a707 154->155 156 60a6b3-60a6bb CreateMutexW 154->156 155->156 157 60a6c1-60a6d7 156->157 159 60a709-60a70e 157->159 160 60a6d9-60a6ff 157->160 159->160
                                                            APIs
                                                            • CreateMutexW.KERNELBASE(?,?), ref: 0060A6B9
                                                            Memory Dump Source
                                                            • Source File: 0000000A.00000002.2146392816.000000000060A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0060A000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_10_2_60a000_server.jbxd
                                                            Similarity
                                                            • API ID: CreateMutex
                                                            • String ID:
                                                            • API String ID: 1964310414-0
                                                            • Opcode ID: 6562862533143bc61fda7173fcabc7da9baba581bf3fdb4cd9d5d68c8598f7e1
                                                            • Instruction ID: 6e1baae53913a843eb2593855e5ddef5b569913d09898f0d41aabc0bf35c29ea
                                                            • Opcode Fuzzy Hash: 6562862533143bc61fda7173fcabc7da9baba581bf3fdb4cd9d5d68c8598f7e1
                                                            • Instruction Fuzzy Hash: 9A21B0756002009FE720CB65CD45BA6FBE8EF14310F088469E948CB781D371E909CA76
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 163 60a710-60a778 165 60a7b9-60a7be 163->165 166 60a77a-60a782 FindCloseChangeNotification 163->166 165->166 167 60a788-60a79a 166->167 169 60a7c0-60a7c5 167->169 170 60a79c-60a7b8 167->170 169->170
                                                            APIs
                                                            • FindCloseChangeNotification.KERNELBASE(?), ref: 0060A780
                                                            Memory Dump Source
                                                            • Source File: 0000000A.00000002.2146392816.000000000060A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0060A000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_10_2_60a000_server.jbxd
                                                            Similarity
                                                            • API ID: ChangeCloseFindNotification
                                                            • String ID:
                                                            • API String ID: 2591292051-0
                                                            • Opcode ID: a5694dc3e3a2a1119e95900779b9bda2b636892718b956f11e1e3cb6c8f43cea
                                                            • Instruction ID: 855d496716b2d0d38c390ef939d9240a80cb8b6bbdc90ec3eaa206e2ed83daa2
                                                            • Opcode Fuzzy Hash: a5694dc3e3a2a1119e95900779b9bda2b636892718b956f11e1e3cb6c8f43cea
                                                            • Instruction Fuzzy Hash: FD21F3B55093809FDB028F25DC85792BFB4EF02320F0884EBDD858B693D2359909CBA2
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 172 60a392-60a3cf 174 60a3d1 172->174 175 60a3d4-60a3dd 172->175 174->175 176 60a3e2-60a3e8 175->176 177 60a3df 175->177 178 60a3ea 176->178 179 60a3ed-60a404 176->179 177->176 178->179 181 60a406-60a419 RegQueryValueExW 179->181 182 60a43b-60a440 179->182 183 60a442-60a447 181->183 184 60a41b-60a438 181->184 182->181 183->184
                                                            APIs
                                                            • RegQueryValueExW.KERNELBASE(?,00000E24,6D8DEACA,00000000,00000000,00000000,00000000), ref: 0060A40C
                                                            Memory Dump Source
                                                            • Source File: 0000000A.00000002.2146392816.000000000060A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0060A000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_10_2_60a000_server.jbxd
                                                            Similarity
                                                            • API ID: QueryValue
                                                            • String ID:
                                                            • API String ID: 3660427363-0
                                                            • Opcode ID: b6d860920c275577b5a010ff578eb2980fc8797ca768448c2623f5e6832e7651
                                                            • Instruction ID: 4e233d33b5d8316d2872665477df7a0fd0d4be7e2a8677fee785c021062a371e
                                                            • Opcode Fuzzy Hash: b6d860920c275577b5a010ff578eb2980fc8797ca768448c2623f5e6832e7651
                                                            • Instruction Fuzzy Hash: 11216A76600704AEE720CE55CC84FA7B7ECEF14750F08845AE946CB791D3A0E949CAB2
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 188 60a486-60a4c3 190 60a4c5 188->190 191 60a4c8-60a4d4 188->191 190->191 192 60a4d6 191->192 193 60a4d9-60a4f0 191->193 192->193 195 60a4f2-60a505 RegSetValueExW 193->195 196 60a527-60a52c 193->196 197 60a507-60a524 195->197 198 60a52e-60a533 195->198 196->195 198->197
                                                            APIs
                                                            • RegSetValueExW.KERNELBASE(?,00000E24,6D8DEACA,00000000,00000000,00000000,00000000), ref: 0060A4F8
                                                            Memory Dump Source
                                                            • Source File: 0000000A.00000002.2146392816.000000000060A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0060A000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_10_2_60a000_server.jbxd
                                                            Similarity
                                                            • API ID: Value
                                                            • String ID:
                                                            • API String ID: 3702945584-0
                                                            • Opcode ID: c62bacefd9c2af5776e4838f14288ce78df911eb4e25da3815d7f17841ca6432
                                                            • Instruction ID: 833678bfad91d418be57b398f4840b1e4d09d3a0dc3d0650b93efabac31e7cb1
                                                            • Opcode Fuzzy Hash: c62bacefd9c2af5776e4838f14288ce78df911eb4e25da3815d7f17841ca6432
                                                            • Instruction Fuzzy Hash: F811ACB6640700AFEB218E55CC45FA7BBECEF15714F08845AE949CA781D360E9488AB2
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 202 60a74e-60a778 203 60a7b9-60a7be 202->203 204 60a77a-60a782 FindCloseChangeNotification 202->204 203->204 205 60a788-60a79a 204->205 207 60a7c0-60a7c5 205->207 208 60a79c-60a7b8 205->208 207->208
                                                            APIs
                                                            • FindCloseChangeNotification.KERNELBASE(?), ref: 0060A780
                                                            Memory Dump Source
                                                            • Source File: 0000000A.00000002.2146392816.000000000060A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0060A000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_10_2_60a000_server.jbxd
                                                            Similarity
                                                            • API ID: ChangeCloseFindNotification
                                                            • String ID:
                                                            • API String ID: 2591292051-0
                                                            • Opcode ID: 03b6bc9969f3d71644851904efe4d5de73982de9fe1b882ef4461e0b4473c929
                                                            • Instruction ID: 1c1eafb933be766e409ceb9e6a991439938f267e39e6cc1541c745c70e7ceb85
                                                            • Opcode Fuzzy Hash: 03b6bc9969f3d71644851904efe4d5de73982de9fe1b882ef4461e0b4473c929
                                                            • Instruction Fuzzy Hash: 8101DF79A003009FEB50CF55D9857A6FBE4EF15320F08C4ABDD498B782D275E808CEA2
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 210 b00080-b000ad 213 b000b8-b002f9 210->213
                                                            Memory Dump Source
                                                            • Source File: 0000000A.00000002.2146800267.0000000000B00000.00000040.00000800.00020000.00000000.sdmp, Offset: 00B00000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_10_2_b00000_server.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: b5570819ba74efb255a3a074fb5695f7c80d53121cf1c85844cf033ef4b95d3b
                                                            • Instruction ID: 6bf0b7965fe9c6e07797fe6ac38cd7d4c20e10aa766dde778c530c827c908535
                                                            • Opcode Fuzzy Hash: b5570819ba74efb255a3a074fb5695f7c80d53121cf1c85844cf033ef4b95d3b
                                                            • Instruction Fuzzy Hash: D3518330605A86CBC754FB34E5949CA77F2BBB6308306E929D0054B76EDF309949CB82
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 251 b00006-b00076
                                                            Memory Dump Source
                                                            • Source File: 0000000A.00000002.2146800267.0000000000B00000.00000040.00000800.00020000.00000000.sdmp, Offset: 00B00000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_10_2_b00000_server.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: db11ddc773069eee9c9a5667fef204826848fb39f11cb1fbd03bad8d7a1a819a
                                                            • Instruction ID: d62620966b2d6fcceab2f701e4aa355c702e75ae113f6b20d35cd836b40eef21
                                                            • Opcode Fuzzy Hash: db11ddc773069eee9c9a5667fef204826848fb39f11cb1fbd03bad8d7a1a819a
                                                            • Instruction Fuzzy Hash: B701059A84E7C14FCB5357B05C296907FB06E13224B9F42DBC082CF9B7E29C094AD722
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 253 b305e0-b305e2 254 b305e5-b30603 253->254 255 b305e4 253->255 256 b30606-b30620 254->256 255->254 257 b30626-b30643 256->257
                                                            Memory Dump Source
                                                            • Source File: 0000000A.00000002.2146829341.0000000000B30000.00000040.00000020.00020000.00000000.sdmp, Offset: 00B30000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_10_2_b30000_server.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: d66d3c5d2ff5fe8692818d71718e6f71d58ed9909566843ec6667d70a9d21a86
                                                            • Instruction ID: e2938abf641cd9cfed6670dbb1006f07ccc4f0aeb81f97c7a944b22744025a2f
                                                            • Opcode Fuzzy Hash: d66d3c5d2ff5fe8692818d71718e6f71d58ed9909566843ec6667d70a9d21a86
                                                            • Instruction Fuzzy Hash: 1D01FEB65087805FD7018F16AC448A2FFF8EF96630709C49FEC4987612D125B904CB72
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 258 b30606-b30620 259 b30626-b30643 258->259
                                                            Memory Dump Source
                                                            • Source File: 0000000A.00000002.2146829341.0000000000B30000.00000040.00000020.00020000.00000000.sdmp, Offset: 00B30000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_10_2_b30000_server.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: efdacdf51ac8df786e600d43dd8efc5cc676ca01beb3408662517779ecbac9fa
                                                            • Instruction ID: 8770fdbb7e070cb14b17dd600ddf64e1706a3e2e0a6b1b9bc196552aa48eeb34
                                                            • Opcode Fuzzy Hash: efdacdf51ac8df786e600d43dd8efc5cc676ca01beb3408662517779ecbac9fa
                                                            • Instruction Fuzzy Hash: 11E092B6600A005FD750DF0AEC45462F7D8EB94630708C47FDC0E8B701D235F508CAA5
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 260 6023f4-6023ff 261 602401-60240e 260->261 262 602412-602417 260->262 261->262 263 602419 262->263 264 60241a 262->264 265 602420-602421 264->265
                                                            Memory Dump Source
                                                            • Source File: 0000000A.00000002.2146374032.0000000000602000.00000040.00000800.00020000.00000000.sdmp, Offset: 00602000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_10_2_602000_server.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 8ff5a8e356aace91c4551e30c3e4f500c916427a3f34929ba44cd4f85606babe
                                                            • Instruction ID: 59dbcd64eb81c80241343c2f8595f9cc32a7605b2348e92f73cf1c12a570289b
                                                            • Opcode Fuzzy Hash: 8ff5a8e356aace91c4551e30c3e4f500c916427a3f34929ba44cd4f85606babe
                                                            • Instruction Fuzzy Hash: 88D05E792456C24FD31A9A1CC1A8BD637D9AF61714F4A44F9AC008B7A3C768D9D1D600
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            Memory Dump Source
                                                            • Source File: 0000000A.00000002.2146374032.0000000000602000.00000040.00000800.00020000.00000000.sdmp, Offset: 00602000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_10_2_602000_server.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: dd23c921052902b43099256f8e5a33153bd809d9af486856cb8a0244fdf50459
                                                            • Instruction ID: 662bbbc5a98f79bb30296970f29c5aca845f6a502e93800297d74c8282047024
                                                            • Opcode Fuzzy Hash: dd23c921052902b43099256f8e5a33153bd809d9af486856cb8a0244fdf50459
                                                            • Instruction Fuzzy Hash: 3AD05E342402824BCB1DDA0CD6E9F9A37D9AF50B14F1A44E8AC108B7A2C7B8DCC1CA00
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%